Senior Threat Intelligence Researcher

SentinelOne

SentinelOne

Brno, Czechia · South Moravian Region, Czechia

Posted on May 11, 2026

Our Purpose

At SentinelOne, we are driven by a clear purpose: to give the advantage to those who secure our future. As AI reshapes how organizations build, operate, and innovate, the responsibility to protect them becomes more critical than ever. When you join SentinelOne, your work helps protect global enterprises, critical infrastructure, and the technologies shaping tomorrow. If you are motivated by meaningful challenges and want your impact to be real, measurable, and global, you will find purpose here.

About Us

SentinelOne is a company at the intersection of AI and security, pioneering a new operating model for cybersecurity. Our AI-native platform unifies protection across endpoint, cloud, identity, data, and AI systems to deliver autonomous detection and response with clarity and speed. By combining real-time analytics, intelligent automation, and a unified data foundation, we reduce noise, simplify complexity, and empower security teams to focus on what truly matters.

Our teams are builders, problem-solvers, and innovators committed to shaping the future of security. If you are excited to solve hard problems alongside talented, mission-driven people, we invite you to help us build a safer future for humanity.

What Are We Looking For?

We’re looking for people who are relentlessly curious and committed to continuous learning. AI is reshaping every function across our business, and we enable every team member, regardless of role or level, to build fluency in AI tools and concepts. Those who thrive here actively seek out new solutions, experiment thoughtfully, and apply what they learn to drive better, faster, smarter outcomes.

As a Senior Threat Intelligence Researcher, you'll lead deep-dive investigations into both emerging & known threats, while maintaining a vigilant watch over malware developments to ensure defenses remain a step ahead of evolving attack methods. You'll put into use your ability to synthesize complex data into actionable intelligence, and to provide senior management with the clear briefings necessary to understand and mitigate potential risks. Furthermore, you'll be expected to develop refined hunting strategies (to adapt to and anticipate shifts in threat actor tactics & techniques), and to track adversary infrastructure, effectively counteracting shifts in threat actor tactics through detail-oriented investigation.

What Will You Do?

Primary responsibilities include:

  • Drive External Threat Research: Triage and evaluate findings from OSINT and lead in-depth investigations into emerging threats. Systematically evaluate signals from the global OSINT community and dark web forums to determine their fidelity, relevance, and impact.
  • Synthesize Actionable Intelligence: Transform raw data from dark web forums, leak sites, and research repositories into high-level threat briefings and risk assessments for senior stakeholders.
  • Adversary Knowledge Management: Curate and expand our internal Knowledge Base and IOCs collections.
  • Track Actor Tradecraft (TTPs): Monitor adversary behaviors across the open and deep web to identify shifts in recruitment, target selection and shifting of operations.
  • Pivot Across Infrastructure: Identify and map threat actor footprints by pivoting through domain registrations, SSL certificates, passive DNS.
  • Bridge Intelligence Gaps: Collaborate closely with Detection Engineering to translate validated OSINT findings into durable hunting logic.
  • Develop OSINT Tooling: Build and automate scrapers, monitors, and data-visualization tools to identify anomalies and track threats in external telemetry.

What Skills and Knowledge Will You Bring?

Ideal candidates will have:

  • Must haves
    • A Threat Intelligence / Threat hunting background.
    • Knowledge of the cyber threat landscape, including actors and TTPs.
    • Strong analytical skills, with the ability to identify patterns and trends in large datasets.
    • Programming skills in python and knowledge of databases (SQL, noSQL)
    • Strong knowledge of YARA to track new malware families and knowledge on validation best practices.
    • Knowledge of MITRE ATT&CK, CISA KEV, EPSS, AMITT, MISP Galaxy.
  • Strongly preferred
    • Knowledge of malware analysis tools and techniques, including static and dynamic analysis, sandboxing, and debugging.
    • Technical writing & content development skills.
  • Nice to have
    • Understanding software vulnerabilities, and ability to implement hunting strategies to track and discover them.
    • Knowledge about internal working of EDR products.
    • Relevant certifications, such as Certified Malware Analyst (CMA), Certified Reverse Engineering Analyst (CREA), or GIAC Certified Malware Reverse Engineer (GREM)

Why SentinelOne?

AI is redefining how the world operates and rewriting the rules of security in real time, and SentinelOne was built for this moment. From day one, we architected an AI-native platform designed to operate at machine speed, not as an add-on to legacy systems but as the foundation itself. If you want to build where innovation and impact move together, this is that place.

We invest in our Sentinels with comprehensive, competitive benefits designed to support you and your family:

  • Enjoy flexible hybrid work in Prague (Karlin), Brno (Clubco), or remotely across CZ/SK. Only Prague-based employees are required to work from the office at least two days per week.
  • Stock & Bonuses: Grant of Restricted Stock Units with a 4-year vesting plan, annual performance-based bonuses, and an employee stock purchase plan.
  • Time Off & Well-being: Flexible Time Off, on top of the standard 5 weeks vacation, flexible paid sick days, fully paid Short Term Sick/Nursing Leave, 16-week parental leave, grandparent leave, and additional company holidays.
  • Insurance & Health: Pension Insurance Contribution, Premium life insurance, Private medical care (for you and +1), and a Global Employee Assistance Program.
  • Work Perks: Monthly meal and well-being allowance, high-end MacBook/Windows laptop, work-from-home support, and in-office refreshments.
  • Growth & Community: LinkedIn Learning, internal mentoring, educational support, generous referral bonuses, and optional company events (sports, BBQs, charity).

Be part of an inclusive, innovative workplace that values belonging, flexibility, and growth!

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles.