Cyber Threat Detection & Response Analyst at UltraViolet Cyber – Remote
Explore Related Opportunities
About This Position
UltraViolet Cyber is seeking a Cyber Threat Detection & Response Analyst to join the Threat Intelligence & Detection Engineering (TIDE) team. Your primary responsibilities will be performing threat hunts to identify, investigate, and respond to cyber threats in our customer environments, and creating intelligence-based threat detections to defend our customers against modern cyber threats. This role requires you to lean on deep technical expertise, advanced analytic skillsets, and knowledge of adversarial tactics, techniques, and procedures (TTPs) to help stop threat actors from compromising our customers. The ideal candidate will be open to engaging with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
- Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.
- Proactively create detection rules to alert SOC analysts of intrusions against customer networks.
- Assist with tuning and enhancing existing detection rules to better defend against evolving threats.
- Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence.
- Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity.
- Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
- Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection.
- Collaborate with Incident Response and SOC teams to investigate and contain security incidents.
- Provide technical mentorship to junior threat hunters and SOC analysts.Partner with Threat Intelligence to operationalize indicators and adversary insights.
- Contribute to continuous improvement of detection engineering and hunting methodologies.
- Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
- Provide technical insight to internal account teams and customers as needed.
- US Citizenship is Required
- 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting, detection engineering, or incident response.
- Demonstrated ability building hypotheses from threat models, not just IOC-driven searches.
- Strong understanding of threat actor tradecraft, including malware, lateral movement, persistence, and exfiltration techniques.
- Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools (SentinelOne AI SIEM, CrowdStrike, MS Defender andSentinel, Splunk, Elastic).
- Experience with scripting languages (Python, PowerShell, etc.) to automate analysis and detection.
- Familiarity with MITRE ATT&CK, threat intelligence platforms, and adversary emulation.
- Strong analytical, investigative, and problem-solving skills.
Preferred Experience:
- Experience with cloud security (AWS, Microsoft Azure, GCP).
- Knowledge of threat hunting in OT/ICS environments.
- B.A or B.S in computer science or related field.
- GIAC Threat Hunting (GCTH).
- GIAC Certified Enterprise Defender (GCED).
- GIAC Certified Intrusion Analyst (GCIA).
- 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
- Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
- Group Term Life, Short-Term Disability, Long-Term Disability
- Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
- Participation in the Discretionary Time Off (DTO) Program
- 11 Paid Holidays Annually
$75,000 - $95,000 a year