You haven't searched anything yet.
Make a difference here.
UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
UltraViolet Cyber is seeking a Security Analyst who will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy.
The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.).
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation.
The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC incident and tracking application.
Must be legally allowed to work in the US, and the work must be done in the US.
No third-party candidates will be considered
\nWhat You Have
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status.
If you want to make an impact, UltraViolet Cyber is the place for you!
Full Time
$79k-97k (estimate)
02/03/2024
06/03/2024
The job skills required for SOC Analyst | Incident Response include Analysis, Cybersecurity, Cybersecurity, SIEM, Linux, Operating System, etc. Having related job skills and expertise will give you an advantage when applying to be a SOC Analyst | Incident Response. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by SOC Analyst | Incident Response. Select any job title you are interested in and start to search job requirements.
The following is the career advancement route for SOC Analyst | Incident Response positions, which can be used as a reference in future career path planning. As a SOC Analyst | Incident Response, it can be promoted into senior positions as a Systems/Application Security Analyst that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary SOC Analyst | Incident Response. You can explore the career advancement for a SOC Analyst | Incident Response below and select your interested title to get hiring information.