Senior Tactical Response Analyst - West Coast job opportunity at Huntress Labs, Inc..



bot
Huntress Labs, Inc. Senior Tactical Response Analyst - West Coast
Experience: 5-years
Pattern: Remote
Walk In
apply Apply Now
Salary:
Status:

Security

Copy Link Report
degreeOND
Hiring inbound within Remote US

Reports to: Senior Manager, Tactical Response Location: Remote US Compensation Range: $145,000 to $165,000 base plus bonus and equity   What We Do: Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service. We protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting. What You’ll Do:  The Huntress Tactical Response team has the unique honor of waking up every morning knowing we will be kicking out threat actors. This team sits alongside our 24x7 Security Operations Center team. It is a skilled team of individuals who review lower-confidence signals and manage tactical incident response scenarios to assist customers in exiting critical intrusions. In the Response side of the role, you will have the opportunity to flex your incident response and forensics skills. When customers are experiencing the worst incidents of their lives, this team will step in to answer questions core to understanding the cause of an attack, the high-level activities of the attacker once in the environment, and provide remediation actions and recommendations that will help reduce or eliminate this threat from occurring again in their environment. In between cases, you will get to research new attacker tradecraft, test new theories, and query data at scale for millions of endpoints. If you have a skillset in Incident Response, Threat Hunting, and/or Detection Engineering,  and would thrive in the environment and energy of a SOC, this is the role for you!  Responsibilities:   Lead or support tactical incident response engagements for customers who already utilize Huntress MDR. Perform live analysis on systems to determine the root cause of an intrusion, and craft reports that summarize the intrusion, with the next steps to be taken Research, develop, and test new tooling  in the form of automations, scripts, and tools  for analysis  Perform intermediate malware analysis as part of response efforts Perform OSINT as part of response efforts Contribute to content creation efforts such as blogs, videos, podcasts, and webinars Contribute to community-driven projects and frameworks, such as MITRE ATT&CK, HijackLibs, and the LOLBAS Project. Speak with customers to explain or summarize findings from investigations What You Bring To The Team:   3-5 years working in one or more of the following: SOC, MDR, Threat Hunting, or Incident Response roles Experience leading or participating in Incident Response engagements for external customers Experience with tools such as osquery, Velociraptor, or leveraging EDRs to perform forensic artifact analysis on systems Confident command of forensic tools - such as Ericzimmerman’s EZ tools, RegRipper, Hayabusa, or Chainsaw - and forensic artifacts - such as prefetch, jumplists, shellbags, and more Deep understanding of offensive security tradecraft, particularly persistence, lateral movement, credential theft, and remote access. Confidently able to track threat actors across an organization and timeline the activity  Strong familiarity with one or more detection languages such as Sigma, Suricata, Snort, or Yara Familiarity with OSINT sources and how they can help answer questions relating to threat actor activity and infrastructure Strong familiarity with various query languages such as KQL, EQL, ES|QL, Splunk SPL Intermediate malware analysis skills Intermediate knowledge of Windows internals  Intermediate knowledge of Linux and macOS internals is a bonus Strong understanding of the current threat landscape, initial access brokers, and ransomware actors Passionate and involved with the community through blogs, social media, conferences, etc. Experience with scripting (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby) Demonstrable experience providing written and/or verbal customer-facing deliverables Experience with detection and response in cloud environments such as Microsoft M365/Azure Comfortable using Git to contribute to internal projects What We Offer:  100% remote work environment - since our founding in 2015 Generous paid time off policy, including vacation, sick time, and paid holidays 12 weeks of paid parental leave Highly competitive and comprehensive medical, dental, and vision benefits plans  401(k) with a 5% contribution regardless of employee contribution Life and Disability insurance plans Stock options for all full-time employees  One-time $500 reimbursement for building/upgrading home office Annual allowance for education and professional development assistance  $75 USD/month digital reimbursement Access to the BetterUp platform for coaching, personal, and professional growth    Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.  We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.   We do discriminate against hackers who try to exploit businesses of all sizes. Accommodations:  If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.  Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights. #BI-Remote 

Other Ai Matches

remote-jobserver Remote
Technical Account Manager I Applicants are expected to have a solid experience in handling Sales related tasks
remote-jobserver Remote
Staff Platform Engineer Applicants are expected to have a solid experience in handling Product related tasks
Product Support Specialist Applicants are expected to have a solid experience in handling Product Support related tasks
remote-jobserver Remote
Senior Security Researcher, SAT Applicants are expected to have a solid experience in handling Product related tasks
Director of Integrated Marketing Applicants are expected to have a solid experience in handling Campaigns related tasks
remote-jobserver Remote
Channel Sales Engineer Applicants are expected to have a solid experience in handling Sales related tasks
Director, Security Operations & Enablement Applicants are expected to have a solid experience in handling Security Operations & Enablement related tasks
remote-jobserver Remote
Strategic Events Specialist Applicants are expected to have a solid experience in handling Field Marketing related tasks
Account Manager I Applicants are expected to have a solid experience in handling Account Management related tasks
Sales Engineer II Applicants are expected to have a solid experience in handling Sales Engineering related tasks
remote-jobserver Remote
Principal Product Marketing Manager - Managed EDR Applicants are expected to have a solid experience in handling Product related tasks
remote-jobserver Remote
Staff Analytics Engineer Applicants are expected to have a solid experience in handling Operations related tasks
remote-jobserver Remote
Staff Product Manager, Billing System & Core Services Applicants are expected to have a solid experience in handling Product related tasks
remote-jobserver Remote
Regional Marketing Specialist - APAC Applicants are expected to have a solid experience in handling Field Marketing related tasks
remote-jobserver Remote
Technical Account Manager I Applicants are expected to have a solid experience in handling Sales related tasks
remote-jobserver Remote
Evergreen - Sales Development Representative Applicants are expected to have a solid experience in handling Sales Development related tasks
remote-jobserver Remote
Senior Tactical Response Analyst - West Coast Applicants are expected to have a solid experience in handling Security related tasks
remote-jobserver Remote
Staff Cloud Security Engineer Applicants are expected to have a solid experience in handling Security related tasks
remote-jobserver Remote
Staff Product Manager, Endpoint Security Posture Management Applicants are expected to have a solid experience in handling Product related tasks
remote-jobserver Remote
Director, Regional Marketing - EMEA Applicants are expected to have a solid experience in handling Field Marketing related tasks
remote-jobserver Remote
Senior Product Marketing Manager - Managed Endpoint Security Posture Management Applicants are expected to have a solid experience in handling Product related tasks
remote-jobserver Remote
Senior Sales Development Representative - Mid-Market - East Coast Applicants are expected to have a solid experience in handling Sales related tasks
Director, Detection Engineering & Threat Hunting Applicants are expected to have a solid experience in handling DE&TH related tasks