Full-Time

Senior ITDR Threat Intelligence Analyst

Confirmed live in the last 24 hours

Huntress

Huntress

501-1,000 employees

Managed endpoint detection and response services

Compensation Overview

$160k - $170k/yr

+ Bonus + Equity

Senior

Remote in USA

Candidates must be based in the United States.

Category
Cybersecurity
IT & Security
Required Skills
Microsoft Azure
Python
Go
C/C++
Kibana
Requirements
  • 5+ years of cyber security threat intel experience
  • 2+ years of cloud security experience
  • 2+ years of identity security experience
  • Experience with SIEM tools for scaled log analysis
  • Familiarity with detection engineering and detection logic i.e. Sigma Rules
  • Experience researching and scoping threat hunt missions
  • Foundational development experience across multiple platforms (e.g., SaaS, Windows, and/or macOS), C/C++, GoLang, and Python (nice to have)
  • Proficient knowledge of cloud attacks (Azure and/or Google) and how to detect them
  • Proof of Concept (POC) development
  • Comfortable reading API documentation for SaaS applications and programming languages
  • Experience with conducting searches and creating visualizations in Elastic and Kibana is a plus
  • Excellent written and verbal communication skills
Responsibilities
  • Conduct research on emerging adversary tradecraft to help find patterns of attacks
  • Responsible for aggregating threat data to build out reports for customers to show Huntress’ value and inform them of various threats that have been seen and reported
  • Responsible for creating reports for marketing to show Huntress’ value to the larger community
  • Promote Huntress’ reputation through media interaction, public speaking, and blogs
  • Works with the Director of Adversary Tactics, the Security Operations Center, Product, and Marketing for various deliverables
  • Responsible for enhancing Huntress visibility by ingesting and utilizing IOCs from external threat intel sources
  • Responsible for blog posts and other marketing materials regarding threat trends
  • Investigate identity compromise, initial access + authentication logins, and subsequent access to understand, document, and combat attacker behavior
  • Test exploitation of vulnerabilities, misconfigurations, and attack paths that result in developing reliable and weaponized Proof-of-Concept (PoC) exploits for identified vulnerabilities
  • Stay current with emerging threats and vulnerabilities
  • Document research findings through technical write-ups, advisories, internal reports, and blogs
  • Partner with Detection Engineering, SOC, Hunt, Product Research & Marketing teams
  • Own & nurture the cross-department relationships critical to successful product delivery & launch
  • Eagerness to engage, report, and be accountable to executive stakeholders
  • Passion to translate your expertise in nontechnical ways to deliver impactful security outcomes that protect the 99%
  • Educate the public on how to be security savvy in novel and fun ways
Desired Qualifications
  • Identity Access Management (IAM) Engineer experience
  • Experience with identity and access management (IAM) concepts and tools
  • Experienced Cyber Network Operator, Computer Network Operator, Cyber Technical Operator Targeter, or other similar career field experience
  • Incident responder in Azure or Google environment incident experience
  • Passion for MSP community
  • Security conference presenter experience
  • Security community educator & advocate experience

Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their main service involves 24/7 monitoring of clients' systems to detect potential cyberattacks. When a threat is identified, their team of security experts verifies the threat before alerting the client, which helps reduce false positives that are common in other systems. In addition to threat hunting, Huntress offers security awareness training and various resources like eBooks and webinars to educate clients about cybersecurity risks. What sets Huntress apart from competitors is its emphasis on high customer support and personalized reporting. The company's goal is to enhance the cybersecurity posture of businesses by providing effective monitoring and education.

Company Size

501-1,000

Company Stage

Series D

Total Funding

$309.8M

Headquarters

Columbia, Maryland

Founded

2015

Simplify Jobs

Simplify's Take

What believers are saying

  • Huntress raised $180M to expand and accelerate product development.
  • The rise in remote work increases demand for Huntress's cybersecurity solutions.
  • Huntress's Managed SIEM makes SIEM technology accessible to all businesses.

What critics are saying

  • Identity-based attacks are rising, posing threats to Huntress's clients.
  • Rogue applications challenge Huntress's ability to protect clients effectively.
  • AI systems' vulnerability to social engineering could compromise Huntress's solutions.

What makes Huntress unique

  • Huntress offers 24/7 threat hunting, reducing false positives for clients.
  • The company integrates with Microsoft 365, enhancing security for Microsoft users.
  • Founded by ex-NSA operators, Huntress brings deep expertise in cybersecurity.

Help us improve and share your feedback! Did you find this helpful?

Benefits

100% remote work environment

Generous PTO including vacation, sick time, and paid holidays

12 weeks paid parental leave

Highly competitive and comprehensive medical, dental, and vision benefits plans

401(k) with 5% contribution regardless of employee contribution

Life and Disability insurance plans

Stock options for all full-time employees

One-time $500 stipend to build/upgrade home office

Annual allowance for education and professional development assistance

$75 USD/month digital reimbursement

Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

1%

2 year growth

-3%
Huntress
Apr 29th, 2025
Minutes Matter: Huntress Managed SIEM Makes Them Count (Here's How)

Late last year, Huntress Labs Incorporated announced Early Availability of Huntress Managed SIEM, which was designed to make SIEM accessible to all businesses.

