Full-Time

Security – SOC

UltraViolet Cyber

UltraViolet Cyber

501-1,000 employees

MDR and penetration testing services

Compensation Overview

$70k - $76k/yr

No H1B Sponsorship

Reston, VA, USA

In Person

On-site requirement: 5 days per week in Herndon, VA.

US Top Secret Clearance Required

Category
IT & Security (1)
Required Skills
TCP/IP
SQL
Computer Networking
Vulnerability Analysis
Linux/Unix
Requirements
  • Active US Secret Security Clearance
  • 3+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis
  • Working knowledge of the various operating systems (e.g. Windows, OS X, Linux) commonly deployed in enterprise networks
  • Working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS)
  • Familiarity with adversarial tactics, techniques, and procedures (TTPs)
  • Capability to analyze security logs and events from devices including Firewalls, Intrusion Detection Sensors/Intrusion Prevention Sensors, Host-based Intrusion Detection/Prevention Systems, and additional: proxy/web filter, vulnerability scans, routers, NetFlow, VPN gateways, server event logs, e-mail and endpoint protection, PKI, cloud security infrastructure
  • 8570 Certification(s): Security+ or equivalent
  • High school diploma
  • Must be legally allowed to work in the US, and the work must be done in the US
  • No third-party candidates will be considered
Responsibilities
  • Monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy
  • Work with a large team that rotates 3x12 or 4x12 hour shifts
  • Onsite work five days per week in Herndon, VA
  • Analyze logs and events from various device types that may send logs to the SOC in the future (non-traditional feeds such as HR data, badging information, physical security devices)
  • Provide documentation detailing any additional information collected and maintained for each security investigation
  • Record all artifacts (emails, logs, documents, URLs, screenshots, etc.) associated with security events and incident investigations within the SOC incident and tracking application
Desired Qualifications
  • Certification(s): Security+, GCIH, CEH, or CYSA+ is desired
  • Experience with Splunk query language
  • Experience with IDS/IPS/firewall/security configurations and signature development
  • Experience with PCAP analysis
  • Experience with Tanium threat response
  • Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents (identification of malicious code and activities)
  • Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents
  • Excellent verbal and written communications skills and ability to produce clear and thorough security incident reports and briefings
  • Experience in monitoring the operational status of monitoring components and escalating/reporting outages
  • Conceptual understanding of Windows Active Directory
  • Experience working with various event logging systems and SIEM platforms that perform log collection, analysis, correlation, and alerting
  • Experience with identification and implementation of counter-measures or mitigating controls for deployment in enterprise networks
  • Experience collecting and maintaining information pertinent to security investigations and incidents in a format suitable for analysis and law enforcement

UltraViolet Cyber focuses on delivering managed security solutions that blend defensive and offensive security to boost organizational resilience. The company offers 24/7 Managed Detection and Response (MDR) and Penetration Testing as a Service, both sold on a subscription basis. Its Security as Code platform automates threat detection and investigation, providing a unified risk view for the security operations team. By integrating Red Team (attack simulation) and Blue Team (defense) activities, the company ensures vulnerabilities are both identified and promptly remediated. The main goal is to help organizations continuously improve cyber readiness and protect critical data and infrastructure.

Company Size

501-1,000

Company Stage

Series A

Total Funding

$4.1M

Headquarters

McLean, Virginia

Founded

2023

Simplify Jobs

Simplify's Take

What believers are saying

  • Named to Inc. 5000 fastest-growing companies list in 2025.
  • Global offices in McLean, Hyderabad, Toronto, and London support expansion.
  • SOC-as-a-Service provides 24x7x365 monitoring for Fortune 500 clients.

What critics are saying

  • CrowdStrike's Falcon erodes UV Lens subscriptions in 6-12 months.
  • Mandiant poaches ex-NSA talent, hollowing penetration testing in 9-15 months.
  • NDAA 2027 cuts bankrupt government revenue from non-FedRAMP UV Lens.

What makes UltraViolet Cyber unique

  • UV Lens integrates offensive security, detection, and response, eliminating silos.
  • Founded by national intelligence practitioners for Global 2000 and federal clients.
  • Merger of four firms creates unified Red Team and Blue Team operations.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Vision Insurance

Life Insurance

Disability Insurance

401(k) Company Match

401(k) Retirement Plan

Unlimited Paid Time Off

Paid Holidays

Growth & Insights and Company News

Headcount

6 month growth

4%

1 year growth

-1%

2 year growth

41%
The Business Journals
Apr 15th, 2023
Four cybersecurity firms merge to create McLean's UltraViolet Cyber

With backing from private equity, four cybersecurity companies have combined into one and have set up shop in Northern Virginia.