Soc Analyst

closed
SentinelOne Logo

SentinelOne

πŸ’΅ $92k-$126k
πŸ“Remote - United States

Summary

Join SentinelOne's Security Operations (SOC) team as a Security Analyst and contribute to safeguarding our environments. You'll work alongside experienced professionals, monitoring and responding to security alerts, analyzing incidents, and maintaining 24/7 coverage. This role offers hands-on experience with security tools and the opportunity to learn from experts in the field. You'll be part of a collaborative team dedicated to defending against cyber threats and ensuring the integrity of our networks.

Requirements

  • 1+ years of experience
  • Educational background in cybersecurity, information technology, or related fields; relevant certifications are a plus but not required
  • Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
  • Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
  • Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
  • Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
  • Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
  • Exposure to common security tools, such as EDR solutions
  • Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
  • Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
  • Ability to work flexible hours to support 24/7 SOC operations
  • Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers

Responsibilities

  • Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
  • Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
  • Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
  • Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
  • Correlate information from disparate sources to develop innovative detection method

Benefits

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry-leading gender-neutral parental leave
  • Paid company holidays
  • Paid sick time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team-building events
This job is filled or no longer available