Intelligence Analyst - Falcon Recon (Remote)
CrowdstrikeFull Time
Mid-level (3 to 4 years), Senior (5 to 8 years)
Candidates should possess 3-5 years of experience in roles such as SOC, MDR, Threat Hunting, or Incident Response. Experience leading or participating in Incident Response engagements for external customers is required, along with familiarity with tools like osquery, Velociraptor, or leveraging EDRs for forensic artifact analysis.
The Senior Hunt & Response Analyst will perform a cadenced review of hunting data to identify compromises, research and develop new hunting hypotheses, lead or support tactical incident response engagements for customers, perform regular rotations in the SOC, conduct intermediate malware analysis, perform OSINT, contribute to content creation, and speak with customers to explain investigation findings.
Managed endpoint detection and response services
Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.