Cyber Threat Researcher

Posted 12 Hours Ago
Be an Early Applicant
Hiring Remotely in USA
Remote
90K-120K Annually
Mid level
Security • Cybersecurity
The Role
As a Cyber Threat Researcher, you'll engage in threat hunting, enhance detection rules, mentor junior analysts, and collaborate with SOC teams to investigate incidents.
Summary Generated by Built In
Make a difference here.

UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.

By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. 

UltraViolet Cyber is seeking an Cyber Threat Researcher (Level II) to join our Threat Intelligence & Detection Engineering (TIDE) team. Your primary responsibilities will be engaging in threat hunts to identify, investigate, and respond to cyber threats in our customer environments, creating intelligence-based threat detections to defend our customers against modern cyber threats, and leveraging your knowledge of the cyber threat landscape to support offensive and defensive threat intelligence objectives. This role requires you to lean on deep technical expertise, advanced analytic skillsets, and knowledge of adversarial tactics, techniques, and procedures (TTPs) to help stop threat actors from compromising our customers. The ideal candidate will be open to engaging with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.

What You'll Do:

  • Proactively create detection rules to alert SOC analysts of intrusions against customer networks.
  • Assist with tuning and enhancing existing detection rules to better defend against evolving threats.
  • Support hypotheses-driven threat hunting efforts using security data and intelligence.
  • Support threat intelligence objectives by contributing to offensive and defensive threat intelligence reports.  
  • Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.
  • Provide technical mentorship to junior threat hunters and SOC analysts.

  • Contribute to continuous improvement of detection engineering and hunting methodologies.
  • Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.
  • Provide technical insight to internal account teams and customers as needed.
  • Collaborate with Incident Response and SOC teams to investigate and contain security incidents.


What You've Done:

  • U.S. citizenship is required.
  • At least 4+ years of experience in cybersecurity, with at least 1 year focused on threat hunting or detection engineering.
  • History of building custom behavior-based and/or threshold-based detections in customer environments from scratch.
  • Capable of identifying and tuning flaws in existing detections to reduce noise with little to no oversight.
  • Experience performing hypothesis-driven threat hunts in customer environments.
  • Capable of clearly and concisely reporting findings from threat hunts.
  • History of attending customer meetings, including those involving senior leadership.
  • Working understanding of the MITRE ATT&CK framework.
  • Background knowledge in the cyber threat landscape, including threat actors, malware, and evolving TTPs.
  • Experience working with cyber threat intelligence analysts/teams to identify new detection opportunities.
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools.
  • Experience with scripting languages (Python, PowerShell, etc.) for scripting purposes.
  • Enjoy working in a team environment.
  • Willingness to learn from more senior team members while mentoring junior team members.
  •  

Preferred Qualifications:

  • Experience building detections in SentinelOne, Elastic, and/or CrowdStrike platforms preferred.
  • Prior experience as part of, or directly supporting, a Threat Intelligence team.
  • GIAC Threat Hunting (GCTH), Certified Enterprise Defender (GCED), or Certified Intrusion Analyst (GCIA) certification(s)

What We Offer:

  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed  
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)  
  • Group Term Life, Short-Term Disability, Long-Term Disability  
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness  
  • Participation in the Discretionary Time Off (DTO) Program  
  • 11 Paid Holidays Annually 

UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.

We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.

UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. 

If you want to make an impact, UltraViolet Cyber is the place for you! 

Skills Required

  • At least 4+ years of experience in cybersecurity
  • At least 1 year focused on threat hunting or detection engineering
  • History of building custom behavior-based and/or threshold-based detections
  • Experience performing hypothesis-driven threat hunts
  • Working understanding of the MITRE ATT&CK framework
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools
  • Experience with scripting languages (Python, PowerShell, etc.)
  • U.S. citizenship
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: McLean, Virginia
205 Employees

What We Do

Unified Security Operations, Delivered. We tear down the walls between red and blue teams & address risk exposure when it’s discovered—not weeks later. UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as- code platform combines technology innovation and human expertise to make advanced real time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams. By creating continuously optimized identification, detection and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia with global offices across the U.S. and in India.

Similar Jobs

Remote
USA
205 Employees
50K-90K Annually

Wipfli Logo Wipfli

Senior Consultant

Cloud • Fintech • Software • Business Intelligence • Consulting • Financial Services
Remote or Hybrid
Reston, VA, USA
3000 Employees

Wipfli Logo Wipfli

Senior Consultant

Cloud • Fintech • Software • Business Intelligence • Consulting • Financial Services
Remote or Hybrid
Chicago, IL, USA
3000 Employees
88K-118K Annually

Mondelēz International Logo Mondelēz International

Digital Supply Chain Engineering Director

Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Remote or Hybrid
3 Locations
90000 Employees
143K-235K Annually

Similar Companies Hiring

Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Milestone Systems Thumbnail
Artificial Intelligence • Other • Security • Software • Analytics • Big Data Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account