Unveiling Opportunities: Careers at SentinelOne

Job Posting

Sr. Threat Hunter

About Us

At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.

From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.

What are we looking for?

Join SetinelOne’s elite professional services division by becoming part of our proactive threat hunting program. Our Threat Hunters serve our clients by utilizing the SentinelOne platform to identify potential malware, malicious behavior, insider threats, and security hygiene issues that exist within client environments.

The Hunters’ goal is to identify threats, disrupt attacks prior to further damage occurring within a client environment, and advise for remediation as well as long-term security posture improvement. Incumbent will be responsible for identifying attack trends and threat intelligence by harvesting threat data generated by several million endpoints from across the globe.

This is an exciting opportunity to join a growing team of industry renowned experts dedicated to providing the highest level of security service to our clients.  

What will you do?

  • Conduct proactive threat hunting services for SentinelOne clients
  • Build, evolve, and expand hunting tooling, techniques and use-cases
  • Integrate relevant threat intelligence and dark web data into hunting operations
  • Advise engineering team on platform enhancements to further enable rapid and effective threat hunting
  • Work closely with clients to remediate threats and improve long-term security posture

What experience or knowledge should you bring?

  • 5+ years experience in security engineering, SOC operations, system administration, or other cyber security relevant roles
  • 5+ years experience in digital forensic investigations, penetration testing, red teaming, threat intelligence, network threat hunting, or malware analysis
  • 2+ years experience in threat hunting via endpoint focused threat hunting
  • 3+ years Python scripting experience, including:
    • API integration
    • DB integration
    • Data manipulation 
    • Multiprocessing   
  • Working knowledge of git
  • Experience with working under Scrum regime
  • Ability to create code with the best Python practices
  • Ability to work with large datasets to get valuable and vital information
  • Strong understanding of common malware activity on endpoints
  • Knowledge of MITRE ATT&CK framework and known APT group activity
  • Operating system internals knowledge (Windows, Linux, OSX)
  • Experience utilizing EDR technologies
  • Experience with working with Cyber threat Intelligence tools and data
  • Knowledge of OSINT tools and techniques


Why us?

You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry.

  • Health Benefits 
  • Industry leading gender-neutral parental leave
  • Paid Personal Time Off (PTO)
  • Paid Company Holidays
  • Paid Sick Time
  • Employee assistance program
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team building events

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles.