SOC Analyst @ SentinelOne | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
SOC Analyst jobs in United States
166 applicants
company-logo

SentinelOne · 1 day ago

SOC Analyst

ftfMaximize your interview chances
Artificial Intelligence (AI)Cyber Security
check
Growth Opportunities
badNo H1BnoteU.S. Citizen OnlynoteSecurity Clearance Requirednote

Insider Connection @SentinelOne

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
Correlate information from disparate sources to develop innovative detection method

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

CybersecurityIncident ResponseLog AnalysisSecurity FrameworksOperating SystemsNetworking FundamentalsEDR SolutionsCommand-Line Skills

Required

U.S. Citizenship is required for this position.
1+ years of experience
Educational background in cybersecurity, information technology, or related fields; relevant certifications are a plus but not required
Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
Exposure to common security tools, such as EDR solutions
Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
Ability to work flexible hours to support 24/7 SOC operations
Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers

Benefits

Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid company holidays
Paid sick time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events including regular happy hours and team-building events

Company

SentinelOne

company-logo
SentinelOne is an autonomous cybersecurity solution company.

Funding

Current Stage
Public Company
Total Funding
$696.52M
Key Investors
Tiger Global ManagementInsight PartnersRedpoint
2021-06-30Post Ipo Equity· Undisclosed
2021-06-30IPO· nyse:S
2020-11-11Series F· $267M

Leadership Team

leader-logo
Tomer Weingarten
Co-Founder and CEO
linkedin
leader-logo
Wayne Phillips
Field CTO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot