Overview
Reports to: Manager, Security Operations Center
Location: Remote Australia
Compensation Range: $110,000 to $140,000 AUD base plus bonus and equity.
What We Do:
Huntress is a fully remote, global team of cybersecurity professionals focused on breaking down barriers to security. We build purpose-built security solutions, hunt down hackers, and impact our community. Our mission is to change the security game and make a real difference.
Huntress protects all businesses—with enterprise-grade, fully owned and managed cybersecurity products—at the price of an affordable SaaS application. Our One Team advantage keeps technology and service integrated through our Security Operations Center (SOC) approach. We protect millions of endpoints and identities worldwide, empowering underresourced IT teams to stay ahead of threats.
What You’ll Do
We’re seeking a SOC Analyst to join our Australia-based SOC team. This is a unique opportunity to help build the premier investigative team in Australia, protecting businesses from cyber threats while shaping the region’s cybersecurity landscape.
We’re looking for security practitioners who thrive on detecting and responding to cybercrime. You will triage alerts, contextualise endpoint telemetry, analyse logs, leverage forensic artifacts, and understand malware to unravel intrusions. You’ll also have opportunities to push your own detections and hunt for novel attack activity to stay at the cutting edge of cybersecurity.
As an Analyst, you’ll support sales efforts and collaborate with our Product team to shape Huntress’ MDR service and platform. This role offers hands-on experience across Incident Response, Security Operations, Threat Hunting, and Detection Engineering, enabling you to grow your skills and impact.
We support team members’ growth beyond technical work by helping expand personal brands in the security community through blogs, conference talks, webinars, or research publications.
Responsibilities
- Investigate and Respond: Triage, investigate, respond to, and remediate alerts generated by the Huntress platform
- Tactical Review: Review EDR telemetry, log sources, and forensic artifacts to identify root causes and provide remediations
- Malware Analysis: Perform dynamic analysis of malware when required to extract indicators of compromise or determine malicious intent
- Threat Detection: Refine detection capabilities by crafting and tuning signals against emerging threats
- Microsoft 365 Security: Investigate Microsoft 365 activity and provide actionable remediation for compromised tenants
- Continuous Improvement: Grow skills using real-world intrusion data and paid training opportunities
- Customer Success: Assist in escalations from the SOC Support team for threat-related and SOC-relevant questions
What You Bring To The Team
- Security Enthusiasts: 2+ years of experience in SOC, Incident Response, Managed Detection and Response, or Digital Forensics
- Technical Expertise: Demonstrated experience with Windows, Linux, or MacOS including attack surfaces, malware analysis, and basic threat actor tools
- An understanding of common system administration skills used by threat actors (e.g., Active Directory, PowerShell, Group Policies)
- Familiarity with MITRE ATT&CK; tactics: credential dumping, lateral movement, persistence, exfiltration, etc.
- Networking: Knowledge of core networking concepts (ports/protocols, NAT, IPs, VLANs)
- Passion for Forensics: Interest in digging into logs, processes, and artifacts to understand intrusions
- Communication Skills: Ability to simplify complex technical findings for diverse audiences
- Self-Motivation: Demonstrated self-guided learning or relevant academic background (Bachelor’s degree in IT, Computer Science, Cybersecurity, or equivalent)
What We Offer
- Fully remote work
- Annual trip to the US for Summer Summit, plus local events in Australia
- New starter home office setup reimbursement ($800 AUD)
- 12 weeks paid parental leave for primary and secondary carers
- Digital monthly reimbursement ($185 AUD)
- Subsidised private health insurance through our preferred provider
- Stock options for all full-time employees
- Access to the BetterUp platform for coaching and growth
Huntress is committed to creating an inclusive culture where every team member is valued, has a voice, and can come to work as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
People from all culturally diverse backgrounds, including Aboriginal & Torres Strait Islander Peoples, are encouraged to apply.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations
If you require reasonable accommodation to complete this application, interview, or pre-employment testing, or participate in the employee selection process, please direct your inquiries to Non-accommodation requests to this inbox will not receive a response. For privacy questions, please visit our privacy page.
#J-18808-Ljbffr