热门公司

招聘

职位SentinelOne

Threat Hunter

SentinelOne

Threat Hunter

SentinelOne

United States

·

On-site

·

Full-time

·

5d ago

Our Purpose

At Sentinel One, we are driven by a clear purpose: to give the advantage to those who secure our future. As AI reshapes how organizations build, operate, and innovate, the responsibility to protect them becomes more critical than ever. When you join Sentinel One, your work helps protect global enterprises, critical infrastructure, and the technologies shaping tomorrow. If you are motivated by meaningful challenges and want your impact to be real, measurable, and global, you will find purpose here.

About Us

Sentinel One is a company at the intersection of AI and security, pioneering a new operating model for cybersecurity. Our AI-native platform unifies protection across endpoint, cloud, identity, data, and AI systems to deliver autonomous detection and response with clarity and speed. By combining real-time analytics, intelligent automation, and a unified data foundation, we reduce noise, simplify complexity, and empower security teams to focus on what truly matters.

Our teams are builders, problem-solvers, and innovators committed to shaping the future of security. If you are excited to solve hard problems alongside talented, mission-driven people, we invite you to help us build a safer future for humanity.

What Are We Looking For?

We’re looking for people who are relentlessly curious and committed to continuous learning. AI is reshaping every function across our business, and we enable every team member, regardless of role or level, to build fluency in AI tools and concepts. Those who thrive here actively seek out new solutions, experiment thoughtfully, and apply what they learn to drive better, faster, smarter outcomes.

As an experienced threat hunter, you will be tasked with delivering Sentinel One’s proactive threat hunting services to our Threat Hunting clients (including FedRAMP-authorized environments). You’ll build and maintain a high-quality library of hunts and rules across Windows, macOS, and Linux, with a strong emphasis on EDR telemetry (bonus if you know Sentinel One deeply). You’ll partner closely with MDR, Incident Response, Labs, and Detection Engineering to respond to emerging threats, convert research into actionable hunts, and communicate clearly with clients.

What will you do?

Threat Hunting & Hunt Library Ownership

  • Design, implement, and continuously improve a structured library of hypothesis-driven hunts and reusable rules aligned with the ATT&CK framework.
  • Execute proactive hunts across diverse telemetry (primarily EDR) to uncover malicious activity such as living-off-the-land techniques and stealthy persistence.
  • Carry out all threat hunting activities in controlled FedRAMP environments.
  • Translate findings into repeatable playbooks, automations, and platform-ready detections where applicable.

Emerging Threat Response

  • Triage emerging threats (e.g. zero-days) and assess potential exposure.
  • Build focused hunts and detections mapped to relevant TTPs, with clear rationale and validation steps.
  • Produce concise, actionable client advisories explaining scope and potential impact of the emerging threat, recommended mitigations, and the steps being taken by Sentinel One to protect our customers.

Operational Partner Collaboration

  • Partner with Detection Engineering, MDR, Labs, and CTI to evaluate and tune rules for fidelity and coverage.
  • Curate and operationalize relevant IOCs/TTPs from CTI, Labs research, and OSINT into hunts and when appropriate convert those into platform detections.

What experience or knowledge should you bring?

  • 3+ years in security operations and/or adjacent disciplines (threat hunting, incident response, DFIR, malware analysis, SOC, or penetration testing).
  • Strong familiarity with EDR telemetry (process, file, network, persistence)—Sentinel One experience is a plus.
  • Proficiency with Python and Git/GitHub workflows (branches, PRs, code review); ability to turn hunt logic into robust, reusable code.
  • Broad OS internals knowledge across Windows, Linux, and macOS.
  • Applied CTI skills: consume and operationalize IOCs/TTPs; track actors/campaigns; pivot with OSINT to enrich hunts.
  • Experience collaborating with cross-functional teams (MDR, IR, Labs, Detection Engineering) to cycle from research → hunt → detection → outcome.
  • Clear, concise writing and reporting for client-facing communications (advisories, AARs, executive summaries), and comfort presenting technical analysis directly to clients when necessary.
  • Familiarity with MITRE ATT&CK and mapping hunts to relevant techniques
  • U.S. citizenship required due to FedRAMP program requirements.

Why Sentinel One?

AI is redefining how the world operates and rewriting the rules of security in real time, and Sentinel One was built for this moment. From day one, we architected an AI-native platform designed to operate at machine speed, not as an add-on to legacy systems but as the foundation itself. If you want to build where innovation and impact move together, this is that place.

We invest in our Sentinels with comprehensive, competitive benefits designed to support you and your family:

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Leading Total Rewards including Restricted Stock Program
  • 16-weeks of gender-neutral parental leave
  • Paid company holidays and sick time
  • Flexible working hours
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Internet/Mobile allowance
  • Learning & development at every level for every function
  • Opportunity to strengthen communities globally through our S Foundation

This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.

Base Salary Range:

$84,000—$110,000 USD

Sentinel One is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

Sentinel One participates in the E-Verify Program for all U.S. based roles.

总浏览量

0

申请点击数

0

模拟申请者数

0

收藏

0

关于SentinelOne

SentinelOne

SentinelOne, Inc. is an American cybersecurity company listed on NYSE based in Mountain View, California. The company was founded in 2013 by Tomer Weingarten, Almog Cohen and Ehud ("Udi") Shamir. Weingarten acts as the company's CEO.

1,001-5,000

员工数

Mountain View

总部位置

$1.1B

企业估值

评价

3.5

10条评价

工作生活平衡

2.8

薪酬

4.0

企业文化

3.9

职业发展

3.2

管理层

2.3

65%

推荐给朋友

优点

Supportive and collaborative team environment

Innovative technology and cutting-edge products

Competitive salary and excellent benefits

缺点

Poor management communication and leadership

Work-life balance challenges and long hours

Fast-paced stressful environment with high expectations

薪资范围

54个数据点

Junior/L3

Junior/L3 · Cybersecurity Analyst

0份报告

$302,000

年薪总额

基本工资

-

股票

-

奖金

-

$256,700

$347,300

面试经验

3次面试

难度

3.0

/ 5

时长

14-28周

体验

正面 0%

中性 67%

负面 33%

面试流程

1

Application Review

2

Recruiter Screen

3

Hiring Manager Interview

4

Technical/Role-Specific Interview

5

Final Round Interview

6

Offer

常见问题

Behavioral/STAR

Past Experience

Technical Knowledge

Culture Fit

Role-Specific Scenarios