Huntress

👥 251-500💰 $60.0m Series C on 2023-05-16SecurityInformation TechnologyCyber SecuritySoftware
Website LinkedIn Email Phone # Facebook Twitter

Huntress is an information technology company specializing in threat detection and cybersecurity intelligence solutions, empowering IT departments and managed service providers to successfully navigate complex cybersecurity challenges.

Related companies:

Jobs at this company:

Apply

📍 United States

🧭 Full-Time

💸 $190,000 - $215,000 per year

🔍 Cybersecurity

  • 10+ years of experience developing complex software products
  • 8+ years of programming in Ruby on Rails
  • A BS in Computer Science or Engineering or equivalent experience gained through work
  • Experience in Agile or Scrum environment
  • Experience with JavaScript and CSS
  • Experience working with external APIs
  • Experience reviewing code, problem-solving, and technical troubleshooting
  • Experience working on Linux-based infrastructure
  • Experience with databases such as Postgres
  • A deep understanding of ActiveRecord (Rails)
  • Excellent technical, diagnostic, and troubleshooting skills
  • Ability to grasp new tools and technologies quickly
  • Effective communication and interpersonal skills
  • Ability to prioritize and execute multiple tasks in a fast-paced environment, often independently
  • Ability to distill complex technical topics for a non-technical audience
  • Ability to work cross-functionally between teams
  • Passion for technology and accountability for high-quality software features
  • Ability to build strong relationships with product, development teams, and stakeholders

  • Own delivery, product quality, and up-time of complex mission-critical features/systems
  • Impact objectives and initiatives that span across departments
  • Lead technical decisions with company-wide impact
  • Evolve our collective understanding of our technical domain
  • Define long-term strategic technical goals and initiatives
  • Effectively communicate strategic technical vision and set an example for the organization
  • Work with the team engineering manager to ensure technical expectations align with strategy
  • Communicate critical trade-offs on technical approaches across the platform
  • Collaborate closely with the engineering manager, product manager, and architect on strategic initiatives and technical designs
  • Develop and enforce best practices for team and department
  • Engage with customers as necessary
  • Contribute to and improve the organization's test frameworks and approaches
  • Develop a deep cross-product understanding of features and architecture
  • Own and drive performance impact of team/department solutions and the overall platform suite
  • Lead and develop high-quality scalable software, designs, and architecture while setting standards for team excellence
  • Focus on the entire life cycle of the system, including evolution, configuration, and risk management
  • Ensure code quality and test code coverage through code reviews and test plan reviews
  • Lead the team in providing accurate estimates and ensure timely completion of work
  • Mentor and coach junior engineers, fostering professional development and collaboration
  • Actively engage with the team and lead as a positive role model

LeadershipAgileCSSJavascriptRubyRuby on RailsSCRUMJavaScriptStrategyPostgresCollaborationLinux

Posted 2024-09-26
Apply
Apply

📍 United States

🧭 Full-Time

💸 $170,000 - $195,000 per year

🔍 Cybersecurity

  • 8+ years of experience developing complex software products.
  • 6+ years of programming in Ruby on Rails.
  • Experience with Javascript.
  • Experience with AWS Cloud Environments.
  • Experience working on Linux-based infrastructure.
  • Experience with databases such as Postgres.
  • Excellent technical, diagnostic, and troubleshooting skills.
  • Ability to grasp new tools and technologies quickly.
  • Ability to prioritize and execute multiple tasks at a time in a fast-paced environment, often operating independently.
  • Strong communication and interpersonal skills, with the ability to work and coordinate between multiple teams.
  • Ability to communicate highly technical concepts clearly and concisely.
  • Demonstrated ability to take high-level requirements, decompose them into actionable work units, and lead the entire SDLC.
  • Passion for technology and strong motivation and responsibility for high-quality software features.
  • Ability to build strong interpersonal relationships with product, development teams, leadership, senior management, and internal and external stakeholders.

  • Manage the technical aspects of the development of features for the Portal, including UX/UI and API-focused work.
  • Lead and develop high-quality software, software designs, and architecture, setting the standard for team excellence.
  • Convert acceptance criteria into functional workflows, data models, and associated software design.
  • Be a technical thought leader for your team, providing architectural and design direction.
  • Focus on the entire life cycle of the system, including evolution, configuration, and risk management.
  • Ensure code quality and test code coverage through code reviews and test plan reviews.
  • Lead the team in providing accurate estimates and taking ownership over the timely completion of work.
  • Mentor and coach junior engineers, fostering an environment that values professional development to help uplevel their skills.
  • Motivate teams and promote collaboration and engagement.
  • Actively engage with the team and lead by being a positive role model.

