Shape the Future of AI - Irish Talent Hub
WelocalizePart Time
Entry Level & New Grad
Candidates should have at least 2 years of experience in a SOC or Digital Forensics (DFIR) role. Demonstrated experience with Windows, Linux, and MacOS as an attack surface is required, along with experience with basic threat actor tools and techniques such as the MITRE ATT&CK Framework, PowerShell, Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, and other offensive/Red Team TTPs. Experience with static and dynamic malware analysis concepts is also necessary, as is a working knowledge of Windows Administration or Enterprise Domain Administration (Active Directory, Group Policy, Domain Trusts), core networking concepts (common ports/protocols, NAT, Public/Private IPs, VLANs), and web technologies and concepts (Web servers/applications, OWASP top 10). Effective communication skills and a strong sense of curiosity are essential. Previous experience in an MSP/MSSP/MDR role, Linux and MacOS investigative experience, and experience with scripting languages are preferred qualifications.
The Security Operations Center Analyst will triage, investigate, respond to, and remediate a variety of intrusions. This role involves performing tactical review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks and provide necessary remediations. Responsibilities also include performing tactical malware analysis, investigating suspicious Microsoft M365 activity, assisting with escalations from the Product Support team, and contributing to detection engineering creation and tuning efforts. The analyst will also contribute to projects focused on improving outcomes for analysts and partners and participate in a collaboratively mentored team environment.
Managed endpoint detection and response services
Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.