COMFORT SYSTEMS
Threat Management Specialist
COMFORT SYSTEMS, Morrisville, North Carolina, United States, 27560
Job Description
Seize your opportunity to make a personal impact as a
Threat Management Specialist
supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.
At GDIT, people are our differentiators. As a
Threat Management Specialist , you will help ensure today is safe and tomorrow is smarter. Our work depends on a
Threat Management Specialist
joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service.
How a Threat Management Specialist will make an impact In this role, a typical day will include:
Performing deep-dive incident analysis by correlating data from various sources and determine if a critical system or data set is affected. Handle incidents as defined in Playbooks and SOPs. They also advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy.
Position #1
Hours: 3:30pm to 11:30pm
Days off: Tuesday and Wednesday
Position #2
Hours: 11:30pm to 7:30am
Days off: Saturday and Sunday
Education and Experience Education :
Bachelor's or Master's degree in Computer Science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience.
NOTE: If resources do not have a relevant college degree, an additional 4 years of relevant work experience is required.
Required Experience :
3+ years IT security experience with at least some exposure to AI/ML projects
2+ years’ experience in network traffic analysis
One or more relevant certifications (desired):
GIAC Certified Enterprise Defender (GCED)
GIAC Certified Security Essentials (GSEC)
CISSP
SSCP
Strong working knowledge of:
Boolean Logic
TCP/IP Fundamentals
Network Level Exploits
Threat Management
Knowledge of Control Frameworks and Risk Management techniques
Identification of Cybersecurity problems which may require mitigating controls
Analyze network traffic to identify exploit or intrusion related attempts
Recommend detection mechanisms for exploit and or intrusion related attempts
Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies
Escalate items which require further investigation to other members of the Threat Management team
Execute operational processes in support of response efforts to identified security incidents
Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence
Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools
Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks
Configure Splunk for log analysis, create alerts, and investigate security incidents diligently
Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures
Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments
Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)
Performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions
Experience with cloud security (AWS, Azure, GCP)
Hands-on experience with cybersecurity automation (e.g., SOAR platforms).
Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts.
Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities.
Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics. Experience in evaluating the effectiveness of AI/ML solutions in a SOC environment is a plus.
Understanding and experience identifying and implementing automation use cases.
Security Clearance
Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting
This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years.
Location
Morrisville, NC
Falls Church, VA
Eagan, MN
Remote considered
Benefits
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career.
Professional growth opportunities including paid education and certifications.
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely salary range for this position is $72,877 - $98,599. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
#J-18808-Ljbffr
Threat Management Specialist
supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.
At GDIT, people are our differentiators. As a
Threat Management Specialist , you will help ensure today is safe and tomorrow is smarter. Our work depends on a
Threat Management Specialist
joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service.
How a Threat Management Specialist will make an impact In this role, a typical day will include:
Performing deep-dive incident analysis by correlating data from various sources and determine if a critical system or data set is affected. Handle incidents as defined in Playbooks and SOPs. They also advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy.
Position #1
Hours: 3:30pm to 11:30pm
Days off: Tuesday and Wednesday
Position #2
Hours: 11:30pm to 7:30am
Days off: Saturday and Sunday
Education and Experience Education :
Bachelor's or Master's degree in Computer Science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience.
NOTE: If resources do not have a relevant college degree, an additional 4 years of relevant work experience is required.
Required Experience :
3+ years IT security experience with at least some exposure to AI/ML projects
2+ years’ experience in network traffic analysis
One or more relevant certifications (desired):
GIAC Certified Enterprise Defender (GCED)
GIAC Certified Security Essentials (GSEC)
CISSP
SSCP
Strong working knowledge of:
Boolean Logic
TCP/IP Fundamentals
Network Level Exploits
Threat Management
Knowledge of Control Frameworks and Risk Management techniques
Identification of Cybersecurity problems which may require mitigating controls
Analyze network traffic to identify exploit or intrusion related attempts
Recommend detection mechanisms for exploit and or intrusion related attempts
Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies
Escalate items which require further investigation to other members of the Threat Management team
Execute operational processes in support of response efforts to identified security incidents
Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence
Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools
Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks
Configure Splunk for log analysis, create alerts, and investigate security incidents diligently
Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures
Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments
Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)
Performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions
Experience with cloud security (AWS, Azure, GCP)
Hands-on experience with cybersecurity automation (e.g., SOAR platforms).
Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts.
Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities.
Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics. Experience in evaluating the effectiveness of AI/ML solutions in a SOC environment is a plus.
Understanding and experience identifying and implementing automation use cases.
Security Clearance
Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting
This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years.
Location
Morrisville, NC
Falls Church, VA
Eagan, MN
Remote considered
Benefits
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career.
Professional growth opportunities including paid education and certifications.
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely salary range for this position is $72,877 - $98,599. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
#J-18808-Ljbffr