refresh

トレンド企業

トレンド企業

採用

求人SentinelOne

Threat Hunter

SentinelOne

Threat Hunter

SentinelOne

United States

·

On-site

·

Full-time

·

5d ago

Our Purpose

At Sentinel One, we are driven by a clear purpose: to give the advantage to those who secure our future. As AI reshapes how organizations build, operate, and innovate, the responsibility to protect them becomes more critical than ever. When you join Sentinel One, your work helps protect global enterprises, critical infrastructure, and the technologies shaping tomorrow. If you are motivated by meaningful challenges and want your impact to be real, measurable, and global, you will find purpose here.

About Us

Sentinel One is a company at the intersection of AI and security, pioneering a new operating model for cybersecurity. Our AI-native platform unifies protection across endpoint, cloud, identity, data, and AI systems to deliver autonomous detection and response with clarity and speed. By combining real-time analytics, intelligent automation, and a unified data foundation, we reduce noise, simplify complexity, and empower security teams to focus on what truly matters.

Our teams are builders, problem-solvers, and innovators committed to shaping the future of security. If you are excited to solve hard problems alongside talented, mission-driven people, we invite you to help us build a safer future for humanity.

What Are We Looking For?

We’re looking for people who are relentlessly curious and committed to continuous learning. AI is reshaping every function across our business, and we enable every team member, regardless of role or level, to build fluency in AI tools and concepts. Those who thrive here actively seek out new solutions, experiment thoughtfully, and apply what they learn to drive better, faster, smarter outcomes.

As an experienced threat hunter, you will be tasked with delivering Sentinel One’s proactive threat hunting services to our Threat Hunting clients (including FedRAMP-authorized environments). You’ll build and maintain a high-quality library of hunts and rules across Windows, macOS, and Linux, with a strong emphasis on EDR telemetry (bonus if you know Sentinel One deeply). You’ll partner closely with MDR, Incident Response, Labs, and Detection Engineering to respond to emerging threats, convert research into actionable hunts, and communicate clearly with clients.

What will you do?

Threat Hunting & Hunt Library Ownership

  • Design, implement, and continuously improve a structured library of hypothesis-driven hunts and reusable rules aligned with the ATT&CK framework.
  • Execute proactive hunts across diverse telemetry (primarily EDR) to uncover malicious activity such as living-off-the-land techniques and stealthy persistence.
  • Carry out all threat hunting activities in controlled FedRAMP environments.
  • Translate findings into repeatable playbooks, automations, and platform-ready detections where applicable.

Emerging Threat Response

  • Triage emerging threats (e.g. zero-days) and assess potential exposure.
  • Build focused hunts and detections mapped to relevant TTPs, with clear rationale and validation steps.
  • Produce concise, actionable client advisories explaining scope and potential impact of the emerging threat, recommended mitigations, and the steps being taken by Sentinel One to protect our customers.

Operational Partner Collaboration

  • Partner with Detection Engineering, MDR, Labs, and CTI to evaluate and tune rules for fidelity and coverage.
  • Curate and operationalize relevant IOCs/TTPs from CTI, Labs research, and OSINT into hunts and when appropriate convert those into platform detections.

What experience or knowledge should you bring?

  • 3+ years in security operations and/or adjacent disciplines (threat hunting, incident response, DFIR, malware analysis, SOC, or penetration testing).
  • Strong familiarity with EDR telemetry (process, file, network, persistence)—Sentinel One experience is a plus.
  • Proficiency with Python and Git/GitHub workflows (branches, PRs, code review); ability to turn hunt logic into robust, reusable code.
  • Broad OS internals knowledge across Windows, Linux, and macOS.
  • Applied CTI skills: consume and operationalize IOCs/TTPs; track actors/campaigns; pivot with OSINT to enrich hunts.
  • Experience collaborating with cross-functional teams (MDR, IR, Labs, Detection Engineering) to cycle from research → hunt → detection → outcome.
  • Clear, concise writing and reporting for client-facing communications (advisories, AARs, executive summaries), and comfort presenting technical analysis directly to clients when necessary.
  • Familiarity with MITRE ATT&CK and mapping hunts to relevant techniques
  • U.S. citizenship required due to FedRAMP program requirements.

Why Sentinel One?

AI is redefining how the world operates and rewriting the rules of security in real time, and Sentinel One was built for this moment. From day one, we architected an AI-native platform designed to operate at machine speed, not as an add-on to legacy systems but as the foundation itself. If you want to build where innovation and impact move together, this is that place.

We invest in our Sentinels with comprehensive, competitive benefits designed to support you and your family:

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Leading Total Rewards including Restricted Stock Program
  • 16-weeks of gender-neutral parental leave
  • Paid company holidays and sick time
  • Flexible working hours
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Internet/Mobile allowance
  • Learning & development at every level for every function
  • Opportunity to strengthen communities globally through our S Foundation

This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.

Base Salary Range:

$84,000—$110,000 USD

Sentinel One is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

Sentinel One participates in the E-Verify Program for all U.S. based roles.

総閲覧数

0

応募クリック数

0

模擬応募者数

0

スクラップ

0

SentinelOneについて

SentinelOne

SentinelOne, Inc. is an American cybersecurity company listed on NYSE based in Mountain View, California. The company was founded in 2013 by Tomer Weingarten, Almog Cohen and Ehud ("Udi") Shamir. Weingarten acts as the company's CEO.

1,001-5,000

従業員数

Mountain View

本社所在地

$1.1B

企業価値

レビュー

3.5

10件のレビュー

ワークライフバランス

2.8

報酬

4.0

企業文化

3.9

キャリア

3.2

経営陣

2.3

65%

友人に勧める

良い点

Supportive and collaborative team environment

Innovative technology and cutting-edge products

Competitive salary and excellent benefits

改善点

Poor management communication and leadership

Work-life balance challenges and long hours

Fast-paced stressful environment with high expectations

給与レンジ

54件のデータ

Junior/L3

Junior/L3 · Cybersecurity Analyst

0件のレポート

$302,000

年収総額

基本給

-

ストック

-

ボーナス

-

$256,700

$347,300

面接体験

3件の面接

難易度

3.0

/ 5

期間

14-28週間

体験

ポジティブ 0%

普通 67%

ネガティブ 33%

面接プロセス

1

Application Review

2

Recruiter Screen

3

Hiring Manager Interview

4

Technical/Role-Specific Interview

5

Final Round Interview

6

Offer

よくある質問

Behavioral/STAR

Past Experience

Technical Knowledge

Culture Fit

Role-Specific Scenarios