New offer - be the first one to apply!

November 6, 2025

Senior Intelligence Analyst, Espionage, Google Threat Intelligence

Senior • On-site

$142,000 - $208,000/yr

Reston, VA , +1


Minimum qualifications:

  • Bachelor's degree or equivalent practical experience.
  • 7 years of experience conducting cyber security research and developing leads related to espionage activities.
  • 3 years of experience as a technical security professional performing digital forensics, malware reverse engineering, or systems administration.
  • Experience correlating and attributing malicious activity based on technical and geopolitical factors.
  • Experience with writing and presenting on topics for a variety of audiences.

Preferred qualifications:

  • Experience identifying and prioritizing cyber threats for investigation.
  • Experience with technical analysis, including the creation of file, host, and network signatures leveraging multiple malware and network detection platforms, static and dynamic malware analysis, host forensics or other technical topics.
  • Experience implementing techniques used to hunt for adversarial activity with an understanding of attacker methodology and methodologies.
  • Experience developing tools to uncover activity leveraging large data sets.
  • Understanding of the geopolitical drivers of cyber espionage, with a focus on threat actors that originate from Russia and work on behalf of the Russian state.

About the job

Google Threat Intelligence Group (GTIG) is a recognized leader in cyber security expertise and has earned the trust of security professionals and company executives. Our combination of renowned front-line experience, threat intelligence, machine intelligence, and the industry's best security validation ensures that we know more about today's advanced threats than anyone.

In this role, you will have analytic and communications capabilities and the ability to identify, analyze, and communicate the importance of state backed threats. You will also have knowledge of state-sponsored cyber espionage along with a technical understanding of the tools, techniques and procedures used by these threat actors. You will conduct threat research, formulate assessments, and communicate findings in your domain of experience to internal and external stakeholders. You will achieve this via the production of written intelligence reporting or the creation of structured data. You will work with a set of intelligence priorities to manage a variety of complex assignments and situations and also demonstrate full knowledge of fundamental concepts across a wide range of technical and intelligence disciplines. Within established priorities and deadlines, you will exercise acumen in selecting and applying appropriate work methods, procedures, techniques and practices.

Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

The US base salary range for this full-time position is $142,000-$208,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.

Responsibilities

  • Conduct and lead research into the capabilities, techniques, and motivations of state sponsored espionage campaigns and actors.
  • Produce and review high-quality written content to include reporting and structured data on state sponsored espionage campaigns and operations.
  • Prioritize research according to stakeholder priorities. Conduct briefings to present findings to internal and external stakeholders.
  • Maintain awareness of geopolitical trends affecting the cyber threat landscape, including cyber operations and missions, vulnerabilities, malware development, third-party risk, geopolitics, and significant global events.
  • Provide guidance to members of your team, and other teams across the organization, who are developing materials or directly supporting clients on topics related to cyber espionage.