Lead Threat Hunter (Remote)
Crowdstrike- Full Time
- Senior (5 to 8 years)
Candidates should possess a Bachelor’s degree in a related field, and ideally have 3+ years of experience in threat hunting, incident response, or detection engineering, with a strong understanding of cybersecurity principles and attacker methodologies. Experience with data analysis and scripting languages is beneficial, and familiarity with endpoint detection and response (EDR) solutions is preferred.
The Senior Hunt & Response Analyst will conduct a cadenced review of hunting data to identify compromises not found during standard SOC workflows, research and develop new hunting hypotheses in the form of new detections or analytics, and lead or support tactical incident response engagements for customers utilizing Huntress MDR, performing live analysis on systems to determine the root cause of an intrusion and crafting reports detailing remediation actions and recommendations to mitigate future threats.
Managed endpoint detection and response services
Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their service includes 24/7 monitoring of clients' systems to identify potential cyberattacks. When a threat is detected, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false positives that can occur with other services. In addition to threat hunting, Huntress offers security awareness training and resources like eBooks and webinars to educate employees about cybersecurity risks. Their commitment to high customer support and personalized reporting distinguishes them from competitors in the cybersecurity field. The goal of Huntress is to enhance the security posture of businesses by providing effective monitoring and education against cyber threats.