
Cybersecurity • SaaS • Enterprise
Huntress is a cybersecurity firm that provides managed detection, investigation, and response solutions to protect endpoints, identities, and email environments. It offers a platform with managed EDR, security awareness training, ITDR for Microsoft 365, and SIEM solutions, all supported by a 24/7 Security Operations Center. Huntress is designed to secure small and medium-sized businesses against cyber threats. Their services help organizations across industries, ensuring robust protection and compliance, especially in environments like education, finance, healthcare, manufacturing, and government.
November 25

Cybersecurity • SaaS • Enterprise
Huntress is a cybersecurity firm that provides managed detection, investigation, and response solutions to protect endpoints, identities, and email environments. It offers a platform with managed EDR, security awareness training, ITDR for Microsoft 365, and SIEM solutions, all supported by a 24/7 Security Operations Center. Huntress is designed to secure small and medium-sized businesses against cyber threats. Their services help organizations across industries, ensuring robust protection and compliance, especially in environments like education, finance, healthcare, manufacturing, and government.
• Triage, investigate, and respond to alerts coming in from the Huntress platform. • Perform tactical review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks, where possible, and provide remediations needed to remove the threat. • Perform tactical malware analysis as part of investigating and triaging alerts. • Investigate suspicious Microsoft M365 activity and provide remediations. • Assist in escalations from the Product Support team for threat-related and SOC-relevant questions. • Contribute to detection engineering creation and tuning efforts. • Contribute to projects focused on driving better outcomes for our analysts and partners • Contribute to our collaboratively mentored team (we're all here to make each other better!).
• 2+ years of experience in a SOC or Digital Forensics (DFIR) role • Demonstrated experience with Windows, Linux, and MacOS as an attack surface • Demonstrated experience with basic Threat Actor tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs) • Demonstrated experience with static and dynamic malware analysis concepts • Working knowledge of Windows Administration or Enterprise Domain Administration • Working knowledge of core networking concepts • Working knowledge of web technologies and concepts • Effective communication skills, with the ability to explain complex events to less technical audiences • Dedicated to prioritizing and addressing customer needs and concerns in all decision-making processes • A strong sense of curiosity and a genuine excitement for learning
• 100% remote work environment - since our founding in 2015 • Generous paid time off policy, including vacation, sick time, and paid holidays • 12 weeks of paid parental leave • Highly competitive and comprehensive medical, dental, and vision benefits plans • 401(k) with a 5% contribution regardless of employee contribution • Life and Disability insurance plans • Stock options for all full-time employees • One-time $500 reimbursement for building/upgrading home office • Annual allowance for education and professional development assistance • $75 USD/month digital reimbursement • Access to the BetterUp platform for coaching, personal, and professional growth
Apply NowNovember 25
Infrastructure Security Operations Engineer focusing on patch management and cybersecurity operations for IT infrastructure. Monitoring, analyzing, and coordinating vulnerability management and remediation efforts.
November 13
Embedded VSOC Analyst identifying and advising on security threats affecting client safety for Sibylline, a leading intelligence consultancy. Engaging with clients to provide immediate support in a remote role.
November 6
PSIRT Incident Responder leading response to product security incidents at Docusign. Collaborating with cross-functional teams to ensure timely communication, analysis, and remediation of vulnerabilities.
🇺🇸 United States – Remote
💵 $94k - $136.6k / year
⏰ Full Time
🟢 Junior
🟡 Mid-level
🛡️ Security Operations
🦅 H1B Visa Sponsor
November 6
Security Engineer part of internal tech team influencing corporate security. Protecting clients' digital lives by designing and supporting security technology solutions.
🇺🇸 United States – Remote
💵 $100k - $140k / year
💰 $11M Series A on 2021-07
⏰ Full Time
🟡 Mid-level
🟠 Senior
🛡️ Security Operations
November 4
Remote SOC Analyst investigating security alerts and managing incidents in cybersecurity operations. Requires certifications and scripting knowledge for effective threat detection and response.