SOC Analyst
SentinelOne
Job highlights
Summary
Join SentinelOne's Security Operations (SOC) team as a Security Analyst and contribute to the protection of our environments. You will work alongside experienced professionals, monitoring and safeguarding our systems, responding to security alerts, and maintaining 24/7 coverage. This role offers hands-on experience with security tools and technologies. You will engage in diverse responsibilities, including continuous monitoring, threat hunting, incident response, and security compliance. The position requires a minimum of one year of experience and a background in cybersecurity or a related field. SentinelOne offers a comprehensive benefits package, including medical, dental, vision, 401k, unlimited PTO, and more.
Requirements
- 1+ years of experience
- Educational background in cybersecurity, information technology, or related fields
- Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
- Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
- Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
- Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
- Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
- Exposure to common security tools, such as EDR solutions
- Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
- Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
- Ability to work flexible hours to support 24/7 SOC operations
- Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers
Responsibilities
- Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
- Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
- Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
- Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
- Correlate information from disparate sources to develop innovative detection method
Preferred Qualifications
Relevant certifications
Benefits
- Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
- Unlimited PTO
- Industry-leading gender-neutral parental leave
- Paid company holidays
- Paid sick time
- Employee stock purchase program
- Disability and life insurance
- Employee assistance program
- Gym membership reimbursement
- Cell phone reimbursement
- Numerous company-sponsored events including regular happy hours and team-building events
Share this job:
Similar Remote Jobs
- π°$48k-$70kπIreland
- πWorldwide
- πIndia
- πUnited States
- πIndia
- πWorldwide
- πUnited States
- πWorldwide
- πWorldwide