Dragonfli Group · 15 hours ago
Cyber Threat Analyst
Dragonfli Group is a cybersecurity and IT consulting firm providing services to federal agencies and Fortune 100 enterprises. They are seeking a highly experienced Senior Cyber Threat Analyst to enhance automation strategies in threat detection and incident response.
Cyber SecurityInformation TechnologyRisk Management
Responsibilities
Incident Management & Triage: Perform triage on security escalations and detections to determine scope, severity, and root cause; monitor cybersecurity events and investigate incidents efficiently
Automation & Engineering: Identify, recommend, and implement automation use cases leveraging AI/ML capabilities to accelerate response times
SOAR Implementation: Support the deployment, configuration, testing, and maintenance of the Security Orchestration, Automation, and Response (SOAR) platform, specifically focusing on SentinelOne and Splunk integrations
Detection Tuning: Create and modify detection rules, signatures, and alerts across SIEM and EDR platforms (Splunk and SentinelOne) to reduce false positives and enhance fidelity
Data Analysis & Dashboarding: Analyze alerts from Cloud, SIEM, EDR, and XDR tools; build and maintain comprehensive dashboards and perform complex queries to support decision-making
Vulnerability & Risk Assessment: Perform vulnerability assessments of discovered CVEs against agency systems and analyze network traffic to provide actionable security recommendations
Framework Implementation: Apply security frameworks such as MITRE ATT&CK and NIST to interpret use cases into actionable monitoring solutions
Communication: Effectively communicate technical findings to non-technical audiences and influence stakeholders to comply with security standards and best practices
Qualification
Required
7+ years of experience with security operations, threat hunting, and incident response
Experience in analyzing alerts from Cloud, SIEM, EDR, and XDR tools, and alerts tuning process with preference on SentinelOne, Armis, and Splunk
Experience in configuring network devices and analyzing network traffic
Experience with Artificial Intelligence and Machine Learning (AI/ML) based security tools
Experience in researching, developing, and implementing SOAR use cases
Familiar with Security Orchestration, Automation, and Response (SOAR) platform
Familiarity with cybersecurity operation center functions
Experience configuring and re-configuring security tools, including SentinelOne and Splunk
Experience implementing Security frameworks, such as MITRE ATT&CK and NIST, and can interpret use cases into actionable monitoring solutions
MUST have one or more of the following Certification(s): CISSP, CISA, CISM, GIAC, RHCE
Preferred
Candidates with previous federal contracting experience are preferred
Benefits
Insurance – health, dental, and vision
Paid Time Off (PTO) and 11 Federal Holidays
401(k) employer match