Logo
PLANIT Group

Threat Management Specialist (Tier 2)

PLANIT Group, Reston, Virginia, United States, 22090

Save Job

Reston, VA Contract On-Site Flexibility/Remote: 100%

Threat Management Specialist (Tier 2) Position 1 Hours: 3:30pm to 11:30pm ET Days off: Tuesday and Wednesday

Position 2 Hours: 11:30pm to 7:30am ET Days off: Saturday and Sunday

The Tier 2 Analysts perform deep‑dive incident analysis by correlating data from various sources and determines if a critical system or data set affected. Handle incidents as defined in Playbooks and SOPs. They also advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy.

Key Responsibilities

Identification of Cybersecurity problems which may require mitigating controls

Analyze network traffic to identify exploit or intrusion related attempts

Recommend detection mechanisms for exploit and or intrusion related attempts

Provide subject matter expertise on network‑based attacks, network traffic analysis, and intrusion methodologies

Escalate items which require further investigation to other members of the Threat Management team

Execute operational processes in support of response efforts to identified security incidents

Utilize AI/ML‑based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence

Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools

Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks

Configure Splunk for log analysis, create alerts, and investigate security incidents diligently

Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures

Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments

Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)

Perform threat detection and analysis, investigate suspicious activity, coordinate incident response efforts, and implement remediation actions

Tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture

Stay current on the latest cybersecurity trends, threat actors, and AI/ML research relevant to the field

Identify and support automation use cases, including the use of AI/ML to enhance SOC capabilities

Collaborate across Operations to provide SOC enhancement capabilities through the use of automation and AI

Qualification Requirements

3+ years IT security experience with at least some exposure to AI/ML projects

2+ years' experience in network traffic analysis

Strong working knowledge of:

Boolean Logic

TCP/IP Fundamentals

Network Level Exploits

Threat Management

Knowledge of Control Frameworks and Risk Management techniques

Excellent oral, written communication skills and excellent interpersonal and organizational skills

Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies

Strong understanding of common IDS/IPS architectures and implementations

Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly‑based analysis and detection

Experience with cloud security (AWS, Azure, GCP)

Hands‑on experience with cybersecurity automation (e.g., SOAR platforms)

Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts

Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities

Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics. Experience in evaluating the effectiveness of AI/ML solutions in a SOC environment is a plus

Understanding and experience identifying and implementing automation use cases

Experience

A minimum of eight (8) to twelve (12) years' relevant experience

A degree from an accredited College/University in the applicable field of services is required. If the individual's degree is not in the applicable field then four additional years of related experience is required

Typically performs all functional duties independently

One or more relevant certifications such as GIAC Certified Enterprise Defender (GCED), GIAC Certified Security Essentials (GSEC), CISSP, or SSCP desired

#J-18808-Ljbffr