UltraViolet Cyber

Cybersecurity Threat Hunter

UltraViolet Cyber

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $80,000 - $95,000 per year

About the role

  • Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.
  • Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence.
  • Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity.
  • Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
  • Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection.
  • Collaborate with Incident Response and SOC teams to investigate and contain security incidents.
  • Provide technical mentorship to junior threat hunters and SOC analysts.
  • Partner with Threat Intelligence to operationalize indicators and adversary insights.
  • Contribute to continuous improvement of detection engineering and hunting methodologies.

Requirements

  • US Citizenship is Required
  • 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting, detection engineering, or incident response.
  • Demonstrating the ability building hypotheses from threat models, not just IOC-driven searches
  • Strong understanding of attacker tradecraft, including malware, lateral movement, persistence, and exfiltration techniques.
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools (SentinelOne AI SIEM, CrowdStrike, MS Defender and Sentinel, Splunk, Elastic).
  • Experience with scripting languages (Python, PowerShell, etc.) to automate analysis and detection.
  • Familiarity with MITRE ATT&CK, threat intelligence platforms, and adversary emulation.
  • Strong analytical, investigative, and problem-solving skills.
  • **Preferred Experience:**
  • Experience with cloud security (AWS, Microsoft Azure, GCP).
  • Knowledge of threat hunting in OT/ICS environments.
  • B.A or B.S in computer science or related field.
  • GIAC Threat Hunting (GCTH).
  • GIAC Certified Enterprise Defender (GCED).
  • GIAC Certified Intrusion Analyst (GCIA).
Benefits
  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
  • Group Term Life, Short-Term Disability, Long-Term Disability
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
  • Participation in the Discretionary Time Off (DTO) Program
  • 11 Paid Holidays Annually
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
threat huntingdetection engineeringincident responselog analysishypothesis developmentmalware analysisscripting (Python, PowerShell)cloud securityadversary emulationanomaly detection
Soft Skills
analytical skillsinvestigative skillsproblem-solving skillstechnical mentorshipcollaboration
Certifications
GIAC Threat Hunting (GCTH)GIAC Certified Enterprise Defender (GCED)GIAC Certified Intrusion Analyst (GCIA)