Related skills
incident response threat hunting sigma yara osquery📋 Description
- Lead or support tactical incident response for Huntress MDR.
- Perform live analysis to identify root cause of intrusions.
- Craft remediation steps in reports for customers.
- Research, develop, and test tooling for analysis.
- Perform intermediate malware analysis during responses.
- Conduct OSINT during response efforts.
🎯 Requirements
- 3-5 years in SOC/MDR/Threat Hunting/IR roles
- Experience leading or participating in Incident Response engagements for external customers
- Experience with osquery, Velociraptor, or EDR forensic analysis
- Proficient with forensic tools such as EZ tools, RegRipper, Hayabusa, Chainsaw
- Strong understanding of offensive security tradecraft (persistence, lateral movement, credential theft)
- Familiarity with detection languages such as Sigma, Suricata, Snort, or Yara
🎁 Benefits
- 100% remote work environment
- Generous PTO (vacation, sick time, holidays)
- 12 weeks paid parental leave
- Medical, dental, and vision benefits
- 401(k) with 5% employer contribution
- Stock options for all full-time employees
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!