Huntress

Security Operations Analyst- Pacific Time Zone

United States

$100,000 – $120,000Compensation
Junior (1 to 2 years)Experience Level
Full TimeJob Type
UnknownVisa
CybersecurityIndustries

Requirements

Candidates should possess at least 2 years of experience in a Security Operations Center (SOC) or Digital Forensics (DFIR) role, demonstrating experience with Windows, Linux, and MacOS as an attack surface, and experience with basic Threat Actor tools and techniques, including the MITRE ATT&CK Framework, PowerShell, and Windows Domain administration. Knowledge of core networking concepts and web technologies is also required.

Responsibilities

The Security Operations Analyst will triage, investigate, and respond to alerts from the Huntress platform, perform tactical review of EDR telemetry and log sources, conduct tactical malware analysis, investigate suspicious Microsoft M365 activity, assist in escalations from the Product Support team, contribute to detection engineering efforts, and support projects focused on improving analyst and partner outcomes. They will also contribute to a collaboratively mentored team environment and maintain working knowledge of Active Directory, Group Policy, and other relevant technologies.

Skills

Cybersecurity
Threat Detection
Incident Response
Intrusion Analysis
Security Operations
SOC
Investigation
Remediation

Huntress

Managed endpoint detection and response services

About Huntress

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.

Columbia, MarylandHeadquarters
2015Year Founded
$281.8MTotal Funding
SERIES_DCompany Stage
CybersecurityIndustries
501-1,000Employees

Benefits

100% remote work environment
Generous PTO including vacation, sick time, and paid holidays
12 weeks paid parental leave
Highly competitive and comprehensive medical, dental, and vision benefits plans
401(k) with 5% contribution regardless of employee contribution
Life and Disability insurance plans
Stock options for all full-time employees
One-time $500 stipend to build/upgrade home office
Annual allowance for education and professional development assistance
$75 USD/month digital reimbursement
Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Risks

Exploitation of security flaws in data transfer tools could affect Huntress's clients.
Social engineering attacks may bypass AI security measures, posing a risk to Huntress.
Difficulty in finding specialized talent could hinder Huntress's expansion efforts.

Differentiation

Huntress offers a 24/7 Security Operations Center for continuous threat monitoring.
The company integrates with Microsoft 365, enhancing security for businesses using Microsoft tools.
Huntress eliminates false positives by verifying threats before alerting clients.

Upsides

Huntress raised $180 million to expand and accelerate product development.
Recognition in Inc.'s Power Partner Awards boosts Huntress's market credibility.
Increased demand for cybersecurity due to remote work benefits Huntress's growth.

Land your dream remote job 3x faster with AI