SentinelOne Logo

SentinelOne

Sr. Threat Hunter

Sorry, this job was removed at 02:12 a.m. (PST) on Friday, Dec 05, 2025
Be an Early Applicant
Remote
Hiring Remotely in United States
104K-130K Annually
Remote
Hiring Remotely in United States
104K-130K Annually

Similar Jobs

7 Days Ago
Remote or Hybrid
USA
125K-180K Annually
Senior level
125K-180K Annually
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a Sr. Threat Hunter at CrowdStrike, you will analyze intrusions using Falcon data, communicate findings, and enhance detection capabilities.
Top Skills: AWSAzureFalcon Endpoint DataKibanaLogscaleSplunk
3 Days Ago
In-Office or Remote
6 Locations
120K-140K Annually
Senior level
120K-140K Annually
Senior level
Biotech
The Senior Cybersecurity Analyst will proactively hunt for advanced threats, conduct security analyses, lead incident response, and mentor junior analysts.
Top Skills: EdrPowershellPythonSIEM
3 Days Ago
Remote
US
96K-171K Annually
Senior level
96K-171K Annually
Senior level
Insurance
The Senior Threat Hunter will analyze security data, mentor incident response teams, and design custom analysis models for threat detection. Responsibilities include collaboration with teams on hunting techniques and threats, and providing solutions for vulnerabilities.
Top Skills: ArcsightBashC/C++CrowdstrikeDnsHTTPPerlPowershellPythonSIEMSmtpSplunkTaniumTcp/IpTlsXML
About Us

At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats.

From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you.

What are we looking for?

We’re seeking an experienced threat hunter to deliver SentinelOne’s proactive threat hunting services to our Threat Hunting clients (including FedRAMP-authorized environments). You’ll build and maintain a high-quality library of hunts and rules across Windows, macOS, and Linux, with a strong emphasis on EDR telemetry (bonus if you know SentinelOne deeply). You’ll partner closely with MDR, Incident Response, Labs, and Detection Engineering to respond to emerging threats, convert research into actionable hunts, and communicate clearly with clients.

What will you do? 

Threat Hunting & Hunt Library Ownership

  • Design, implement, and continuously improve a structured library of hypothesis-driven hunts and reusable rules aligned with the ATT&CK framework.
  • Execute proactive hunts across diverse telemetry (primarily EDR) to uncover malicious activity such as living-off-the-land techniques and stealthy persistence.
  • Carry out all threat hunting activities in controlled FedRAMP environments.
  • Translate findings into repeatable playbooks, automations, and platform-ready detections where applicable.

Emerging Threat Response

  • Triage emerging threats (e.g. zero-days) and assess potential exposure.
  • Build focused hunts and detections mapped to relevant TTPs, with clear rationale and validation steps.
  • Produce concise, actionable client advisories explaining scope and potential impact of the emerging threat, recommended mitigations, and the steps being taken by SentinelOne to protect our customers.

Operational Partner Collaboration

    • Partner with Detection Engineering, MDR, Labs, and CTI to evaluate and tune rules for fidelity and coverage.
    • Curate and operationalize relevant IOCs/TTPs from CTI, Labs research, and OSINT into hunts and when appropriate convert those into platform detections.
What skills and knowledge should you bring?
  • 5+ years in security operations and/or adjacent disciplines (threat hunting, incident response, DFIR, malware analysis, SOC, or penetration testing).
  • 2+ years hands-on, hypothesis-driven threat hunting with measurable outcomes in EDR-centric environments.
  • Strong familiarity with EDR telemetry (process, file, network, persistence)—SentinelOne experience is a plus.
  • Proficiency with Python and Git/GitHub workflows (branches, PRs, code review); ability to turn hunt logic into robust, reusable code.
  • Broad OS internals knowledge across Windows, Linux, and macOS.
  • Applied CTI skills: consume and operationalize IOCs/TTPs; track actors/campaigns; pivot with OSINT to enrich hunts.
  • Experience collaborating with cross-functional teams (MDR, IR, Labs, Detection Engineering) to cycle from research → hunt → detection → outcome.
  • Clear, concise writing and reporting for client-facing communications (advisories, AARs, executive summaries), and comfort presenting technical analysis directly to clients when necessary.
  • Familiarity with MITRE ATT&CK and mapping hunts to relevant techniques 
  • U.S. citizenship required due to FedRAMP program requirements.
Why us? 

You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.

  • Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
  • Unlimited PTO
  • Industry-leading gender-neutral parental leave
  • Paid Company Holidays
  • Paid Sick Time
  • Employee stock purchase program
  • Disability and life insurance
  • Employee assistance program
  • Gym membership reimbursement
  • Cell phone reimbursement

This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply.  If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.

Base Salary Range
$104,000$130,000 USD

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles. 

What you need to know about the Seattle Tech Scene

Home to tech titans like Microsoft and Amazon, Seattle punches far above its weight in innovation. But its surrounding mountains, sprinkled with world-famous hiking trails and climbing routes, make the city a destination for outdoorsy types as well. Established as a logging town before shifting to shipbuilding and logistics, the Emerald City is now known for its contributions to aerospace, software, biotech and cloud computing. And its status as a thriving tech ecosystem is attracting out-of-town companies looking to establish new tech and engineering hubs.

Key Facts About Seattle Tech

  • Number of Tech Workers: 287,000; 13% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Amazon, Microsoft, Meta, Google
  • Key Industries: Artificial intelligence, cloud computing, software, biotechnology, game development
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Madrona, Fuse, Tola, Maveron
  • Research Centers and Universities: University of Washington, Seattle University, Seattle Pacific University, Allen Institute for Brain Science, Bill & Melinda Gates Foundation, Seattle Children’s Research Institute

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account