Staff Threat Intelligence Analyst

November 7

Apply Now
Logo of Huntress

Huntress

Cybersecurity • SaaS • Enterprise

Huntress is a cybersecurity firm that provides managed detection, investigation, and response solutions to protect endpoints, identities, and email environments. It offers a platform with managed EDR, security awareness training, ITDR for Microsoft 365, and SIEM solutions, all supported by a 24/7 Security Operations Center. Huntress is designed to secure small and medium-sized businesses against cyber threats. Their services help organizations across industries, ensuring robust protection and compliance, especially in environments like education, finance, healthcare, manufacturing, and government.

201 - 500 employees

🔒 Cybersecurity

☁️ SaaS

🏢 Enterprise

📋 Description

• Conducts research on emerging adversary tradecraft to help scope, and conducts hunt missions • Responsible for aggregating threat data to build out reports for customers to show Huntress’ value, and inform them of various threats that have been seen and reported • Responsible for creating reports for marketing to show Huntress’ value to the larger community • Promote Huntress’ reputation through media interaction, public speaking, and blogs • Works with the Director of Adversary Tactics, the Security Operations Center, Product, and others to develop the Product and threat operations roadmap • Provides technical leadership for some members of the Security teams • Supports the professional development of researchers and others in the organization through coaching, and mentorship • Responsible for enhancing Huntress visibility by ingesting and utilizing IOCs from external threat intel sources • Responsible for blog posts and other marketing materials regarding threat trends

🎯 Requirements

• Minimum of 5 years of experience in the field of Threat Intelligence • Experience with SIEM tools for scaled log analysis • Familiarity with detection engineering, detection logic i.e. Sigma Rules • Experience researching and scoping threat hunt missions • Understanding of cyber security, threat actors, and end-to-end threat life cycle including one or more of the following: digital forensics, malware research, incident response, vulnerabilities, and exploits • Experience with 3rd party intelligence tools, feeds, and reputation services. • Experience conducting OSINT gathering and analysis • Foundational development experience across multiple platforms (e.g., Windows and/or macOS), C/C++, GoLang, and Python (nice to have) • Proficient knowledge of Windows and/or macOS subsystems and how they interact both at the user and kernel level (nice to have)

🏖️ Benefits

• 100% remote work environment - since our founding in 2015 • Generous paid time off policy, including vacation, sick time, and paid holidays • 12 weeks of paid parental leave • Highly competitive and comprehensive medical, dental, and vision benefits plans • 401(k) with a 5% contribution regardless of employee contribution • Life and Disability insurance plans • Stock options for all full-time employees • One-time $500 reimbursement for building/upgrading home office • Annual allowance for education and professional development assistance • $75 USD/month digital reimbursement • Access to the BetterUp platform for coaching, personal, and professional growth

Apply Now

Similar Jobs

November 4

Circle

501 - 1000

💳 Fintech

₿ Crypto

🌐 Web 3

Principal Threat Intelligence Analyst at Circle responsible for physical security intelligence and threat response. Leading efforts in monitoring risks to employees and enhancing security measures.

🇺🇸 United States – Remote

💵 $175k - $225k / year

⏰ Full Time

🔴 Lead

🔐 Security Analyst

🦅 H1B Visa Sponsor

Developed by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or support@remoterocketship.com