Match score not available

Staff Threat Hunter

extra holidays - fully flexible
Remote: 
Full Remote
Contract: 
Salary: 
128 - 160K yearly
Experience: 
Expert & Leadership (>10 years)
Work from: 

Offer summary

Qualifications:

10+ years in security engineering or SOC operations, 5+ years in digital forensics or threat intelligence, 2+ years in endpoint-focused threat hunting, 3+ years working with Fortune 500 clients, Proficient in Python scripting and data management.

Key responsabilities:

  • Conduct proactive threat hunting for clients
  • Build and enhance hunting tools and techniques
  • Integrate threat intelligence into operations
  • Advise on platform enhancements for threat hunting
  • Work with clients to remediate threats
SentinelOne logo
SentinelOne Cybersecurity Large https://www.sentinelone.com/
1001 - 5000 Employees
See more SentinelOne offers

Job description

About Us:

SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. 

We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!

What are we looking for?

Join SentinelOne’s elite professional services division by becoming part of our proactive threat hunting program. Our Threat Hunters serve our clients by utilizing the SentinelOne platform to identify potential malware, malicious behavior, insider threats, and security hygiene issues that exist within client environments.

The Hunters’ goal is to identify threats, disrupt attacks prior to further damage occurring within a client environment, and advise for remediation as well as long-term security posture improvement. Incumbent will be responsible for identifying attack trends and threat intelligence by harvesting threat data generated by several million endpoints from across the globe.

This is an exciting opportunity to join a growing team of industry renowned experts dedicated to providing the highest level of security service to our clients.  

What will you do?

  • Conduct proactive threat hunting services for SentinelOne clients
  • Build, evolve, and expand hunting tooling, techniques and use-cases
  • Integrate relevant threat intelligence and dark web data into hunting operations
  • Advise engineering team on platform enhancements to further enable rapid and effective threat hunting
  • Work closely with clients to remediate threats and improve long-term security posture

What experience or knowledge should you bring?

  • 10+ years experience in security engineering, SOC operations, system administration, or other cyber security relevant roles
  • 5+ years experience in digital forensic investigations, penetration testing, red teaming, threat intelligence, network threat hunting, or malware analysis
  • 2+ years experience in threat hunting via endpoint focused threat hunting
  • 3+ years working or consulting in Fortune 500 environments
  • 3+ years Python scripting experience, including:
    • API integration
    • DB integration
    • data manipulation 
    • Multiprocessing   
  • Working knowledge of git
  • Ability to create code with the best Python practices
  • Ability to work with large datasets to get valuable and vital information
  • Strong understanding of common malware activity on endpoints
  • Knowledge of MITRE ATT&CK framework and known APT group activity
  • Operating system internals knowledge (Windows, Linux, OSX)
  • Experience utilizing EDR technologies
  • Experience with working with Cyber threat Intelligence tools and data
  • Knowledge of OSINT tools and techniques
  • Working understanding of risk management programs

Why us?

You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry leading gender-neutral parental leave
  • Paid Company Holidays
  • Paid Sick Time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team building events 
This U.S. role has a base pay range that will vary based on the location of the candidate.  For some

locations, a different pay range may apply.  If so, this range will be provided to you during the recruiting

process.  You can also reach out to the recruiter with any questions.

Base Salary Range
$128,000$160,000 USD

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles. 

Required profile

Experience

Level of experience: Expert & Leadership (>10 years)
Industry :
Cybersecurity
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Related jobs