Security Operations Analyst
Security Operations Analyst

Security Operations Analyst

London Full-Time 52000 - 63000 £ / year (est.) Home office possible
H

At a Glance

  • Tasks: Join our team to investigate and respond to cyber threats daily.
  • Company: Huntress, founded by ex-NSA operators, protects small businesses from hackers.
  • Benefits: Enjoy 100% remote work, generous leave, and a home office setup reimbursement.
  • Why this job: Accelerate your career in a mission-driven team combating cyber threats globally.
  • Qualifications: 2+ years in SOC or Digital Forensics; familiarity with various operating systems and threat tools.
  • Other info: Inclusive culture where every voice matters; we fight against hackers, not people.

The predicted salary is between 52000 - 63000 £ per year.

Reports to: Manager, Security Operations Center Location: Remote UK Compensation Range: £62,000 to £70,500 base plus bonus and equity What We Do: Founded in 2015 as a fully remote company by former NSA cyber operators, Huntress was built on a simple premise: to force hackers to earn every inch of their access. Today’s cyber-attacks aren’t limited to large organizations with the security tools that can ward off threats. Hackers don\’t discriminate and will find a way to penetrate any vulnerability in any size business, which is why Huntress focuses on protecting those small to midsize businesses that make up the backbone of our economy. Huntress stops hidden threats that sneak past preventive security tools by utilizing our award-winning security platform and expert human threat hunters through dynamic products, including Managed EDR, MDR for Microsoft 365, and Managed Security Awareness Training. Join the hunt and help us stop hackers in their tracks! What You’ll Do: Huntress is looking for a Security Operations Center Analyst to add to our growing team. In this role, you will get to triage, investigate, respond, and remediate a variety of intrusions on a daily basis. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies around the world from cyber-attacks and will have daily opportunities to progress your analyst skillset and accelerate your career growth. The Huntress Security Operations Center is an elite team of individuals who wake up every day to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. If you’re looking to accelerate your career and skills, this is the team for you! Responsibilities: Triage, investigate, and respond to alerts from the Huntress platform Perform tactical review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks where possible and provide remediations needed to remove the threat Perform tactical malware analysis as part of investigating and triaging alerts Investigate suspicious Microsoft M365 activity and provide remediations Assist in escalations from the Product Support team for threat-related and SOC-relevant questions Contribute to detection engineering creation and tuning efforts Contribute to projects focused on driving better outcomes for our analysts and partners Contribute to our collaboratively mentored team (we\’re all here to make each other better!) What You Bring To The Team: 2+ years experience in a SOC or Digital Forensics (DFIR) role Demonstrated experience with Windows, Linux, and MacOS as an attack surface Demonstrated experience with basic Threat Actor tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs) Demonstrated experience with static and dynamic malware analysis concepts Working knowledge of Windows Administration or Enterprise Domain Administration Active Directory, Group Policy, Domain Trusts, etc. Working knowledge of core networking concepts Common ports/protocols, NAT, Public/Private IPs, VLANs, etc. Working knowledge of web technologies and concepts Web servers/applications, OWASP top 10, etc. Effective communication skills, with the ability to explain complex events to less technical audiences, enabling effective cross-functional collaboration within the SOC and across departments Dedicated to prioritizing and addressing customer needs and concerns in all decision-making processes A strong sense of curiosity and a genuine excitement for learning Preferred Qualifications: Previous experience in an MSP/MSSP/MDR role Linux and MacOS investigative experience Experience with scripting languages (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby) Demonstrated experience on platforms such as HackTheBox, TryHackMe, Blue Team Labs Online, etc. Demonstrated experience with Cloud-based investigations such as M365, Azure, AWS, GCP, etc. Participation in cybersecurity competitions such as Capture the Flags, the Collegiate Cyber Defense Competition, etc. Familiarity with MSP tools such as RMMs What We Offer: 100% remote work environment – since our founding in 2015 New starter home office set up reimbursement (£398) Generous personal leave entitlements Digital monthly reimbursement (£92) Travel to the US 1-2 times/year for various company events Pension Access to the BetterUp platform for coaching, personal, and professional growth Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are. We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status. We do discriminate against hackers who try to exploit small businesses. Accommodations: If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com . Please note that non-accommodation requests to this inbox will not receive a response. If you have questions about your personal data privacy at Huntress, please visit our privacy page . Seniority level Seniority level Entry level Employment type Employment type Full-time Job function Job function Information Technology Industries Computer and Network Security Referrals increase your chances of interviewing at Huntress by 2x Consultant, Application Security Penetration Tester Principal Security Analyst – Microsoft Sentinel /Chronicle Principal Security Analyst – Microsoft Sentinel /Chronicle Newcastle Upon Tyne, England, United Kingdom 1 week ago Adderbury, England, United Kingdom 3 weeks ago Gloucestershire, England, United Kingdom 6 days ago Bolton, England, United Kingdom 3 days ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr

