Job Search and Career Advice Platform

Enable job alerts via email!

Security Operations Analyst- West Coast New Remote US

Applied Intuition Inc.

Remote

USD 100,000 - 120,000

Full time

22 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm is seeking a Security Operations Center Analyst to join their remote team. This role involves triaging and investigating security alerts while collaborating with an elite team to protect clients. Applicants should have over 2 years of relevant experience and possess knowledge in various operating systems and threat actor tools. The position offers competitive compensation including bonus, stock options, and generous leave policies.

Benefits

100% remote work environment
Generous paid time off
12 weeks of paid parental leave
Highly competitive medical benefits
401(k) with company contribution
Stock options for full-time employees
Home office reimbursement
Annual education allowance

Qualifications

  • Experience in a Security Operations Center or Digital Forensics.
  • Knowledge of basic Threat Actor tools and techniques.
  • Ability to explain technical concepts to non-technical audiences.

Responsibilities

  • Triage, investigate, and respond to security alerts.
  • Perform malware analysis and investigate attacks.
  • Assist with escalations from Product Support team.

Skills

EDR telemetry analysis
Threat Actor tools knowledge
Static and dynamic malware analysis
Windows, Linux, MacOS knowledge
Basic networking concepts
Effective communication
Curiosity and eagerness to learn

Education

2+ years in SOC or Digital Forensics role
Job description

Reports to: Manager, Security Operations Center

Location: Remote Pacific Time Zone, US

Compensation Range: $100,000-$120,000 base plus bonus and equity. This role may be eligible for on-call/call-in pay in addition to base pay.

Training Period: The initial training period for this position will be Monday-Friday. Following training, the work schedule is subject to change and may include weekend or a 4x10 shift, depending on business requirements.

What We Do

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1 %—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center in mind and is never separated from our service.

We protect more than 4 million endpoints and 7 million identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do

Huntress is looking for a Security Operations Center Analyst to add to our growing team. In this role, you will triage, investigate, respond, and remediate a variety of intrusions on a daily basis. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies around the world from cyberattacks and will have daily opportunities to progress your analyst skillset and accelerate your career growth. The Huntress Security Operations Center is an elite team of individuals who wake up every day to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. If you’re looking to accelerate your career and skills, this is the team for you!

Responsibilities
  • Triage, investigate, and respond to alerts coming in from the Huntress platform.
  • Perform tactical review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks, where possible, and provide remediations needed to remove the threat.
  • Perform tactical malware analysis as part of investigating and triaging alerts.
  • Investigate suspicious Microsoft M365 activity and provide remediations.
  • Assist in escalations from the Product Support team for threat-related and SOC-relevant questions.
  • Contribute to detection engineering creation and tuning efforts.
  • Contribute to projects focused on driving better outcomes for our analysts and partners
  • Contribute to our collaboratively mentored team (we're all here to make each other better!).
What You Bring To The Team
  • 2+ years of experience in a SOC or Digital Forensics (DFIR) role
  • Demonstrated experience with Windows, Linux, and MacOS as an attack surface
  • Demonstrated experience with basic Threat Actor tools and techniques: MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs
  • Demonstrated experience with static and dynamic malware analysis concepts
  • Working knowledge of Windows Administration or Enterprise Domain Administration
  • Working knowledge of core networking concepts
  • Working knowledge of web technologies and concepts
  • Effective communication skills, with the ability to explain complex events to less technical audiences, enabling effective cross-functional collaboration within the SOC and across departments
  • Dedicated to prioritizing and addressing customer needs and concerns in all decision-making processes
  • A strong sense of curiosity and a genuine excitement for learning
Preferred Qualifications
  • Previous experience in an MSP/MSSP/MDR role
  • Linux and MacOS investigative experience
  • Demonstrated experience on platforms such as HackTheBox, TryHackMe, Blue Team Labs Online, etc.
  • Demonstrated experience with Cloud-based investigations such as M365, Azure, AWS, GCP, etc.
  • Participation in cybersecurity competitions such as Capture the Flags, the Collegiate Cyber Defense Competition, etc.
  • Familiarity with MSP tools such as RMMs
What We Offer
  • 100% remote work environment - since our founding in 2015
  • Generous paid time off policy, including vacation, sick time, and paid holidays
  • 12 weeks of paid parental leave
  • Highly competitive and comprehensive medical, dental, and vision benefits plans
  • 401(k) with a 5% contribution regardless of employee contribution
  • Life and Disability insurance plans
  • Stock options for all full-time employees
  • One-time $500 reimbursement for building/upgrading home office
  • Annual allowance for education and professional development assistance
  • Access to the BetterUp platform for coaching, personal, and professional growth
Accommodations

We understand the importance of an inclusive hiring process and workplace. If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.

Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process.

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.

We do discriminate against hackers who try to exploit businesses of all sizes.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.