SOC Analyst (contract)
Capgemini
Date: 8 hours ago
City: Sandy Springs, GA
Contract type: Contractor

We are seeking a SOC Analyst to support Level 2 security operations and incident response activities in a hybrid environment based in Sandy Springs, GA. This role requires strong technical experience across SIEM tools (with preference for Google SecOps/Chronicle), threat detection, incident handling, and infrastructure security monitoring. You will be responsible for triaging security events, enhancing detection capabilities, and supporting a secure enterprise environment in collaboration with engineering and compliance teams.
Key Responsibilities
Core Expertise:
Security Operations Center (SOC), Incident Response, Threat Detection, Security Monitoring
Languages & Frameworks
Python, PowerShell, Bash
Reactive & Event-Driven Tools
Google SecOps (Chronicle), Splunk, QRadar, LogRhythm, Elastic Stack
Cloud & Containerization
AWS, Azure, GCP (cloud security focus)
Other Tools & Technologies
Wireshark, tcpdump, Nessus, Qualys, MS Defender, CrowdStrike, MITRE ATT&CK, SIEM, IDS/IPS
Soft Skills
Analytical thinking, verbal/written communication, collaboration, crisis management, eagerness to learn
Certifications (Preferred)
CompTIA Security+, GCIH, GCIA, GCFA, Certified SOC Analyst (CSA), CEH, CISSP/CISM (a plus)
Key Responsibilities
- Monitor, triage, and analyze security alerts from various sources including SIEM, IDS/IPS, EDR, and firewalls.
- Provide Level 2 incident response support during business hours (8x5 EST), including identification, containment, and remediation of security threats.
- Investigate suspicious activity across on-prem and cloud environments (AWS, Azure, GCP).
- Utilize Google SecOps (Chronicle) and other SIEM platforms for log analysis, threat hunting, and correlation.
- Apply the MITRE ATT&CK framework and cyber kill chain methodology to improve threat detection.
- Collaborate with Tier 3 analysts and threat intelligence teams to escalate and resolve complex incidents.
- Develop and maintain playbooks, detection rules, and automation scripts (Python, PowerShell, Bash).
- Participate in red/blue/purple team exercises and contribute to continuous security posture improvements.
- Support compliance initiatives related to HIPAA, PCI-DSS, GDPR, and internal security standards.
- Communicate clearly and professionally with stakeholders across IT, compliance, and executive teams.
- SIEM Tools: Google SecOps (Chronicle preferred), Splunk, QRadar, LogRhythm, Elastic Stack
- IDS/IPS platforms and EDR solutions like MS Defender, CrowdStrike
- Network and endpoint monitoring, malware analysis, and packet inspection tools (Wireshark, tcpdump)
- Familiarity with vulnerability management tools such as Nessus and Qualys
- Understanding of common protocols (TCP/IP, DNS, HTTP/S)
- Cloud security across AWS, Azure, and GCP
- Scripting and automation with Python, PowerShell, or Bash
- Hands-on experience in L2 security incident triage and escalation
- Exposure to 24/7 SOC operations or rotational support environments
- Ability to interface across IT, risk, and compliance functions
- Experienced in crisis response and working under pressure
- Curious and motivated to continuously learn and improve detection methods
Core Expertise:
Security Operations Center (SOC), Incident Response, Threat Detection, Security Monitoring
Languages & Frameworks
Python, PowerShell, Bash
Reactive & Event-Driven Tools
Google SecOps (Chronicle), Splunk, QRadar, LogRhythm, Elastic Stack
Cloud & Containerization
AWS, Azure, GCP (cloud security focus)
Other Tools & Technologies
Wireshark, tcpdump, Nessus, Qualys, MS Defender, CrowdStrike, MITRE ATT&CK, SIEM, IDS/IPS
Soft Skills
Analytical thinking, verbal/written communication, collaboration, crisis management, eagerness to learn
Certifications (Preferred)
CompTIA Security+, GCIH, GCIA, GCFA, Certified SOC Analyst (CSA), CEH, CISSP/CISM (a plus)
How to apply
To apply for this job you need to authorize on our website. If you don't have an account yet, please register.
Post a resume