Associate Cyber Threat Researcher in Remote at UltraViolet Cyber
Explore Related Opportunities
Job Description
UltraViolet Cyber is seeking an Associate Cyber Threat Researcher (Level I) to join our Threat Intelligence & Detection Engineering (TIDE) team. Your primary responsibilities will be engaging in threat hunts to identify, investigate, and respond to cyber threats in our customer environments, creating intelligence-based threat detections to defend our customers against modern cyber threats, and leveraging your knowledge of the cyber threat landscape to support offensive and defensive threat intelligence objectives. This role requires you to lean on deep technical expertise, advanced analytic skillsets, and knowledge of adversarial tactics, techniques, and procedures (TTPs) to help stop threat actors from compromising our customers. The ideal candidate will be open to engaging with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
- Proactively create detection rules to alert SOC analysts of intrusions against customer networks.
- Assist with tuning and enhancing existing detection rules to better defend against evolving threats.
- Support hypotheses-driven threat hunting efforts using security data and intelligence.
- Support threat intelligence objectives by contributing to offensive and defensive threat intelligence reports.
- Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
- Provide technical mentorship to junior threat hunters and SOC analysts.
- Contribute to continuous improvement of detection engineering and hunting methodologies.
- Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
- Provide technical insight to internal account teams and customers as needed.
- Collaborate with Incident Response and SOC teams to investigate and contain security incidents.
- U.S. citizenship is required.
- At least 1-3 years of experience in cybersecurity, with at least 1 year focused on threat hunting or detection engineering.
- History of building custom behavior-based and/or threshold-based detections in customer environments from scratch.
- Capable of identifying and tuning flaws in existing detections to reduce noise with little to no oversight.
- Experience performing hypothesis-driven threat hunts in customer environments.
- Capable of clearly and concisely reporting findings from threat hunts.
- History of attending customer meetings, including those involving senior leadership.
- Working understanding of the MITRE ATT&CK framework.
- Background knowledge in the cyber threat landscape, including threat actors, malware, and evolving TTPs.
- Experience working with cyber threat intelligence analysts/teams to identify new detection opportunities.
- Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools.
- Experience with scripting languages (Python, PowerShell, etc.) for scripting purposes.
- Enjoy working in a team environment.
- Willingness to learn from more senior team members while mentoring junior team members.
- Experience building detections in SentinelOne, Elastic, and/or CrowdStrike platforms preferred.
- Prior experience as part of, or directly supporting, a Threat Intelligence team.
- GIAC Threat Hunting (GCTH), Certified Enterprise Defender (GCED), or Certified Intrusion Analyst (GCIA) certification(s)
- 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
- Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
- Group Term Life, Short-Term Disability, Long-Term Disability
- Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
- Participation in the Discretionary Time Off (DTO) Program
- 11 Paid Holidays Annually
$50,000 - $90,000 a year