
Senior Hunt & Response Analyst
Huntress
full-time
Posted on:
Location Type: Remote
Location: Remote • 🇺🇸 United States
Visit company websiteSalary
💰 $145,000 - $165,000 per year
Job Level
Senior
Tech Stack
AzureCloudJavaScriptLinuxMacOSPHPPythonRubySplunk
About the role
- Perform a cadenced review of hunting data to identify compromises not found during standard SOC workflows
- Research, develop, and test new hunting hypotheses in the form of new detections or analytics
- Lead or support tactical incident response engagements for customers who already utilize Huntress MDR. Perform live analysis on systems to determine the root cause of an intrusion, and craft reports that summarize the intrusion, with the next steps to be taken
- Perform intermediate malware analysis as part of hunting and response efforts
- Perform OSINT as part of hunting and response efforts
- Contribute to content creation efforts such as blogs, videos, podcasts, and webinars
- Contribute to community-driven projects and frameworks, such as MITRE ATT&CK, HijackLibs, and the LOLBAS Project
- Speak with customers to explain or summarize findings from investigations
Requirements
- 3-5 years working in one or more of the following: SOC, MDR, Threat Hunting, or Incident Response roles
- Experience leading or participating in Incident Response engagements for external customers
- Experience with tools such as osquery, Velociraptor, or leveraging EDRs to perform forensic artifact analysis on systems
- Confident command of forensic tools - such as Ericzimmerman’s EZ tools, RegRipper, Hayabusa, or Chainsaw - and forensic artifacts - such as prefetch, jumplists, shellbags, and more
- Deep understanding of offensive security tradecraft, particularly persistence, lateral movement, credential theft, and remote access.
- Confidently able to track threat actors across an organization and timeline the activity
- Strong familiarity with one or more detection languages such as Sigma, Suricata, Snort, or Yara
- Familiarity with OSINT sources and how they can help answer questions relating to threat actor activity and infrastructure.
- Strong familiarity with various query languages such as KQL, EQL, ES|QL, Splunk SPL
- Intermediate malware analysis skills
- Intermediate knowledge of Windows internals
- Intermediate knowledge of Linux and macOS internals is a bonus
- Strong understanding of the current threat landscape, initial access brokers, and ransomware actors.
- Passionate and involved with the community through blogs, social media, conferences, etc.
- Experience with scripting (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
- Demonstrable experience providing written and/or verbal customer-facing deliverables
- Experience with detection and response in cloud environments such as Microsoft M365/Azure
- Comfortable using Git to contribute to internal projects
Benefits
- 100% remote work environment - since our founding in 2015
- Generous paid time off policy, including vacation, sick time, and paid holidays
- 12 weeks of paid parental leave
- Highly competitive and comprehensive medical, dental, and vision benefits plans
- 401(k) with a 5% contribution regardless of employee contribution
- Life and Disability insurance plans
- Stock options for all full-time employees
- One-time $500 reimbursement for building/upgrading home office
- Annual allowance for education and professional development assistance
- $75 USD/month digital reimbursement
- Access to the BetterUp platform for coaching, personal, and professional growth
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
malware analysisforensic analysisdetection languagesquery languagesscriptingoffensive security tradecraftincident responsethreat huntingOSINTWindows internals
Soft skills
communicationleadershipcommunity involvementcustomer-facing deliverablesresearchcontent creation