ABOUT US
At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.
WHAT ARE WE LOOKING FOR?
We are seeking a highly motivated and skilled individual to join our team as a Staff Threat (Intelligence) Researcher. The ideal new colleague should have a solid background in cybercrime investigation/threat research - incl. especially Linux and/or Cloud, and malware analysis. You will be responsible for conducting in-depth research and analysis of emerging and existing threats, provide actionable intelligence for detection, and will leverage your deep understanding of the tactics, techniques, and procedures used by ransomware operators and their ecosystem.
WHAT EXPERIENCE OR KNOWLEDGE SHOULD YOU BRING?
- Expertise in malware analysis (both static and dynamic), reverse engineering, unpacking, and deobfuscation using tools like IDA Pro, Ghidra, x64dbg, and behavioral sandboxes (Cuckoo, CAPE, etc.).
- Strong understanding of endpoint security technologies, especially EDR platforms and the internal workings of how detection signals are generated and triaged.
- Deep knowledge of operating system internals (Windows, Linux), including memory management, process/thread architecture, registry, and system calls. Familiarity with Extended Berkeley Packet Filter (eBPF) and container security is highly valued.
- Knowledge of cloud threat landscape, and threats and attacks targeting Linux, containers, and K8s.
- Experience with cloud security research/ cloud threat hunting or IR/ cloud pentesting or redteaming; and with cloud threat detection and cloud-native telemetry (AWS, Azure, GCP).
- Proficient in threat intelligence frameworks and methodologies, including the Diamond Model, MITRE ATT&CK, Kill Chain, and mapping TTPs to coverage and detection gaps.
- Strong data analysis and pattern recognition skills, able to sift through telemetry, logs, and artifacts to derive meaningful insights that drive detection hypotheses and logic.
- Skilled in programming/scripting for automation, analysis, and detection logic generation (mostly Python)
- Experience building and maintaining threat hunting playbooks, leveraging endpoint telemetry, behavior analytics, and threat intelligence to operationalize continuous threat detection.
- Comprehensive understanding of threat actor behaviors, intrusion sets, and motivations and their tooling/ecosystem.
NICE-TO-HAVE SKILLS AND QUALIFICATIONS:
- Relevant certifications such as GIAC GREM, CREA, CMA, OSCE3, or RECA.
- Familiarity with CTI enrichment platforms and tooling, such as MISP, ThreatConnect, or commercial TIPs.
- Practical experience in building detection pipelines, integrating threat intelligence with SIEM/EDR platforms.
- Contributions to open-source tools, YARA rulesets, or CTI repositories.
- Authored some blogs