UltraViolet Cyber

Cyber Threat Detection – Response Analyst

UltraViolet Cyber

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $75,000 - $95,000 per year

About the role

  • Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.
  • Proactively create detection rules to alert SOC analysts of intrusions against customer networks.
  • Assist with tuning and enhancing existing detection rules to better defend against evolving threats.
  • Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence.
  • Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity.
  • Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
  • Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection.
  • Collaborate with Incident Response and SOC teams to investigate and contain security incidents.
  • Provide technical mentorship to junior threat hunters and SOC analysts.
  • Partner with Threat Intelligence to operationalize indicators and adversary insights.
  • Contribute to continuous improvement of detection engineering and hunting methodologies.
  • Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
  • Provide technical insight to internal account teams and customers as needed.

Requirements

  • US Citizenship is Required
  • 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting, detection engineering, or incident response.
  • Demonstrated ability building hypotheses from threat models, not just IOC-driven searches.
  • Strong understanding of threat actor tradecraft, including malware, lateral movement, persistence, and exfiltration techniques.
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools (SentinelOne AI SIEM, CrowdStrike, MS Defender and Sentinel, Splunk, Elastic).
  • Experience with scripting languages (Python, PowerShell, etc.) to automate analysis and detection.
  • Familiarity with MITRE ATT&CK, threat intelligence platforms, and adversary emulation.
  • Strong analytical, investigative, and problem-solving skills.
Benefits
  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
  • Group Term Life, Short-Term Disability, Long-Term Disability
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
  • Participation in the Discretionary Time Off (DTO) Program
  • 11 Paid Holidays Annually
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
threat huntingdetection engineeringincident responsehypothesis-driven threat huntinglog analysismalware analysisscripting (Python, PowerShell)adversary emulationSIEMEDR/XDR
Soft Skills
analytical skillsinvestigative skillsproblem-solving skillstechnical mentorshipcollaborationcommunication