SentinelOne · 11 hours ago
MDR Threat Analyst
Maximize your interview chances
Artificial Intelligence (AI)Cyber Security
Growth OpportunitiesH1B Sponsor Likely
Insider Connection @SentinelOne
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Detection Engineering: Responsible for the curation of all MDR detection capabilities in order to maximize threat detection coverage while minimizing overall alert volume, including:
Ongoing reporting and analysis of the efficacy of all existing detection capabilities.
Partnering with SentinelOne detection engineering and threat intelligence teams to improve these detection capabilities, as needed.
Proactively identifying additional detection capabilities/sources for possible inclusion in MDR service scope.
Emerging Threat Response support:
Supporting the overall SentinelOne response to new emerging threats (such as ‘zero day’ vulnerabilities and supply chain attacks).
Partnering with other internal stakeholders to share information and coordinate the response to these emerging threats.
Identifying the appropriate actions that can be performed by the MDR team to effectively protect customers against these emerging threats.
Developing communications to customers about these emerging threats, and the steps we are taking to protect them.
Threat Intelligence:
Curate threat intelligence (IOCs and TTPs) identified by the MDR team, and partner with other teams to integrate this intelligence into SentinelOne products and services.
Integrate relevant threat intelligence and research from other SentinelOne groups into MDR operations.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
At least 5 years of experience as a security operations practitioner, with a focus on one or more of the following areas: SOC operations, security monitoring, incident investigation and response, malware analysis, threat hunting, and threat intelligence.
A detailed technical understanding of the current threat landscape, including widely used attacker TTPs and prominent threat actor groups.
Prior experience developing and/or tuning existing detection capabilities (SIEM/EDR/NDR detections).
Previous Managed Services/MDR experience.
Previous experience developing operational metrics/dashboards/reports, with a focus on detection/alert fidelity.
Familiarity with the MITRE ATT&CK framework.
Benefits
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events including regular happy hours and team building events
Company
SentinelOne
SentinelOne is an autonomous cybersecurity solution company.
H1B Sponsorship
SentinelOne has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (2)
2022 (16)
2021 (7)
Funding
Current Stage
Public CompanyTotal Funding
$696.52MKey Investors
Tiger Global ManagementInsight PartnersRedpoint
2021-06-30Post Ipo Equity· undefined
2021-06-30IPO· undefined
2020-11-11Series F· $267M
Recent News
2024-11-14
2024-11-12
Company data provided by crunchbase