Full-Time Principal Threat Intelligence Researcher
Palo Alto Networks is hiring a remote Full-Time Principal Threat Intelligence Researcher. The career level for this job opening is Experienced and is accepting Santa Clara, CA based applicants remotely. Read complete job description before applying.
Palo Alto Networks
Job Title
Principal Threat Intelligence Researcher
Posted
Career Level
Full-Time
Career Level
Experienced
Locations Accepted
Santa Clara, CA
Salary
YEAR $162700 - $263150
Share
Job Details
We are seeking a Principal Threat Intelligence Researcher for our Unit 42 Intelligence Response Unit’s CTI Services Delivery Team. This team plays a critical role in creating timely, relevant, and actionable threat insights to drive business and security outcomes for our customers.
Your Impact
The incumbent will play a critical role in understanding our customers intelligence needs and developing tailored intelligence that augment their existing capabilities
As a Principal Threat Intelligence Researcher in the Intel Response Unit, your primary responsibilities will include:
Your Experience
7 years minimum in the CTI field with experience in threat research, analytic production, and client-facing delivery.
Strong knowledge of cyber threat actors, noteworthy attacks, and ability to quickly recognize inflection points, signalling shifts, evolution, or deviation from threat activity baselines or industry norms.
Ability to contextualize cyber events, identify how the events fit into a current or historical pattern, the impact on an industry or organization, and tailored defensive recommendations.
Experience operating under short fuse deadlines, managing concurrent tasks, and thriving in complex and sometimes ambiguous situations.
Strong writing and presentation skills with the ability to communicate threat intelligence effectively to diverse audiences, including C-suite level customers.
Deep experience with cyber threat intelligence frameworks and analytical techniques preferred.
Demonstrated ability to coordinate with cross-organizational threat analysts, facilitating collaboration, and aligning efforts to achieve common goals.
Experience presenting at CTI or cyber threat research conferences preferred.
History of triaging and modeling open source data, telemetry, and other intelligence sources to quickly respond to requests for information. Preference for experience with Synapse or other hypergraphs.
Experience with prompt engineering and leveraging Google’s AI capabilities to support development of intelligence products.
Comfortable adapting to change as part of a growing team.
Your Impact
The incumbent will play a critical role in understanding our customers intelligence needs and developing tailored intelligence that augment their existing capabilities
As a Principal Threat Intelligence Researcher in the Intel Response Unit, your primary responsibilities will include:
- Client-facing Briefing: Deliver fused intelligence insights on a recurring basis to clients across industry verticals focusing on relevant cyber threat activities, trends, and shifts in the cyber threat landscape trends. Custom tailored content should empower defensive actions for clients, providing their threat intelligence and security teams with key observations, insights, and perspective.
- Client-facing RFI Support: Provide tailored research and analysis for client-based RFIs to drive business and security outcomes. Leverage the full weight of Palo Alto Network's unique data holdings, on-going research, cross-company capabilities, and externally sourced information. Assist leadership in creating a scalable solution to service multiple industries and similar stakeholder types. Model research findings into Unit 42’s Threat Intelligence Knowledge Repository (TIKR). Provide recommendations and help implement improvements to service support quality and speed to enhance the effectiveness and differentiation of our threat intelligence services. Some requests will require rapid turn around time, which may include operating outside of normal business hours.
- Threat Profile Production: Create cyber threat profiles for clients to identify top cyber threat activities, groups, and trends relevant to a client’s unique business operations then provide tailored defensive recommendations. Work with clients to understand their operational footprint, business objectives, technology and security stacks, and areas of risk exposure. Develop MITRE ATT&CK workflows and heatmaps for top threat groups.
- Anticipatory Threat Knowledge Creation: Develop structured intelligence insights tracking adversary trends, motivations, organizational priorities, and historical region and industry targeting patterns. This information will act as a backdrop to support intelligence production response for unfolding cyber events, exploitation trends, and threat actor campaigns. Collaborate with other Unit 42 CTI SMEs in fusion cells to expand research and existing collateral on threat groups.
- Industry Voice & Expertise: Must be willing to represent Unit 42 by delivering expert-level presentations at key conferences, public speaking engagements, podcasts or webinars, and authoring influential thought leadership materials.
- Peer Empowerment: Act as a resource for colleagues, sharing expertise and best practices to enhance team capabilities. Provide guidance to grow technical and strategic research acumen through personalized or group brown bag sessions.