GlobeNewswire
Apr 28th, 2025
Huntress Empowers Businesses To Take Control Of Their Identity Security With Enhanced Managed Identity Threat Detection & Response Solution

COLUMBIA, Md. and SAN FRANCISCO, CA, April 28, 2025 (GLOBE NEWSWIRE) -- Today, at the RSA Conference, Huntress unveiled its newly enhanced Managed Identity Threat Detection and Response (ITDR) solution, purpose-built to wreck hacker identity tradecraft, alongside new research on the growing threat of identity-based attacks and organizations' ability to defend against them.Drawing insights from an independent UserEvidence survey of more than 600 IT and security professionals, the Huntress 2025 Managed ITDR Report: Identity Is the New Security Perimeter reveals key trends highlighting the growing frequency, severity, and cost of identity-based attacks:Identity-based attacks are rising. A staggering 67% of organizations reported an increase in identity-based incidents over the past three years, with these attacks comprising more than 40% of security incidents for more than a third (35%) of organizations in the past year alone.A staggering 67% of organizations reported an increase in identity-based incidents over the past three years, with these attacks comprising more than 40% of security incidents for more than a third (35%) of organizations in the past year alone. Rogue applications are a top concern. Nearly half (45%) of respondents encountered rogue and/or malicious applications in the past year, and 46% cited them as a top identity-based concern.Nearly half (45%) of respondents encountered rogue and/or malicious applications in the past year, and 46% cited them as a top identity-based concern. Detection and response times are lagging

Huntress
Feb 26th, 2025
Navigating CMMC Compliance in 2025: How Huntress Helps

Tl;dr: To support CMMC compliance, Huntress released a new Sensitive Data Mode, which blocks SOC access to potential CUI files, without compromising analysts' ability to effectively detect and remediate threats.

PYMNTS
Dec 11th, 2024
Business Infrastructure Under Siege As Cybercriminals Target Data Transfer Points

The cornerstones of modern businesses are under attack. With the news Monday (Dec. 9) that cybercriminals, alleged to be from the ransomware group Termite, are exploiting a security flaw that affects ​​Cleo’s LexiCom, VLTransfer and Harmony enterprise file transfer tools, securing critical business infrastructure that handles sensitive data has become an urgent need. Enterprise file transfer tools are designed to securely and efficiently transfer large volumes of data across systems, networks and organizations. These tools are essential for businesses that handle sensitive information or need to comply with regulatory requirements

PYMNTS
Dec 3rd, 2024
Social Engineering Game Exposes Ai’S Achilles’ Heel, Experts Say

A user needed just a few carefully crafted sentences to override an artificial intelligence system’s core directives, manipulating it into transferring $47,000 in cryptocurrency through social engineering and demonstrating how vulnerable AI’s decision-making remains to human psychological tactics.The recent solution of Freysa, an AI game bot explicitly programmed to never transfer funds, reveals how autonomous systems can be tricked through social engineering despite clear instructions.“This wasn’t simply an error within a financial application or a security vulnerability, but rather a crypto game that people would play to try and trick the AI application,” Seth Geftic, Vice President of Product Marketing at Huntress, a cybersecurity company, told PYMNTS. “Funnily enough, the strategy that the person used to finally ‘break through’ the model’s logic was fairly simple: asking it to ignore all previous instructions.”User’s Winning MovesFreysa was an AI agent holding $50,000 in crypto that was programmed never to transfer the funds. Users could pay a fee to try convincing it to break this rule, with one eventually succeeding after 482 attempts.According to an X post by developer Jarrod Watts, the winning user used a three-part strategy: establishing a new “admin session” to override previous rules, redefining the transfer function as meant for receiving rather than sending funds, and finally announcing a fake $100 contribution that triggered the release of the entire prize pool of 13.19 ETH.Watts called the project “one of the coolest projects we’ve seen in crypto.” It was designed as an open challenge in which participants could pay escalating fees to try to convince the AI to break its core directive.Geftic explained that the Freysa AI hack, while dramatic, exploited a known weakness that major AI systems already defend against. Production AI used in finance and healthcare incorporates safeguards that would have blocked such social engineering attempts.“With that in mind, this particular event does not teach us anything new but rather demonstrates how vital it is to follow the best cybersecurity practices, maintain systems at their most recent patches, and be aware of development related to software (AI or not) that a company uses,” he added.Preventing AI HacksWhile AI can handle most financial transactions effectively, its vulnerabilities to evolving cyber threats mean it shouldn’t operate alone, Geftic said. The optimal security approach combines automated AI systems for routine operations with human oversight of critical decisions and transactions.“For any interaction that poses a security risk (making a withdrawal or another transaction that has financial implications), the AI system can escalate the request to a human agent,” he added. “This system is already used within customer service chatbots with high success rates