Job Description
Huntress, founded in 2015, is seeking a Security Operations Center Analyst to join their team. Huntress focuses on protecting small to midsize businesses from cyber-attacks. The ideal candidate will triage, investigate, respond, and remediate intrusions daily, contributing to a mission-driven team combating threat actors.
Role involves:
- Triage, investigate, and respond to alerts from the Huntress platform.
- Perform tactical review of EDR telemetry, log sources, and forensic artifacts.
- Perform tactical malware analysis.
- Investigate suspicious Microsoft M365 activity.
- Contribute to detection engineering creation and tuning efforts.
- Contribute to projects focused on driving better outcomes for analysts and partners.
- Contribute to a collaboratively mentored team.
Requirements:
- 2+ years experience in a SOC or Digital Forensics (DFIR) role.
- Demonstrated experience with Windows, Linux, and MacOS.
- Demonstrated experience with basic Threat Actor tools and techniques.
- Working knowledge of Windows Administration or Enterprise Domain Administration.
- Working knowledge of core networking concepts.
- Working knowledge of web technologies and concepts.
- Effective communication skills.
- Dedicated to prioritizing and addressing customer needs.
- A strong sense of curiosity and a genuine excitement for learning.
What Huntress offers:
- 100% remote work environment.
- New starter home office set up reimbursement (£398).
- Generous personal leave entitlements.
- Digital monthly reimbursement (£92).
- Travel to the US 1-2 times/year for various company events
- Pension.
- Access to the BetterUp platform for coaching, personal, and professional growth.