Huntress

Security Operations Analyst - Ireland

Ireland

€70,000 – €90,000Compensation
Mid-level (3 to 4 years), Senior (5 to 8 years)Experience Level
Full TimeJob Type
UnknownVisa
Cybersecurity, Information Technology, SoftwareIndustries

About Huntress

Founded in 2015 as a fully remote company by former NSA cyber operators, Huntress was built on a simple premise: to force hackers to earn every inch of their access.

Today’s cyber-attacks aren’t limited to large organizations with the security tools that can ward off threats. Hackers don't discriminate and will find a way to penetrate any vulnerability in any size business, which is why Huntress focuses on protecting those small to midsize businesses that make up the backbone of our economy.

Huntress stops hidden threats that sneak past preventive security tools by utilizing our award-winning security platform and expert human threat hunters through dynamic products, including Managed EDR, MDR for Microsoft 365, and Managed Security Awareness Training.

Join the hunt and help us stop hackers in their tracks!

Role Overview

Huntress is looking for a Security Operations Center Analyst to add to our growing team. In this role, you will get to triage, investigate, respond, and remediate a variety of intrusions on a daily basis. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies around the world from cyber-attacks and will have daily opportunities to progress your analyst skillset and accelerate your career growth.

The Huntress Security Operations Center is an elite team of individuals who wake up every day to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. If you’re looking to accelerate your career and skills, this is the team for you!

Responsibilities

  • Triage, investigate, and respond to alerts from the Huntress platform
  • Perform tactical review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks where possible and provide remediations needed to remove the threat
  • Perform tactical malware analysis as part of investigating and triaging alerts
  • Investigate suspicious Microsoft M365 activity and provide remediations
  • Assist in escalations from the Product Support team for threat-related and SOC-relevant questions
  • Contribute to detection engineering creation and tuning efforts
  • Contribute to projects focused on driving better outcomes for our analysts and partners
  • Contribute to our collaboratively mentored team (we're all here to make each other better!)

What You Bring To The Team

  • 2+ years experience in a SOC or Digital Forensics (DFIR) role
  • Demonstrated experience with Windows, Linux, and MacOS as an attack surface
  • Demonstrated experience with basic Threat Actor tools and techniques:
    • MITRE ATT&CK Framework
    • PowerShell & Command Prompt Terminals
    • WMIC
    • Scheduled Tasks
    • SCM
    • Windows Domain and host Enumeration Techniques
    • Basic Lateral Movement Techniques
    • Basic Persistence Mechanisms
    • Basic Defense Evasion Techniques
    • Other offensive/Red Team TTPs
  • Demonstrated experience with static and dynamic malware analysis concepts
  • Working knowledge of Windows Administration or Enterprise Domain Administration:
    • Active Directory
    • Group Policy
    • Domain Trusts, etc.
  • Working knowledge of core networking concepts:
    • Common ports/protocols
    • NAT
    • Public/Private IPs
    • VLANs, etc.
  • Working knowledge of web technologies and concepts:
    • Web servers/applications
    • OWASP top 10, etc.
  • Effective communication skills, with the ability to explain complex events to less technical audiences, enabling effective cross-functional collaboration within the SOC and across departments
  • Dedicated to prioritizing and addressing customer needs and concerns in all decision-making processes
  • A strong sense of curiosity and a genuine excitement for learning

Preferred Qualifications

  • Previous experience in an MSP/MSSP/MDR role
  • Linux and MacOS investigative experience
  • Experience with scripting languages (such as Python, PowerShell, Bash)

Job Details

  • Reports to: Manager, Security Operations Center
  • Location: Remote Ireland
  • Compensation Range: €70,000 to €90,000 base plus bonus and equity

Skills

EDR telemetry
log analysis
forensic artifact analysis
threat hunting
incident response
alert triage
cybersecurity
SOC analysis

Huntress

Managed endpoint detection and response services

About Huntress

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.

Columbia, MarylandHeadquarters
2015Year Founded
$281.8MTotal Funding
SERIES_DCompany Stage
CybersecurityIndustries
501-1,000Employees

Benefits

100% remote work environment
Generous PTO including vacation, sick time, and paid holidays
12 weeks paid parental leave
Highly competitive and comprehensive medical, dental, and vision benefits plans
401(k) with 5% contribution regardless of employee contribution
Life and Disability insurance plans
Stock options for all full-time employees
One-time $500 stipend to build/upgrade home office
Annual allowance for education and professional development assistance
$75 USD/month digital reimbursement
Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Risks

Exploitation of security flaws in data transfer tools could affect Huntress's clients.
Social engineering attacks may bypass AI security measures, posing a risk to Huntress.
Difficulty in finding specialized talent could hinder Huntress's expansion efforts.

Differentiation

Huntress offers a 24/7 Security Operations Center for continuous threat monitoring.
The company integrates with Microsoft 365, enhancing security for businesses using Microsoft tools.
Huntress eliminates false positives by verifying threats before alerting clients.

Upsides

Huntress raised $180 million to expand and accelerate product development.
Recognition in Inc.'s Power Partner Awards boosts Huntress's market credibility.
Increased demand for cybersecurity due to remote work benefits Huntress's growth.

Land your dream remote job 3x faster with AI