Senior SOC Engineer
CVS HealthFull Time
Senior (5 to 8 years)
Candidates should have 6+ years of experience in a SOC, Incident Response, or Forensics role. They must possess the ability to explain complex alerts and events clearly, both verbally and in writing. Proven mentoring experience and skills for junior team members are essential. A strong understanding of Malware Analysis, including isolated VM configuration, file format identification, and basic static/dynamic analysis, is required. Demonstrated experience with Windows and/or MacOS as an attack surface, along with a strong understanding of Threat Actor Tools and techniques such as the MITRE ATT&CK Framework, PowerShell, Command Prompt, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, and Basic Defense Evasion, is also necessary.
The Principal Security Operations Analyst will triage, investigate, respond to, and remediate intrusions daily. Responsibilities include serving as the lead liaison between the SOC and other Product and Research teams, building automation through report template creation to reduce SOC workload, and owning and completing investigative objectives for multi-host intrusions independently. The role involves performing tactical forensic analysis to determine attack root causes and provide remediations, conducting advanced malware analysis, investigating suspicious Microsoft M365 activity, and assisting with escalations from the product support team. Additionally, the analyst will engage with customers when needed to explain observed activity, contribute to detection efforts by creating or requesting new detections and tuning existing ones, provide technical mentorship to junior team members, and contribute to external content such as blogs and webinars.
Managed endpoint detection and response services
Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.