Back to jobs
New

Security Operations Center Analyst

Remote Australia

Title: Security Operations Center Analyst - Australia

Reports to: Manager, Security Operations Center

Location: Remote Australia

Compensation Range: $110,000 to $140,000 AUD base plus bonus and equity

 

What We Do:

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 3M+ endpoints and 1M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do: 

Huntress is seeking a SOC Analyst to join our rapidly growing Australia-based SOC team. This is a unique opportunity to be part of our mission to build the premier investigative team in Australia, protecting businesses from cyber threats while actively shaping the future of cybersecurity in the region.

At Huntress, we’re looking for passionate security practitioners who thrive on detecting and responding to cybercrime. If you love triaging pre-ransomware intrusions, tracking attackers through a network, and kicking them out before they achieve their objectives, this role is for you. Our analysts excel in triaging alerts, contextualising endpoint telemetry, analysing logs, leveraging forensic artifacts, and understanding malware, to unravel the full scope of an intrusion. You’ll also have the freedom to push your own detections and spend time hunting for novel attack activity, ensuring you’re always at the cutting edge of cybersecurity.

As an Analyst, in addition to triaging alerts and responding to intrusions, you’ll support efforts with sales, and collaborate with our Product team to help shape Huntress’ MDR service and platform. This role offers hands-on opportunities across Incident Response, Security Operations, Threat Hunting, and Detection Engineering, empowering you to grow your skills and make a real impact on the world.

At Huntress, we don’t just want you to succeed—we want you to thrive. This is why we prioritize helping our team members grow their personal brands in the broader security community. Whether it’s through blogs, conference talks, webinars, or research publications, we’ll support you in sharing your work with the world. We believe this not only elevates Huntress but also enhances your career development, building your reputation as a leading voice in cybersecurity.

Responsibilities:  

  • Investigate and Respond: Triage, investigate, respond to, and remediate alerts generated by the Huntress platform
  • Tactical Review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks where possible and provide remediations needed to remove the threat
  • Malware Analysis: Perform dynamic analysis of malware where required to extract indicators of compromise or determine malicious intent of a file
  • Threat Detection: Contribute to and refine detection capabilities by crafting and tuning signals to address emerging threats
  • Microsoft 365 Security: Investigate Microsoft 365 activity and deliver actionable remediation advice for compromised tenants
  • Continuous Improvement: Continue to regularly grow your skills and knowledge by using our real world intrusion data and paid training opportunities on a regular basis 

What You Bring To The Team:  

  • Security Enthusiasts: Practitioners with 2+ years of experience in SOC, Incident Response, Managed Detection and Response, or Digital Forensics roles
  • Technical Expertise:
    • Demonstrated experience with at least one of Windows, Linux, MacOS, including attack surfaces, malware analysis, and basic threat actor tools and techniques
    • An understanding of common system administration skills and how they are abused by threat actors to achieve their goals (Active Directory, PowerShell, Group Policies, Local Account Creation, etc)
    • Familiarity with the underlying techniques in tactics in MITRE ATT&CK such as credential dumping, lateral movement, persistence mechanisms, exfiltration techniques, etc.
    • Working knowledge of core networking concepts such as common ports/protocols, NAT, Public/Private IPs, VLANs, etc.
  • Passion for Forensics: A love for digging into logs, processes, and artifacts to understand intrusions and outmaneuver attackers
  • Communication Skills: Strong verbal and written communication, capable of simplifying complex technical findings for diverse audiences
  • Self-Motivation: Demonstrated self-guided learning or relevant academic background (Bachelor’s degree in IT, Computer Science, Cybersecurity, or equivalent)

What We Offer: 

  • Fully remote work
  • At least one annual trip to the US for Summer Summit, with additional local events in Australia!
  • New starter home office set up reimbursement ($800 AUD)
  • 12 weeks paid parental leave for both primary and secondary carers
  • Digital monthly reimbursement ($185 AUD)
  • Subsidised private health insurance through our preferred provider
  • Stock options for all full-time employees
  • Access to the BetterUp platform for coaching, personal, and professional growth

 

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status. 

People from all culturally diverse backgrounds, including Aboriginal & Torres Strait Islander Peoples, are encouraged to apply.

We do discriminate against hackers who try to exploit businesses of all sizes.

Accommodations:

If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.

If you have questions about your personal data privacy at Huntress, please visit our privacy page.

Create a Job Alert

Interested in building your career at Huntress? Get future opportunities sent straight to your email.

Apply for this job

*

indicates a required field

Resume/CV*

Accepted file types: pdf, doc, docx, txt, rtf

Cover Letter

Accepted file types: pdf, doc, docx, txt, rtf


Select...
Select...