JobTarget Logo

Cyber Threat Detection & Response Analyst at UltraViolet Cyber – Remote

UltraViolet Cyber
Remote
Posted on
NewSalary:$75000 - $95000Job Function:General Business
New job! Apply early to increase your chances of getting hired.

Explore Related Opportunities

About This Position

Cyber Threat Detection & Response Analyst

Make a difference here.

UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.

By creating continuously optimized identification, detection, and resilience from todays dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.

UltraViolet Cyber is seeking a Cyber Threat Detection & Response Analyst to join the Threat Intelligence & Detection Engineering (TIDE) team. Your primary responsibilities will be performing threat hunts to identify, investigate, and respond to cyber threats in our customer environments, and creating intelligence-based threat detections to defend our customers against modern cyber threats. This role requires you to lean on deep technical expertise, advanced analytic skillsets, and knowledge of adversarial tactics, techniques, and procedures (TTPs) to help stop threat actors from compromising our customers. The ideal candidate will be open to engaging with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.

What You'll Do:
  • Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.
  • Proactively create detection rules to alert SOC analysts of intrusions against customer networks.
  • Assist with tuning and enhancing existing detection rules to better defend against evolving threats.
  • Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence.
  • Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity.
  • Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
  • Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection.
  • Collaborate with Incident Response and SOC teams to investigate and contain security incidents.
  • Provide technical mentorship to junior threat hunters and SOC analysts.Partner with Threat Intelligence to operationalize indicators and adversary insights.
  • Contribute to continuous improvement of detection engineering and hunting methodologies.
  • Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
  • Provide technical insight to internal account teams and customers as needed.
What You've Done:
  • US Citizenship is Required
  • 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting, detection engineering, or incident response.
  • Demonstrated ability building hypotheses from threat models, not just IOC-driven searches.
  • Strong understanding of threat actor tradecraft, including malware, lateral movement, persistence, and exfiltration techniques.
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools (SentinelOne AI SIEM, CrowdStrike, MS Defender andSentinel, Splunk, Elastic).
  • Experience with scripting languages (Python, PowerShell, etc.) to automate analysis and detection.
  • Familiarity with MITRE ATT&CK, threat intelligence platforms, and adversary emulation.
  • Strong analytical, investigative, and problem-solving skills.
We Prefer:

Preferred Experience:

  • Experience with cloud security (AWS, Microsoft Azure, GCP).
  • Knowledge of threat hunting in OT/ICS environments.
  • B.A or B.S in computer science or related field.
  • GIAC Threat Hunting (GCTH).
  • GIAC Certified Enterprise Defender (GCED).
  • GIAC Certified Intrusion Analyst (GCIA).
What We Offer:
  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
  • Group Term Life, Short-Term Disability, Long-Term Disability
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
  • Participation in the Discretionary Time Off (DTO) Program
  • 11 Paid Holidays Annually
UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.

We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.

UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.

If you want to make an impact, UltraViolet Cyber is the place for you!

$75,000 - $95,000 a year

Job Location

Remote

Frequently asked questions about this position

Continue to apply
Enter your email to continue. You’ll be redirected to the employer’s application.
By clicking Continue, you understand and agree to JobTarget's Terms of Service and Privacy Policy.