Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
 - Change status (Applied, Interview, Offer, etc.)
 - Add personal notes and comments
 - Set reminders for follow-ups
 - Track your entire application journey
 
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
 - Review job details later without searching again
 - Compare with other saved opportunities
 - Keep a collection of interesting positions
 - Receive notifications about saved jobs before they expire
 
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
๐ ๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
We are seeking a highly skilled L2 Security Analyst to join our Security Operations Center (SOC) team, deployed at Ooredoo's headquarters in Doha. In this role, you will be a key player in defending against sophisticated cyber threats within a cutting-edge hybrid environment. You will serve as the primary technical escalation point for L1 analysts, leveraging your deep expertise in Splunk Enterprise Security and Google Cloud security technologies like Chronicle and Security Command Center. Your responsibilities will include advanced incident investigation, proactive threat hunting, and engineering robust detection mechanisms. This position is crucial for enhancing our operational resilience by improving detection logic, automating response actions, and ensuring rapid containment of security incidents. You will collaborate closely with various security teams to strengthen Ooredoo's overall security posture.
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
๐ฏ ๐ฅ๐ฒ๐พ๐๐ถ๐ฟ๐ฒ๐บ๐ฒ๐ป๐๐:
โธ Strong hands-on experience with Splunk Enterprise Security (ES), including creating advanced SPL queries and custom correlation searches.
โธ Demonstrated expertise in Google Chronicle SIEM for threat hunting and Google Cloud Security Command Center (SCC) for incident analysis.
โธ Proficiency with Endpoint Detection and Response (EDR) tools such as Trellix EDR and Microsoft Defender for Endpoint.
โธ Solid understanding of network protocols, firewalls, IDS/IPS, endpoint logs, and authentication systems.
โธ Proven ability to conduct root-cause analysis by correlating data from multiple security sources (SIEM, EDR, Cloud).
โธ Experience in developing custom detection rules and use cases mapped to the MITRE ATT&CK framework.
โธ Working knowledge of scripting languages like Python, PowerShell, or Bash for security automation and data manipulation.
โธ Experience with BigQuery for analyzing large-scale security datasets.
โจ ๐๐ฒ๐๐ถ๐ฟ๐ฎ๐ฏ๐น๐ฒ๐:
โธ Professional certifications such as Splunk Certified Power User/Admin, Google Cloud Certified Security Engineer, GCIH, or CEH.
โธ Bachelorโs degree in Computer Science, Information Security, or a related discipline.
โธ Experience with Security Orchestration, Automation, and Response (SOAR) platforms, particularly Splunk Phantom.
โธ Familiarity with compliance frameworks like ISO 27001, QCB, or NIA.
โธ Previous experience in mentoring junior security analysts.
Key Skills
Ranked by relevanceReady to apply?
Join Starlink Qatar and take your career to the next level!
Application takes less than 5 minutes

