Full-Time Sr Threat Hunter Researcher
Palo Alto Networks is hiring a remote Full-Time Sr Threat Hunter Researcher. The career level for this job opening is Experienced and is accepting United Kingdom based applicants remotely. Read complete job description before applying.
Palo Alto Networks
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
Your CareerPalo Alto Networks seeks a senior Threat Hunter to join Unit 42's Managed Services group. Threat Hunters in Unit 42 proactively search for threats across multiple datasets. They lead and conduct threat hunting activities related to malware, threat actor groups, and campaign activity.
Responsibilities
- Proactively search for malicious activity within an organization's network using advanced tools and methodologies to identify anomalies and potential threats.
- Actively engage in research and experimentation to develop new hunting techniques and stay ahead of evolving threats.
- Work closely with Incident Response, Threat Intelligence, Customers, and cybersecurity leadership to share findings and coordinate response efforts.
Your Impact
- Help multinational organizations stay ahead of cyber threats.
- Collaborate with customers to enhance protection and readiness.
- Improve Palo Alto Networks' solutions by identifying and analyzing new threats and tactics.
- Influence the industry by sharing knowledge and findings.
Experience
- Security Clearance: UK Security Clearance (SC) required
- Understanding of threat landscape, attack tools, tactics, and techniques, plus networking and security fundamentals.
- Experience investigating targeted, sophisticated, or hidden threats in endpoints and networks.
- 4+ years of relevant experience in cybersecurity research, specializing in APTs or cybercrime.
- Background in forensic analysis and incident response tools (Dynamic and Static, like IDA Pro, Ollydbg, and Wireshark) to identify threats and assess compromise scope.
- Understanding of APT operations (attack vectors, propagation, data exfiltration, lateral movement, persistence).
- Familiarity with organizational cybersecurity measures.
- Excellent written and oral communication skills in English.
- Strong attention to detail.
- Knowledge of advanced threat hunting methodologies and ability to develop novel techniques.
- Experience in an Incident Response environment is a plus.
- Proficiency in Python and SQL is beneficial.
- Familiarity with reverse engineering is advantageous.
- Ability to simplify and clarify complex ideas.
- Experience in writing technical blog posts and analysis reports.
- Ability to analyze and understand malicious campaign infrastructure.
- Self-starter, adaptable to changing priorities
Qualifications
- Eligibility for Security Clearance (last 5 years in UK, British citizenship)