Huntress

Senior Hunt & Response Analyst

Australia

A$175,000 – A$190,000Compensation
Senior (5 to 8 years)Experience Level
Full TimeJob Type
UnknownVisa
CybersecurityIndustries

Job Description: Threat Hunter / Incident Responder

Employment Type: Full-time Location: Remote Australia Reports to: Manager, Hunt & Response Compensation Range: $175,000 to $190,000 AUD base plus bonus and equity


What We Do:

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 3M+ endpoints and 1M+ identities worldwide, elevating under-resourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.


What You’ll Do:

The Huntress Global Hunting & Response team has the unique honor of waking up every morning knowing we will be kicking out threat actors. This team sits alongside our 24x7 Security Operations Center (SOC) team. It is a skilled team of individuals who review lower confidence signals and manage tactical incident response scenarios to aid customers out of critical intrusions. Members of this team will get to allocate their time across Hunting efforts and Response efforts.

  • Hunting Mode: Research new attacker tradecraft, test new theories, and review hunting data at scale for millions of endpoints. While the SOC is responding to alerts within minutes, this team is developing detections and reviewing more ambiguous signs of attacker activity on a daily & weekly basis.
  • Response Mode: Flex your incident response and forensics skills. When customers are experiencing the worst incidents of their lives, this team will step in to answer questions core to understanding the cause of an attack, the high-level activities of the attacker once in the environment, and providing remediation actions and recommendations which will help reduce or eliminate this threat occurring again in their environment.

If you love Threat Hunting, Incident Response, and Detection Engineering while in the environment and energy of a SOC, this is the role for you!


Responsibilities:

  • Perform a cadenced review of hunting data to identify compromises not found during standard SOC workflows.
  • Research, develop, and test new hunting hypotheses in the form of new detections or analytics.
  • Lead or support tactical incident response engagements for customers who already utilize Huntress MDR. Perform live analysis on systems to determine the root cause of an intrusion, and craft reports that summarize the intrusion with next steps to be taken.
  • Perform regular rotations in the SOC to stay current and familiar with SOC day-to-day workflows.
  • Perform intermediate malware analysis as part of hunting and response efforts.
  • Perform OSINT as part of hunting and response efforts.
  • Contribute to content creation efforts such as blogs, videos, podcasts, and webinars.
  • Contribute back to community-driven projects and frameworks such as MITRE ATT&CK, HijackLIbs, and the LOLBAS Project.
  • Speak with customers to explain or summarize findings from investigations.

What You Bring To The Team:

  • 3-5 years working in one or more of the following: SOC, MDR, Threat Hunting, or Incident Response role.
  • Experience leading or participating in Incident Response engagements for external customers.
  • Experience with tools such as osquery, Velociraptor, or leveraging EDRs to perform forensic artifact analysis on systems.
  • Confident command of forensic tools - such as Eric Zimmerman’s EZ tools, R...

Skills

Cybersecurity
Threat Hunting
Incident Response
Security Operations Center (SOC)
Threat Research
Detection Development
Tradecraft Analysis

Huntress

Managed endpoint detection and response services

About Huntress

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.

Columbia, MarylandHeadquarters
2015Year Founded
$281.8MTotal Funding
SERIES_DCompany Stage
CybersecurityIndustries
501-1,000Employees

Benefits

100% remote work environment
Generous PTO including vacation, sick time, and paid holidays
12 weeks paid parental leave
Highly competitive and comprehensive medical, dental, and vision benefits plans
401(k) with 5% contribution regardless of employee contribution
Life and Disability insurance plans
Stock options for all full-time employees
One-time $500 stipend to build/upgrade home office
Annual allowance for education and professional development assistance
$75 USD/month digital reimbursement
Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Risks

Exploitation of security flaws in data transfer tools could affect Huntress's clients.
Social engineering attacks may bypass AI security measures, posing a risk to Huntress.
Difficulty in finding specialized talent could hinder Huntress's expansion efforts.

Differentiation

Huntress offers a 24/7 Security Operations Center for continuous threat monitoring.
The company integrates with Microsoft 365, enhancing security for businesses using Microsoft tools.
Huntress eliminates false positives by verifying threats before alerting clients.

Upsides

Huntress raised $180 million to expand and accelerate product development.
Recognition in Inc.'s Power Partner Awards boosts Huntress's market credibility.
Increased demand for cybersecurity due to remote work benefits Huntress's growth.

Land your dream remote job 3x faster with AI