Security Operations Center Analyst

Huntress Logo

Huntress

πŸ’΅ $68k-$86k
πŸ“Remote - Australia

Summary

Join Huntress's growing Australia-based SOC team as a Security Operations Center Analyst. This remote position offers a unique opportunity to contribute to a mission of building a premier investigative team, protecting businesses from cyber threats, and shaping the future of cybersecurity in the region. You will investigate and respond to alerts, perform malware analysis, contribute to threat detection, and support sales efforts. The role involves hands-on experience in incident response, security operations, threat hunting, and detection engineering. Huntress prioritizes employee growth, supporting professional development through various avenues such as blogs, conference talks, and research publications. Compensation includes a competitive salary, bonus, equity, and comprehensive benefits.

Requirements

  • Security Enthusiasts: Practitioners with 2+ years of experience in SOC, Incident Response, Managed Detection and Response, or Digital Forensics roles
  • Technical Expertise: Demonstrated experience with at least one of Windows, Linux, MacOS, including attack surfaces, malware analysis, and basic threat actor tools and techniques
  • An understanding of common system administration skills and how they are abused by threat actors to achieve their goals (Active Directory, PowerShell, Group Policies, Local Account Creation, etc)
  • Familiarity with the underlying techniques in tactics in MITRE ATT&CK such as credential dumping, lateral movement, persistence mechanisms, exfiltration techniques, etc
  • Working knowledge of core networking concepts such as common ports/protocols, NAT, Public/Private IPs, VLANs, etc
  • Passion for Forensics: A love for digging into logs, processes, and artifacts to understand intrusions and outmaneuver attackers
  • Communication Skills: Strong verbal and written communication, capable of simplifying complex technical findings for diverse audiences
  • Self-Motivation: Demonstrated self-guided learning or relevant academic background (Bachelor’s degree in IT, Computer Science, Cybersecurity, or equivalent)

Responsibilities

  • Investigate and Respond: Triage, investigate, respond to, and remediate alerts generated by the Huntress platform
  • Tactical Review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks where possible and provide remediations needed to remove the threat
  • Malware Analysis: Perform dynamic analysis of malware where required to extract indicators of compromise or determine malicious intent of a file
  • Threat Detection: Contribute to and refine detection capabilities by crafting and tuning signals to address emerging threats
  • Microsoft 365 Security: Investigate Microsoft 365 activity and deliver actionable remediation advice for compromised tenants
  • Continuous Improvement: Continue to regularly grow your skills and knowledge by using our real world intrusion data and paid training opportunities on a regular basis

Benefits

  • Fully remote work
  • At least one annual trip to the US for Summer Summit, with additional local events in Australia!
  • New starter home office set up reimbursement ($800 AUD)
  • 12 weeks paid parental leave for both primary and secondary carers
  • Digital monthly reimbursement ($185 AUD)
  • Subsidised private health insurance through our preferred provider
  • Stock options for all full-time employees
  • Access to the BetterUp platform for coaching, personal, and professional growth

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.

Similar Remote Jobs