Security Engineer, Product Security Engineering, Cloud CISO (google)
Job posting number: #152891 (Ref:85859757096608454)
Job Description
Qualifications
Minimum qualifications:
- Bachelor's degree or equivalent practical experience.
- 2 years of experience with security assessments or security design reviews or threat modeling.
- 2 years of coding experience in one or more general purpose languages.
- 2 years of experience with security engineering, computer and network security and security protocols.
Preferred qualifications:
- Experience in reverse engineering, static analysis or dynamic analysis, or exploit development.
Summary
- Bachelor's degree or equivalent practical experience.
- 2 years of experience with security assessments or security design reviews or threat modeling.
- 2 years of coding experience in one or more general purpose languages.
- 2 years of experience with security engineering, computer and network security and security protocols.
Description
There's no such thing as a "safe system" - only safer systems. Our Security team works to create and maintain the safest operating environment for Google's users and developers. As a Security Engineer, you help protect network boundaries, keep computer systems and network devices hardened against attacks and provide security services to protect highly sensitive data like passwords and customer information. Security Engineers work directly with network equipment and actively monitor our systems for attacks and intrusions. You also work with software engineers to proactively identify and fix security flaws and vulnerabilities.
You use your industry experience to own and drive the resolution of complex security incidents, policy questions and technical security issues.
The Product Security Engineering team is within the Cloud CISO organization responsible for helping ensure products are as secure as possible, and increase the security in the infrastructure underlying all products. In this role, you will focus on increasing the capabilities of each product team to develop more secure products by design and by default, from patterns, tools and frameworks to increasing the skill level of embedded security leads.
As a Security Engineer you will help to ensure that software and systems are designed and implemented to security standards. You will perform technical security assessments, code reviews, and vulnerability testing to highlight risk, helping Google teams and partners to improve security, and work on a wide variety of software designs and technology stacks.
Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
The US base salary range for this full-time position is $136,000-$200,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
- Perform security reviews, research and reproduce vulnerabilities, design secure protocols and systems, and write tests.
- Review and develop secure operational practices, and provide security guidance for engineers and support staff.
- Review designs and drive towards defense and security by default, both with one-time reviews and longer term engagements.
- Look for vulnerabilities with techniques including reverse engineering, static analysis, and more.
- Respond to vulnerabilities with repros, variant analysis, mitigations, and hardening.