FlexHired LogoFlexHired
Logo of Huntress

Huntress

Senior Hunt & Response Analyst

Job Summary

This role involves working within Huntress's global hunting and response team to identify and manage cybersecurity threats across a large scale of endpoints. Responsibilities include researching attacker techniques, developing detections, and supporting incident response efforts with forensic analysis and root cause investigation. The candidate should have 3-5 years of experience in SOC, threat hunting, or incident response, with skills in malware analysis, forensics, detection languages, and cloud security. The position is fully remote and offers various benefits focused on professional development and well-being.

Required Skills

Scripting
Cloud Security
Incident Response
OSINT
Threat Hunting
Malware Analysis
SIEM
Forensics
Detection Engineering
Detection Languages
Cybersecurity Tradecraft

Benefits

Remote Work
Healthcare Benefits
Home Office Setup Reimbursement
Personal Leave
Digital Reimbursement
Travel Reimbursements
Superannuation
Professional Growth Platforms

Job Description

Reports to: Manager, Hunt & Response

Location: Remote Australia

Compensation Range: $175,000 to $190,000 AUD base plus bonus and equity

What We Do:

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 3M+ endpoints and 1M+ identities worldwide, elevating under-resourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do:

The Huntress Global Hunting & Response team has the unique honor of waking up every morning knowing we will be kicking out threat actors. This team sits alongside our 24x7 Security Operations Center team. It is a skilled team of individuals who review lower confidence signals and manage tactical incident response scenarios to aid customers out of critical intrusions.

Members of this team will get to allocate their time across Hunting efforts and Response efforts. While in Hunting mode, you will get to research new attacker tradecraft, test new theories, and review hunting data at scale for millions of endpoints. While the SOC is responding to alerts within minutes, this team is developing detections and reviewing more ambiguous signs of attacker activity on a daily & weekly basis.

In the Response side of the role, you will get to flex your incident response and forensics skills. When customers are experiencing the worst incidents of their lives, this team will step in to answer questions core to understanding the cause of an attack, the high-level activities of the attacker once in the environment, and providing remediation actions and recommendations which will help reduce or eliminate this threat occurring again in their environment.

If you love Threat Hunting, Incident Response, and Detection Engineering while in the environment and energy of a SOC, this is the role for you!

Responsibilities:

  • Perform a cadenced review of hunting data to identify compromises not found during standard SOC workflows
  • Research, develop, and test new hunting hypotheses in the form of new detections or analytics
  • Lead or support tactical incident response engagements for customers who already utilize Huntress MDR. Perform live analysis on systems to determine the root cause of an intrusion, and craft reports that summarize the intrusion with next steps to be taken
  • Perform regular rotations in the SOC to stay current and familiar with SOC day-to-day workflows
  • Perform intermediate malware analysis as part of hunting and response efforts
  • Perform OSINT as part of hunting and response efforts
  • Contribute to content creation efforts such as blogs, videos, podcasts, and webinars
  • Contribute back to community-driven projects and frameworks such as MITRE ATT&CK, HijackLIbs, and the LOLBAS Project.
  • Speak with customers to explain or summarize findings from investigations

What You Bring To The Team:

  • 3-5 years working in one or more of the following: SOC, MDR, Threat Hunting, or Incident Response role
  • Experience leading or participating in Incident Response engagements for external customers
  • Experience with tools such as osquery, Velociraptor, or leveraging EDRs to perform forensic artifact analysis on systems
  • Confident command of forensic tools - such as Ericzimmerman’s EZ tools, RegRipper, Hayabusa, or Chainsaw - and forensic artifacts - such as prefetch, jumplists, shellbags, and more
  • Deep understanding of offensive security tradecraft, particularly persistence, lateral movement, credential theft, and remote access.
  • Confidently able to track threat actors across an organization and timeline the activity
  • Strong familiarity with one or more detection languages such as Sigma, Suricata, Snort, or Yara
  • Familiarity with OSINT sources and how they can help answer questions relating to threat actor activity and infrastructure.
  • Strong familiarity with various query languages such as KQL, EQL, ES|QL, Splunk SPL
  • Intermediate malware analysis skills
  • Intermediate knowledge of Windows internals
  • Intermediate knowledge of Linux and MacOS internals a bonus
  • Strong understanding of the current threat landscape, initial access brokers, and ransomware actors.
  • Passionate and involved with the community through blogs, social media, conferences, etc
  • Experience with scripting (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
  • Demonstrable experience providing written and/or verbal customer-facing deliverables
  • Experience with detection and response in cloud environments such as Microsoft M365/Azure
  • Comfortable using Git to contribute to internal projects

What We Offer:

  • Fully remote work
  • 1-2 trips to the US annually for events such as Sales Kick-Off and Summer Summit!
  • New starter home office set up reimbursement ($800 AUD)
  • Generous personal leave entitlements
  • Digital monthly reimbursement ($185 AUD)
  • Superannuation
  • Healthcare Benefits
  • Access to the BetterUp platform for coaching, personal, and professional growth

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.

People from all culturally diverse backgrounds, including Aboriginal & Torres Strait Islander Peoples, are encouraged to apply.

We do discriminate against hackers who try to exploit small businesses.

Accommodations:

If you require reasonable accommodation to complete this application, interview, or any pre-employment testing or participate in the employee selection process, please direct your inquiries to [email protected]. Please note that non-accommodation requests to this inbox will not receive a response.

If you have any questions about your personal data privacy at Huntress, please visit our privacy page.

Interested in this job?

Application deadline: Open until filled

Logo of Huntress

Huntress

Huntress is the enterprise-grade, people-powered cybersecurity platform for all businesses, not just the 1%.

See more jobs
Date PostedMay 13th, 2025
Job TypeFull Time
LocationRemote Australia
Salary$175,000 - $190,000
Exciting remote opportunity (requires residency in Australia) for a Senior Hunt & Response Analyst at Huntress. Offering $175,000 - $190,000 (full time). Explore more remote jobs on FlexHired!

Safe Remote Job Search Tips

Verify Employer Thoroughly

Research the company's identity thoroughly before applying. Check for a professional website with contacts, active social media, and LinkedIn profiles. Verify details across platforms and look for reviews on Glassdoor or Trustpilot to confirm legitimacy.

Never Pay to Get a Job

Legitimate employers never require payment for applications, training, background checks, or equipment. Always reject upfront payment requests or demands for bank details, even if they claim it's for purchasing necessary work gear on your behalf.

Safeguard Your Personal Information

Protect sensitive data like SSN, bank details, or ID copies. Share this only after accepting a formal, written job offer. Ensure it's submitted via a secure company system or portal, never through insecure channels like standard email attachments.

Scrutinize Communication & Interviews

Watch for communication red flags: poor grammar, generic emails (@gmail), vague details, or undue pressure. Be highly suspicious of interviews held only via text or chat apps; legitimate companies typically use video or phone calls.

Beware of Unrealistic Offers

If an offer's salary or benefits seem unrealistically high for the work involved, be cautious. Research standard pay for similar roles. Offers that appear 'too good to be true' are often scams designed to lure you into providing information or payment.

Insist on a Formal Contract

Always secure and review a formal, written job offer or employment contract before starting work or sharing final personal details. Ensure it clearly defines your role, compensation, key terms, and conditions to avoid misunderstandings or scams.

Subscribe Newsletter

Never miss a remote job opportunity. Subscribe to our newsletter today and receive exclusive job alerts, career advice, and industry insights delivered straight to your inbox.