UltraViolet Cyber

UltraViolet Cyber is a cybersecurity company focused on unified offensive and defensive security operations. It describes itself as a practitioner-led MSSP delivering managed detection and response, SOC-as-a-Service, red teaming, penetration testing, application security testing, continuous threat exposure management, and dedicated defense, with its UV Lens Security-as-Code platform at the core of its integrated security operations approach.

Computer and Network Security
501-1000

Description

  • Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.
  • Create and tune detection rules to alert SOC analysts to intrusions and reduce false positives.
  • Develop and execute hypothesis-driven threat hunting campaigns using security data and threat intelligence.
  • Analyze large volumes of log, endpoint, and network data to identify anomalous or malicious activity.
  • Research adversary tactics, techniques, and procedures and map findings to frameworks such as MITRE ATT&CK.
  • Collaborate with Detection Engineering, Incident Response, and SOC teams to refine detections, investigate incidents, and contain threats.
  • Partner with Threat Intelligence to operationalize indicators and adversary insights.
  • Engage with internal account teams and customers to report findings, explain detection strategies, and strengthen security posture.
  • Provide technical mentorship to junior threat hunters and SOC analysts.
  • Contribute to continuous improvement of detection engineering and threat hunting methodologies.

Requirements

  • U.S. citizenship is required.
  • 4+ years of experience in cybersecurity, including at least 2 years focused on threat hunting or detection engineering.
  • Experience independently building custom behavior-based and/or threshold-based detections from scratch in customer environments.
  • Experience building detections in SentinelOne, Elastic, or CrowdStrike.
  • Experience identifying and tuning flaws in existing detections to reduce noise.
  • Experience independently building and performing hypothesis-driven threat hunts in customer environments.
  • Ability to clearly and concisely report threat hunting findings.
  • Experience meeting with customers and senior leadership to explain detections and threat hunt findings.
  • Experience mapping detections to the MITRE ATT&CK framework.
  • Working knowledge of the cyber threat landscape, including threat actors, malware, and evolving TTPs.
  • Experience working with cyber threat intelligence analysts or teams to identify new detection opportunities.
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools.
  • Experience with scripting languages such as Python or PowerShell.
  • Experience with pentesting or red teaming is preferred.
  • Experience with reverse engineering is preferred.
  • GIAC Threat Hunting (GCTH), Certified Enterprise Defender (GCED), or Certified Intrusion Analyst (GCIA) certification(s) are preferred.

Benefits

  • $100,000 - $120,000 annual salary range.
  • 401(k) with employer match of 100% of the first 3% contributed and 50% of the next 2% contributed.
  • Medical, dental, and vision insurance available on the first day of the month following your start date.
  • Group term life, short-term disability, and long-term disability coverage.
  • Voluntary life, hospital indemnity, accident, and critical illness coverage options.
  • Participation in the Discretionary Time Off (DTO) program.
  • 11 paid holidays annually.

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Senior Security GRC Analyst

Rubrik 1K-5K IT Services

Rubrik is hiring a Compliance Analyst to help run and continuously improve its security compliance program across multiple regulatory and control frameworks.

HIPAA JIRA Power BI
39 minutes ago

Information Security Analyst

Mindera 1K-5K Internet Software & Services

Mindera is seeking a mid-level Information Security Analyst to support security operations across its global locations, helping monitor infrastructure, manage vulnerabilities, respond to incidents, and strengthen the company’s security posture.

Agile AWS Bash CrowdStrike GCP Linux macOS Palo Alto Python
15 hours, 52 minutes ago

Security Support Analyst, Contract

66degrees 251-1K IT Services

66degrees is seeking a remote Information Security Support Helpdesk Contractor to support security helpdesk operations for a client, handling frontline identity and access requests within a 12-month contract with potential to extend or convert.

Active Directory
16 hours, 23 minutes ago

Fraud Data Analyst

Riskified 251-1K Internet Software & Services

Riskified is hiring a Fraud Data Analyst to support its Merchant Health Team in analyzing customer performance and preventing online fraud for a global client base.

Python R SQL
17 hours, 56 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers