Make a difference here.
Applying for this role is straight forward Scroll down and click on Apply to be considered for this position.
UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions.
Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients.
UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
UltraViolet Cyber is seeking a Security (SOC) Analyst who will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy.
The Security Analyst will work with a large team that rotates 3x12 or 4x12 hour shifts. The position requires a US Government issued Secret Clearance and requires 5 days onsite per week in Herndon, VA.
The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future.
Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.).
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation.
The analyst will record all artifacts (i.e., emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.
associated with all security events and incident investigations within the SOC incident and tracking application.
Must be legally allowed to work in the US, and the work must be done in the US.
No third-party candidates will be considered.
What You Have :
- US Secret Security Clearance
- 2+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis
- Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.
- Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.
g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
- Familiarity with adversarial tactics, techniques, and procedures (TTPs)
- Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to :
- Firewalls (FWs), Intrusion Detection Sensors / Intrusion Prevention Sensors (IDS / IPS)
- Host-based Intrusion Detection System / Host-based Intrusion Prevention System (HIDS / HIPS)
- Additional : proxy / web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow)
- Virtual Private Network (VPN) gateways / concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.
e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP)
Additionally : network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.
g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)
Education, Certification & Clearance Requirements :
- Certification(s) : Security+ or equivalent
- Clearance Requirements : SECRET
- High school diploma needed
Preferred Skills :
- Certification(s) : Security+, GCIH, CEH, or CYSA+ is desired
- Experience with Splunk query language
- Experience with IDS / IPS / firewall / security configurations and signature development
- Experience with PCAP analysis
- Experience with Tanium threat response
- Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents.
This includes the identification of malicious code present within a computer system as well as the identification of malicious activities that are present within a computer system and / or enterprise network
- Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents
- Excellent verbal and written communications skills and ability to produce clear and thorough security incident reports and briefings
- Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components
- Conceptual understanding of Windows Active Directory is also desired
- Experience working with various event logging systems and must be proficient in the review of security event log analysis.
Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred
- Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment
- Experience in collecting and maintaining information pertinent to security investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation efforts
Benefits at UltraViolet Cyber!
- 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
- Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
- Group Term Life, Short-Term Disability, Long-Term Disability
- Voluntary Life, Hospital Indemnity, Accident, and / or Critical Illness
- Participation in the Discretionary Time Off (DTO) Program
- 11 Paid Holidays Annually
$70,000 - $76,000 a year
UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors.
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.
If you want to make an impact, UltraViolet Cyber is the place for you!
J-18808-Ljbffr