Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
📌 𝗗𝗲𝘀𝗰𝗿𝗶𝗽𝘁𝗶𝗼𝗻:
We are seeking an expert SIEM Administrator to manage and optimize our Google Chronicle and Google Cloud Security platforms. In this critical role, you will be responsible for the end-to-end administration of our security information and event management system, ensuring comprehensive visibility across cloud and on-premise infrastructures. Your primary focus will be on advanced detection engineering using YARA-L, managing data ingestion pipelines, and automating incident response workflows. You will collaborate with SOC and Threat Intelligence teams to create high-fidelity detection rules mapped to the MITRE ATT&CK framework. Additionally, you will leverage BigQuery and Looker Studio to build security analytics and compliance reports. This position requires a proactive, detail-oriented professional with deep expertise in Google Cloud native security services and a passion for building robust, automated security operations.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
🎯 𝗥𝗲𝗾𝘂𝗶𝗿𝗲𝗺𝗲𝗻𝘁𝘀:
▸ 7–8 years of professional experience in SIEM operations with a strong focus on cloud security environments.
▸ Expert-level, hands-on experience with the administration and maintenance of Google Chronicle SIEM and Google Cloud Security Command Center (SCC).
▸ Proficiency in creating and tuning custom detection rules using YARA-L.
▸ Advanced skills in BigQuery SQL for security data analysis, threat hunting, and reporting.
▸ Demonstrable experience in automation using Python/Bash, Google Cloud Functions, and Chronicle Playbooks.
▸ In-depth knowledge of Google Cloud services including IAM, VPC Flow Logs, Cloud Audit Logs, and Pub/Sub.
▸ Proven experience managing log ingestion pipelines from multi-cloud (GCP, AWS, Azure) and on-premise sources.
▸ Must hold the 'Google Cloud Certified – Professional Cloud Security Engineer' certification.
✨ 𝗗𝗲𝘀𝗶𝗿𝗮𝗯𝗹𝗲𝘀:
▸ Chronicle Certified Analyst / Administrator certification.
▸ Professional security certifications such as GCIH, CISM, or CISSP.
▸ Experience with data visualization tools like Looker Studio.
▸ Strong understanding of compliance frameworks such as ISO 27001, QCB, and NIA.
▸ Experience integrating SIEM with SOAR and EDR platforms.
Key Skills
Ranked by relevanceReady to apply?
Join Starlink Qatar and take your career to the next level!
Application takes less than 5 minutes

