Capgemini FG# CGEMJPSecOps Security Architect Issaquah WA (Onsite Preferred or Remote)
Job Title: SecOps Security Architect
Location: Issaquah WA (Onsite Preferred or Remote)
Duration: 6 Months
Rate: DOE C2C All Inclusive
New Capgemini Onboarding Process Updates:
Due to additional onboarding requirements a meet and greet is required for all new hires.
Selected candidates must be willing to go to the closest Capgemini/Client office location as indicated by the project team to meet and greet with a Capgemini team member prior to starting their assignment.
If the candidate is not local Capgemini will pay the expenses.
Job Summary:
Architect & Design:
Lead the architecture and design of Google Chronicle SIEM and SOAR solutions to meet the security needs of the organization.
Collaborate with stakeholders to define requirements and ensure alignment with business objectives.
Design integration strategies with existing security tools applications and data sources.
Implementation:
Lead the deployment and configuration of Google Chronicle SIEM and SOAR environments.
Develop and implement data ingestion pipelines ensuring the effective collection and correlation of security events.
Implement use cases detection rules and response playbooks based on organizational security requirements.
Support & Maintenance:
Provide ongoing support for the Google Chronicle SIEM and SOAR environments including troubleshooting tuning and optimization.
Monitor and maintain the health and performance of the systems ensuring high availability and reliability.
Collaborate with security teams to continuously improve detection and response capabilities.
Automation & Integration:
Develop automation scripts and workflows to streamline security operations and incident response.
Integrate Google Chronicle with other security tools (e.g. EDR firewalls threat intelligence platforms) to enhance threat detection and response.
Training & Documentation:
Create and maintain comprehensive documentation of the architecture configurations and processes.
Provide training and knowledge transfer to internal teams on the use and administration of the SIEM and SOAR environments.
Qualifications:
Experience:
5 years of experience in security architecture engineering or operations.
Extensive handson experience with Google Chronicle SIEM and SOAR platforms.
Proven experience in designing and implementing largescale SIEM and SOAR solutions.
Experience with scripting languages (e.g. Python) for automation purposes.
Technical Skills:
Strong understanding of security concepts threat intelligence incident response and security operations.
Develop parsers for log integration within Google Chronicle.
Proficiency with security technologies and frameworks (e.g. SIEM SOAR EDR IDS/IPS firewalls).
Familiarity with cloud environments (e.g. GCP AWS Azure) and cloud security best practices.
Knowledge of data normalization correlation and threat detection techniques.
Soft Skills:
Strong problemsolving skills and ability to work independently as well as part of a team.
Excellent communication skills both verbal and written with the ability to convey complex technical information to nontechnical stakeholders.
Ability to work in a fastpaced environment and manage multiple priorities.
Certifications:
Relevant certifications such as Google Cloud Professional Security Engineer GIAC Security Expert (GSE) CISSP or equivalent are a plus.
Please send your resumes to:
/