New offer - be the first one to apply!

September 15, 2025

Senior Analyst, Mandiant Threat Intelligence Services

Senior • On-site

$132,000 - $194,000/yr

New York, NY , +1


Minimum qualifications:

  • Bachelor's degree or equivalent practical experience.
  • 5 years of experience in a customer-facing role in cyber security (e.g. Network Forensics Analyst, Threat Intelligence Analyst).
  • Experience engaging with, and presenting to, technical stakeholders and executive leaders.
  • Experience with project management.

Preferred qualifications:

  • Experience evaluating host and network forensic reports of electronic media, packet capture, log data analysis, malware triage and network devices in support of information security operations.
  • Experience processing and analyzing tactical CTI within a changing operational environment, supporting monitoring, detection, and response capabilities.
  • Ability to correlate raw intelligence from sensors, incident response engagements, and other sources into reports and briefings.
  • Ability to take ambiguous topics, build strategy, and influence stakeholders.
  • Excellent communication skills to convey technical data and information to both technical and non-technical audiences while producing clear and concise threat intelligence reports.

About the job

Mandiant is a recognized leader in cyber security and has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

This role supports Mandiant’s Advanced Intelligence Access (AIA) program. The AIA program enables customers, via an onsite Cyber Analyst, access to the totality of Mandiant’s Threat Intelligence, including raw data. In this role, you will ensure the delivery of intelligence to each customer’s security or operational environments in order to drive decision making and action. You will also acts as a conduit to Mandiant’s extensive network of cyber security, threat intelligence, and information operations professionals. Your role will be an onsite, client-facing position that requires three days a week in Dallas, Texas or New York City.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.

The US base salary range for this full-time position is $132,000-$194,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.

Responsibilities

  • Evaluate current and emerging tools and best-practices for tracking advanced persistent threats, tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends.
  • Perform strategic, operational, and tactical research and all-source analysis tailored to the client’s vertical, geographic footprint, and network mapping to produce timely and tailored intelligence.
  • Communicate complex technical findings effectively to both technical and non-technical audiences, verbally and in writing.
  • Support tactical and operational cyber fusion center stakeholders regularly to comprehensively identify and action their evolving intelligence needs and request for information.
  • Maintain a strong on-site presence at the customer's location multiple days per week, and facilitate the integration of Cyber Threat Intelligence (CTI) into the customer's existing security infrastructure, including SIEM and Threat Intelligence Platform (TIP) systems.