Full-Time Sr Staff Research Engineer
Palo Alto Networks is hiring a remote Full-Time Sr Staff Research Engineer. The career level for this job opening is Experienced and is accepting Washington, DC based applicants remotely. Read complete job description before applying.
Palo Alto Networks
Job Title
Posted
Career Level
Career Level
Locations Accepted
Salary
Share
Job Details
Protect our customers against malicious actors on the Internet.
Develop novel techniques and approaches for understanding the internet and characterizing data for insights relevant to cyber threat intelligence.
Collaborate with US government partners in investigating and reporting malicious cyber activity for analysts and senior leaders.
Aid in developing software to better leverage Palo Alto Networks datasets in the various missions of threat hunting, vulnerability discovery, and as-yet undetermined missions.
Grow our library of datasets and integrate new capabilities into our tools.
Build prototypes that generate insights for customers and help to operationalize them towards cyber threat hunting.
Discover the emergent properties of the Internet so we start to expect the unexpected.
Mentor junior staff, share best practices and technical expertise with a multidisciplinary team.
Experience required:
Bachelor's degree in Computer Science, Engineering, or other technical discipline (or equivalent professional experience).
GCTI, GPEN, OSCP, CEH certifications a plus.
Professional experience manipulating large datasets and a high level of comfort with SQL and database operations.
Proficiency in Python, Go, and/or Rust.
High-level understanding of computer networks, protocols, and of how the Internet works.
Experience collecting, analyzing, and interpreting data from multiple sources, documenting the results, and providing meaningful analytic products.
Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing intelligence.
Broad knowledge of nation-state linked APT groups with emphasis on differences in Tactics, Techniques, and Procedures.
Knowledge of the Intelligence Community, US Government, and federal cyber centers.
Experience using tools such as nmap, nessus, dsniff, netcat, network sniffers, and fuzzers.
Ability to concisely communicate complex subject matter to technical and non-technical audiences.
Minimum eligibility for a security clearance, active Top Secret preferred.