LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.
Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.
This range is provided by UltraViolet Cyber. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range
$70,000.00/yr - $76,000.00/yr
Make a difference here. UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
UltraViolet Cyber is seeking a Security (SOC) Analyst who will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The Security Analyst will work with a large to team that rotates 3x12 or 4x12 hour shifts. The position requires a US Government issued Secret Clearance, and requires 5 days onsite per week in Herndon, VA.
The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.).
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation.
The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC incident and tracking application.
Must be legally allowed to work in the US, and the work must be done in the US. No third-party candidates will be considered What You Have:
Active US Secret Security Clearance
3+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis
Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks
Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
Familiarity with adversarial tactics, techniques, and procedures (TTPs)
Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to:
Certification(s): Security+, GCIH, CEH, or CYSA+ is desired
Experience with Splunk query language
Experience with IDS/IPS/firewall/security configurations and signature development
Experience with PCAP analysis
Experience with Tanium threat response
Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network
Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents
Excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings
Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components
Conceptual understanding of Windows Active Directory is also desired
Experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred
Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment
Experience in collecting and maintaining information pertinent to security; investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation efforts
Benefits at UltraViolet Cyber!
401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
Group Term Life, Short-Term Disability, Long-Term Disability
Participation in the Discretionary Time Off (DTO) Program
11 Paid Holidays Annually
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. If you want to make an impact, UltraViolet Cyber is the place for you!
UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.
Seniority level
Associate
Employment type
Full-time
Job function
Information Technology
Industries
Transportation, Logistics, Supply Chain and Storage
Referrals increase your chances of interviewing at UltraViolet Cyber by 2x