- Career Center Home
- Search Jobs
- Security Engineer, Cloud Threat and Abuse Detection
Results
Job Details
Explore Location
Google
Sunnyvale, California, United States
(on-site)
Posted
17 hours ago
Google
Sunnyvale, California, United States
(on-site)
Job Type
Full-Time
Security Engineer, Cloud Threat and Abuse Detection
The insights provided are generated by AI and may contain inaccuracies. Please independently verify any critical information before relying on it.
Security Engineer, Cloud Threat and Abuse Detection
The insights provided are generated by AI and may contain inaccuracies. Please independently verify any critical information before relying on it.
Description
Minimum qualifications:- Bachelor's degree or equivalent practical experience.
- 2 years of experience with security assessments or security design reviews or threat modeling.
- 2 years of experience with security engineering, computer and network security and security protocols.
- 2 years of experience with coding in one or more general purpose languages.
Preferred qualifications:
- Experience with host/memory based forensics and detections.
About the job
Our Security team works to create and maintain the safest operating environment for Google's users and developers. Security Engineers work with network equipment and actively monitor our systems for attacks and intrusions. In this role, you will also work with software engineers to proactively identify and fix security flaws and vulnerabilities.
Cloud CISO Security Engineering(CCSE) is the team within the Cloud CISO organization responsible for helping ensure every product Cloud ships is as secure as it can be and increasing the assurance levels of security in the infrastructure underlying all our products. This team will also focus on increasing the capabilities of each product team to develop more secure products by design and by default, from patterns, tools and frameworks to increasing the skill level of embedded security leads.
As a Security Engineer on the Cloud Abuse Security Engineering team inside of CCSE, you will be part of the team that's responsible for protecting Google and its users from attacks and abuses originating from Google Cloud Platform. You will ensure trust and reputation not only for this product, but also for Google as a broader brand and company. You will work globally and cross-functionally with several internal stakeholders.The US base salary range for this full-time position is $147,000-$211,000 bonus equity benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
- Research new detection techniques to prevent/mitigate abusive activities such as outbound security attacks, botnet, DDoS and other malicious behaviors which violate Google Cloud Platform (GCP) terms of service.
- Develop high fidelity detection to identify malicious activity based on raw network and host level telemetry.
- Analyze various logs, packets to increase accuracy of detections.
- Hunt for threats/abusers and respond proactively.
- Create, develop and manage tools to collect and process abuse reports and threat intelligence data.
${qualifications}${responsibilities}
Requisition #: 107262608767099590
pca3lyuhf
Job ID: 83073550
Jobs You May Like
Median Salary
Net Salary per month
$8,512
Median Apartment Rent in City Center
(1-3 Bedroom)
$3,330
-
$5,403
$4,367
Safety Index
76/100
76
Utilities
Basic
(Electricity, heating, cooling, water, garbage for 915 sq ft apartment)
$100
-
$500
$255
High-Speed Internet
$50
-
$100
$65
Transportation
Gasoline
(1 gallon)
$4.66
Taxi Ride
(1 mile)
$3.86
Data is collected and updated regularly using reputable sources, including corporate websites and governmental reporting institutions.
Loading...
