Full-Time

Staff Data Analyst

Security Operations Center/Support

Posted on 9/11/2025

Huntress

Huntress

501-1,000 employees

Managed 24/7 EDR threat hunting

Compensation Overview

$155k - $170k/yr

+ Bonus + Equity

Remote in USA

Remote

Category
Data & Analytics (1)
Required Skills
Power BI
Python
R
SQL
Tableau
Salesforce
Looker
Data Analysis
Excel/Numbers/Sheets
Requirements
  • Bachelor’s degree in a quantitative field (e.g., Finance, Economics, Statistics, Computer Science) or equivalent practical experience.
  • 5+ years of experience in data analytics, business intelligence, or a similar role, with a strong focus on customer health reporting, preferably within a B2B SaaS environment.
  • Advanced proficiency in SQL for data querying and manipulation.
  • Proven experience with BI tools such as Sigma, Tableau, Looker, Power BI, or similar platforms.
  • Excellent communication, presentation, and storytelling skills, with the ability to translate complex data into clear, actionable insights for an executive audience.
  • Demonstrated ability to partner with senior leaders and influence strategic decision-making.
Responsibilities
  • Unlock value in our install base by leaning in with curiosity to investigate customer usage, enablement, and engagement.
  • Offer insights into key performance indicators (KPIs) and provide timely alerts on significant changes, anomalies, or performance gaps.
  • Proactively develop and present compelling, data-driven narratives to support strategic planning, investment decisions, and business reviews (e.g., QBRs, board meetings).
  • Lead deep-dive analyses on critical business questions, such as sales motion effectiveness, market segmentation, and pricing strategy.
  • Own the end-to-end reporting process for key support metrics, customer health, product usage, and support effectiveness.
  • Actively support business owners in better understanding their business, staffing capacity planning, product requirements, and improving operating efficiency.
  • Design, build, and maintain a suite of scalable dashboards and reports using business intelligence tools (e.g., Sigma, Tableau, Power BI, Looker) that provide visibility into performance.
  • Conduct complex data analysis using SQL to extract, manipulate, and analyze data from various sources (e.g., Salesforce, marketing automation platforms, financial systems).
  • Serve as a trusted advisor by proactively identifying trends, opportunities, and risks within our customer health and support data products.
  • Translate complex data concepts into clear, concise, and simple terms for non-technical audiences.
  • Have regular meetings with key stakeholders that define what data product readiness looks like in the now, next, and future timelines.
  • Influence key prioritization and resource allocation decisions by providing a clear, data-backed point of view that makes data products future-ready.
  • Collaborate with analytics engineers to build and maintain the data pipelines that ensure growth metrics are evolving in alignment with the company's strategy.
  • Customer Health Analysis is the core data product that helps support, security operations, and revenue leaders understand the health of our customer base. Directly influence decisions around retention programs and support coverage.
  • Support Efficiency defines key metrics around tickets and ticket efficiency metrics to support capacity planning.
  • Incident Effectiveness measures the number of Security Operations incidents, resolution times, and customer sentiment.

Huntress delivers managed security services focused on endpoint detection and response (EDR) and proactive threat hunting. It continuously monitors client systems around the clock to detect cyber threats, particularly ransomware and other advanced attacks, and only raises alerts after analysts verify them. In addition to detection, Huntress provides security awareness training and educational resources to help clients improve cybersecurity practices. The service is designed to complement Microsoft 365 environments and emphasizes personalized reporting and strong customer support. The company’s goal is to help businesses defend against cyber threats with reliable, verified detections and practical guidance, reducing false positives and improving security posture.

Company Size

501-1,000

Company Stage

Series D

Total Funding

$309.8M

Headquarters

Columbia, Maryland

Founded

2015

Simplify Jobs

Simplify's Take

What believers are saying

  • May 5, 2026, partnerships with Ingram Micro and Vertosoft expand to public sector.
  • March 24, 2026, ITDR extension to Google Workspace protects 10 million identities.
  • Inside Agent acquisition bolsters ISPM amid 40% identity attack incidents.

