Dragonfli Group · 1 day ago
Threat Management Specialist (Remote)
Dragonfli Group is a cybersecurity and IT consulting firm providing services to federal agencies and Fortune 100 enterprises. The Threat Management Specialist role supports a federal agency's Cybersecurity Operations team, focusing on incident analysis and remediation actions within a large-scale IT environment.
Cyber SecurityInformation TechnologyRisk Management
Responsibilities
Perform deep-dive incident analysis by correlating data from various sources
Handle incidents as defined in Playbooks and SOPs
Advise on remediation actions and provide input on leveraging AI/ML and SOAR capabilities
Identify cybersecurity problems requiring mitigating controls
Analyze network traffic to identify exploit or intrusion attempts
Recommend detection mechanisms for exploit or intrusion attempts
Provide expertise on network-based attacks and intrusion methodologies
Escalate items requiring further investigation
Utilize AI/ML-based tools to detect anomalies and automate incident triage
Manage email security using ProofPoint and respond to threats
Configure Splunk for log analysis and investigate security incidents
Set up FirePower for network monitoring and enforce security measures
Deploy Sentinel 1 agents and conduct security assessments
Monitor and respond to security alerts across multiple platforms
Perform threat detection and analysis, and implement remediation actions
Tune security policies and support continuous improvement of security posture
Stay current on cybersecurity trends and AI/ML research
Identify and support automation use cases to enhance SOC capabilities
Collaborate across Operations to provide SOC enhancement capabilities
Qualification
Required
3+ years IT security experience with exposure to AI/ML projects
2+ years' experience in network traffic analysis
Strong working knowledge of Boolean Logic, TCP/IP Fundamentals, and Threat Management
Knowledge of Control Frameworks and Risk Management techniques
Excellent oral and written communication skills
Strong understanding of IDS/IPS technologies and methodologies
Experience with cloud security (AWS, Azure, GCP)
Hands-on experience with cybersecurity automation (e.g., SOAR platforms)
Proficiency in using machine learning frameworks for anomaly detection
Familiarity with AI/ML techniques in cybersecurity
Ability to preprocess and transform large datasets for machine learning models
Experience in automated threat detection and incident response automation
Strong analytical and problem-solving skills
Ability to work collaboratively in a team environment
Strong organizational and time-management skills
Ability to stay current with cybersecurity trends and technologies
Excellent interpersonal skills for effective communication
Ability to evaluate the effectiveness of AI/ML solutions in a SOC environment
Preferred
Candidates with previous federal contracting experience are preferred
U.S. Citizenship or Permanent Residency required
Benefits
Insurance – health, dental, and vision
Paid Time Off (PTO) and 11 Federal Holidays
401(k) employer match