Senior SOC Security Engineer
CalendlyFull Time
Senior (5 to 8 years), Expert & Leadership (9+ years)
Candidates should possess at least 2 years of experience in a Security Operations Center (SOC) or Digital Forensics (DFIR) role, demonstrating experience with Windows, Linux, and MacOS as an attack surface, and experience with basic Threat Actor tools and techniques, including the MITRE ATT&CK Framework, PowerShell, and Windows Domain administration. Knowledge of core networking concepts and web technologies is also required.
The Security Operations Analyst will triage, investigate, and respond to alerts from the Huntress platform, perform tactical review of EDR telemetry and log sources, conduct tactical malware analysis, investigate suspicious Microsoft M365 activity, assist in escalations from the Product Support team, contribute to detection engineering efforts, and support projects focused on improving analyst and partner outcomes. They will also contribute to a collaboratively mentored team environment and maintain working knowledge of Active Directory, Group Policy, and other relevant technologies.
Managed endpoint detection and response services
Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.