- Leverage AI for Analytic Workflows: Integrate Generative AI, NotebookLM, and other artificial intelligence and machine learning solutions across all phases of the intelligence lifecycle to improve analytic workflows. Use and develop new AI solutions to reduce research toil, query existing intelligence holdings, and accelerate report and presentation creation.
Your Experience
7 years minimum in the CTI field with experience in threat research, analytic production, and client-facing delivery.
Strong knowledge of cyber threat actors, noteworthy attacks, and ability to quickly recognize inflection points, signalling shifts, evolution, or deviation from threat activity baselines or industry norms.
Ability to contextualize cyber events, identify how the events fit into a current or historical pattern, the impact on an industry or organization, and tailored defensive recommendations.
Experience operating under short fuse deadlines, managing concurrent tasks, and thriving in complex and sometimes ambiguous situations.
Strong writing and presentation skills with the ability to communicate threat intelligence effectively to diverse audiences, including C-suite level customers.
Deep experience with cyber threat intelligence frameworks and analytical techniques preferred.
Demonstrated ability to coordinate with cross-organizational threat analysts, facilitating collaboration, and aligning efforts to achieve common goals.
Experience presenting at CTI or cyber threat research conferences preferred.
History of triaging and modeling open source data, telemetry, and other intelligence sources to quickly respond to requests for information. Preference for experience with Synapse or other hypergraphs.
Experience with prompt engineering and leveraging Google’s AI capabilities to support development of intelligence products.
Comfortable adapting to change as part of a growing team.
Skills
FAQs
What is the last date for applying to the job?
The deadline to apply for Full-Time Principal Threat Intelligence Researcher at Palo Alto Networks is
12th of January 2026
. We consider jobs older than one month to have expired.
Which countries are accepted for this remote job?
This job accepts [
Santa Clara, CA
] applicants. .
Related Jobs You May Like
Senior Product Partnerships Manager (Cortex)
Remote, CA
13 hours ago
Business Development
Data-driven Analysis
Partnerships Management
Palo Alto Networks
Full-Time
Senior Manager
YEAR $152000 - $246500
Solutions Consultant II
Ottawa, Canada
13 hours ago
Cloud Security
Network Security
Pre-sales / Sales Engineering
Palo Alto Networks
Full-Time
Experienced
YEAR $151552 - $208384
Domain Consultant - SecOps
Warsaw, Poland
1 day ago
Pre-sales / Solution Consulting
Security Operations
SIEM
Palo Alto Networks
Full-Time
Experienced
Ecosystem Acceleration Lead
Denver, CO
1 day ago
Channel Management
Cross-Functional Alignment
GTM Strategy
Palo Alto Networks
Full-Time
Senior Manager
YEAR $226000 - $310750
Solutions Engineer, Enterprise Accounts - East
Boston, Massachusetts
1 day ago
Authentication & Federation (SSO, MFA, RBAC)
Cloud Platforms (AWS/Azure/GCP)
Identity Security (CyberArk)
Cyberark
Full-Time
Experienced
YEAR $124000 - $182000
Principal Consultant – SOC Transformation & XSIAM
Santa Clara, CA
1 day ago
Detection Engineering & Correlation Rules
Log Ingestion & Parsing
SOAR / EDR / Cloud Security Integration
Palo Alto Networks
Full-Time
Senior Manager
YEAR $163000 - $204000
Senior Security Engineer
San Francisco, CA
1 day ago
Cloud Security (AWS/Azure/GCP)
DevSecOps / CI/CD
Infrastructure-as-Code & IaC Validation
Loft Orbital Solutions
Full-Time
Expert
YEAR $140250 - $190000
Security Compliance Specialist
Worldwide
1 day ago
Audit & Evidence Management
Controls Design & Governance
Security Compliance (GRC)
Livekit
Full-Time
Experienced
Solution Engineer - Inside Sales Support
Worldwide
2 days ago
Cloud Platforms (AWS/Azure/GCP)
Kubernetes & Container Orchestration
Pre-sales Engineering
Illumio
Full-Time
Expert
Senior Security Operations Analyst
Berkeley
2 days ago
Incident Response
Mentoring
SIEM
The Voleon Group
Full-Time
Expert
Pre-sales Systems Engineer, Public&Social Infrastructure
Osaka, Japan
6 days ago
Cloud Security
Cybersecurity
Network Security
Palo Alto Networks
Full-Time
Experienced
プリセールスSE‐戦略アカウント担当
Chiyoda, Japan
6 days ago
Communication
Cybersecurity
Networking
Palo Alto Networks
Full-Time
Experienced