Senior Security; SOC Analyst, Secret Clearance Required
Listed on 2025-12-01
-
IT/Tech
Cybersecurity, Security Manager, Network Security
Make a difference here.
Ultra Violet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the Ultra Violet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real‑time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, Ultra Violet Cyber provides both managed and custom‑tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. Ultra Violet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India.
Ultra Violet Cyber is seeking a Senior Security (SOC) Analystwho will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The Security Analyst will work with a large to team that rotates 3x12 or 4x12 hour shifts. The position requires a US Government issued Secret Clearance, and requires 5 days onsite per week in Herndon, VA.
The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.).
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation.
The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC incident and tracking application.
Must be legally allowed to work in the US, and the work must be done in the US.
No third‑party candidates will be considered
What You Have:- Active US Secret Security Clearance
- 5+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis
- Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.
- Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
- Familiarity with adversarial tactics, techniques, and procedures (TTPs)
- Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to:
- Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS)
- Host‑based Intrusion Detection System/ Host‑based Intrusion Prevention System (HIDS/HIPS)
- Additional: proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco Net Flow)
- Virtual Private Network (VPN) gateways/concentrators, server event logs, e‑mail and host anti‑virus, desktop security monitoring agents, anti‑virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP)
- Additionally: network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)
- 8570 Certification(s):
Security+ or equivalent - Clearance Requirements:
Secret Clearance - High school diploma needed
Skills:
- Certification(s):
Security+, GCIH, CEH, or CYSA+ is desired - Experience with Splunk query language
- Experience with IDS/IPS/firewall/security configurations and signature development
- Experience with PCAP analysis
- Experience with Tanium threat response
- Ability and prior experience with analyzing information technology security events to discern events that qualify…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).