Vigilance MDR Security Analyst

United States

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

SentinelOne

SentinelOne unites endpoint, cloud, identity, and data protection—enriched by our Security Data Lake for a seamless and efficient cybersecurity experience.

View all jobs at SentinelOne

Apply now Apply later

About Us

At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.

From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.

***Please Note the Required Work Schedule***
4x10 Shift – Wednesday through Saturday, within one of the following time zones:
10:00 PM – 9:00 AM Eastern Time
7:00 PM – 6:00 AM Pacific Time
4:00 PM – 3:00 AM Hawaii Time

The selected candidate will receive thorough training and shadowing before transitioning into this shift.

What are we looking for?

SentinelOne is looking for mid-level MDR Analysts who are inquisitive, calm under pressure, and passionate about applying their cybersecurity knowledge and skills to protect our global clients. You’ll join a supportive, globally distributed security team focused on detecting, analyzing, and responding to threats in real-time. Whether it’s tuning detections, investigating alerts, or helping our customers understand risk, you’ll be hands-on in shaping how we defend against modern threats

This isn’t a gatekeeping, ego-filled team—we believe security is a team sport. You’ll bring your expertise and grow it here, working alongside thoughtful, inclusive teammates who support one another.

What will you do?

  • Monitor and triage security threats, respond to incidents, and guide clients through remediation and mitigation efforts.
  • Collaborate with internal MDR and MDR-adjacent teams on various projects, tasks, and initiatives to improve our ability to detect and respond to threat actors.
  • Query and analyze log data using the SentinelOne Singularity Platform and become an expert in using our bespoke DFIR tools to identify and contextualize threats across EDR, cloud, and network sources.
  • Tune and provide feedback on detection rules to reduce noise and improve signal quality.
  • Write clear, detailed incident reports that communicate findings to both technical and non-technical audiences.
  • Collaborate with detection engineers, threat intel, and client teams to improve the overall quality of the MDR service.
  • Function as a force multiplier by training and mentoring fellow analysts both in one-on-one and group settings.
  • Contribute to process improvements and knowledge sharing to make the SOC better every day.

What experience or knowledge should you bring?

  • 2–4 years of experience in a SOC, IR, MDR, or similar environment.
  • A mindset that values learning, collaboration, and making things better.
  • Experience with SIEM and EDR platforms.
  • Comfort investigating alerts from tools like CrowdStrike, SentinelOne, Splunk, Rapid7, or Microsoft 365 Defender.
  • Understanding of attacker tactics (MITRE ATT&CK, phishing, lateral movement, etc.) and how to spot them.
  • Clear written and verbal communication—you can explain your thought process and back it up.

Why us?

You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry leading gender-neutral parental leave
  • Paid Company Holidays
  • Paid Sick Time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team building events

This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply.  If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.

Base Salary Range$80,000—$100,000 USD

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles. 

Apply now Apply later
Job stats:  0  0  0
Category: Analyst Jobs

Tags: Cloud CrowdStrike DFIR EDR Forensics Incident response MITRE ATT&CK SIEM SOC Splunk

Perks/benefits: Career development Equity / stock options Fitness / gym Health care Insurance Medical leave Parental leave Team events Unlimited paid time off

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.