Senior Security (SOC) Analyst, Secret Clearance Required
Company: UltraViolet Cyber
Location: Herndon
Posted on: February 17, 2026
|
|
|
Job Description:
Job Description Job Description Make a difference here.
UltraViolet Cyber is a leading platform-enabled unified security
operations company providing a comprehensive suite of security
operations solutions. Founded and operated by security
practitioners with decades of experience, the UltraViolet Cyber
security-as-code platform combines technology innovation and human
expertise to make advanced real-time cybersecurity accessible for
all organizations by eliminating risks of separate red and blue
teams. By creating continuously optimized identification,
detection, and resilience from today’s dynamic threat landscape,
UltraViolet Cyber provides both managed and custom-tailored unified
security operations solutions to the Fortune 500, Federal
Government, and Commercial clients. UltraViolet Cyber is
headquartered in McLean, Virginia, with global offices across the
U.S. and in India. UltraViolet Cyber is seeking a Senior Security
(SOC) Analyst who will monitor and analyze security events and
alerts reported by the SIEM on a 24x7 basis to identify and
investigate suspicious or malicious activity, or other cyber events
which violate policy. The Security Analyst will work with a large
to team that rotates 3x12 or 4x12 hour shifts. The position
requires a US Government issued Secret Clearance, and requires 5
days onsite per week in Herndon, VA. The analyst will be
responsible for analyzing logs and events from any other device
types which may send logs or events to the SOC in the future.
Non-traditional device feeds will deliver data to the SIEM
architecture (e.g., Human Resources (HR) data, badging information,
and physical security devices, etc.). The analyst will provide
documentation detailing any additional information collected and
maintained for each security investigation. The analyst will record
all artifacts (i.e. emails, logs, documents, Uniform Resource
Locators (URLs), screenshots, etc.) associated with all security
events and incident investigations within the SOC incident and
tracking application. Must be legally allowed to work in the US,
and the work must be done in the US. No third-party candidates will
be considered What You Have: Active US Secret Security Clearance 5
years of experience working in a Security Operations Center (SOC)
or Network Operations Center (NOC) environment performing security
event monitoring and analysis Working knowledge of the various
operating systems (e.g. Windows, OS X, Linux, etc.) commonly
deployed in enterprise networks. Must possess a working knowledge
of network communications and routing protocols (e.g. TCP, UDP,
ICMP, BGP, MPLS, etc.) and common internet applications and
standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
Familiarity with adversarial tactics, techniques, and procedures
(TTPs) Must be capable of analyzing security logs and events from
the following types of devices such as, but not limited to:
Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention
Sensors (IDS/IPS) Host-based Intrusion Detection System/ Host-based
Intrusion Prevention System (HIDS/HIPS) Additional: proxy/web
filter, vulnerability scans, routers, router Internet Protocol (IP)
accounting systems (i.e., Cisco NetFlow) Virtual Private Network
(VPN) gateways/concentrators, server event logs, e-mail and host
anti-virus, desktop security monitoring agents, anti-virus servers,
IP services (i.e. Domain Name System (DNS) Services, Dynamic Host
Configuration Protocol (DHCP) Additionally: network address
translation devices, MDM (e.g. cellphones), Public Key
Infrastructure (PKI), and cloud security infrastructure (e.g.
Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)
Education, Certification & Clearance Requirements: 8570
Certification(s): Security or equivalent Clearance Requirements:
Secret Clearance High school diploma needed Preferred Skills:
Certification(s): Security, GCIH, CEH, or CYSA is desired
Experience with Splunk query language Experience with
IDS/IPS/firewall/security configurations and signature development
Experience with PCAP analysis Experience with Tanium threat
response Ability and prior experience with analyzing information
technology security events to discern events that qualify as
legitimate security incidents as opposed to non-incidents. This
includes the identification of malicious code present within a
computer system as well identification of malicious activities that
are present within a computer system and/or enterprise network
Experience working with a ticket management system to collect,
document and maintain information pertinent to security
investigations and incidents Excellent verbal and written
communications skills and ability produce clear and thorough
security incident reports and briefings Experience in monitoring
the operational status of monitoring components and escalating and
reporting outages of the components Conceptual understanding of
Windows Active Directory is also desired Experience working with
various event logging systems and must be proficient in the review
of security event log analysis. Previous experience with SIEM
platforms that perform log collection, analysis, correlation, and
alerting is also preferred Experience with the identification and
implementation of counter-measures or mitigating controls for
deployment and implementation in the enterprise network environment
Experience in collecting and maintaining information pertinent to
security; investigations and incidents in a format that supports
analysis, situational awareness reporting, and law enforcement
investigation efforts Benefits at UltraViolet Cyber! 401(k),
including an employer match of 100% of the first 3% contributed and
50% of the next 2% contributed Medical, Dental, and Vision
Insurance (available on the 1st day of the month following your
first day of employment) Group Term Life, Short-Term Disability,
Long-Term Disability Voluntary Life, Hospital Indemnity, Accident,
and/or Critical Illness Participation in the Discretionary Time Off
(DTO) Program 11 Paid Holidays Annually UltraViolet Cyber maintains
broad salary ranges for its roles in order to account for
variations in knowledge, skills, experience, market conditions and
locations, as well as reflect our company's differing products,
services, industries and lines of business. Candidates are
typically placed into the range based on the preceding factors. We
sincerely thank all applicants in advance for submitting their
interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the
workplace regardless of race, gender, religion, age, sexual
orientation, gender identity, disability, or veteran status. If you
want to make an impact, UltraViolet Cyber is the place for you! We
may use artificial intelligence (AI) tools to support parts of the
hiring process, such as reviewing applications, analyzing resumes,
or assessing responses. These tools assist our recruitment team but
do not replace human judgment. Final hiring decisions are
ultimately made by humans. If you would like more information about
how your data is processed, please contact us.
Keywords: UltraViolet Cyber, Bowie , Senior Security (SOC) Analyst, Secret Clearance Required, IT / Software / Systems , Herndon, Maryland