Cloud Security Consultant - Google Chronicle/ SIEM, Contract

Remote, United States

Applications have closed

Overview of Role

We are seeking a highly skilled and experienced Cloud Security Consultant specializing in Google Chronicle SIEM implementation to join our team for a 3 month + contract opportunity. 

The ideal candidate will be responsible for providing expert-level guidance and support in the use of Chronicle and will play a critical role in designing, implementing, and maintaining security solutions that enhance our client's cloud environment's security posture. This role involves collaborating with clients, analyzing security data, configuring SIEM system, and developing automated incident response workflows.


  • SIEM Implementation: Lead the planning, design, and implementation of SIEM solutions in client’s Google cloud environments to monitor and analyze security events and incidents.
  • Security Analysis: Analyze security data and logs from various sources to identify threats, vulnerabilities, and suspicious activities.
  • Consultation: Provide expert guidance and consultancy to clients on Google Chronicle SIEM platform best practices, helping them optimize their security operations.
  • Security Policies: Assist in the development and enforcement of cloud security policies and procedures.
  • Threat Detection: Collaborate with threat hunters to enhance threat detection rules and strategies within the Google Chronicle SIEM platform.
  • Documentation: Create and maintain documentation, including system configurations, incident response procedures, and security reports.
  • Training: Conduct training sessions for internal teams and clients to ensure they can effectively utilize Google Chronicle SIEM tool..
  • Help to Develop and Chronicle SIEM detention rules using YARA-L
  • Conduct discovery sessions to identify and understand the types of data that will be ingested into Chronucle SIEM. 


  • Proven expertise in delivering enterprise level Chronicle.
  • Preferred Professional certifications such as CISSP, CISA, or GIAC.
  • 3+ years of proven experience in designing, configuring, and managing SIEM solutions (Splunk, Qualys Cloud Platform, LogRhythm, Wiz, etc) in cloud environments.
  • Experience with Splunk is required.
  • Strong knowledge of cloud security principles and best practices.
  • Excellent analytical and problem-solving skills.
  • Effective communication and client-facing skills.
  • Ability to work independently and as part of a team.
  • Up-to-date knowledge of cybersecurity threats and trends.
  • Strong understanding of Chronicle's architecture, capabilities, and features.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: CISA CISSP Cloud GCP GIAC Incident response LogRhythm Qualys Security analysis SIEM Splunk Threat detection Vulnerabilities

Perks/benefits: Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  27  4  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.