SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle.
We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!
What are we looking for?
We seek an experienced leader to lead our malware and signatures team in our detection organization.
In this role, you will lead a team of talented Windows, Linux, and macOS detection researchers that will ensure we provide the best detection, protection, and visibility capabilities to our customers at any given time.
The team does it by performing in-depth analysis and research of threats, techniques, and vulnerabilities while also being responsible for closing the loop through the development and deployment of signatures to millions of endpoints across the globe. You’ll be working closely with other detection teams to ensure our customers gets the best security products they can.
You’ll be responsible and the owner of the quality and accuracy of the deliverables that you’ll provide and be accountable for them.
Collaborate extensively with other teams to incorporate research discoveries into our endpoint security platform.
Deliver technical guidance and mentorship to empower and support the team.
Coordinate the team’s effort, deliverables, and requirements with other teams and individuals across the organization.
Plan and execute the team’s projects according to the goals and responsibilities the team has on a regular basis.
Communicate effectively and clearly with cross-functional teams to ensure alignment on objectives and priorities.
What should you bring?
Previous experience with managing detection or research teams.
Excellent understanding of OS (Windows/macOS/Linux) internals.
Several years of experience in malware analysis (both statically and dynamically)
Familiarity with the malware world (how the malware operates, techniques, infamous families).
Experience with creating detection rules using YARA or other engines.
Proven experience with reverse engineering of x86/x64 or ARM architecture.
Experienced with reverse engineering and analysis tools, such as disassemblers, compilers, and debuggers (like IDA, Ghidra, WinDBG, SysInternals, lldb, gdb, etc …).
Understanding of existing AVs internals.
Familiarity with attack simulations and their TTPs.
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.