UltraViolet Cyber
Security (SOC) Analyst, Secret Clearance Required
UltraViolet Cyber, Herndon, Virginia, United States, 22070
Make a difference here.
UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
UltraViolet Cyber is seeking a Security (SOC) Analyst
who will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The Security Analyst will work with a large to team that rotates 3x12 or 4x12 hour shifts. The position requires a US Government issued Secret Clearance, and requires 5 days onsite per week in Herndon, VA.
The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.).
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation.
The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC incident and tracking application.
Must be legally allowed to work in the US, and the work must be done in the US.
No third-party candidates will be considered
What You Have:US Secret Security Clear2+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment
performing security event monitoring and analysisWorking knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)Familiarity with adversarial tactics, techniques, and procedures (TTPs)Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to:Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS)Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS)Additional: proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow)Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP)Additionally: network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)Education, Certification & Clearance Requirements:
Certification(s):
Security+ or equivalentClearance Requirements:
SECRETHigh school diploma neededPreferred Skills:
Certification(s): Security+, GCIH, CEH, or CYSA+ is desiredExperience with Splunk query languageExperience with IDS/IPS/firewall/security configurations and signature developmentExperience with PCAP analysisExperience with Tanium threat responseAbility and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise networkExperience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidentsExcellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefingsExperience in monitoring the operational status of monitoring components and escalating and reporting outages of the componentsConceptual understanding of Windows Active Directory is also desiredExperience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferredExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environmentExperience in collecting and maintaining information pertinent to security; investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation effortsBenefits at UltraViolet Cyber!
401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributedMedical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)Group Term Life, Short-Term Disability, Long-Term DisabilityVoluntary Life, Hospital Indemnity, Accident, and/or Critical IllnessParticipation in the Discretionary Time Off (DTO) Program11 Paid Holidays Annually
$70,000 - $76,000 a year
UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.
If you want to make an impact, UltraViolet Cyber is the place for you!
UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
UltraViolet Cyber is seeking a Security (SOC) Analyst
who will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The Security Analyst will work with a large to team that rotates 3x12 or 4x12 hour shifts. The position requires a US Government issued Secret Clearance, and requires 5 days onsite per week in Herndon, VA.
The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.).
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation.
The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC incident and tracking application.
Must be legally allowed to work in the US, and the work must be done in the US.
No third-party candidates will be considered
What You Have:US Secret Security Clear2+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment
performing security event monitoring and analysisWorking knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)Familiarity with adversarial tactics, techniques, and procedures (TTPs)Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to:Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS)Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS)Additional: proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow)Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP)Additionally: network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)Education, Certification & Clearance Requirements:
Certification(s):
Security+ or equivalentClearance Requirements:
SECRETHigh school diploma neededPreferred Skills:
Certification(s): Security+, GCIH, CEH, or CYSA+ is desiredExperience with Splunk query languageExperience with IDS/IPS/firewall/security configurations and signature developmentExperience with PCAP analysisExperience with Tanium threat responseAbility and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise networkExperience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidentsExcellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefingsExperience in monitoring the operational status of monitoring components and escalating and reporting outages of the componentsConceptual understanding of Windows Active Directory is also desiredExperience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferredExperience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environmentExperience in collecting and maintaining information pertinent to security; investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation effortsBenefits at UltraViolet Cyber!
401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributedMedical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)Group Term Life, Short-Term Disability, Long-Term DisabilityVoluntary Life, Hospital Indemnity, Accident, and/or Critical IllnessParticipation in the Discretionary Time Off (DTO) Program11 Paid Holidays Annually
$70,000 - $76,000 a year
UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors.
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.
If you want to make an impact, UltraViolet Cyber is the place for you!