Huntress Logo

Huntress

Principal Product Researcher - Linux

Job Posted 3 Days Ago Posted 3 Days Ago
Be an Early Applicant
Easy Apply
Remote
Hiring Remotely in US
Expert/Leader
Easy Apply
Remote
Hiring Remotely in US
Expert/Leader
As a Principal Product Researcher, you will lead efforts in security capabilities, investigate Linux endpoint compromises, test vulnerabilities, and collaborate across teams to enhance security solutions.
The summary above was generated by AI

Reports to: Director, Product Research

Location: Remote US 

Compensation Range: $200,000 to $220,000 base plus bonus and equity 


What We Do:

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 3M+ endpoints and 1M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do: 

Do you like getting into the weeds on all things technical, psychological, and educational and have a desire to know how things work? Then this is the position for you. We are looking for that jack of all trades who brings broad experience to each challenge presented. The Huntress Security team has the unique honor of waking up every morning knowing we’re going to make hackers regret targeting our partners and customers. As a Product Security Researcher, we’re looking for someone who wants to pour all of their creativity into building and implementing simple solutions that are disproportionately effective at countering these constantly evolving threats. Competitive candidates have experience managing, deploying, and securing growing business environments utilizing a wide variety of security software, best practices, and automation tools. Familiarity with product management, incident response, social engineering, psychology, education, and managed service provider tools are additional ways to differentiate yourself.

As you can imagine, success doesn’t happen in a vacuum. An effective Security Researcher fosters highly collaborative environments between the Product, Engineering, and Security teams to accelerate our mission and secure the 99% of businesses that fall below the enterprise poverty line. This collaboration is needed to produce and prioritize a unified technical vision that ultimately delivers our most impactful features and capabilities.

We defend over 3.5M endpoints across 100,000+ mid-sized and small business customers, and that number continues to grow each month. Considering this market’s tighter budget, it’s not financially possible to dedicate human analysts to each client. The Security Operations team addresses this challenge head-on by building and scaling highly automated efficiencies—often lightly augmented by our SOC — that make intruders earn every inch of their access while maintaining affordability and healthy gross margins.

Responsibilities:  

  • Lead the security Capabilities we bring to market, owning the layered defense strategy gained by combining multiple log sources
  • Investigate Linux endpoint compromise to understand, document & combat attacker behavior
  • Test attack paths. Hunt and solve for exploitation of vulnerabilities and misconfigurations
  • Hack to FIX things. Know how to break in and devise innovative fixes. Discover how to protect against attacks
  • Test exploitation of vulnerabilities, misconfigurations, and attack paths that result in developing reliable and weaponized Proof-of-Concept (PoC) exploits for identified vulnerabilities
  • Identify and prototype telemetry data that can be leveraged within Huntress to expand current prevention, hardening, and detection capabilities
  • Analyze and reverse engineer software to discover security weaknesses and undocumented features
  • Distinguish between suspicious and malicious events to reach the highest accuracy true positive rate
  • Conduct research and development efforts to further threat detection and security posture
  • Document research findings through technical write-ups, advisories, internal reports, and blogs
  • Identify improvement opportunities in existing product features and explore new ones based on feedback from partners, prospects, peers, and industry publications.
  • Coordinate with Security, Product, and Engineering teams to integrate and operationalize solutions you develop.
  • Own & nurture the cross-department relationships critical to successful product delivery & launch
  • Proven organizational and program management skills, with keen attention to detail and a sense of urgency to deliver an exceptional product under tight deadline pressures
  • Eagerness to engage, report, and be accountable to executive stakeholders
  • Passion to translate your expertise in nontechnical ways to deliver impactful security outcomes that protect the 99%
  • Promote Huntress’ reputation through media interaction, public speaking, and blogs
  • Educate the public on how to be security savvy in novel and fun ways

What You Bring To The Team: 

