UltraViolet Cyber

Unified Security Operations, Delivered.

Cybersecurity Threat Hunter

Threat Intelligence SpecialistSecurity AnalystFull TimeRemoteTeam 201-500H1B No SponsorCompany SiteLinkedIn

Location

United States

Posted

47 days ago

Salary

$80K - $95K / year

Bachelor Degree4 yrs expEnglishAWSAzureCloudCyber SecurityGoogle Cloud PlatformPythonSplunk

Job Description

• Proactively hunt for hidden threats across endpoints, networks, cloud, and applications. • Develop and execute hypotheses-driven threat hunting campaigns using security data and intelligence. • Analyze large volumes of log, endpoint, and network data to uncover anomalous or malicious activity. • Research and track adversary TTPs and leverage frameworks such as MITRE ATT&CK. • Collaborate with Detection Engineering to refine detection rules, signatures, and playbooks to improve threat detection. • Collaborate with Incident Response and SOC teams to investigate and contain security incidents. • Provide technical mentorship to junior threat hunters and SOC analysts. • Partner with Threat Intelligence to operationalize indicators and adversary insights. • Contribute to continuous improvement of detection engineering and hunting methodologies.

Job Requirements

  • US Citizenship is Required
  • 4+ years of experience in cybersecurity, with at least 2 years focused on threat hunting, detection engineering, or incident response.
  • Demonstrating the ability building hypotheses from threat models, not just IOC-driven searches
  • Strong understanding of attacker tradecraft, including malware, lateral movement, persistence, and exfiltration techniques.
  • Proficiency with SIEMs, EDR/XDR platforms, and log analysis tools (SentinelOne AI SIEM, CrowdStrike, MS Defender and Sentinel, Splunk, Elastic).
  • Experience with scripting languages (Python, PowerShell, etc.) to automate analysis and detection.
  • Familiarity with MITRE ATT&CK, threat intelligence platforms, and adversary emulation.
  • Strong analytical, investigative, and problem-solving skills.
  • Preferred Experience:**
  • Experience with cloud security (AWS, Microsoft Azure, GCP).
  • Knowledge of threat hunting in OT/ICS environments.
  • B.A or B.S in computer science or related field.
  • GIAC Threat Hunting (GCTH).
  • GIAC Certified Enterprise Defender (GCED).
  • GIAC Certified Intrusion Analyst (GCIA).

Benefits

  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)
  • Group Term Life, Short-Term Disability, Long-Term Disability
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness
  • Participation in the Discretionary Time Off (DTO) Program
  • 11 Paid Holidays Annually

Related Job Pages