Job ID: JOB_ID_9410
Job Overview:
We are seeking an experienced Infrastructure Project Manager to join our team for a long-term contract role in Boston, MA. This position requires 3 days a week onsite presence. The ideal candidate will have a strong background in security operations, incident response, and security engineering, with a focus on cloud environments, particularly GCP. You will be responsible for implementing, configuring, and maintaining Google SecOps (Chronicle SIEM + SOAR), owning the platform configuration end-to-end, and developing detection as code practices.
Key Responsibilities:
- Implement, configure, and maintain Google SecOps (Chronicle SIEM + SOAR).
- Own SecOps platform configuration end-to-end: data sources, parsers, correlation rules, enrichments, user/role configuration, and integration with ticketing/ITSM and messaging tools.
- Design and implement detection as code: manage SIEM detections, correlation rules, and content in version control (e.g., Git), using code-driven workflows, reviews, and CI/CD where applicable.
- Develop, tune, and maintain reusable detection logic, including rule templates, mappings to MITRE ATT&CK, and test cases for validating new and updated detections.
- Create, maintain, and optimize automation playbooks in SOAR for common and complex use cases (phishing triage, suspicious login, malware, data exfiltration, privilege escalation, cloud misconfigurations).
- Continuously improve automation coverage and quality by identifying manual tasks, converting them into playbooks, and measuring playbook performance (MTTR, autoresolution rate, false positives).
- Onboard and normalize security telemetry from GCP, SaaS platforms, endpoints, network devices, and identity providers into Google SecOps, including parser/taxonomy tuning.
- Own L2 triage of security alerts: validate, correlate, and prioritize events escalated by L1, and perform deepdive investigations using Chronicle search, pivots, and threat intelligence.
- Lead or participate in incident response: containment, eradication, recovery, documentation, and postincident review; feed lessons learned back into detections and automation playbooks.
- Contribute to proactive threat hunting based on hypotheses, IOCs, TTPs, and threat intel feeds, and codify successful hunts into reusable detections and automated workflows.
- Act as a stand-in On-call support one week per month for any major escalations.
- Monitor platform health and data quality for Google SecOps (log gaps, parsing errors, latency, ingestion failures) and drive resolution with engineering/ops teams.
- Document runbooks, SOPs, detection and playbook catalogs, and knowledge articles to enable L1 teams and ensure consistent service delivery.
Required Skills and Experience:
- 3-5 years of experience in Security Operations (SOC), Incident Response, or Security Engineering, including hands-on work in cloud environments (preferably GCP).
- Strong experience with SIEM/SOAR platforms; direct experience with Google SecOps / Chronicle SIEM + SOAR is highly preferred.
- Proven experience implementing detection-as-code practices: managing rules/content, using branching, code review, and testing approaches for detections and playbooks.
- Experience designing and maintaining automation playbooks in SOAR tools, including integrations (REST APIs, webhooks, custom connectors) and error-handling strategies.
- Good understanding of security concepts and services: IAM, VPC, firewall rules, Cloud DNS, Cloud Storage, Load Balancing, Security Command Center, Cloud Logs, and Monitoring.
- Solid knowledge of network and security fundamentals: TCP/IP, DNS, VPNs, proxies, IDS/IPS, WAF, EDR, authentication and authorization, encryption, and common attack techniques.
- Demonstrated experience in incident handling, threat analysis, and root cause analysis across endpoints, identities, and cloud workloads.
- Scripting or automation skills (e.g., Python, Bash, YAML, or similar) to build integrations, detections, and SOAR workflows, and to support CI/CD for SecOps content.
- Familiarity with security frameworks and standards (MITRE ATT&CK, NIST, CIS, SOC 2, PCIDSS, ISO 27001) and how they map to detections and controls.
- Strong analytical and troubleshooting skills, with the ability to work independently in an L2 capacity and mentor L1 analysts.
- Excellent written and verbal communication skills for working with US-based stakeholders and documenting technical content.
Good To Have/Preferred:
- Google Cloud Professional Security Operations Engineer or Professional Cloud Security Engineer certification.
- Prior experience working with US enterprises, MSSP environments, or 24×7 global SOCs.
Special Requirements
3 days a week onsite. On-call support one week per month. Keywords: continuous integration continuous deployment Massachusetts.
Compensation & Location
Salary: $100,000 – $150,000 per year (Estimated)
Location: Boston, MA
Recruiter / Company – Contact Information
Email: hul@nusofttek.com
Recruiter Notice:
To remove this job posting, please send an email from
hul@nusofttek.com with the subject:
DELETE_JOB_ID_9410