Position: Google Chronicle SIEM Engineer
Location: San Jose, CA or Palo Alto, CA or (Any TCS specified offices) / Hybrid role
Duration: 12 months
Job Description:
Google Chronicle SIEM Engineer , SOC Automation Specialist & Platform management
We are seeking a highly skilled Google Chronicle SIEM Engineer with expertise in SOC
automation to enhance our detection capabilities and reduce false positives across the
security landscape. The ideal candidate will be responsible for designing, developing, and
maintaining advanced detection use cases, automation workflows, and integrations to
strengthen our overall security posture and improve operational efficiency within the SOC
environment.
Tools:
1) Google Chronical SIEM
2) Bind plane
3) Cribl
Key Responsibilities
· Design, implement, and optimize Google Chronicle SIEM for scalable log ingestion, parsing, normalization, and enrichment.
· Create and updating correlation rules and use cases
· Develop and fine-tune detection rules, parsers, and correlation logic to improve threat detection accuracy.
. Integrate diverse log sources including firewalls, endpoint security, cloud services, IAM network devices and etc …
. Build and maintain custom parsers and dashboards to enhance visibility into security events.
. Collaborate with threat hunting and detection engineering teams to identify and implement new detection logic.
. Design and implement automation workflows (SOAR-based or API-based) to reduce analyst workload and response time.
· Automate alert triage, enrichment, and response actions using scripts, playbooks, or orchestration tools.
. Integrate Google Chronicle with automation platforms (e.g .. Cortex XSOAR, Splunk, SOAR. Swimlane. or custom Pvthon-hased frameworks).
Education: At least a bachelor’s degree (or equivalent experience) in Computer Science, Software/Electronics Engineering, Information Systems, or closely related field is required.
Contact Information
Email: ganesh.g@itechus.net
Click the email address to contact the job poster directly.