About Us:
SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle.
We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!
What Are We Looking For?
We are looking to add a Security Analyst to our Security Operations (SOC) team, eager to grow their skills in cybersecurity. In this role, you’ll work alongside experienced professionals to monitor and safeguard our environments, supporting incident response efforts by analyzing and responding to security alerts and helping maintain our 24/7 coverage. This is a great opportunity to gain hands-on experience with security tools and contribute to SentinelOne’s operations. You’ll join a collaborative team dedicated to defending against cyber threats and ensuring the integrity of our networks.
What will you do?
- Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
- Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
- Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
- Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
- Correlate information from disparate sources to develop innovative detection method
What skills and knowledge you should bring?
- 5+ years of experience
- Educational background in cybersecurity, information technology, or related fields; relevant certifications are a plus but not required
- Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
- Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
- Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
- Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
- Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
- Experience with common security tools, such as EDR solutions
- Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
- Familiarity with cloud environments and related security controls (such as AWS, GCP, Azure)
- Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
- Ability to work flexible hours to support 24/7 SOC operations and Hybrid work.
- Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers
Why Us?
You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry
- Employee stock purchase program and RSU
- Numerous company-sponsored events including regular happy hours and team-building events
- Flexible Time Off.
- Flexible Paid Sick Days.
- Global gender-neutral Parental Leave (16 weeks, beyond the leave provided by the local laws)
- Gym membership/sports gears by Cultfit.
- Wellness Coach app, with 3,000+ on-demand sessions, daily interactive classes, audiobooks, and unlimited private coaching.
- Private medical insurance plan for you and your family.
- Life Insurance covered by S1 (for employees)
- Telemedical app consultation (Practo)
- Global Employee Assistance Program (confidential counseling related to both personal and work life matters)
- High-end MacBook or Windows laptop.
- Home-office-setup allowances (one time) and maintenance allowance.
- Internet allowances.
- Provident Fund and Gratuity (as per govt clause)
- NPS contribution (Employee contribution)
- Half yearly bonus program depending on the individual and company performance.
- Above standard referral bonus as per policy.
- Udemy Business platform for Hard/Soft skills Training & Support for your further educational activities/trainings
- Sodexo food coupons.
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.