Security Operations Analyst employer: Huntress

Huntress is an exceptional employer that champions a fully remote work culture, allowing you to thrive from the comfort of your home in the UK. With a strong focus on employee growth, we offer generous personal leave entitlements, a home office setup reimbursement, and access to coaching for professional development. Join a passionate team dedicated to protecting small to midsize businesses from cyber threats, where your contributions are valued and your career can flourish.
H

Contact Detail:

Huntress Recruiting Team

accommodations@huntresslabs.com

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Analyst

✨Tip Number 1

Familiarise yourself with the MITRE ATT&CK Framework, as it's crucial for understanding threat actor tactics and techniques. Being able to discuss specific examples of how you've applied this knowledge in past roles will impress the interviewers.

✨Tip Number 2

Engage with online platforms like HackTheBox or TryHackMe to sharpen your practical skills. Mentioning your hands-on experience with these tools during your discussions can set you apart from other candidates.

✨Tip Number 3

Showcase your curiosity and eagerness to learn by discussing recent cybersecurity trends or incidents. This demonstrates your passion for the field and your commitment to staying updated on emerging threats.

✨Tip Number 4

Prepare to explain complex security concepts in simple terms. This skill is essential for effective communication within the SOC and across departments, so practice articulating your thoughts clearly and concisely.

We think you need these skills to ace Security Operations Analyst

Incident Response
Threat Analysis
Malware Analysis
EDR Telemetry Review
Digital Forensics
Windows, Linux, and MacOS Administration
MITRE ATT&CK Framework
PowerShell and Command Prompt Proficiency
Active Directory Management
Networking Concepts
Web Technologies Knowledge
Effective Communication Skills
Customer Service Orientation
Curiosity and Willingness to Learn
Scripting Languages (PowerShell, Python, Bash)
Cloud-Based Investigation Experience

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in security operations, digital forensics, and any specific tools or techniques mentioned in the job description. Use keywords from the listing to ensure your application stands out.

Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and how your skills align with Huntress's mission. Mention specific experiences that demonstrate your ability to triage and investigate security incidents.

Showcase Your Technical Skills: Include a section in your CV or cover letter that details your proficiency with Windows, Linux, MacOS, and any scripting languages you know. Highlight any relevant projects or competitions you've participated in that showcase your skills.

Prepare for Potential Questions: Anticipate questions related to your experience with threat actor tools and techniques. Be ready to discuss your approach to investigating alerts and how you communicate complex technical information to non-technical audiences.

How to prepare for a job interview at Huntress

✨Know Your Tools

Familiarise yourself with the tools and techniques mentioned in the job description, such as the MITRE ATT&CK Framework and basic malware analysis concepts. Being able to discuss these confidently will show your technical expertise.

✨Demonstrate Your Curiosity

Showcase your passion for learning and curiosity about cybersecurity. Discuss any recent projects, competitions, or platforms you've engaged with, like HackTheBox or TryHackMe, to illustrate your commitment to staying updated in the field.

✨Communicate Effectively

Prepare to explain complex security concepts in simple terms. This is crucial for cross-functional collaboration within the SOC. Practising how to convey technical information clearly can set you apart from other candidates.

✨Highlight Team Collaboration

Emphasise your experience working in teams, especially in a SOC environment. Share examples of how you've contributed to team success and supported colleagues, as Huntress values a collaborative and mentored approach.

Security Operations Analyst
Huntress
H
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>