At a Glance
- Tasks: Lead investigations and respond to cyber threats while mentoring junior analysts.
- Company: Join Huntress, a remote team dedicated to making cybersecurity accessible for all businesses.
- Benefits: Enjoy remote work, generous leave, and reimbursement for home office setup.
- Why this job: Be part of an elite SOC team, enhancing your skills while making a real impact.
- Qualifications: 6+ years in SOC or Incident Response; strong communication and mentoring skills required.
- Other info: Inclusive culture that values every team member and offers personal growth opportunities.
The predicted salary is between 74900 - 102000 £ per year.
Reports to: Manager, Security Operations Center- EMEA
Location: Remote UK
Compensation Range: £89,950 to £116,450 base plus bonus and equity
What We Do:
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.
Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.
We protect 3M+ endpoints and 1M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.
What You’ll Do:
Huntress is looking for a Principal Security Operations Center Analyst based in the UK or Ireland to join our quickly growing team. In this role, you will triage, investigate, respond to, and remediate intrusions daily. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies worldwide from cyber-attacks. This person will also mentor junior team members, allowing them to grow individually and as a team.
The Huntress Security Operations Center is an elite team that wakes up daily to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. With the chance to work on various incidents alongside a skilled team, you’ll have the opportunity to accelerate your career and skills, too.
Responsibilities
- Function as the lead liaison between the SOC and other Product and Research teams
- Build automation to help reduce the workload on the SOC through report template creation
- Own and complete investigative objectives associated with multi-host intrusions without assistance
- Triage, investigate, and respond to alerts coming in from the Huntress platform
- Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat
- Perform advanced malware analysis as part of investigating systems and identities
- Investigate suspicious Microsoft M365 activity and provide remediations
- Assist in escalations from the product support team for threat-related and SOC-relevant questions
- Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed
- Contribute to detection efforts by helping to create or request net new detections as well as tuning detections
- Provide technical mentorship of more junior team members
- Contribute regularly to external facing Huntress content such as blogs, webinars, presentations, and speaking engagements
What You Bring To The Team:
- 6+ years experience in a SOC, Incident Response, or Forensics role
- Ability to explain possible complex alerts/events in a non-complex way, both written and verbal
- Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team
- Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis)
- Demonstrated experience with Windows and/or MacOS as an attack surface
- Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs)
- Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts)
- Strong experience with M365/Cloud attack techniques
- Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or cybersecurity
Preferred Qualifications:
- Experience with scripting languages (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
- Demonstrated experience on platforms like HackTheBox, TryHackMe, Blue Team Labs Online, etc.
- Participation in cybersecurity competitions such as Capture the Flags, the Collegiate Cyber Defense Competition, etc.
- Familiarity with MSP tools such as RMMs
- Previous experience in an MSP/MSSP/MDR role
What We Offer:
- 100% remote work environment – since our founding in 2015
- New starter home office set up reimbursement (£398)
- Generous personal leave entitlements
- Digital monthly reimbursement (£92)
- Travel to the US 1-2 times/year for various company events
- Pension
- Access to the BetterUp platform for coaching, personal, and professional growth
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.
If you have questions about your personal data privacy at Huntress, please visit our privacy page.
#J-18808-Ljbffr
Principal Security Operations Analyst- UK employer: Hyperproof
Contact Detail:
Hyperproof Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Principal Security Operations Analyst- UK
✨Tip Number 1
Familiarise yourself with the MITRE ATT&CK Framework, as it's crucial for understanding threat actor tools and techniques. Being able to discuss specific tactics and how they relate to real-world scenarios will impress during interviews.
✨Tip Number 2
Showcase your mentoring skills by preparing examples of how you've helped junior team members grow in their roles. This is particularly important for the Principal Security Operations Analyst position, where mentorship is a key responsibility.
✨Tip Number 3
Engage with the cybersecurity community through platforms like HackTheBox or TryHackMe. Participating in these environments not only sharpens your skills but also demonstrates your commitment to continuous learning and improvement.
✨Tip Number 4
Prepare to discuss your experience with automation in the SOC environment. Think about specific tools or scripts you've used to streamline processes, as this aligns with the responsibilities of reducing workload through automation.
We think you need these skills to ace Principal Security Operations Analyst- UK
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in SOC, Incident Response, or Forensics roles. Emphasise your skills in malware analysis and your understanding of threat actor tools and techniques, as these are crucial for the position.
Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and how your background aligns with Huntress's mission. Mention specific experiences that demonstrate your ability to mentor junior team members and your proactive approach to tackling cyber threats.
Showcase Your Technical Skills: Include specific examples of your experience with Windows Administration, M365/Cloud attack techniques, and any scripting languages you know. This will help illustrate your technical proficiency and suitability for the role.
Prepare for Potential Questions: Anticipate questions related to your experience with incident response and your approach to mentoring. Be ready to discuss how you would handle complex alerts and your strategies for improving SOC efficiency through automation.
How to prepare for a job interview at Hyperproof
✨Showcase Your Experience
Make sure to highlight your 6+ years of experience in SOC, Incident Response, or Forensics roles. Be prepared to discuss specific incidents you've handled and the methodologies you used to triage and investigate alerts.
✨Demonstrate Your Mentoring Skills
Since the role involves mentoring junior team members, share examples of how you've successfully guided others in the past. Discuss your approach to teaching complex concepts in a simple manner.
✨Familiarise Yourself with Key Tools
Brush up on your knowledge of the MITRE ATT&CK Framework and other threat actor tools and techniques. Be ready to explain how you've applied these in real-world scenarios during your previous roles.
✨Prepare for Technical Questions
Expect technical questions related to malware analysis, Windows and MacOS attack surfaces, and M365/cloud attack techniques. Practise explaining your thought process clearly and concisely, as communication is key in this role.