SentinelOne is shaping the future of endpoint security through its unified converged platform that automatically prevents detects and responds to threats in real-time. Our unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviours protecting devices against advanced targeted threats in real time.
What are we looking for
We are looking for talented detection engineer people who look at the world differently who explore hunt live to beat the system and challenge it. People who can address tough security problems and deliver them quickly.
Why us
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do
You will be responsible for detecting cloud attacks in runtime. The role includes an end to end responsibility for behaviour based detection capabilities starting from researching the attack method designing rules to detect or prevent those and incorporating it into the product along with the engineering teams. You will be developing and using internal research tools PoCs and discovering new ways to detect/prevent malicious techniques. At the end of the day your deliveries will enhance the security of countless cloud workloads that are protected by our platform.
What experience or knowledge should you bring
- Experience with reverse engineering of x86/x64 binaries.
- Experience in malware analysis (statically and dynamically)
- Understanding of Linux and Containers threat landscape (including but not limited to frameworks MITRE IaaS)
- Understand Cloud Workloads infrastructure (EKS ECS Fargate etc.)
- Excellent understanding of the Linux Internals - understanding how core system components (Processes and Threads Virtual Memory and more) work behind the scenes.
- Lua experience - advantage.
- Understanding of existing AVs internals - advantage.
Required Experience:
Staff IC
SentinelOne is shaping the future of endpoint security through its unified converged platform that automatically prevents detects and responds to threats in real-time. Our unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate...
SentinelOne is shaping the future of endpoint security through its unified converged platform that automatically prevents detects and responds to threats in real-time. Our unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviours protecting devices against advanced targeted threats in real time.
What are we looking for
We are looking for talented detection engineer people who look at the world differently who explore hunt live to beat the system and challenge it. People who can address tough security problems and deliver them quickly.
Why us
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do
You will be responsible for detecting cloud attacks in runtime. The role includes an end to end responsibility for behaviour based detection capabilities starting from researching the attack method designing rules to detect or prevent those and incorporating it into the product along with the engineering teams. You will be developing and using internal research tools PoCs and discovering new ways to detect/prevent malicious techniques. At the end of the day your deliveries will enhance the security of countless cloud workloads that are protected by our platform.
What experience or knowledge should you bring
- Experience with reverse engineering of x86/x64 binaries.
- Experience in malware analysis (statically and dynamically)
- Understanding of Linux and Containers threat landscape (including but not limited to frameworks MITRE IaaS)
- Understand Cloud Workloads infrastructure (EKS ECS Fargate etc.)
- Excellent understanding of the Linux Internals - understanding how core system components (Processes and Threads Virtual Memory and more) work behind the scenes.
- Lua experience - advantage.
- Understanding of existing AVs internals - advantage.
Required Experience:
Staff IC
View more
View less