Huntress Logo

Huntress

Senior Hunt & Response Analyst

Posted Yesterday
Be an Early Applicant
Easy Apply
Remote
Hiring Remotely in US
145K-165K
Mid level
Easy Apply
Remote
Hiring Remotely in US
145K-165K
Mid level
The analyst will conduct threat hunting, incident response, and forensic analysis to manage security incidents and protect customer environments.
The summary above was generated by AI

Reports to: Senior Manager, Hunt & Response

Location: Remote US

Compensation Range: $145,000 to $165,000 base plus bonus and equity


What We Do:

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 3M+ endpoints and 1M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do: 

The Huntress Global Hunting & Response team has the unique honor of waking up every morning knowing we will be kicking out threat actors. This team sits alongside our 24x7 Security Operations Center team. It is a skilled team of individuals who review lower confidence signals and manage tactical incident response scenarios to aid customers out of critical intrusions. 
Members of this team will get to allocate their time across Hunting efforts and Response efforts. While in Hunting mode, you will get to research new attacker tradecraft, test new theories, and review hunting data at scale for millions of endpoints. While the SOC is responding to alerts within minutes, this team is developing detections and reviewing more ambiguous signs of attacker activity on a daily & weekly basis.
In the Response side of the role, you will get to flex your incident response and forensics skills. When customers are experiencing the worst incidents of their lives, this team will step in to answer questions core to understanding the cause of an attack, the high-level activities of the attacker once in the environment, and provide remediation actions and recommendations that will help reduce or eliminate this threat from occurring again in their environment.
If you love Threat Hunting, Incident Response, and Detection Engineering while in the environment and energy of a SOC, this is the role for you!

Responsibilities:  

  • Perform a cadenced review of hunting data to identify compromises not found during standard SOC workflows
  • Research, develop, and test new hunting hypotheses in the form of new detections or analytics
  • Lead or support tactical incident response engagements for customers who already utilize Huntress MDR. Perform live analysis on systems to determine the root cause of an intrusion, and craft reports that summarize the intrusion with the next steps to be taken
  • Perform regular rotations in the SOC to stay current and familiar with SOC day-to-day workflows
  • Perform intermediate malware analysis as part of hunting and response efforts
  • Perform OSINT as part of hunting and response efforts
  • Contribute to content creation efforts such as blogs, videos, podcasts, and webinars
  • Contribute back to community-driven projects and frameworks such as MITRE ATT&CK, HijackLIbs, and the LOLBAS Project.
  • Speak with customers to explain or summarize findings from investigations

What You Bring To The Team:  

  • 3-5 years working in one or more of the following: SOC, MDR, Threat Hunting, or Incident Response role
  • Experience leading or participating in Incident Response engagements for external customers
  • Experience with tools such as osquery, Velociraptor, or leveraging EDRs to perform forensic artifact analysis on systems
  • Confident command of forensic tools - such as Ericzimmerman’s EZ tools, RegRipper, Hayabusa, or Chainsaw - and forensic artifacts - such as prefetch, jumplists, shellbags, and more
  • Deep understanding of offensive security tradecraft, particularly persistence, lateral movement, credential theft, and remote access.
  • Confidently able to track threat actors across an organization and timeline the activity 
  • Strong familiarity with one or more detection languages such as Sigma, Suricata, Snort, or Yara
  • Familiarity with OSINT sources and how they can help answer questions relating to threat actor activity and infrastructure.
  • Strong familiarity with various query languages such as KQL, EQL, ES|QL, Splunk SPL
  • Intermediate malware analysis skills
  • Intermediate knowledge of Windows internals 
  • Intermediate knowledge of Linux and MacOS internals is a bonus
  • Strong understanding of the current threat landscape, initial access brokers, and ransomware actors.
  • Passionate and involved with the community through blogs, social media, conferences, etc
  • Experience with scripting (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
  • Demonstrable experience providing written and/or verbal customer-facing deliverables
  • Experience with detection and response in cloud environments such as Microsoft M365/Azure
  • Comfortable using Git to contribute to internal projects

What We Offer: 

  • 100% remote work environment - since our founding in 2015
  • Generous paid time off policy, including vacation, sick time, and paid holidays
  • 12 weeks of paid parental leave
  • Highly competitive and comprehensive medical, dental, and vision benefits plans 
  • 401(k) with a 5% contribution regardless of employee contribution
  • Life and Disability insurance plans
  • Stock options for all full-time employees 
  • One-time $500 reimbursement for building/upgrading home office
  • Annual allowance for education and professional development assistance 
  • $75 USD/month digital reimbursement
  • Access to the BetterUp platform for coaching, personal, and professional growth

  

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are. 

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.  

We do discriminate against hackers who try to exploit businesses of all sizes.

Accommodations: 

If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to [email protected]. Please note that non-accommodation requests to this inbox will not receive a response. 

If you have questions about your personal data privacy at Huntress, please visit our privacy page.

#BI-Remote 

Top Skills

Azure
Bash
Chainsaw
Edrs
Eql
Ericzimmerman'S Ez Tools
Es|Ql
Git
Hayabusa
JavaScript
Kql
Microsoft M365
Osquery
PHP
Powershell
Python
Regripper
Ruby
Sigma
Snort
Splunk Spl
Suricata
Velociraptor
Yara

Huntress Boston, Massachusetts, USA Office

Boston, MA, United States

Similar Jobs at Huntress

24 Days Ago
Easy Apply
Remote
US
Easy Apply
160K-180K
Senior level
160K-180K
Senior level
Information Technology • Cybersecurity
As a Senior Security Researcher, you'll develop security capabilities, analyze threats, and collaborate with teams to enhance product security. Your focus will be on innovative solutions and community education.
Top Skills: BeyondcorpChrome EnterpriseCybersecurity ToolsElasticGoogle ApisGoogle Cloud PlatformGoogle Identity PremiumGoogle VaultGoogle WorkspaceKibana
23 Days Ago
Easy Apply
Remote
US
Easy Apply
190K-225K
Senior level
190K-225K
Senior level
Information Technology • Cybersecurity
As a Principal Security Operations Analyst, you will investigate and respond to cyber incidents, mentor junior team members, and lead automation efforts in the Security Operations Center.
Top Skills: Active DirectoryCloud SecurityCommand PromptIncident ResponseMalware AnalysisMicrosoft 365PowershellWindows Server
16 Days Ago
Easy Apply
Remote
US
Easy Apply
160K-170K
Senior level
160K-170K
Senior level
Information Technology • Cybersecurity
The role involves researching threats, creating reports, collaborating with teams, and advocating for product enhancements to improve cybersecurity strategies.
Top Skills: AzureC/C++ElasticGoGoogleKibanaPythonSiem Tools

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account