  • Expert knowledge of Linux distributions, eBPF, kernel modules, and audit frameworks
  • Experience bypassing Linux EDR
  • Experience building exploit proofs of concept (POC)
  • Expert knowledge of Linux vulnerabilities & threats with the ability to emulate attacks
  • Expert knowledge of Linux logs
  • Expert knowledge of multi-tenant environments, especially supporting MSPs
  • Linux systems administration knowledge
  • Docker, Kubernetes knowledge
  • Experience with conducting searches and creating visualizations in Elastic and Kibana is a plus
  • Innovator builder mindset – you are not afraid to build in the open and share the ugly early versions of your work using feedback to iterate your research & learning

Desired:

  • Experienced Cyber Network Operator, Computer Network Operator, Cyber Technical Operator Targeter or other similar career fields
  • Red team experience, coursework, training, certifications
  • Passion for the MSP community
  • Security conference presenter
  • Security community educator & advocate

What We Offer: 

  • 100% remote work environment - since our founding in 2015
  • Generous paid time off policy, including vacation, sick time, and paid holidays
  • 12 weeks of paid parental leave
  • Highly competitive and comprehensive medical, dental, and vision benefits plans 
  • 401(k) with a 5% contribution regardless of employee contribution
  • Life and Disability insurance plans
  • Stock options for all full-time employees 
  • One-time $500 reimbursement for building/upgrading home office
  • Annual allowance for education and professional development assistance 
  • $75 USD/month digital reimbursement
  • Access to the BetterUp platform for coaching, personal, and professional growth

  

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are. 

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.  

We do discriminate against hackers who try to exploit small businesses.

Accommodations: 

If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response. 

If you have questions about your personal data privacy at Huntress, please visit our privacy page.

#BI-Remote 

Top Skills

Docker
Ebpf
Elastic
Kernel Modules
Kibana
Kubernetes
Linux Distributions

Huntress Seattle, Washington, USA Office

Seattle, WA, United States

Similar Jobs at Huntress

5 Days Ago
Easy Apply
Remote
US
Easy Apply
Senior level
Senior level
Information Technology • Cybersecurity
As a Principal Security Operations Analyst, you will investigate and respond to cyber incidents, mentor junior team members, and lead automation efforts in the Security Operations Center.
Top Skills: Active DirectoryCloud SecurityCommand PromptIncident ResponseMalware AnalysisMicrosoft 365PowershellWindows Server
5 Days Ago
Easy Apply
Remote
US
Easy Apply
Senior level
Senior level
Information Technology • Cybersecurity
As a Senior Security Researcher, you'll develop security capabilities, analyze threats, and collaborate with teams to enhance product security. Your focus will be on innovative solutions and community education.
Top Skills: BeyondcorpChrome EnterpriseCybersecurity ToolsElasticGoogle ApisGoogle Cloud PlatformGoogle Identity PremiumGoogle VaultGoogle WorkspaceKibana
6 Days Ago
Easy Apply
Remote
US
Easy Apply
Senior level
Senior level
Information Technology • Cybersecurity
The Principal Security Operations Center Analyst will triage, investigate, and remediate cyber intrusions while mentoring junior team members and contributing to detection efforts and technical content.
Top Skills: Active DirectoryBashCommand PromptJavaScriptM365Mitre Att&Ck FrameworkPHPPowershellPythonRubyWindows Server

What you need to know about the Seattle Tech Scene

Home to tech titans like Microsoft and Amazon, Seattle punches far above its weight in innovation. But its surrounding mountains, sprinkled with world-famous hiking trails and climbing routes, make the city a destination for outdoorsy types as well. Established as a logging town before shifting to shipbuilding and logistics, the Emerald City is now known for its contributions to aerospace, software, biotech and cloud computing. And its status as a thriving tech ecosystem is attracting out-of-town companies looking to establish new tech and engineering hubs.

Key Facts About Seattle Tech

  • Number of Tech Workers: 287,000; 13% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Amazon, Microsoft, Meta, Google
  • Key Industries: Artificial intelligence, cloud computing, software, biotechnology, game development
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Madrona, Fuse, Tola, Maveron
  • Research Centers and Universities: University of Washington, Seattle University, Seattle Pacific University, Allen Institute for Brain Science, Bill & Melinda Gates Foundation, Seattle Children’s Research Institute
By clicking Apply you agree to share your profile information with the hiring company.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account