Huntress Logo

Huntress

Principal Security Operations Analyst- West Coast

Job Posted 4 Days Ago Posted 4 Days Ago
Be an Early Applicant
Easy Apply
Remote
Hiring Remotely in US
Senior level
Easy Apply
Remote
Hiring Remotely in US
Senior level
As a Principal Security Operations Analyst, you will investigate and respond to cyber incidents, mentor junior team members, and lead automation efforts in the Security Operations Center.
The summary above was generated by AI

Reports to: Manager, Security Operations Center

Location: Remote West Coast US

Compensation Range: $190,000 - $225,000 plus bonus and equity 


What We Do:

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 3M+ endpoints and 1M+ identities worldwide, elevating under-resourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do:

Huntress is looking for a Principal Security Operations Center Analyst based in the United States to join our quickly growing team. In this role, you will triage, investigate, respond to, and remediate intrusions daily. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies worldwide from cyber-attacks. This person will also mentor junior team members, allowing them to grow individually and as a team.

The Huntress Security Operations Center is an elite team that wakes up daily to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. With the chance to work on various incidents alongside a skilled team, you’ll have the opportunity to accelerate your career and skills, too. 

Responsibilities:

  • Function as the lead liaison between the SOC and other Product and Research teams
  • Build  automation to help reduce the workload on the SOC through report template creation
  • Own and complete investigative objectives associated with multi-host intrusions without assistance
  • Triage, investigate, and respond to alerts coming in from the Huntress platform
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat
  • Perform advanced malware analysis as part of investigating systems and identities
  • Investigate suspicious Microsoft M365 activity and provide remediations
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions
  • Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed
  • Contribute to detection efforts by helping to create or request net new detections as well as tuning detections
  • Provide technical mentorship of more junior team members
  • Contribute regularly to external facing Huntress content such as blogs, webinars, presentations, and speaking engagements

What You Bring To The Team:  

  • 6+ years experience in a SOC, Incident Response, or Forensics role
  • Ability to explain possible complex alerts/events in a non-complex way, both written and verbal
  • Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team
  • Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis)
  • Demonstrated experience with Windows and/or MacOS as an attack surface
  • Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs)
  • Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts)
  • Strong experience with M365/Cloud attack techniques
  • Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or cybersecurity

Preferred Qualifications:

  • Experience with scripting languages (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby) 
  • Demonstrated experience on platforms like HackTheBox, TryHackMe, Blue Team Labs Online, etc. 
  • Participation in cybersecurity competitions such as Capture the Flags, the Collegiate Cyber Defense Competition, etc. 
  • Familiarity with MSP tools such as RMMs
  • Previous experience in an MSP/MSSP/MDR role  

What We Offer: 

  • 100% remote work environment - since our founding in 2015
  • Generous paid time off policy, including vacation, sick time, and paid holidays
  • 12 weeks of paid parental leave
  • Highly competitive and comprehensive medical, dental, and vision benefits plans 
  • 401(k) with a 5% contribution regardless of employee contribution
  • Life and Disability insurance plans
  • Stock options for all full-time employees 
  • One-time $500 reimbursement for building/upgrading home office
  • Annual allowance for education and professional development assistance 
  • $75 USD/month digital reimbursement
  • Access to the BetterUp platform for coaching, personal, and professional growth

  

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are. 

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.  

We do discriminate against hackers who try to exploit small businesses. 

Accommodations:

If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.

If you have questions about your personal data privacy at Huntress, please visit our privacy page.

#BI-Remote

Top Skills

Active Directory
Cloud Security
Command Prompt
Incident Response
Malware Analysis
Microsoft 365
Powershell
Windows Server

Huntress Seattle, Washington, USA Office

Seattle, WA, United States

Similar Jobs at Huntress

2 Days Ago
Easy Apply
Remote
US
Easy Apply
Expert/Leader
Expert/Leader
Information Technology • Cybersecurity
As a Principal Product Researcher, you will lead efforts in security capabilities, investigate Linux endpoint compromises, test vulnerabilities, and collaborate across teams to enhance security solutions.
Top Skills: DockerEbpfElasticKernel ModulesKibanaKubernetesLinux Distributions
4 Days Ago
Easy Apply
Remote
US
Easy Apply
Senior level
Senior level
Information Technology • Cybersecurity
As a Senior Security Researcher, you'll develop security capabilities, analyze threats, and collaborate with teams to enhance product security. Your focus will be on innovative solutions and community education.
Top Skills: BeyondcorpChrome EnterpriseCybersecurity ToolsElasticGoogle ApisGoogle Cloud PlatformGoogle Identity PremiumGoogle VaultGoogle WorkspaceKibana
5 Days Ago
Easy Apply
Remote
US
Easy Apply
Senior level
Senior level
Information Technology • Cybersecurity
The Principal Security Operations Center Analyst will triage, investigate, and remediate cyber intrusions while mentoring junior team members and contributing to detection efforts and technical content.
Top Skills: Active DirectoryBashCommand PromptJavaScriptM365Mitre Att&Ck FrameworkPHPPowershellPythonRubyWindows Server

What you need to know about the Seattle Tech Scene

Home to tech titans like Microsoft and Amazon, Seattle punches far above its weight in innovation. But its surrounding mountains, sprinkled with world-famous hiking trails and climbing routes, make the city a destination for outdoorsy types as well. Established as a logging town before shifting to shipbuilding and logistics, the Emerald City is now known for its contributions to aerospace, software, biotech and cloud computing. And its status as a thriving tech ecosystem is attracting out-of-town companies looking to establish new tech and engineering hubs.

Key Facts About Seattle Tech

  • Number of Tech Workers: 287,000; 13% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Amazon, Microsoft, Meta, Google
  • Key Industries: Artificial intelligence, cloud computing, software, biotechnology, game development
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Madrona, Fuse, Tola, Maveron
  • Research Centers and Universities: University of Washington, Seattle University, Seattle Pacific University, Allen Institute for Brain Science, Bill & Melinda Gates Foundation, Seattle Children’s Research Institute
By clicking Apply you agree to share your profile information with the hiring company.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account