Huntress

Security Operations Analyst- East or Central Time Zone

United States

$100,000 – $120,000Compensation
Junior (1 to 2 years)Experience Level
Full TimeJob Type
UnknownVisa
CybersecurityIndustries

Security Operations Center Analyst

Position Overview

Huntress is seeking a motivated Security Operations Center (SOC) Analyst to join our growing team. In this role, you will be responsible for triaging, investigating, responding to, and remediating a variety of cyber intrusions. You will work alongside a dedicated team of cybersecurity professionals focused on protecting companies worldwide from cyberattacks, with ample opportunities for skill progression and career advancement. The Huntress SOC is an elite unit dedicated to combating threat actors and staying at the forefront of emerging threats.

Employment Type

Full-time

Location

Remote (East or Central Time Zone, US)

Reporting Structure

Reports to: Manager, Security Operations Center

Compensation

  • Base Salary: $100,000 - $120,000
  • Additional Compensation: Bonus and equity
  • On-Call Pay: May be eligible for on-call/call-in pay in addition to base pay.

Work Schedule

  • Training Period: Monday-Friday
  • Post-Training: Subject to change based on business requirements, may include weekends or a 4x10 shift.

About Huntress

Huntress is a fully remote, global team committed to breaking down cybersecurity barriers. We develop purpose-built security solutions, actively hunt down hackers, and strive to make a significant positive impact on our community. Founded in 2015 by former NSA cyber operators, Huntress provides enterprise-grade, fully owned, and managed cybersecurity products at an affordable SaaS price point, making robust security accessible to all businesses, not just large enterprises. Our unique "One Team" advantage ensures our technology is seamlessly integrated with our industry-leading Security Operations Center (SOC). We currently protect over 3 million endpoints and 1 million identities globally, empowering under-resourced IT teams with effective cybersecurity.

Responsibilities

  • Triage, investigate, and respond to alerts generated by the Huntress platform.
  • Conduct tactical reviews of EDR telemetry, log sources, and forensic artifacts to identify the root cause of attacks and recommend necessary remediation steps.
  • Perform tactical malware analysis as part of alert investigations.
  • Investigate suspicious Microsoft M365 activity and provide remediation guidance.
  • Assist the Product Support team with threat-related escalations and SOC-relevant inquiries.
  • Contribute to the creation and tuning of detection engineering efforts.
  • Participate in projects aimed at improving outcomes for analysts and partners.
  • Engage in collaborative mentoring to foster team growth and individual skill development.

Requirements

  • Experience: 2+ years of experience in a SOC or Digital Forensics (DFIR) role.
  • Operating Systems: Demonstrated experience with Windows, Linux, and macOS as attack surfaces.
  • Threat Actor Tools & Techniques: Demonstrated experience with:
    • MITRE ATT&CK Framework
    • PowerShell & Command Prompt Terminals
    • WMIC, Scheduled Tasks, SCM
    • Windows Domain and host Enumeration Techniques
    • Basic Lateral Movement Techniques
    • Basic Persistence Mechanisms
    • Basic Defense Evasion Techniques
    • Other offensive/Red Team TTPs
  • Malware Analysis: Demonstrated experience with static and dynamic malware analysis concepts.
  • Windows Administration: Working knowledge of Windows Administration or Enterprise Domain Administration, including Active Directory, Group Policy, and Domain Trusts.
  • Networking: Working knowledge of core networking concepts, including common ports/protocols, NAT, Public/Private IPs, and VLANs.
  • Web Technologies: Working knowledge of web technologies and concepts, such as web servers/applications and the OWASP Top 10.
  • Communication: Effective communication skills.

Skills

Cybersecurity
Intrusion detection
Incident response
Threat investigation
Remediation
Security Operations Center (SOC)

Huntress

Managed endpoint detection and response services

About Huntress

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.

Columbia, MarylandHeadquarters
2015Year Founded
$281.8MTotal Funding
SERIES_DCompany Stage
CybersecurityIndustries
501-1,000Employees

Benefits

100% remote work environment
Generous PTO including vacation, sick time, and paid holidays
12 weeks paid parental leave
Highly competitive and comprehensive medical, dental, and vision benefits plans
401(k) with 5% contribution regardless of employee contribution
Life and Disability insurance plans
Stock options for all full-time employees
One-time $500 stipend to build/upgrade home office
Annual allowance for education and professional development assistance
$75 USD/month digital reimbursement
Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Risks

Exploitation of security flaws in data transfer tools could affect Huntress's clients.
Social engineering attacks may bypass AI security measures, posing a risk to Huntress.
Difficulty in finding specialized talent could hinder Huntress's expansion efforts.

Differentiation

Huntress offers a 24/7 Security Operations Center for continuous threat monitoring.
The company integrates with Microsoft 365, enhancing security for businesses using Microsoft tools.
Huntress eliminates false positives by verifying threats before alerting clients.

Upsides

Huntress raised $180 million to expand and accelerate product development.
Recognition in Inc.'s Power Partner Awards boosts Huntress's market credibility.
Increased demand for cybersecurity due to remote work benefits Huntress's growth.

Land your dream remote job 3x faster with AI