Find Laws Find Lawyers Free Legal Forms USA State Laws
100,000's of Government Jobs
Search Government Jobs
Advanced Search

SECURITY ENGINEER

Job Field: Legal Jobs
Location: Mountain View, CA
Salary: $Not stated
JOB SUMMARY:
</tr>
<tr><td valign="top" width="450"><b>Security EngineerLocation:Mountain View (Global HQ)Team:Technical InfrastructureApply nowThis position is based in Mountain View, CA.The area: Research and Systems InfrastructureAt Google, our users come first, and the Systems Infrastructure team is at the heart of that promise. We build the technologies that transform the way we think about doing business. Whether working on our cloud systems, researching the latest in computer technology or keeping Google''s internal systems humming, Googlers and users alike rely on us to keep things running. We''re back-end ninjas: protecting your privacy, ensuring your security and leaving no trace behind.The role: Security EngineerIf you dream about stack protection, suspicious activity in raw tcpdumps, or like nothing better than to teach others about the intricacies of Windows RPC, then we''d love to see your resume. As a Security Engineer at Google you will help Googlers design, create and maintain secure and safe operating environments. You will help protect network boundaries, keep computer systems and network devices hardened against attack, and investigate suspicious traffic on Google''s networks.Responsibilities:* Design and implement infrastructure to protect the Google network.* Conduct sophisticated security reviews of core infrastructure* Evaluate the impact of current security advisories and publications* Evangelize security within Google and provide security advice and guidanceMinimum Qualifications:* Bachelor''s Degree (In lieu of degree, 4 years relevant work experience)* 4 years relevant work experience.Preferred Qualifications:* Master''s Degree in Computer Science.* 6 years of relevant work experience.* Knowledge of network-based and system-level attacks and mitigation methods* Knowledge of system-level attacks and mitigation methods with a core competency in Windows, Linux or Mac OS X.

KEY REQUIREMENTS:
Not stated
Tips