SOC Analyst @ SentinelOne | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
SOC Analyst jobs in United States
62 applicants
company-logo

SentinelOne · 3 hours ago

SOC Analyst

ftfMaximize your interview chances
Artificial Intelligence (AI)Cyber Security
check
Growth Opportunities
badNo H1BnoteU.S. Citizen OnlynoteSecurity Clearance Requirednote

Insider Connection @SentinelOne

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
Correlate information from disparate sources to develop innovative detection methods

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

CybersecurityIncident ResponseLog AnalysisMITRE ATT&CKCyber Kill ChainSIEM ToolsWindowsLinuxMacOSNetworking FundamentalsPowerShellBashEDR Solutions

Required

U.S. Citizenship is required for this position.
1+ years of experience.
Educational background in cybersecurity, information technology, or related fields.
Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain.
Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools.
Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery.
Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash).
Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability).
Exposure to common security tools, such as EDR solutions.
Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents.
Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes.
Ability to work flexible hours to support 24/7 SOC operations.
Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers.

Preferred

Relevant certifications are a plus but not required.

Benefits

Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid company holidays
Paid sick time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events including regular happy hours and team-building events

Company

SentinelOne

company-logo
SentinelOne is an autonomous cybersecurity solution company.

Funding

Current Stage
Public Company
Total Funding
$696.52M
Key Investors
Tiger Global ManagementInsight PartnersRedpoint
2021-06-30Post Ipo Equity· Undisclosed
2021-06-30IPO· nyse:S
2020-11-11Series F· $267M

Leadership Team

leader-logo
Tomer Weingarten
Co-Founder and CEO
linkedin
leader-logo
Wayne Phillips
Field CTO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot