Digital Forensics Incident Response Lead (North America)

| Remote
Sorry, this job was removed at 8:57 a.m. (CST) on Saturday, September 17, 2022
Find out who’s hiring remotely Nationwide
See all Remote jobs Nationwide
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

About Us:

SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. 

We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!

About the role:
SentinelOne’s Vigilance DFIR team conducts digital forensic investigations and threat hunting operations for global clients.  Our team provides multiple levels of proactive and reactive services to our clients to include incident readiness assessments, table-top exercises, purple-team activities, full-breach investigation, malware analysis, and hunting operations.  The US Lead will report to the Global Sr. Director of DFIR and lead a team of investigators located in all US time-zones.  The selected candidate will be a strong leader, experienced investigator and endpoint-based hunter with superior technical and customer services skills. 


Major responsibilities:

  • Provide strong leadership, guidance, and engagement to our elite staff in North America.
  • Collaborate with peers and leaders in all regions to provide around the clock concierge services to our global customer base. 
  • Champion growth, evolution, and innovation within the service and within the team.
  • Accountable to ensure excellence in every engagement, to include scoping, forensic analysis, reporting, hunting, remediation consulting, and client communication.
  • Contribute as a lead investigator for engagements.  Manage all aspects of a breach response and containment investigation.
  • Technical investigative skills must include expertise in host-based forensic analysis, EDR-driven incident response, malware analysis, memory analytics, and network log investigations.
  • Provide detailed and impactful formal investigative reports, to include technical findings and security improvement recommendations.
  • Provide additional IR services, to include: 
    • Incident Response Assessments
    • Table-top exercises
    • Purple-teaming
  • Work closely with the threat intelligence team to pursue attribution, identify attack trends, innovative malicious TTPs, and contribute to community-facing publications and blogs.
  • Adopt and follow our core values amongst the team: 
    • Trust – We earn our client’s trust via technical expertise and a customer-first mindset.
    • Accountability – Every team member contributes to our group success via diligently fulfilling their assigned duties.
    • Collaboration – The Vigilance DFIR team works closely together and with our threat intelligence, research, MDR, and product teams to make every engagement a success.
    • Relentlessness – We will leave no stone unturned to provide outstanding service and fulfill our clients needs.
    • Ingenuity – If no tool exists to enable our investigations and hunts, then we will create one.  There is always a way to improve existing methodologies.
    • Community - The Vigilance team supports each other as we grow and improve ourselves and our service.



Required Knowledge & Experience:

  • 5+ years of hands-on consulting experience in threat hunting, digital forensics, and incident response.
  • 2+ years of experience in people management.
  • An ideal candidate would have notable speaking and publications in the industry and or be an active participating member within the industry.
  • Evident self-starter with intellectual curiosity and the ability to adapt to change.
  • Expert level experience with forensic investigative software.
  • Experience with EDR/XDR platforms (SentinelOne preferred).
  • Experienced conducting dynamic malware analysis and understanding of the reverse engineering process.
  • Experience with memory analytics (Volatility Preferred).
  • Experience or knowledge of conducting endpoint based threat hunting (compromise assessments).
  • Experience working with cyber threat intelligence platforms and the threat intelligence process from raw attack data to finished intel and publications.
  • Scripting ability (Python preferred).


Why us?

You will work on real-world problems and make an impact by protecting our customers from cyber threats. You will join a cutting-edge project and will be able to influence the architecture, design and structure of our core platform. You will tackle extraordinary challenges and work with the very BEST in the industry. 

  • Medical, Vision, Dental, 401(k), Commuter, and Dependent FSA
  • Unlimited PTO
  • Paid Company Assigned Holidays
  • Paid Sick Time
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team building events

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles. 

More Information on SentinelOne
SentinelOne operates in the Cybersecurity industry. The company is located in Mountain View, CA and Eugene, OR. SentinelOne was founded in 2013. It has 1050 total employees. It offers perks and benefits such as Volunteer in local community, Partners with nonprofits, Open door policy, OKR operational model, Team based strategic planning and Open office floor plan. To see all 22 open jobs at SentinelOne, click here.
Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about SentinelOneFind similar jobs