AWSLeadershipJavascriptRubyRuby on RailsJavaScriptPostgresCollaborationLinux

Posted 2024-09-25
Apply
Apply

📍 UK

🧭 Full-Time

💸 £110,000 - £120,000 per year

🔍 Cyber Security

  • 6+ years experience in a SOC, Incident Response, or Forensics role.
  • Ability to explain possible complex alerts/events in a non-complex way, both written and verbal.
  • Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team.
  • Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis).
  • Demonstrated experience with Windows and/or MacOS as an attack surface.
  • Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs).
  • Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts).
  • Strong experience with M365/Cloud attack techniques.
  • Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or Cyber Security.

  • Function as the lead liaison between the SOC and other Product and Research teams.
  • Build automation to help reduce the workload on the SOC through report template creation.
  • Own and complete investigative objectives associated with multi-host intrusions without assistance.
  • Triage, investigate, and respond to alerts coming in from the Huntress platform.
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat.
  • Perform advanced malware analysis as part of investigating systems and identities.
  • Investigate suspicious Microsoft M365 activity and provide remediations.
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions.
  • Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed.
  • Contribute to detection efforts by helping to create or request net new detections as well as tuning detections.
  • Provide technical mentorship of more junior team members.
  • Contribute regularly to external facing Huntress content such as blogs, webinars, presentations, and speaking engagements.

Cybersecurity

Posted 2024-09-21
Apply
Apply

📍 Australia

🧭 Full-Time

💸 $165,000 - $185,000 AUD base plus bonus and equity

🔍 Cyber Security

  • 4+ years experience in a SOC, Incident Response, or Forensics role.
  • Excellent verbal and written skills with the ability to explain possible complex alerts/events in a non-complex way.
  • Proven mentoring experience and skills to junior team members.
  • Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or Cyber Security.
  • Understanding of Malware Analysis including VM configuration, file format identification, and basic static & dynamic analysis.
  • Experience with Windows OS and/or Mac OS as an attack surface.
  • Experience with basic threat actor tools and techniques, including MITRE ATT&CK Framework.
  • Experience with Windows Administration or Enterprise Domain Administration.
  • Network Administration Skills, including knowledge of network protocols, OSI layers, and remote access methods.
  • Familiarity with web technologies and OWASP top 10.

  • Triage, investigate, and respond to alerts coming in from the Huntress platform.
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat.
  • Perform senior-level malware analysis as part of investigating systems and identities.
  • Investigate suspicious Microsoft M365 activity and provide remediations.
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions.
  • In a limited fashion, assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC.
  • Contribute to detection efforts. Helping to create or request net new detections as well as tuning detections.
  • Contribute to our collaboratively mentored team.

Cybersecurity

Posted 2024-09-20
Apply
Apply

📍 United States

🧭 Full-Time

💸 180000 - 200000 USD per year

🔍 Cyber Security

  • Located within the US Pacific Time Zone.
  • 6+ years experience in a SOC, Incident Response, or Forensics role.
  • Ability to explain complex alerts/events in a non-complex way, both written and verbal.
  • Proven mentoring experience and skills to junior team members.
  • Understanding of Malware Analysis techniques.
  • Demonstrated experience with Windows and/or MacOS as an attack surface.
  • Strong understanding of Threat Actor Tools and techniques including MITRE ATT&CK Framework.
  • Strong experience with Windows Administration or Enterprise Domain Administration.
  • Strong experience with M365/Cloud attack techniques.
  • Demonstrated equivalent self-guided study experience or Bachelor’s degree in relevant fields.

  • Function as the lead liaison between the SOC and other Product and Research teams.
  • Build automation to help reduce the workload on the SOC through report template creation.
  • Own and complete investigative objectives associated with multi-host intrusions without assistance.
  • Triage, investigate, and respond to alerts coming in from the Huntress platform.
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks and provide necessary remediations.
  • Perform advanced malware analysis as part of investigating systems and identities.
  • Investigate suspicious Microsoft M365 activity and provide remediations.
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions.
  • Engage with customers via video/phone to explain or describe activity observed by the SOC when needed.
  • Contribute to detection efforts and help create or request new detections.
  • Provide technical mentorship to junior team members.
  • Contribute regularly to external facing Huntress content such as blogs, webinars, and presentations.

CybersecurityMentoring

Posted 2024-09-04
Apply