Start Date
Immediate
Expiry Date
25 Jul, 25
Salary
0.0
Posted On
26 Apr, 25
Experience
3 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
C++, Components, Windows Internals, Assembly, Ida, Windows, Edr, C, Windbg, Reverse Engineering, Security Research, Epp, Threads, Ipc, Memory Management
Industry
Information Technology/IT
ABOUT US
At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.
WHAT ARE WE LOOKING FOR?
We are looking for talented security researchers, people who look at the world differently, who explore, “hunt” and live to beat the system and challenge it. People who are in pursuit of outsmarting the malware and overcoming it.
WHAT EXPERIENCE OR KNOWLEDGE SHOULD YOU BRING?
You’ll be part of an exceptional research team that will ensure we provide the best detection, protection, and visibility capabilities to our customers at any given time. The team leads the vulnerabilities, exploits and anti-tampering research for all of our security products under the Windows platforms. The team does it by performing in-depth analysis and research of vulnerabilities and exploits, while also being responsible for closing the loop through the development and deployment of detection assets to millions of endpoints across the globe. You’ll be working closely with other detection teams to ensure our customers get the best security products they can. Your time will be focus on research and detection & protection assets.
Research
Assessing and evaluating our detection and protection coverage against in the wild vulnerabilities, exploits, and anti-tampering techniques.
Detection And Protection assets
You will also be encouraged to write white papers, blogs, and articles (but only if you wish to).