Logo for UltraViolet Cyber

Cyber Threat Detection & Response Engineer

Roles & Responsibilities

  • U.S. citizenship is required
  • 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting or detection engineering
  • History of independently building custom behavior-based and/or threshold-based detections in customer environments from scratch
  • Experience building detections in SentinelOne, Elastic, or CrowdStrike platforms

Requirements:

  • Proactively hunt for hidden threats across endpoints, networks, cloud, and applications
  • Proactively create detection rules to alert SOC analysts of intrusions against customer networks
  • Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence
  • Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection

Job description

Make a difference here.

UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.

By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. 

UltraViolet Cyber is seeking a Cyber Threat Detection & Response Engineer to join the Threat Intelligence & Detection Engineering (TIDE) team. Your primary responsibilities will be performing threat hunts to identify, investigate, and respond to cyber threats in our customer environments, and creating intelligence-based threat detections to defend our customers against modern cyber threats. This role requires you to lean on deep technical expertise, advanced analytic skillsets, and knowledge of adversarial tactics, techniques, and procedures (TTPs) to help stop threat actors from compromising our customers. The ideal candidate will be open to engaging with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.


What You'll Do:
  • Proactively hunt for hidden threats across endpoints, networks, cloud, and applications.

  • Proactively create detection rules to alert SOC analysts of intrusions against customer networks.

  • Assist with tuning and enhancing existing detection rules to better defend against evolving threats.

  • Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence.

  • Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity.

  • Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK.

  • Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection.

  • Collaborate with Incident Response and SOC teams to investigate and contain security incidents.

  • Provide technical mentorship to junior threat hunters and SOC analysts.Partner with Threat Intelligence to operationalize indicators and adversary insights.

  • Contribute to continuous improvement of detection engineering and hunting methodologies.

  • Regularly engage with internal account teams and customers to help strengthen their security posture, identify weaknesses, report on findings, and report on detection strategies.

  • Provide technical insight to internal account teams and customers as needed.


What You've Done:
  • U.S. citizenship is required

  • 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting or detection engineering.

  • History of independently building custom behavior-based and/or threshold-based detections in customer environments from scratch.

  • Experience building detections in SentinelOne, Elastic, or CrowdStrike platforms.

  • Capable of independently identifying and tuning flaws in existing detections to reduce noise.

  • Experience independently building and performing hypothesis-driven threat hunts in customer environments.

  • Capable of clearly and concisely reporting findings from threat hunts.

  • History of meeting with customers to explain detections and threat hunt findings to senior leadership teams.

  • Experience working with and mapping detections to the MITRE ATT&CK framework.

  • Background knowledge in the cyber threat landscape, including threat actors, malware, and evolving TTPs.

  • Experience working with cyber threat intelligence analysts/teams to identify new detection opportunities.

  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools.

  • Experience with scripting languages (Python, PowerShell, etc.) for scripting purposes.

  • Enjoy working in a team environment.

  • Willingness to learn from more senior team members while mentoring junior team members.


Preferred Qualifications:
  • Experience with pentesting or red teaming.
  • Experience with reverse engineering.
  • GIAC Threat Hunting (GCTH), Certified Enterprise Defender (GCED), or Certified Intrusion Analyst (GCIA) certification(s)

  • What We Offer:
  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed  
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)  
  • Group Term Life, Short-Term Disability, Long-Term Disability  
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness  
  • Participation in the Discretionary Time Off (DTO) Program  
  • 11 Paid Holidays Annually 
  • UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.

    We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.

    UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. 

    If you want to make an impact, UltraViolet Cyber is the place for you! 

    Related jobs

    Other jobs at UltraViolet Cyber

    We help you get seen. Not ignored.

    We help you get seen faster — by the right people.

    🚀

    Auto-Apply

    We apply for you — automatically and instantly.

    Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

    AI Match Feedback

    Know your real match before you apply.

    Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

    Upgrade to Premium. Apply smarter and get noticed.

    Upgrade to Premium

    Join thousands of professionals who got noticed and hired faster.