About Us
At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.
What are we looking for?
SentinelOne’s Vigilance DFIR team conducts digital forensic investigations and threat hunting operations for global clients. Our team provides multiple levels of proactive and reactive services to our clients to include incident readiness assessments, table-top exercises, purple-team activities, full-breach investigation, malware analysis, and hunting operations. The selected candidate will be an experienced investigator and endpoint-based hunter with superior technical, malware reverse engineering, and customer services skills.
What will you do?
- Accountable to ensure excellence in every engagement, to include scoping, forensic analysis, reporting, hunting, remediation consulting, and client communication.
- Analyze malware, exploits and other suspicious files from DFIR cases to add context and threat intelligence, including performing deep reverse engineering analysis to understand malware functionality and attack vectors.
- Perform oversight on identified IOCs and enrich context when necessary through comprehensive malware reverse engineering.
- Augment both the forensics processing pipeline and malware analysis infrastructure with new tools and scenarios to streamline reverse engineering workflows.
- Spearhead efforts to publish blogs on unique threats, relevant DFIR cases, and new forensic discoveries during incidents, with emphasis on malware reverse engineering findings.
- Contribute as a lead investigator for engagements. Manage all aspects of a breach response and containment investigation.
- Technical investigative skills must include host-based forensic analysis, EDR-driven incident response, malware analysis, memory analytics, and network log investigations.
- Provide detailed and impactful formal investigative reports, to include technical findings and security improvement recommendations.
- Work closely with the threat intelligence team to pursue attribution, identify attack trends, innovative malicious TTPs, and contribute to community-facing publications and blogs.
What skills and knowledge should you bring?
- 4+ years of hands-on consulting experience in threat hunting, digital forensics, and incident response.
- Malware reverse engineering skills using tools such as IDA Pro, Ghidra, x64dbg, or similar disassemblers and debuggers.
- Proficiency in static and dynamic malware analysis techniques, including unpacking, deobfuscation, and behavioral analysis.
- Experience with scripting languages (Python, PowerShell) for automation of reverse engineering tasks and malware analysis workflows.
- Advanced experience conducting dynamic malware analysis in sandboxed environments and deep understanding of the complete reverse engineering process.
- Knowledge of various malware families, attack frameworks, and ability to identify new or modified variants through reverse engineering analysis.
- Understanding of Windows/Linux internals, assembly language, and common evasion techniques employed by modern malware.
- Experience with forensic investigative software.
- Experience with EDR/XDR platforms (SentinelOne preferred).
- Experience with memory analytics (Volatility Preferred).
- Experience or knowledge of conducting endpoint based threat hunting (compromise assessments).
- Experience working with cyber threat intelligence platforms and the threat intelligence process from raw attack data to finished intel and publications.
Why us?
You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.
- Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
- Unlimited PTO
- Industry leading gender-neutral parental leave
- Paid Company Holidays
- Paid Sick Time
- Employee stock purchase program
- Disability and life insurance
- Employee assistance program
- Gym membership reimbursement
- Cell phone reimbursement
- Numerous company-sponsored events including regular happy hours and team building events
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range
$128,800—$160,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.