Sr. Threat Hunter - SentinelOne
View Company Profile- Job Title
- Sr. Threat Hunter
- Job Location
- United States
- Job Description
About Us
At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.
What are we looking for?
We’re seeking an experienced threat hunter to deliver SentinelOne’s proactive threat hunting services to our Threat Hunting clients (including FedRAMP-authorized environments). You’ll build and maintain a high-quality library of hunts and rules across Windows, macOS, and Linux, with a strong emphasis on EDR telemetry (bonus if you know SentinelOne deeply). You’ll partner closely with MDR, Incident Response, Labs, and Detection Engineering to respond to emerging threats, convert research into actionable hunts, and communicate clearly with clients.
What will you do?
Threat Hunting & Hunt Library Ownership
- Design, implement, and continuously improve a structured library of hypothesis-driven hunts and reusable rules aligned with the ATT&CK framework.
- Execute proactive hunts across diverse telemetry (primarily EDR) to uncover malicious activity such as living-off-the-land techniques and stealthy persistence.
- Carry out all threat hunting activities in controlled FedRAMP environments.
- Translate findings into repeatable playbooks, automations, and platform-ready detections where applicable.
Emerging Threat Response
- Triage emerging threats (e.g. zero-days) and assess potential exposure.
- Build focused hunts and detections mapped to relevant TTPs, with clear rationale and validation steps.
- Produce concise, actionable client advisories explaining scope and potential impact of the emerging threat, recommended mitigations, and the steps being taken by SentinelOne to protect our customers.
Operational Partner Collaboration
-
- Partner with Detection Engineering, MDR, Labs, and CTI to evaluate and tune rules for fidelity and coverage.
- Curate and operationalize relevant IOCs/TTPs from CTI, Labs research, and OSINT into hunts and when appropriate convert those into platform detections.
What skills and knowledge should you bring?
- 5+ years in security operations and/or adjacent disciplines (threat hunting, incident response, DFIR, malware analysis, SOC, or penetration testing).
- 2+ years hands-on, hypothesis-driven threat hunting with measurable outcomes in EDR-centric environments.
- Strong familiarity with EDR telemetry (process, file, network, persistence)—SentinelOne experience is a plus.
- Proficiency with Python and Git/GitHub workflows (branches, PRs, code review); ability to turn hunt logic into robust, reusable code.
- Broad OS internals knowledge across Windows, Linux, and macOS.
- Applied CTI skills: consume and operationalize IOCs/TTPs; track actors/campaigns; pivot with OSINT to enrich hunts.
- Experience collaborating with cross-functional teams (MDR, IR, Labs, Detection Engineering) to cycle from research → hunt → detection → outcome.
- Clear, concise writing and reporting for client-facing communications (advisories, AARs, executive summaries), and comfort presenting technical analysis directly to clients when necessary.
- Familiarity with MITRE ATT&CK and mapping hunts to relevant techniques
- U.S. citizenship required due to FedRAMP program requirements.
Why us?
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
- Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
- Unlimited PTO
- Industry-leading gender-neutral parental leave
- Paid Company Holidays
- Paid Sick Time
- Employee stock purchase program
- Disability and life insurance
- Employee assistance program
- Gym membership reimbursement
- Cell phone reimbursement
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range$104,000—$130,000 USDSentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
Everything You Need, One Platform.
From job listings to startups, investors to funding rounds, and everything in between, Employbl puts the power in your hands. Why wait?
Start your free trial today!Stay Ahead of the Curve
Sign up for our newsletter to stay informed about the latest startups and trends in the tech market. Let Employbl be your guide to success.
SentinelOne Company Size
Between 2,800 - 2,800 employees
SentinelOne Founded Year
2013
SentinelOne Total Amount Raised
$696,520,000
SentinelOne Funding Rounds
View funding detailsIPO
$0
Series F
$267,000,000 USD
Series E
$200,000,000 USD
Series D
$120,000,000 USD
Series C
$70,000,000 USD
Series B
$25,000,000 USD
Series A
$12,000,000 USD
Seed
$2,500,000 USD
Seed
$20,000 USD