What critics are saying

  • Microsoft Defender bundles commoditize Huntress EDR, eroding SMB acquisition by 2027.
  • CrowdStrike undercuts pricing, forcing MSPs to drop Huntress within 12 months.
  • Channel expansion via Ingram Micro sparks conflicts, compressing margins in 6 months.

What makes Huntress unique

  • Huntress combines AI-assisted automation with 24/7 human threat hunters for SMBs.
  • Platform bundles EDR, ITDR, SIEM, and training for MSPs managing SMB security.
  • Founded by ex-NSA operators, Huntress targets identity threats like rogue OAuth apps.

Help us improve and share your feedback! Did you find this helpful?

Benefits

100% remote work environment

Generous PTO including vacation, sick time, and paid holidays

12 weeks paid parental leave

Highly competitive and comprehensive medical, dental, and vision benefits plans

401(k) with 5% contribution regardless of employee contribution

Life and Disability insurance plans

Stock options for all full-time employees

One-time $500 stipend to build/upgrade home office

Annual allowance for education and professional development assistance

$75 USD/month digital reimbursement

Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

1%

2 year growth

3%
IT Security News
Mar 24th, 2026
Huntress brings ITDR to Google Workspace as identity attacks surge.

Huntress brings ITDR to Google Workspace as identity attacks surge. 2026-03-24 16:03 Huntress has announced it is extending its Managed Identity Threat Detection and Response (ITDR) solution to Google Workspace, marking a significant expansion of the company's cloud identity security coverage and coming at a telling moment. The announcement, made today at RSA Conference in San Francisco, coincides with Huntress surpassing 10 million Microsoft 365 identities protected [...] Read the original article: Huntress today announced major enhancements to its Managed Identity Threat Detection and Response (ITDR) solution, delivering a purpose-built answer to disrupt hacker identity tradecraft. Alongside the launch, Huntress also revealed new research underscoring the growing threat of identity-based attacks and organisations' struggles to defend against them. Based on findings from... April 29, 2025 Huntress has unveiled its newly enhanced Managed Identity Threat Detection and Response (ITDR) solution, purpose-built to wreck hacker identity tradecraft, alongside new research on the growing threat of identity-based attacks and organizations' ability to defend against them. Drawing insights from an independent UserEvidence survey of more than 600 IT and... April 29, 2025 Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security... March 17, 2026

Toucan Technology Group
Feb 18th, 2026
Toucan Technology Group Now Partnered with Huntress

Toucan Technology Group now partnered with Huntress. No matter how big or small your business, you've heard about cyber threats. You may not think you are a target, but in 2024 over 6.3 billion dollars was stolen globally from businesses, most of whom did not have managed cybersecurity services. That's where Toucan Technology Group (TTG) and Huntress come in. As a partner of Huntress, TTG implements their continuous protection and real-time threat detection and remediation products. Their suite of products provides you with peace-of-mind that your business is protected from cyber criminals. Why Toucan Technology Group chose Huntress. There are many managed cybersecurity services. However, few offer a complete suite of services that continuously evolve as cybercrime does. As their name implies, Huntress managed cybersecurity services are always hunting for threats. Their proactive approach to identify and stop system compromises constantly evolves to protect businesses at the highest level. Huntress not only protects the system, but also identifies which user account has been compromised. Their solutions provide businesses with top-notch protection and they provide Toucan Technology Group with ongoing updates about new cyber threats and solutions to prevent its clients from becoming victims. Products available through TTG. Huntress offers a suite of security solutions. And, although most businesses need their entire suite to ensure comprehensive protection, not all do. As such, Toucan Technology Group evaluate each business and propose only the solutions that will truly provide a benefit for your company. Toucan Technology Group offer: * Managed Endpoint Detection & Response (EDR) * Managed Identity Threat Detection & Respond (ITDR) * Managed Security Information and Event Management (SEIM) * Managed Security Awareness Training (SAT) And Huntress will also monitor your Microsoft 365 and Google environments to look for unauthorized account access and suspicious enterprise applications. Every 11 seconds a business is attacked. With managed cybersecurity services the chances of an attack being stopped is much greater. When you have managed cybersecurity services for your business, you have 24/7 monitoring. This proactive approach can literally save your business. It also provides what you need to remain in compliance with your cybersecurity insurance company. Of course, the goal is little to no downtime for increased productivity. Call Toucan Technology Group today. Toucan Technology Group offer a free on-site assessment of your hardware, software, network, and, of course, a security and compliance check in the greater Indianapolis area. Toucan Technology Group'll provide you with its recommendations and guidance. If you're ready to take the next step in protecting your business, call Toucan Technology Group at (317) 376-4874 or fill out its contact form today.

