DFIR Engagement Manager

Posted 5 Days Ago
Be an Early Applicant
Australia
Senior level
Information Technology • Security • Cybersecurity
The Role
The DFIR Engagement Manager at SentinelOne will lead cybersecurity incident investigations, manage client interactions, and ensure high-quality deliverables. Responsibilities include overseeing investigations, collaborating with stakeholders, and conducting technical analysis, while promoting team collaboration and adherence to best practices.
Summary Generated by Built In

About Us:

SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. 

We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!

What are we looking for?

SentinelOne’s DFIR team conducts digital forensics investigations, incident response, and breach readiness engagements for global clients.  Our team provides comprehensive proactive and reactive services, including incident readiness assessments, tabletop exercises, purple-team activities, full-breach investigations, malware analysis, and threat-hunting operations. This role will support the reactive DFIR services, managing the overall success of cyber incident investigations. In this role, you will work with our global team of DFIR analysts and serve as the point of contact with customers throughout the entirety of an investigation. The ideal candidate will be an experienced leader with technical expertise and exceptional client management skills.  

What will you do?

  • Lead business development activities including scoping, requirements gathering, and contract development
  • Collaborate with account teams and internal and external legal counsel to ensure service agreements and statements of work are in place
  • Handle high-stakes client interactions involving legal counsel or executive stakeholders
  • Oversee active DFIR investigations, ensuring exceptional quality and timeliness of deliverables
  • Establish and maintain clear communication channels with all stakeholders
  • Manage DFIR investigation objectives, timelines, resource allocation
  • Coordinate cross-functional teams including internal resources and external vendors
  • Handle escalations and resolve technical or operational challenges
  • Ensure proper evidence handling and documentation throughout investigations
  • Maintain oversight of case documentation and artifact archival
  • Ensure adherence to standard operating procedures and best practices
  • Lead post-engagement reviews and process improvement initiatives
  • Conduct technical analysis including endpoint forensics, log analysis, and threat-hunting when required
  • Maintain flexibility with schedule and participate in weekend and holiday on-call schedule
  • Adopt and follow our core values amongst the team: 
    • Trust – We earn our client’s trust via technical expertise and a customer-first mindset.
    • Accountability – Every team member contributes to our group success via diligently fulfilling their assigned duties.
    • Collaboration—The DFIR team works closely with our threat intelligence, research, MDR, and product teams to ensure the success of every investigation.
    • Relentlessness – We will leave no stone unturned to provide outstanding service and fulfill our client's needs.
    • Ingenuity – If no tool or process exists to enable our investigations and hunts, then we will create one.  There is always a way to improve existing methodologies.
    • Community - The DFIR team supports each other as we grow and improve ourselves and our service.

What skills and knowledge should you bring?

  • 5+ years of hands-on consulting experience in digital forensics and incident response
  • Proven track record of managing complex incident response engagements
  • Expert-level experience with industry-standard forensic tools and methodologies
  • Strong understanding of and experience with EDR/XDR platforms and security technologies
  • Experience conducting malware analysis and memory forensics preferred
  • Demonstrated experience in endpoint-based threat-hunting and compromise assessments
  • Experience working with cyber threat intelligence platforms and processes
  • Excellence in client communication and relationship management
  • Experience working with legal teams and insurance carriers
  • Strong project management and team leadership skills
  • Industry certifications (GCFE, GCFA, CFCE, EnCE, or similar) preferred
  • Active participation in the security community through speaking engagements or publications preferred
  • Evident self-starter with intellectual curiosity and the ability to adapt to change

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles. 

The Company
HQ: Mountain View, CA
2,830 Employees
On-site Workplace
Year Founded: 2013

What We Do

SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in 2013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution.
Our endpoint security product is designed to protect your organization's endpoints from known and unknown threats, including malware, ransomware, and APTs. It uses artificial intelligence to continuously learn and adapt to new threats, providing real-time protection and automated response capabilities.

SentinelOne's approach to security is designed to help organizations secure their assets with speed and simplicity. We provide the ability to detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response, and adapt their defenses against the most advanced cyberattacks.

We are recognized by Gartner in the Endpoint Protection Magic Quadrant as a Leader and have enterprise customers worldwide. Our customers include some of the world's largest companies in various industries such as finance, healthcare, government, and more.

At SentinelOne, we understand that cybersecurity is a constantly evolving field and that the threats facing organizations are becoming increasingly sophisticated. That's why we are committed to staying at the forefront of technology and innovation and providing our customers with the best protection against cyber threats.

We offer our customers a wide range of services, including threat hunting, incident response, and incident management. Our team of experts is available to assist you 24/7 and can help you respond to and manage cyber incidents quickly and effectively.

To learn more about our products and services, please visit our website at www.sentinelone.com or contact us to schedule a demo

Gallery

Gallery

Similar Jobs

Atlassian Logo Atlassian

Information Security Incident Commander

Cloud • Information Technology • Productivity • Security • Software • App development • Automation
Sydney, New South Wales, AUS
11000 Employees

CrowdStrike Logo CrowdStrike

Analysts, and Senior Analysts, Falcon Complete (Remote, AUS)

Cloud • Information Technology • Sales • Security • Cybersecurity
Remote
5 Locations
10000 Employees

Canva Logo Canva

Security Engineering Director - Detection & Response - Remote across ANZ

Artificial Intelligence • Cloud • Digital Media • Machine Learning • Mobile • Software • Design
Remote
Hybrid
Melbourne, Victoria, AUS
5000 Employees

CrowdStrike Logo CrowdStrike

Sr. Intelligence Analyst II (Remote, AUS)

Cloud • Information Technology • Sales • Security • Cybersecurity
Remote
6 Locations
10000 Employees

Similar Companies Hiring

Jobba Trade Technologies, Inc. Thumbnail
Software • Professional Services • Productivity • Information Technology • Enterprise Web • Consulting • Cloud
Chicago, IL
45 Employees
InCommodities Thumbnail
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees
HERE Thumbnail
Software • Logistics • Internet of Things • Information Technology • Computer Vision • Automotive • Artificial Intelligence
Amsterdam, NL
6000 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account