πUnited Kingdom
Soc Analyst
closed
SentinelOne
π΅ $92k-$126k
πRemote - United States
Summary
Join SentinelOne's Security Operations (SOC) team as a Security Analyst and contribute to safeguarding our environments. You'll work alongside experienced professionals, monitoring and responding to security alerts, analyzing incidents, and maintaining 24/7 coverage. This role offers hands-on experience with security tools and the opportunity to learn from experts in the field. You'll be part of a collaborative team dedicated to defending against cyber threats and ensuring the integrity of our networks.
Requirements
- 1+ years of experience
- Educational background in cybersecurity, information technology, or related fields; relevant certifications are a plus but not required
- Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
- Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
- Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
- Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
- Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
- Exposure to common security tools, such as EDR solutions
- Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
- Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
- Ability to work flexible hours to support 24/7 SOC operations
- Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers
Responsibilities
- Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
- Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
- Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
- Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
- Correlate information from disparate sources to develop innovative detection method
Benefits
- Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
- Unlimited PTO
- Industry-leading gender-neutral parental leave
- Paid company holidays
- Paid sick time
- Employee stock purchase program
- Disability and life insurance
- Employee assistance program
- Gym membership reimbursement
- Cell phone reimbursement
- Numerous company-sponsored events including regular happy hours and team-building events
This job is filled or no longer available
Similar Remote Jobs
πCzech Republic
πJapan
πWorldwide
πWorldwide
πWorldwide
πWorldwide
πWorldwide
π°$111k-$130k
πUnited States
πNew Zealand