πItaly
Staff Threat Researcher

SentinelOne
π΅ $52k
πRemote - Slovakia
Please let SentinelOne know you found this job on JobsCollider. Thanks! π
Summary
Join SentinelOne as a Staff Threat Researcher and lead threat intelligence initiatives, performing in-depth technical threat analysis, developing detection logic, and designing threat hunting strategies. You will curate a threat intelligence knowledge base, monitor adversary infrastructure, and collaborate with detection engineers. Responsibilities include producing intelligence reports, staying current on malware trends, and mentoring detection engineers. This role requires expertise in malware analysis, endpoint security, operating system internals, and threat intelligence frameworks. Strong data analysis and programming skills are essential.
Requirements
- Expertise in malware analysis (both static and dynamic), reverse engineering, unpacking, and deobfuscation using tools like IDA Pro, Ghidra, x64dbg, and behavioral sandboxes (Cuckoo, CAPE, etc.)
- Strong understanding of endpoint security technologies , especially EDR platforms and the internal workings of how detection signals are generated and triaged
- Deep knowledge of operating system internals (Windows, Linux), including memory management, process/thread architecture, registry, and system calls. Familiarity with Extended Berkeley Packet Filter (eBPF) and container security is highly valued
- Proficient in threat intelligence frameworks and methodologies , including the Diamond Model, MITRE ATT&CK, Kill Chain, and mapping TTPs to coverage and detection gaps
- Strong data analysis and pattern recognition skills , able to sift through telemetry, logs, and artifacts to derive meaningful insights that drive detection hypotheses and logic
- Skilled in programming/scripting for automation, analysis, and detection logic generation (mostly Python)
- Experience building and maintaining threat hunting playbooks , leveraging endpoint telemetry, behavior analytics, and threat intelligence to operationalize continuous threat detection
- Comprehensive understanding of threat actor behaviors , intrusion sets, and motivations and their tooling/ecosystem
Responsibilities
- Lead threat intelligence initiatives to proactively research, analyze, and assess emerging cyber threats, including ransomware groups, financially motivated actors with a focus on developing detection strategies
- Perform in-depth technical threat analysis , including malware reverse engineering (static/dynamic), campaign tracking, and infrastructure profiling, to inform and drive detection logic in endpoint detection and response (EDR) platforms
- Develop high-fidelity detection logic (YARA, platform rules etc) based on actionable intelligence derived from malware capabilities, actor TTPs, and behavioral patterns observed in telemetry and forensic artifacts
- Design and implement threat hunting strategies to proactively discover malicious activity, unearth novel attack patterns, and surface IOCs and BOIs across diverse environments
- Continuously curate and maintain a threat intelligence knowledge base , including actor profiles, toolsets, infrastructure usage, TTPs, and affiliations, with a special focus on tracking ransomware and their evolving ecosystems
- Monitor adversary infrastructure (C2s, exploit servers), and develop automated methods to fingerprint and track infrastructure reuse across campaigns
- Collaborate with detection engineers to align threat research with detection coverage gaps
- Produce actionable intelligence reports and detection recommendations for internal stakeholders, including concise executive briefings and deep technical analysis for detection engineering and response teams
- Stay ahead of the curve on malware trends, evasive techniques, and novel TTPs , and map findings to threat models (e.g., MITRE ATT&CK, Diamond Model) to maintain contextual awareness and detection depth
- Mentor and guide detection engineers , promoting a culture of continuous learning, collaboration, and threat-informed defense
Preferred Qualifications
- Relevant certifications such as GIAC GREM, CREA, CMA, OSCE3, or RECA
- Experience with cloud threat detection and cloud-native telemetry (AWS, Azure, GCP)
- Familiarity with CTI enrichment platforms and tooling , such as MISP, ThreatConnect, or commercial TIPs
- Practical experience in building detection pipelines , integrating threat intelligence with SIEM/EDR platforms
- Contributions to open-source tools, YARA rulesets, or CTI repositories
- Authored some blogs
Benefits
- Salary from 4000 EUR/month
- Yearly % bonus depending on the performance of the company, paid out in 2 installments
- *The final base salary component can be increased accordingly to individual skills and experience of the selected candidate
- Flexible working hours & Full remote within Slovakia ; optional membership in Regus co-working spaces; in Czechia we also have offices in Prague or Brno
- Generous employee stock plan in the form of RSUs (restricted stock units) not options; 4 years vesting with 1 year cliff and then quarterly
- Meal Allowance (maximum value of the employerβs contribution per day: β¬4.29)
- Wellbeing Allowance (β¬120/month)
- Flexible Time Off (on top of the standard 5 weeks of vacation)
- Flexible Paid Sick Days
- Fully Paid Short Term Sick/Short Term Nursing Leave
- Global gender-neutral Parental Leave (16 weeks, beyond the leave provided by the local laws) & Grandparent Leave
- Volunteering paid day off & Additional paid Company holidays off (e.g. 4 days in 2022)
- Pension insurance contribution
- Premium Life Insurance covered by S1
- Global Employee Assistance Program (confidential counseling related to both personal and work life matters), Wellness Coach:Mind Body Sleep app company access (sessions, audiobooks, classes, private coaching etc.)
- High-end MacBook or Windows laptop, Home-office-setup gear & on top of that additional WFH Allowance
- Udemy Business platform for Hard/Soft skills Training, internal mentoring 'MentorOne' & Support for your further educational activities/trainings
- Above-standard referral bonus
- Yearly bonus depending on the performance of the company
- Optional company events for those who like to meet outside of work too - mostly in Czechia expensed as business trip (sport, BBQ, charity etc.)
- DEI&B programs that promote employee resource groups like SentinelWIN (Women Inclusion Network), Blk@S1, Latinos@S1, Pan-Asian@S1, Out@S1 (LGBTQIA+) and Sentinels Who Served
Share this job:
Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Similar Remote Jobs
πPoland
πCzech Republic
πCzech Republic
πSpain
π°$26k
πUnited Kingdom
π°$148k-$234k
πUnited States

π°$150k
πWorldwide
π°$170k-$234k
πUnited States