Skip to main content

Security Engineer, Uppercase Research

Minimum qualifications:

+ Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience.

+ 2 years of experience in log analysis, security monitoring, cybersecurity, or logging and attacks.

+ 1 year of experience coding with one or more programming languages (e.g., Java, C/C++, Python).

Preferred qualifications:

+ Experience with tools used in engagement testing, security event analysis, incident response, computer forensics, network and end point architecture, or other areas of security operations.

Uppercase is a Cloud wide threat intelligence application and research team operating across multiple fronts. We are dedicated to helping companies find and stop cyber attacks before they cause harm. We work with the entire security industry to give the advantage in the fight against cyber crime. Uppercase leverages the full scope of Google's internal knowledge of the Google Cloud Platform (GCP) threat landscape to research and inform our threat detection roadmap. Joining experts in large-scale cloud computing, big data, machine learning, and cybersecurity, you'll help build out the next generation of security intelligence solutions.

In this role, you will be responsible for building threat detection rules for Google Security Operations (formerly Chronicle) and Security Command Center Enterprise customers covering common and, new and novel attacks against GCP.

Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

The US base salary range for this full-time position is $114,000-$168,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google (https://careers.google.com/benefits/) .

+ Conduct technical threat actor behavior analysis and perform deep dives into threat activity in the cloud.

+ Work with partner teams from around Google to discover new detection capabilities.

+ Write and improve YARA-L rules to track and identify potentially malicious behavior in cloud environments.

+ Contribute to building and maintaining internal processes and tooling as needed.

Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also https://careers.google.com/eeo/ and https://careers.google.com/jobs/dist/legal/OFCCP_EEO_Post.pdf If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form: https://goo.gl/forms/aBt6Pu71i1kzpLHe2.