$Not specified
The Threat Management Specialist will perform deep-dive investigations across threat surfaces, enhance detection rules, and guide remediation actions. They will also operationalize AI/ML and SOAR technologies to improve incident response speed and accuracy.
Candidates should have a BA or BS in a related field and at least 3 years of IT security experience, including exposure to AI/ML projects. Strong knowledge of network traffic analysis, threat management, and cybersecurity automation is essential.
Description Dragonfli Group is a cybersecurity and IT consulting firm providing services to federal agencies and Fortune 100 enterprises. Headquartered in Washington, DC, Dragonfli supports clients in securing mission-critical systems across on-site, hybrid, and fully remote environments. Dragonfli Group is hiring a Threat Management Specialist (Tier 2) to support a large federal agency in advancing its Cybersecurity Operations Center (CSOC). This is a remote, contract-based opportunity where your expertise will directly shape how federal systems respond to and defend against emerging cyber threats. In this role, you’ll be more than just a responder—you’ll be a force multiplier. You’ll perform deep-dive investigations across threat surfaces, enhance detection rules, and guide remediation actions. As part of a high-performance team, you’ll also have the unique opportunity to operationalize AI/ML and SOAR technologies to improve incident response speed and accuracy. This is the ideal role for a hands-on analyst who thrives on pattern recognition, continuous learning, and working with next-gen detection platforms like SentinelOne, Splunk, Microsoft Defender XDR, Proofpoint, and FirePower. Responsibilities: Identification of Cybersecurity problems which may require mitigating controls Analyze network traffic to identify exploit or intrusion related attempts Recommend detection mechanisms for exploit and or intrusion related attempts Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies Escalate items which require further investigation to other members of the Threat Management team Execute operational processes in support of response efforts to identified security incidents Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks Configure Splunk for log analysis, create alerts, and investigate security incidents diligently Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC) Performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions Tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture Stay current on the latest cybersecurity trends, threat actors, and AI/ML research relevant to the field Identify and support automation use cases, including the use of AI/ML to enhance SOC capabilities. Collaborate across Operations to provide SOC enhancement capabilities through the use of automation and AI. Requirements Educational Requirements: BA or BS in Computer Science, Information Technology or related field One or more relevant certifications such as GIAC Certified Enterprise Defender (GCED), GIAC Certified Security Essentials (GSEC), CISSP, or SSCP desired Other Requirements: 3+ years IT security experience with at least some exposure to AI/ML projects 2+ years’ experience in network traffic analysis Strong working knowledge of: Boolean Logic TCP/IP Fundamentals Network Level Exploits Threat Management Knowledge of Control Frameworks and Risk Management techniques Excellent oral, written communication skills and excellent interpersonal and organizational skills Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies Strong understanding of common IDS/IPS architectures and implementations Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection Experience with cloud security (AWS, Azure, GCP) Hands-on experience with cybersecurity automation (e.g., SOAR platforms). Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts. Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities. Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics. Experience in evaluating the effectiveness of AI/ML solutions in a SOC environment is a plus. Understanding and experience identifying and implementing automation use cases. Skill(s) 3+ years of IT security experience, with exposure to AI/ML use cases 2+ years in deep network traffic or IDS/IPS analysis Experience with tools such as Splunk, Proofpoint, FirePower, SentinelOne, Microsoft Defender Suite Working knowledge of threat detection, Boolean logic, cloud security (AWS, Azure, GCP), and SOAR automation Skilled in analyzing logs, building detection features, and applying ML to enhance security outcomes Familiarity with frameworks like GCED, GSEC, CISSP, or SSCP is a plus Benefits Insurance - health, dental, vision PTO & 11 Federal Holidays 401(k), employer match Travel None
This job posting was last updated on 8/27/2025