Soc Analyst

  • $92k-$126k
  • Remote - United States

Remote

Cybersecurity

Mid-level

Job description

About Us

At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.

From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.

Due to Federal Government contract requirements, U.S. Citizenship is required for this position.

FedRamp Staff may be subject to customer or third party background checks up to and including Secret Clearance if required by their role at SentinelOne.

Needs to work non-standard hours (including substituting at least 1 M-F workday for 1 weekend day).

What Are We Looking For?

We are looking to add a Security Analyst to our Security Operations (SOC) team, eager to grow their skills in cybersecurity. In this role, you’ll work alongside experienced professionals to monitor and safeguard our environments, supporting incident response efforts by analyzing and responding to security alerts and helping maintain our 247 coverage. This is a great opportunity to gain hands-on experience with security tools and contribute to SentinelOne’s operations. You’ll join a collaborative team dedicated to defending against cyber threats and ensuring the integrity of our networks.

What will you do?

  • Engage in diverse responsibilities within the SentinelOne SOC, encompassing continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response
  • Provide support throughout all stages of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity
  • Identify areas for improvement and automation within the SOC and spearhead initiatives to implement your ideas
  • Recognize and propose solutions for gaps in current capabilities, visibility, and security posture
  • Correlate information from disparate sources to develop innovative detection method

What skills and knowledge should you bring?

  • 1+ years of experience
  • Educational background in cybersecurity, information technology, or related fields; relevant certifications are a plus but not required
  • Basic familiarity with security frameworks and threat models like MITRE ATT&CK and Cyber Kill Chain
  • Hands-on experience with log and event analysis, including the ability to filter, organize, and interpret data from SIEMs or log aggregation tools
  • Fundamental understanding of the incident response process, with a willingness to learn the phases of detection, containment, and recovery
  • Working knowledge of common operating systems (Windows, Linux, macOS) and basic command-line skills (PowerShell, Bash)
  • Basic understanding of networking fundamentals (e.g., IP addressing, DNS, VPNs, firewalls, ports) and security concepts (e.g., confidentiality, integrity, and availability)
  • Exposure to common security tools, such as EDR solutions
  • Demonstrated ability to think critically and solve problems under guidance, with a strong interest in learning to detect and investigate security incidents
  • Commitment to continuous learning and the ability to adapt to new technologies, threats, and processes
  • Ability to work flexible hours to support 247 SOC operations
  • Clear, concise communication skills, especially for documenting security events and reporting findings to team members and managers

Why Us?

You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry-leading gender-neutral parental leave
  • Paid company holidays
  • Paid sick time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team-building events

This U.S. role has a base pay range that will vary based on the location of the candidate.  For some

locations, a different pay range may apply.  If so, this range will be provided to you during the recruiting

process.  You can also reach out to the recruiter with any questions.

Base Salary Range

$92,000—$126,500 USD

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles.

Share this job:
Please let SentinelOne know you found this job on Remote First Jobs 🙏
Apply now