Staff Threat Hunter
United States - Remote
About Us:
SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle.
We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!
What are we looking for?
Join SentinelOne’s elite professional services division by becoming part of our proactive threat hunting program. Our Threat Hunters serve our clients by utilizing the SentinelOne platform to identify potential malware, malicious behavior, insider threats, and security hygiene issues that exist within client environments.
The Hunters’ goal is to identify threats, disrupt attacks prior to further damage occurring within a client environment, and advise for remediation as well as long-term security posture improvement. Incumbent will be responsible for identifying attack trends and threat intelligence by harvesting threat data generated by several million endpoints from across the globe.
This is an exciting opportunity to join a growing team of industry renowned experts dedicated to providing the highest level of security service to our clients.
What will you do?
- Conduct proactive threat hunting services for SentinelOne clients
- Build, evolve, and expand hunting tooling, techniques and use-cases
- Integrate relevant threat intelligence and dark web data into hunting operations
- Advise engineering team on platform enhancements to further enable rapid and effective threat hunting
- Work closely with clients to remediate threats and improve long-term security posture
What experience or knowledge should you bring?
- 10+ years experience in security engineering, SOC operations, system administration, or other cyber security relevant roles
- 5+ years experience in digital forensic investigations, penetration testing, red teaming, threat intelligence, network threat hunting, or malware analysis
- 2+ years experience in threat hunting via endpoint focused threat hunting
- 3+ years working or consulting in Fortune 500 environments
- 3+ years Python scripting experience, including:
- API integration
- DB integration
- data manipulation
- Multiprocessing
- Working knowledge of git
- Ability to create code with the best Python practices
- Ability to work with large datasets to get valuable and vital information
- Strong understanding of common malware activity on endpoints
- Knowledge of MITRE ATT&CK framework and known APT group activity
- Operating system internals knowledge (Windows, Linux, OSX)
- Experience utilizing EDR technologies
- Experience with working with Cyber threat Intelligence tools and data
- Knowledge of OSINT tools and techniques
- Working understanding of risk management programs
Why us?
You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.
- Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
- Unlimited PTO
- Industry leading gender-neutral parental leave
- Paid Company Holidays
- Paid Sick Time
- Employee stock purchase program
- Disability and life insurance
- Employee assistance program
- Gym membership reimbursement
- Cell phone reimbursement
- Numerous company-sponsored events including regular happy hours and team building events
locations, a different pay range may apply. If so, this range will be provided to you during the recruiting
process. You can also reach out to the recruiter with any questions.
Base Salary Range$128,000—$160,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
ApplyJob Profile
401(k) Cell phone reimbursement Collaboration Commuter Company-sponsored events Cutting-edge company Dental Dependent FSA Disability and life Disability and Life Insurance Employee Assistance Program Employee Stock Purchase Employee Stock Purchase Program Extraordinary challenges Gender-neutral parental leave Gym Membership Reimbursement Gym reimbursement Health and Dependent FSA Industry leading gender-neutral parental leave Insurance Life Insurance Medical Medical, Vision, Dental Paid company holidays Paid holidays Paid sick time Parental leave Sick time Stock Purchase Program Team success Unlimited PTO Vision
Tasks- Advise on platform enhancements
- Build and evolve hunting tools
- Conduct threat hunting
- Integrate threat intelligence
- Remediate threats
- Tools
AI AI models API API Integration Collaboration Cybersecurity Cyber Security Database Integration Data manipulation Digital Forensics EDR technologies Git Integration Linux Malware Analysis MITRE ATT&CK Framework Multiprocessing Network threat hunting Operating system internals OSINT tools OSX Penetration Testing Problem-solving Python Python scripting Recruiting Red teaming Risk Management Scripting Security Threat Hunting Threat Intelligence Windows XDR XDR platform
Experience10 years
TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9