cover image
Huntress

Huntress

huntress.com

1 Job

616 Employees

About the Company

Protect Your Endpoints, Identities, Logs, and Employees.

The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.

By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against today’s cyberthreats.

As long as hackers keep hacking, we keep hunting.

Listed Jobs

Company background Company brand
Company Name
Huntress
Job Title
Security Operations Analyst - UK
Job Description
**Job Title** Security Operations Analyst **Role Summary** Conduct real‑time triage, investigation, and remediation of security incidents for small to mid‑size SMB clients using a managed EDR and MDR platform. **Expectations** - Resolve alerts from the security platform each day, determining root causes and applying appropriate remediations. - Provide clear, concise incident reports for both technical and non‑technical stakeholders. - Advance personal skill set and contribute to team knowledge sharing and detection engineering initiatives. - Maintain strong focus on customer protection and timely escalation of complex issues. **Key Responsibilities** - Triage and respond to alerts generated by the security platform. - Perform tactical review of EDR telemetry, log sources, and forensic artifacts to establish incident scope and root cause. - Conduct static and dynamic malware analysis to support investigation workflows. - Investigate and remediate suspicious activity within Microsoft 365 environments. - Escalate product‑support and threat‑related queries from the SOC to the Product Support team. - Contribute to detection engineering: creation, tuning, and improvement of detection rules. - Lead or assist in projects that enhance analyst effectiveness and partner outcomes. - Participate in collaborative mentoring and continuous improvement activities with the SOC team. **Required Skills** - Minimum 2 years SOC or Digital Forensics & Incident Response experience. - Proficiency with Windows, Linux, and macOS attack surfaces. - Hands‑on knowledge of MITRE ATT&CK techniques, PowerShell/Command‑Prompt, WMIC, Scheduled Tasks, SCM, domain enumeration, lateral movement, persistence, and defense‑evasion. - Experience with basic malware analysis (static & dynamic). - Working knowledge of Windows/Active Directory administration, Group Policy, domain trusts. - Understanding of core networking: VLANs, NAT, IP addressing, standard ports/protocols. - Familiarity with web technologies and OWASP Top 10. - Strong verbal and written communication skills; ability to translate technical findings for non‑technical audiences. - Demonstrated curiosity and eagerness to learn and adapt. **Preferred Qualifications** - Experience in an MSP/MSSP/MDR environment. - Linux/macOS investigation experience. - Scripting proficiency (PowerShell, Python, Bash, PHP, JavaScript, or Ruby). - Familiarity with cloud platforms (Microsoft 365, Azure, AWS, GCP). - Participation in cyber‑security exercises (CTFs, Collegiate Cyber Defense Competition). - Knowledge of MSP tools such as RMMs. **Required Education & Certifications** - No specific educational program mandated. - Preferred: Related technical certifications (e.g., CEH, GCIH, GFT) or equivalent experience.
United kingdom
Remote
Junior
04-11-2025