12 days ago

Principal Security Operations Analyst

Huntress

Hybrid
Full Time
$207,500
Hybrid

Job Overview

Job TitlePrincipal Security Operations Analyst
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$207,500
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

What We Do

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service. We protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do as a Principal Security Operations Analyst

Huntress is looking for a Principal Security Operations Analyst based in the United States to join our quickly growing team. In this role, you will triage, investigate, respond to, and remediate intrusions daily. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies worldwide from cyberattacks. This person will also mentor junior team members, allowing them to grow individually and as a team.

The Huntress Security Operations Center is an elite team that wakes up daily to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. With the chance to work on various incidents alongside a skilled team, you’ll have the opportunity to accelerate your career and skills, too.

Responsibilities

  • Function as the lead liaison between the SOC and other Product and Research teams
  • Help build automation to help reduce the workload on the SOC
  • Own and complete investigative objectives associated with multi-host intrusions without assistance
  • Triage, investigate, and respond to alerts coming in from the Huntress platform
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks, where possible, and provide remediations needed to remove the threat
  • Understand and perform advanced malware analysis as part of investigating systems and identities
  • Investigate suspicious Microsoft M365 activity and provide appropriate remediations
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions
  • Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed
  • Contribute to detection efforts by helping to create or request net new detections, as well as tuning current detections
  • Provide technical mentorship to more junior team members
  • Contribute regularly to external-facing Huntress content such as blogs, webinars, presentations, and speaking engagements

What You Bring To The Team

  • 6+ years experience in a SOC, Incident Response, or Forensics role
  • Ability to explain possible complex alerts/events in a non-complex way, both written and verbal
  • Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team
  • Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis)
  • Demonstrated experience with Windows, Linux and/or macOS as an attack surface
  • Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs)
  • Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts)
  • Strong experience with M365/Cloud attack techniques
  • Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or cybersecurity

Preferred Qualifications

  • Experience with scripting languages (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
  • Demonstrated experience on platforms like HackTheBox, TryHackMe, Blue Team Labs Online, etc.
  • Participation in cybersecurity competitions such as Capture the Flag, the Collegiate Cyber Defense Competition, etc.
  • Familiarity with MSP tools such as RMMs
  • Previous experience in an MSP/MSSP/MDR role

What We Offer

  • 100% remote work environment - since our founding in 2015
  • Generous paid time off policy, including vacation, sick time, and paid holidays
  • 12 weeks of paid parental leave
  • Highly competitive and comprehensive medical, dental, and vision benefits plans
  • 401(k) with a 5% contribution regardless of employee contribution
  • Life and Disability insurance plans
  • Stock options for all full-time employees
  • One-time $500 reimbursement for building/upgrading home office
  • Annual allowance for education and professional development assistance
  • $75 USD/month digital reimbursement
  • Access to the BetterUp platform for coaching, personal, and professional growth

Key skills/competency

  • Security Operations Center (SOC)
  • Incident Response (IR)
  • Digital Forensics
  • Malware Analysis
  • Microsoft M365 Security
  • Threat Intelligence (MITRE ATT&CK)
  • Scripting (PowerShell, Python)
  • Windows/Linux/macOS Security
  • Detection Engineering
  • Mentorship

Tags:

Principal Security Operations Analyst
Incident Response
Threat Hunting
Digital Forensics
Malware Analysis
Detection Engineering
Security Operations
Mentorship
Remediation
Customer Engagement
Automation Building
MITRE ATT&CK
PowerShell
Python
Bash
WMIC
Active Directory
Group Policy
Windows Server Update Service
Microsoft 365
RMMs

Share Job:

How to Get Hired at Huntress

  • Research Huntress's mission: Study their unique "One Team" approach and commitment to protecting all businesses from cyber threats.
  • Showcase deep SOC experience: Highlight your 6+ years in a SOC, Incident Response, or Forensics role, emphasizing practical intrusion response.
  • Demonstrate leadership potential: Provide examples of successful mentorship of junior team members and leading complex security investigations.
  • Emphasize technical prowess: Detail your expertise with MITRE ATT&CK, advanced malware analysis, and M365 security in your resume and interviews.
  • Prepare for scenario-based interviews: Be ready to discuss past incident investigations, root cause analysis, and effective remediation strategies.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background