Huntress

Security Operations Analyst- Pacific Time Zone

United States

$100,000 – $120,000Compensation
Junior (1 to 2 years)Experience Level
Full TimeJob Type
UnknownVisa
CybersecurityIndustries

Security Operations Center Analyst

Position Overview

Huntress is seeking a motivated Security Operations Center (SOC) Analyst to join its rapidly expanding team. This role offers the opportunity to actively triage, investigate, respond to, and remediate a wide range of cyber intrusions. You will be part of a dedicated team focused on protecting companies globally from cyber-attacks, with ample opportunities for skill development and career advancement. The Huntress SOC is an elite unit committed to combating threat actors, providing a dynamic environment for analysts to enhance their skills and stay at the forefront of emerging threats.

Employment Type

  • Full-time

Location

  • Remote (Pacific Timezone, US)

Compensation

  • Base Salary: $100,000 - $120,000
  • Additional Compensation: Bonus and equity.
  • On-call/Call-in Pay: May be eligible for additional pay based on business requirements.

Work Schedule

  • Initial Training: Monday - Friday
  • Post-Training: Subject to change, may include weekends or a 4x10 shift based on business needs.

About Huntress

Huntress is a fully remote, global company comprised of passionate experts dedicated to breaking down cybersecurity barriers. We develop purpose-built security solutions, actively hunt down hackers, and strive to make a significant positive impact within our community. Founded in 2015 by former NSA cyber operators, Huntress provides enterprise-grade, fully managed cybersecurity products at an accessible SaaS price point. Our unique "One Team" advantage ensures our technology is designed in tandem with our industry-leading Security Operations Center (SOC), creating a seamless and effective security solution. We currently protect over 3 million endpoints and 1 million identities worldwide, empowering under-resourced IT teams with robust protection.

Responsibilities

  • Triage, investigate, and respond to alerts generated by the Huntress platform.
  • Conduct tactical reviews of EDR telemetry, log sources, and forensic artifacts to identify root causes of attacks and recommend remediation steps.
  • Perform tactical malware analysis as part of alert investigations.
  • Investigate suspicious Microsoft M365 activity and provide remediation guidance.
  • Assist the Product Support team with threat-related escalations and SOC-relevant inquiries.
  • Contribute to the creation and tuning of detection engineering efforts.
  • Participate in projects aimed at improving outcomes for analysts and partners.
  • Engage in collaborative mentoring within the team to foster continuous improvement.

Requirements

  • Experience: 2+ years in a SOC or Digital Forensics (DFIR) role.
  • Operating Systems: Demonstrated experience with Windows, Linux, and MacOS as attack surfaces.
  • Threat Actor Tools & Techniques: Demonstrated experience with:
    • MITRE ATT&CK Framework
    • PowerShell & Command Prompt Terminals
    • WMIC, Scheduled Tasks, SCM
    • Windows Domain and host Enumeration Techniques
    • Basic Lateral Movement Techniques
    • Basic Persistence Mechanisms
    • Basic Defense Evasion Techniques
    • Other offensive/Red Team TTPs
  • Malware Analysis: Demonstrated experience with static and dynamic malware analysis concepts.
  • Windows Administration: Working knowledge of Windows Administration or Enterprise Domain Administration, including:
    • Active Directory
    • Group Policy
    • Domain Trusts
  • Networking: Working knowledge of core networking concepts, including:
    • Common ports/protocols
    • NAT
    • Public/Private IPs
    • VLANs
  • Web Technologies: Working knowledge of web technologies and concepts, including:
    • Web servers/applications
    • OWASP Top 10
  • Communication: Effective communication skills with the ability to explain technical concepts clearly.

Skills

Cybersecurity
Threat Detection
Incident Response
Intrusion Analysis
Security Operations
SOC
Investigation
Remediation

Huntress

Managed endpoint detection and response services

About Huntress

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.

Columbia, MarylandHeadquarters
2015Year Founded
$281.8MTotal Funding
SERIES_DCompany Stage
CybersecurityIndustries
501-1,000Employees

Benefits

100% remote work environment
Generous PTO including vacation, sick time, and paid holidays
12 weeks paid parental leave
Highly competitive and comprehensive medical, dental, and vision benefits plans
401(k) with 5% contribution regardless of employee contribution
Life and Disability insurance plans
Stock options for all full-time employees
One-time $500 stipend to build/upgrade home office
Annual allowance for education and professional development assistance
$75 USD/month digital reimbursement
Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Risks

Exploitation of security flaws in data transfer tools could affect Huntress's clients.
Social engineering attacks may bypass AI security measures, posing a risk to Huntress.
Difficulty in finding specialized talent could hinder Huntress's expansion efforts.

Differentiation

Huntress offers a 24/7 Security Operations Center for continuous threat monitoring.
The company integrates with Microsoft 365, enhancing security for businesses using Microsoft tools.
Huntress eliminates false positives by verifying threats before alerting clients.

Upsides

Huntress raised $180 million to expand and accelerate product development.
Recognition in Inc.'s Power Partner Awards boosts Huntress's market credibility.
Increased demand for cybersecurity due to remote work benefits Huntress's growth.

Land your dream remote job 3x faster with AI