Apply📍 Australia
🧭 Full-Time
💸 $165,000 - $185,000 AUD base plus bonus and equity
🔍 Cyber Security
🏢 Company: Huntress👥 251-500💰 $60.0m Series C on 2023-05-16SecurityInformation TechnologyCyber SecuritySoftware
- 4+ years experience in a SOC, Incident Response, or Forensics role.
- Excellent verbal and written skills with the ability to explain possible complex alerts/events in a non-complex way.
- Proven mentoring experience and skills to junior team members.
- Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or Cyber Security.
- Understanding of Malware Analysis including VM configuration, file format identification, and basic static & dynamic analysis.
- Experience with Windows OS and/or Mac OS as an attack surface.
- Experience with basic threat actor tools and techniques, including MITRE ATT&CK Framework.
- Experience with Windows Administration or Enterprise Domain Administration.
- Network Administration Skills, including knowledge of network protocols, OSI layers, and remote access methods.
- Familiarity with web technologies and OWASP top 10.
- Triage, investigate, and respond to alerts coming in from the Huntress platform.
- Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat.
- Perform senior-level malware analysis as part of investigating systems and identities.
- Investigate suspicious Microsoft M365 activity and provide remediations.
- Assist in escalations from the product support team for threat-related and SOC-relevant questions.
- In a limited fashion, assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC.
- Contribute to detection efforts. Helping to create or request net new detections as well as tuning detections.
- Contribute to our collaboratively mentored team.
Cybersecurity
Posted 2024-09-20
Apply