
Cyber Threat Detection – Response Analyst
UltraViolet Cyber
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Salary
💰 $75,000 - $95,000 per year
Tech Stack
About the role
- Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.
- Proactively create detection rules to alert SOC analysts of intrusions against customer networks.
- Assist with tuning and enhancing existing detection rules to better defend against evolving threats.
- Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence.
- Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity.
- Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
- Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection.
- Collaborate with Incident Response and SOC teams to investigate and contain security incidents.
- Provide technical mentorship to junior threat hunters and SOC analysts.
- Partner with Threat Intelligence to operationalize indicators and adversary insights.
- Contribute to continuous improvement of detection engineering and hunting methodologies.
- Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
- Provide technical insight to internal account teams and customers as needed.
Requirements
- US Citizenship is Required
- 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting, detection engineering, or incident response.
- Demonstrated ability building hypotheses from threat models, not just IOC-driven searches.
- Strong understanding of threat actor tradecraft, including malware, lateral movement, persistence, and exfiltration techniques.
- Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools (SentinelOne AI SIEM, CrowdStrike, MS Defender and Sentinel, Splunk, Elastic).
- Experience with scripting languages (Python, PowerShell, etc.) to automate analysis and detection.
- Familiarity with MITRE ATT&CK, threat intelligence platforms, and adversary emulation.
- Strong analytical, investigative, and problem-solving skills.
Benefits
- 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
- Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
- Group Term Life, Short-Term Disability, Long-Term Disability
- Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
- Participation in the Discretionary Time Off (DTO) Program
- 11 Paid Holidays Annually
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat huntingdetection engineeringincident responsehypothesis-driven threat huntinglog analysismalware analysisscripting (Python, PowerShell)adversary emulationSIEMEDR/XDR
Soft Skills
analytical skillsinvestigative skillsproblem-solving skillstechnical mentorshipcollaborationcommunication