• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
      • Identity theft
    • Malware
      • Ransomware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Jobs » Associate Security Consultant – Entry Level 2021

Associate Security Consultant – Entry Level 2021

2020-12-07 by Geo

Los Angelas CA

Associate Security Consultant – Entry Level 2021

Company Name: FireEye, Inc.

Company Location: Los Angeles, CA, US

Company Description

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 9,000 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

Motley Fool Buy Sign
Motley Fool Buy Sign

Job Description

Job Description

Do you love the challenge of figuring out solutions to intricate technology puzzles?

Do you like to help others solve their network and information security issues?

If you answered YES, then consider a career at Mandiant as an Associate Consultant!

We have the expertise and experience in information security. This is our focus.

You’re not just a number and you won’t get lost in the shuffle.

You will be working on challenging technical projects that make an impact. You’ll be visible.

You’ll be exposed to many different environments and technologies.

You’ll learn from our best incident responders and red teamers.

We investigate breaches that make headlines (and many more that don’t), as well as break into applications and systems to identify security gaps for our clients. We find evil and solve crime, and are seeking candidates who possess the ability to think like an attacker and stay one step ahead of the game.

  • SEE ALL Cyber Security Jobs

Find your niche among the cool projects you’ll be involved with, such as:

  • Incident Response
  • Host and network forensics
  • Network traffic analysis
  • Malware analysis and reverse engineering
  • Penetration testing and Red Team
  • Network, web and mobile application security assessments
  • Source code reviews
  • And more…

Responsibilities

  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations
  • Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
  • Perform network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments and social engineering assessment
  • Build internal scripts, tools and methodologies to enhance our capabilities
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Work with security and IT operations at clients to implement remediation plans

Security training

  • Introduction to Cybersecurity Tools & Cyber Attacks by IBM
  • Financial Markets by Yale University
  • International Cyber Conflicts from the State University of New York
  • Business Foundations by University of Pennsylvania
  • (sponsored)

Requirements

Qualifications

  • Technical skills in at least two of the following areas:
    • Strong knowledge of Windows OS and networking protocols
    • Basic knowledge of tools used for forensic collection and analysis
    • Knowledge of application testing and network security concepts
    • Experience with programming/scripting languages such as Python
  • A technical security-related internship or other professional experience
  • Must be able to travel 20-30%
  • Must be eligible to work in the US without sponsorship

Additional Qualifications

  • Strong technical acumen and ability to quickly assimilate new information
  • Ability to successfully interface with clients (internal and external) and manage expectations of others
  • Ability to document and explain technical details in a concise, understandable manner
Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to [email protected]

Industry

  • Computer Networking
  • Computer & Network Security
  • Computer Software

Employment Type: Full-time

Job Functions: Information Technology

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

511 Tactical

WHAT TO SHOP NOW

Shop

Safeguard Your Money with a VPN

Beat the Stock Market! - Get Rule Breakers!

Malwarebytes Anti-Virus is On Sale!

Shop Kaspersky Anti-Virus

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Gun Forum Booted by Domain Registrar

Feds Warn of Microsoft Defender Security Bug

New and Noteworthy Security and IT Courses

Classiscam Telegram Phishing Scam Targeting Europeans

Niantic Wins Game Cheat Lawsuit

Categories

Cyber Security News

Gun Forum Booted by Domain Registrar

… [Read More...] about Gun Forum Booted by Domain Registrar

Classiscam Telegram Phishing Scam Targeting Europeans

… [Read More...] about Classiscam Telegram Phishing Scam Targeting Europeans

Niantic Wins Game Cheat Lawsuit

… [Read More...] about Niantic Wins Game Cheat Lawsuit

Reserve Bank of New Zealand Reports Data Breach

… [Read More...] about Reserve Bank of New Zealand Reports Data Breach

More Cyber Security News

Tags

amazon Android Apple bitcoin Career China chrome CISA credit card Cyber Attack Cyber security Data Breach data privacy DHS Equifax Facebook FBI Firefox FTC games GDPR Google Government hack hacker identity theft iPhone Iran IRS malware Microsoft North Korea PayPal phishing phishing email ransomware Russia scam smartphone TikTok tutorial VPN web browser WhatsApp WiFi

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • News
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version