***Please Note the Required Work Schedule***
4x10 Shift Wednesday through Saturday within one of the following time zones:
10:00 PM 9:00 AM Eastern Time
7:00 PM 6:00 AM Pacific Time
4:00 PM 3:00 AM Hawaii Time
The selected candidate will receive thorough training and shadowing before transitioning into this shift.
What are we looking for
SentinelOne is looking for mid-level MDR Analysts who are inquisitive calm under pressure and passionate about applying their cybersecurity knowledge and skills to protect our global clients. Youll join a supportive globally distributed security team focused on detecting analyzing and responding to threats in real-time. Whether its tuning detections investigating alerts or helping our customers understand risk youll be hands-on in shaping how we defend against modern threats
This isnt a gatekeeping ego-filled teamwe believe security is a team sport. Youll bring your expertise and grow it here working alongside thoughtful inclusive teammates who support one another.
What will you do
- Monitor and triage security threats respond to incidents and guide clients through remediation and mitigation efforts.
- Collaborate with internal MDR and MDR-adjacent teams on various projects tasks and initiatives to improve our ability to detect and respond to threat actors.
- Query and analyze log data using the SentinelOne Singularity Platform and become an expert in using our bespoke DFIR tools to identify and contextualize threats across EDR cloud and network sources.
- Tune and provide feedback on detection rules to reduce noise and improve signal quality.
- Write clear detailed incident reports that communicate findings to both technical and non-technical audiences.
- Collaborate with detection engineers threat intel and client teams to improve the overall quality of the MDR service.
- Function as a force multiplier by training and mentoring fellow analysts both in one-on-one and group settings.
- Contribute to process improvements and knowledge sharing to make the SOC better every day.
What experience or knowledge should you bring
- 24 years of experience in a SOC IR MDR or similar environment.
- A mindset that values learning collaboration and making things better.
- Experience with SIEM and EDR platforms.
- Comfort investigating alerts from tools like CrowdStrike SentinelOne Splunk Rapid7 or Microsoft 365 Defender.
- Understanding of attacker tactics (MITRE ATT&CK phishing lateral movement etc.) and how to spot them.
- Clear written and verbal communicationyou can explain your thought process and back it up.
Why us
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
- Medical Vision Dental 401(k) Commuter Health and Dependent FSA
- Unlimited PTO
- Industry leading gender-neutral parental leave
- Paid Company Holidays
- Paid Sick Time
- Employee stock purchase program
- Disability and life insurance
- Employee assistance program
- Gym membership reimbursement
- Cell phone reimbursement
- Numerous company-sponsored events including regular happy hours and team building events
Required Experience:
IC