Threat Management Specialist jobs in United States
cer-icon
Apply on Employer Site
company-logo

General Dynamics Information Technology · 1 day ago

Threat Management Specialist

General Dynamics Information Technology is a global technology and professional services company that delivers consulting, technology, and mission services. As a Threat Management Specialist, you will support the United States Postal Service by analyzing, designing, developing, implementing, and supporting code to enhance cybersecurity measures.

Artificial Intelligence (AI)Cloud ComputingConsultingCyber SecurityInformation Technology
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Performing deep-dive incident analysis by correlating data from various sources and determines if a critical system or data set affected
Handle incidents as defined in Playbooks and SOPs
Advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy
Escalate items which require further investigation to other members of the Threat Management team
Execute operational processes in support of response efforts to identified security incidents
Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence
Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools
Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks
Configure Splunk for log analysis, create alerts, and investigate security incidents diligently
Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures
Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments
Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)
Performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions
Experience with cloud security (AWS, Azure, GCP)
Hands-on experience with cybersecurity automation (e.g., SOAR platforms)
Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts
Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities
Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics
Understanding and experience identifying and implementing automation use cases

Qualification

Network TrafficThreat DetectionThreat ManagementAI/ML ExperienceCybersecurity AutomationCloud SecurityData AnalysisFeature EngineeringBoolean LogicTCP/IP FundamentalsNetwork Level ExploitsControl FrameworksRisk Management Techniques

Required

3 + years of related experience
Bachelor's or Master's degree in Computer Science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience
3+ years IT security experience with at least some exposure to AI/ML projects
2+ years' experience in network traffic analysis
Strong working knowledge of Boolean Logic
Strong working knowledge of TCP/IP Fundamentals
Strong working knowledge of Network Level Exploits
Strong working knowledge of Threat Management
Knowledge of Control Frameworks and Risk Management techniques
Identification of Cybersecurity problems which may require mitigating controls
Analyze network traffic to identify exploit or intrusion related attempts
Recommend detection mechanisms for exploit and or intrusion related attempts
Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies
Escalate items which require further investigation to other members of the Threat Management team
Execute operational processes in support of response efforts to identified security incidents
Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence
Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools
Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks
Configure Splunk for log analysis, create alerts, and investigate security incidents diligently
Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures
Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments
Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)
Performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions
Experience with cloud security (AWS, Azure, GCP)
Hands-on experience with cybersecurity automation (e.g., SOAR platforms)
Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts
Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities
Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics
Understanding and experience identifying and implementing automation use cases
Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting

Preferred

One or more relevant certifications (desired): GIAC Certified Enterprise Defender (GCED), GIAC Certified Security Essentials (GSEC), CISSP, SSCP

Benefits

401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career.
Professional growth opportunities including paid education and certifications.
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
Variety of medical plan options, some with Health Savings Accounts
Dental plan options
Vision plan
401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match
Full flex work weeks where possible
Variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave
Short and long-term disability benefits
Life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance

Company

General Dynamics Information Technology

company-logo
General Dynamics Information Technology is an IT consulting company that specializes in cyber security, AI, and quantum computing. It is a sub-organization of General Dynamics.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Paul Nedzbala
Senior Vice President
linkedin
leader-logo
Ben Buckley
Vice President and General Manager
linkedin
Company data provided by crunchbase