Security Operations Analyst

Huntress

Overview

Role involves triaging, investigating, and responding to cybersecurity threats.

Ideal candidate has 2+ years in SOC or DFIR with strong analytical skills and knowledge of threat actor tools.

100k usd / yearremotemidEnglishEDRWindowsLinuxmacOSPowerShellPythonBashPHPJavascriptRubyOWASPActive Directory

Locations

  • United States, California

Requirements

  • 2+ years in SOC or DFIR
  • Experience with Windows, Linux, MacOS
  • Knowledge of EDR telemetry and forensic artifacts

Responsibilities

  • Triage and respond to alerts
  • Investigate intrusions
  • Perform malware analysis
  • Assist in escalations
  • Contribute to detection engineering
  • Drive better outcomes for analysts
  • Mentor team members

Benefits

  • Remote work
  • Generous paid time off
  • 12 weeks parental leave
  • Comprehensive medical benefits
  • 401(k) with contribution
  • Stock options
  • Home office reimbursement
  • Education allowance