MDR Cyber Security Analyst
Australia
SentinelOne
SentinelOne unites endpoint, cloud, identity, and data protection—enriched by our Security Data Lake for a seamless and efficient cybersecurity experience.About Us
At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.
What are we looking for?
Join our Vigilance organization, an elite force of cyber security experts providing a Managed Detection and Response (MDR) service to our largest customers. Help drive a world class threat monitoring, hunting and response service. Be an integral part of a 24x7 follow-the-sun global SOC, and work with key POCs, and customers, to provide an additional level of security and confidence, by leveraging intelligence feeds, threat logs and IOCs. Collaborate with our world class threat team and researchers, and various RnD teams as you help shape our product, help customers be more secure, and introduce yourself to the cyber tech ecosystem.
What will you do?
- Proactively monitor and review threats and suspicious events from customers participating in the service
- Investigate alerts, triage, deep dive and come up with proper action items and remediation plans.
- Use multiple sources of data from the customer, our intelligence cloud, external threat feeds, etc
- Perform proactive hunting for threat data, leveraging our deep visibility abilities and proprietary research cloud.
- Work with the customer to follow up on items that require additional investigation.
- Provide Incident follow up & support
- Maintain excellent customer satisfaction through professional, proactive and personal service
- Work closely with our research and development team
- Contribute to our knowledge base by creating malware analysis cookbooks and best practices
What experience or knowledge should you bring?
- At least 2 years experience with Technical Support, SOC, IR, Malware Analysis, or IT Security is a must
- Strong network and security knowledge is desired
- Experience with SQL, bash, python and powershell
- Professional and articulate with excellent written and verbal communication skills
- Ability to multitask and prioritize
- Multi OS support experience: Windows, Mac & Linux (mobile platforms - an advantage)
- Experience with incident response, computer forensic investigations, or threat hunting is a plus
- Experience with host base (endpoint agent), or sandbox (network based) security solutions is an advantage
- Be able to work a fluid and dynamic schedule to cover hours and days outside of the normal work week
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Bash Cloud Incident response Linux Malware Monitoring POCs PowerShell Python SOC SQL Windows
Perks/benefits: Career development Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.