MyFastTech
Feb 1st, 2026
Cybersecurity Risks & 2026 Hardware Trends

Cybersecurity risks & 2026 hardware trends. The human element: why social engineering is your #1 risk. Most modern cyberattacks don't start with complex code - they start with people. Social engineering is the art of manipulating employees into surrendering credentials by impersonating a trusted source like an executive, vendor, or IT support. Common tactics to watch for: * Phishing: Deceptive emails or texts designed to trick you into clicking malicious links. * Spoofing: "Masking" a message so it appears to come from a brand or person you already trust. * Pretexting: Creating a fabricated scenario (e.g., "urgent payroll update") to steal sensitive data. The real-world impact of a breach. A single compromised password can lead to: * Data Loss: Theft of sensitive client and employee records. * Reputational Damage: Loss of trust that can take years to rebuild. * Financial Fallout: Massive legal fees and recovery costs. Pro Tip: Strong cybersecurity is a multi-layered defense. It must include antivirus, endpoint protection, secure off-site backups, and - most importantly - ongoing employee training. Beyond antivirus: 24/7 managed defense with Huntress. Prevention is only half the battle. To truly secure your business, you need active detection. That's why Myfastech partner with Huntress, a managed security platform that combines automated tools with expert human analysis. Why Huntress? * Expert Human Review: Unlike "set and forget" software, Huntress features a 24/7 Security Operations Center (SOC) where real experts hunt for hidden threats. * Industry-Leading Response: They boast a 99% accuracy rate (less than 1% false positives) and an incredible 8-minute average response time (MTTR). * Proven Scale: Huntress protects over 4 million endpoints and is trusted by 200,000+ organizations worldwide. By integrating Huntress into your security stack, you reduce downtime, maintain compliance, and gain the peace of mind that comes from knowing your systems are being watched by the best in the business. Market watch: the RAM shortage of 2026. The global tech landscape is shifting rapidly. Due to the massive demand for high-bandwidth memory in AI chips (Nvidia, AMD, Google), Myfastech has entered a significant global RAM shortage. What this means for your bottom line. * Price Hikes: Expect RAM prices to rise 30% to 70% throughout 2026 and into 2027. * Hardware Availability: Lead times for new computers and servers are increasing as manufacturers prioritize AI data centers. * Budget Volatility: Waiting to buy is no longer a viable strategy; prices are likely to be higher next quarter than they are today. The "AI boom" Factor. As manufacturers shift their production lines toward AI-focused memory, the supply for traditional enterprise-grade RAM (desktops, laptops, and on-prem servers) is declining. By the end of 2026, the demand for "on-device AI" will only make this squeeze tighter. Strategic planning: don't get caught in the crunch. Are you planning a hardware refresh or office expansion in 2026? Now is the time to act. Securing your equipment early ensures you avoid both the peak pricing and the inevitable supply delays. Contact Myfastech today to strategize your hardware needs and lock in current pricing before the next wave of hikes.

