14 days ago

Logo of SentinelOne

SOC Analyst

$80k - $110k

SentinelOne

USRemote

About Us:

SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. 

We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. Were looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!

Due to Federal Government contract requirements, U.S. Citizenship is required for this position.

FedRamp Staff may be subject to customer or third party background checks up to and including Secret Clearance if required by their role at SentinelOne. 

*** Needs to work non-standard hours (including substituting at least 1 M-F workday for 1 weekend day)***

 

What Are We Looking For?

We are looking to add a Security Analyst to our Security Operations (SOC) team, eager to grow their skills in cybersecurity. In this role, you’ll work alongside experienced professionals to monitor and safeguard our environments, supporting incident response efforts by analyzing and responding to security alerts and helping maintain our 24/7 coverage. This is a great opportunity to gain hands-on experience with security tools and contribute to SentinelOne’s operations. You’ll join a collaborative team dedicated to defending against cyber threats and ensuring the integrity of our networks.

 

What will you do?

  • Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
  • Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
  • Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
  • Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
  • Correlate information from disparate sources to develop innovative detection method

 

What skills and knowledge should you bring?

  • 1+ years of experience
  • Educational background in cybersecurity, information technology, or related fields; relevant certifications are a plus but not required
  • Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
  • Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
  • Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
  • Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
  • Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
  • Exposure to common security tools, such as EDR solutions
  • Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
  • Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
  • Ability to work flexible hours to support 24/7 SOC operations
  • Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers

 

 Why Us?

You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry-leading gender-neutral parental leave
  • Paid company holidays
  • Paid sick time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team-building events
This U.S. role has a base pay range that will vary based on the location of the candidate.  For some

locations, a different pay range may apply.  If so, this range will be provided to you during the recruiting

process.  You can also reach out to the recruiter with any questions.

Base Salary Range
$80,000$110,000 USD

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles.