Full-Time Principal Threat Intelligence Researcher

Palo Alto Networks is hiring a remote Full-Time Principal Threat Intelligence Researcher. The career level for this job opening is Experienced and is accepting Santa Clara, CA based applicants remotely. Read complete job description before applying.

Palo Alto Networks

Job Title

Principal Threat Intelligence Researcher

Posted

Career Level

Full-Time

Career Level

Experienced

Locations Accepted

Santa Clara, CA

Salary

YEAR $162700 - $263150

Job Details

We are seeking a Principal Threat Intelligence Researcher for our Unit 42 Intelligence Response Unit’s CTI Services Delivery Team. This team plays a critical role in creating timely, relevant, and actionable threat insights to drive business and security outcomes for our customers.

Your Impact
The incumbent will play a critical role in understanding our customers intelligence needs and developing tailored intelligence that augment their existing capabilities
As a Principal Threat Intelligence Researcher in the Intel Response Unit, your primary responsibilities will include:
  • Client-facing Briefing: Deliver fused intelligence insights on a recurring basis to clients across industry verticals focusing on relevant cyber threat activities, trends, and shifts in the cyber threat landscape trends. Custom tailored content should empower defensive actions for clients, providing their threat intelligence and security teams with key observations, insights, and perspective.
  • Client-facing RFI Support: Provide tailored research and analysis for client-based RFIs to drive business and security outcomes. Leverage the full weight of Palo Alto Network's unique data holdings, on-going research, cross-company capabilities, and externally sourced information. Assist leadership in creating a scalable solution to service multiple industries and similar stakeholder types. Model research findings into Unit 42’s Threat Intelligence Knowledge Repository (TIKR). Provide recommendations and help implement improvements to service support quality and speed to enhance the effectiveness and differentiation of our threat intelligence services. Some requests will require rapid turn around time, which may include operating outside of normal business hours.
  • Threat Profile Production: Create cyber threat profiles for clients to identify top cyber threat activities, groups, and trends relevant to a client’s unique business operations then provide tailored defensive recommendations. Work with clients to understand their operational footprint, business objectives, technology and security stacks, and areas of risk exposure. Develop MITRE ATT&CK workflows and heatmaps for top threat groups.
  • Anticipatory Threat Knowledge Creation: Develop structured intelligence insights tracking adversary trends, motivations, organizational priorities, and historical region and industry targeting patterns. This information will act as a backdrop to support intelligence production response for unfolding cyber events, exploitation trends, and threat actor campaigns. Collaborate with other Unit 42 CTI SMEs in fusion cells to expand research and existing collateral on threat groups.
  • Industry Voice & Expertise: Must be willing to represent Unit 42 by delivering expert-level presentations at key conferences, public speaking engagements, podcasts or webinars, and authoring influential thought leadership materials.
  • Peer Empowerment: Act as a resource for colleagues, sharing expertise and best practices to enhance team capabilities. Provide guidance to grow technical and strategic research acumen through personalized or group brown bag sessions.
  • Leverage AI for Analytic Workflows: Integrate Generative AI, NotebookLM, and other artificial intelligence and machine learning solutions across all phases of the intelligence lifecycle to improve analytic workflows. Use and develop new AI solutions to reduce research toil, query existing intelligence holdings, and accelerate report and presentation creation.

Your Experience
7 years minimum in the CTI field with experience in threat research, analytic production, and client-facing delivery.
Strong knowledge of cyber threat actors, noteworthy attacks, and ability to quickly recognize inflection points, signalling shifts, evolution, or deviation from threat activity baselines or industry norms.
Ability to contextualize cyber events, identify how the events fit into a current or historical pattern, the impact on an industry or organization, and tailored defensive recommendations.
Experience operating under short fuse deadlines, managing concurrent tasks, and thriving in complex and sometimes ambiguous situations.
Strong writing and presentation skills with the ability to communicate threat intelligence effectively to diverse audiences, including C-suite level customers.
Deep experience with cyber threat intelligence frameworks and analytical techniques preferred.
Demonstrated ability to coordinate with cross-organizational threat analysts, facilitating collaboration, and aligning efforts to achieve common goals.
Experience presenting at CTI or cyber threat research conferences preferred.
History of triaging and modeling open source data, telemetry, and other intelligence sources to quickly respond to requests for information. Preference for experience with Synapse or other hypergraphs.
Experience with prompt engineering and leveraging Google’s AI capabilities to support development of intelligence products.
Comfortable adapting to change as part of a growing team.

FAQs

What is the last date for applying to the job?

The deadline to apply for Full-Time Principal Threat Intelligence Researcher at Palo Alto Networks is 12th of January 2026 . We consider jobs older than one month to have expired.

Which countries are accepted for this remote job?

This job accepts [ Santa Clara, CA ] applicants. .

Related Jobs You May Like

Senior Product Partnerships Manager (Cortex)

Remote, CA
13 hours ago
Business Development
Data-driven Analysis
Partnerships Management
Palo Alto Networks
Full-Time
Senior Manager
YEAR $152000 - $246500

Solutions Consultant II

Ottawa, Canada
13 hours ago
Cloud Security
Network Security
Pre-sales / Sales Engineering
Palo Alto Networks
Full-Time
Experienced
YEAR $151552 - $208384

Domain Consultant - SecOps

Warsaw, Poland
1 day ago
Pre-sales / Solution Consulting
Security Operations
SIEM
Palo Alto Networks
Full-Time
Experienced

Ecosystem Acceleration Lead

Denver, CO
1 day ago
Channel Management
Cross-Functional Alignment
GTM Strategy
Palo Alto Networks
Full-Time
Senior Manager
YEAR $226000 - $310750

Solutions Engineer, Enterprise Accounts - East

Boston, Massachusetts
1 day ago
Authentication & Federation (SSO, MFA, RBAC)
Cloud Platforms (AWS/Azure/GCP)
Identity Security (CyberArk)
Cyberark
Full-Time
Experienced
YEAR $124000 - $182000

Principal Consultant – SOC Transformation & XSIAM

Santa Clara, CA
1 day ago
Detection Engineering & Correlation Rules
Log Ingestion & Parsing
SOAR / EDR / Cloud Security Integration
Palo Alto Networks
Full-Time
Senior Manager
YEAR $163000 - $204000

Senior Security Engineer

San Francisco, CA
1 day ago
Cloud Security (AWS/Azure/GCP)
DevSecOps / CI/CD
Infrastructure-as-Code & IaC Validation
Loft Orbital Solutions
Full-Time
Expert
YEAR $140250 - $190000

Security Compliance Specialist

Worldwide
1 day ago
Audit & Evidence Management
Controls Design & Governance
Security Compliance (GRC)
Livekit
Full-Time
Experienced

Solution Engineer - Inside Sales Support

Worldwide
2 days ago
Cloud Platforms (AWS/Azure/GCP)
Kubernetes & Container Orchestration
Pre-sales Engineering
Illumio
Full-Time
Expert

Senior Security Operations Analyst

Berkeley
2 days ago
Incident Response
Mentoring
SIEM
The Voleon Group
Full-Time
Expert

Pre-sales Systems Engineer, Public&Social Infrastructure

Osaka, Japan
6 days ago
Cloud Security
Cybersecurity
Network Security
Palo Alto Networks
Full-Time
Experienced

プリセールスSE‐戦略アカウント担当

Chiyoda, Japan
6 days ago
Communication
Cybersecurity
Networking
Palo Alto Networks
Full-Time
Experienced

Looking for a specific job?