SOC Analyst

Logo of SentinelOne

SentinelOne

πŸ’΅ $80k-$110k
πŸ“Remote - United States

Job highlights

Summary

Join SentinelOne's Security Operations (SOC) team as a Security Analyst and contribute to the protection of our environments. You will work alongside experienced professionals, monitoring and safeguarding our systems, responding to security alerts, and maintaining 24/7 coverage. This role offers hands-on experience with security tools and technologies. You will engage in diverse responsibilities, including continuous monitoring, threat hunting, incident response, and security compliance. The position requires a minimum of one year of experience and a background in cybersecurity or a related field. SentinelOne offers a comprehensive benefits package, including medical, dental, vision, 401k, unlimited PTO, and more.

Requirements

  • 1+ years of experience
  • Educational background in cybersecurity, information technology, or related fields
  • Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
  • Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
  • Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
  • Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
  • Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
  • Exposure to common security tools, such as EDR solutions
  • Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
  • Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
  • Ability to work flexible hours to support 24/7 SOC operations
  • Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers

Responsibilities

  • Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
  • Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
  • Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
  • Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
  • Correlate information from disparate sources to develop innovative detection method

Preferred Qualifications

Relevant certifications

Benefits

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry-leading gender-neutral parental leave
  • Paid company holidays
  • Paid sick time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team-building events

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Please let SentinelOne know you found this job on JobsCollider. Thanks! πŸ™