Linck IT
Dec 31st, 2025
Our partners in the spotlight: Huntress

Its partners in the spotlight: Huntress. Why Linck IT partners with Huntress to give you the best security possible Cybersecurity has become one of those topics that most SME owners know they should care about, but rarely have the time to get into; it's not their core business, after all. It often feels abstract, overly technical, or framed in worst-case scenarios that do not translate well to day-to-day business reality. At Linck IT, Linckit sit exactly at that intersection between theory and reality. Linckit see what actually happens inside small and medium businesses when something goes wrong. That perspective is what led Linckit to partner with Huntress. They are not a marketing checkbox, but a practical security decision. The reality your company faces. Small and medium businesses are no longer "too small to target." In fact, they are often ideal targets. Attackers today do not need custom exploits or advanced malware to be successful. They rely on scale, automation, and human behavior. Phishing campaigns, credential theft, and abuse of Microsoft 365 are cheap, effective, and difficult to spot without the proper visibility. * A limited or non-existent internal security team * Heavy reliance on cloud services like Microsoft 365 * Users who need to work efficiently, not suspiciously The above combination creates a gap between having security tools and actually being secure. Why traditional security falls short. Classic security tools are still valuable, but they were designed for a different threat model. Antivirus, spam filters, and firewalls focus primarily on identifying known bad things: malicious files, blacklisted domains, and suspicious attachments. Modern attacks often do not trigger any of those signals. An attacker who logs in using valid credentials obtained through phishing is not "hacking" in the traditional sense. From the system's point of view, everything is working as expected. * A user enters credentials on a convincing phishing page * A successful Microsoft 365 login occurs from a plausible location * A mailbox rule is created to forward emails silently * An OAuth application is granted access to read mail None of these actions involves malware. None of them are technically illegal. They use legitimate features of modern platforms. "Is this file or connection known to be malicious?" Modern attacks require answering a different question: "Does this behavior make sense for this user, at this moment, in this environment?" Without context and correlation, that question cannot be answered reliably. Why Linckit chose Huntress. Detection that matches real attacks. Huntress focuses on behavior, patterns, and sequences of actions, not just signatures. Instead of flooding dashboards with alerts, it investigates what is actually happening and escalates only when something crosses from "unusual" into "dangerous." Behind the platform is a team of human threat hunters who validate detections, analyze intent, and provide clear guidance. That human layer is what turns raw data into actionable security. Identity is the new perimeter. For most SMEs, Microsoft 365 is business-critical. Email, documents, invoices, and internal communication all flow through it. That also makes it the primary attack surface. Huntress' identity-focused detection highlights things that should never happen quietly, such as: * Suspicious mailbox rules * Unauthorized privilege changes * OAuth abuse * Credential misuse that bypasses traditional MFA logic Instead of raw logs, you see what changed, why it matters, and what to do next. Technology alone is not enough. Even the best detection will not prevent every mistake. Attackers design phishing messages to look routine, urgent, and familiar. Expecting users to be perfect is unrealistic. That is why its security approach combines detection with continuous security awareness and phishing simulations. The goal is not to blame, but to build resilience. * Recognize suspicious patterns faster * Report incidents earlier * Reduce the blast radius of inevitable mistakes This layered approach aligns with well-established SME security fundamentals, clearly summarized in Huntress' practical guidance. What this means for you as an SME owner. Partnering with Linck IT and Huntress does not mean turning your business into a security laboratory. It means adopting security that fits how SMEs actually operate. * Continuous monitoring without hiring a SOC * Clear incidents instead of vague alerts * Faster containment when something goes wrong * Reduced impact from phishing and identity abuse Security becomes a managed capability, not a constant source of stress. My closing thoughts. Good security should feel calm, boring, and under control. It should enable you to focus on running a business without having to worry about 'doing something wrong'. Linckit partnered with Huntress because it consistently brings clarity where confusion is usually the biggest risk. It helps SMEs move from hoping nothing happens to knowing when something does and acting before it escalates. For small and medium businesses, that difference matters.

GlobeNewswire
Nov 18th, 2025
Huntress Acquires Inside Agent for ISPM

Huntress has acquired Inside Agent, a London-based company focused on securing Microsoft 365 environments against threats. This acquisition enhances Huntress' identity security offerings and supports the development of a new Identity Security Posture Management (ISPM) solution. Identity-based attacks are rising, accounting for 40% of security incidents, with 67% of organizations reporting increased identity-related incidents over three years.

INACTIVE