Threat Management Specialist (Tier 2) jobs in United States
cer-icon
Apply on Employer Site
company-logo

Lifescale Analytics · 1 day ago

Threat Management Specialist (Tier 2)

Lifescale Analytics is a small business providing specialized expertise in data and analytics. They are seeking a Threat Management Specialist (Tier 2) to perform deep-dive incident analysis, handle security incidents, and leverage AI and ML technologies to enhance cybersecurity operations.

AnalyticsConsultingSoftware
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote
Hiring Manager
Sara Giergielewicz
linkedin

Responsibilities

Identification of Cybersecurity problems which may require mitigating controls
Analyze network traffic to identify exploit or intrusion related attempts
Recommend detection mechanisms for exploit and or intrusion related attempts
Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies
Escalate items which require further investigation to other members of the Threat Management team
Execute operational processes in support of response efforts to identified security incidents
Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence
Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools
Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks
Configure Splunk for log analysis, create alerts, and investigate security incidents diligently
Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures
Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments
Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)
Performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions
Tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture
Stay current on the latest cybersecurity trends, threat actors, and AI/ML research relevant to the field
Identify and support automation use cases, including the use of AI/ML to enhance SOC capabilities
Collaborate across Operations to provide SOC enhancement capabilities through the use of automation and AI
Additional responsibilities at the managers request

Qualification

AI/ML techniquesNetwork traffic analysisThreat managementCybersecurity automationCloud securityIDS/IPS technologiesData analysisFeature engineeringBoolean LogicTCP/IP FundamentalsNetwork Level ExploitsCommunicationInterpersonal skillsOrganizational skills

Required

A minimum of eight (8) to twelve (12) years' relevant experience
3+ years IT security experience with at least some exposure to AI/ML projects
2+ years' experience in network traffic analysis
Strong working knowledge of Boolean Logic
Strong working knowledge of TCP/IP Fundamentals
Strong working knowledge of Network Level Exploits
Strong working knowledge of Threat Management
Knowledge of Control Frameworks and Risk Management techniques
Excellent oral, written communication skills and excellent interpersonal and organizational skills
Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies
Strong understanding of common IDS/IPS architectures and implementations
Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection
Experience with cloud security (AWS, Azure, GCP)
Hands-on experience with cybersecurity automation (e.g., SOAR platforms)
Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts
Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities
Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics
Understanding and experience identifying and implementing automation use cases
Typically performs all functional duties independently
A degree from an accredited College/University in the applicable field of services is required. If the individual's degree is not in the applicable field then four additional years of related experience is required
One or more relevant certifications such as GIAC Certified Enterprise Defender (GCED), GIAC Certified Security Essentials (GSEC), CISSP, or SSCP desired
Pass a client mandated clearance process to include drug screening, criminal history check and credit check
Candidates cannot have more than 6 months travel outside the United States within the last five years. Military Service excluded. (Exception does not include military family members.)
The enforced dress code is business casual, i.e., collared shirt with slacks for men, no skirts above the knee for women

Company

Lifescale Analytics

twittertwittertwitter
company-logo
Lifescale Analytics (LSA) provides specialized expertise in data and analytics to help accelerate research and development processes.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Brian Carnell
Chief Information Officer
linkedin
Company data provided by crunchbase