Soc Analyst

closed
SentinelOne Logo

SentinelOne

πŸ’΅ $80k-$110k
πŸ“Remote - United States

Summary

Join SentinelOne's Security Operations (SOC) team as a Security Analyst and contribute to the protection of our environments. You will work alongside experienced professionals, monitoring and safeguarding our systems, responding to security alerts, and maintaining 24/7 coverage. This role offers hands-on experience with security tools and technologies. You will engage in diverse responsibilities, including continuous monitoring, threat hunting, incident response, and security compliance. The position requires a minimum of one year of experience and a background in cybersecurity or a related field. SentinelOne offers a comprehensive benefits package, including medical, dental, vision, 401k, unlimited PTO, and more.

Requirements

  • 1+ years of experience
  • Educational background in cybersecurity, information technology, or related fields
  • Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
  • Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
  • Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
  • Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
  • Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
  • Exposure to common security tools, such as EDR solutions
  • Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
  • Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
  • Ability to work flexible hours to support 24/7 SOC operations
  • Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers

Responsibilities

  • Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
  • Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
  • Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
  • Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
  • Correlate information from disparate sources to develop innovative detection method

Preferred Qualifications

Relevant certifications

Benefits

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry-leading gender-neutral parental leave
  • Paid company holidays
  • Paid sick time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team-building events
This job is filled or no longer available