Full-Time Sr Threat Hunter Researcher
Palo Alto Networks is hiring a remote Full-Time Sr Threat Hunter Researcher. The career level for this job opening is Experienced and is accepting Remote, NY based applicants remotely. Read complete job description before applying.
Palo Alto Networks
Job Title
Posted
Career Level
Career Level
Locations Accepted
Salary
Share
Job Details
Palo Alto Networks is seeking a Senior Threat Hunting Researcher to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity. This position requires a cross–disciplinary approach that involves a deep understanding of cybersecurity, incident response, threat intelligence, and hands–on technical skills.
One primary responsibility of this role is to proactively search for signs of malicious activity within an organization's network. Our Threat Hunting Researchers use advanced tools and methodologies to identify anomalies and potential threats that may go undetected by traditional security solutions. Additionally, our Threat Hunting Researchers should actively engage in research and experimentation to develop new hunting techniques and stay ahead of evolving threats.
Effective communication is crucial in this role. They must work closely with other teams, such as Incident Response, Threat Intelligence, customers, and cybersecurity leadership, to share findings and coordinate response efforts.
Your Impact- Help multinational organizations stay one step ahead of adversaries and cyber threats.
- Collaborate and guide our customers on the best ways to enhance their defenses and readiness for future events.
- Improve Palo Alto Networks' solutions by identifying and analyzing new threats, tactics, and actors.
- Influence the industry by sharing knowledge and findings.
- Collaborate with multiple research and development groups.
- Contribute to making the world a safer and better place.
- Perform threat hunting activities on a wide variety of data sources every day.
- Work on the latest cybersecurity research projects and attacks on a daily basis.
- Build hypotheses, execute manual hunting techniques, gather and analyze results, perform forensic activities, and deliver reports.
- Join a global team of experts who handle threats and adversaries on a global scale daily.
- Enhance your knowledge and experience in all domains of cybersecurity: Network, Endpoint, Cloud, and 3rd-party vendor data sources.
- Develop, create, and execute new hunting hypothesis methodologies to uncover threats, understand their root causes, and attribute them.
We believe in automation and scaling. Leverage big data to discover threats and multiple threat intelligence.
Your Experience- Understanding the evolving threat landscape, including attack tools, tactics, and techniques, as well as networking and security fundamentals.
- Experience investigating targeted, sophisticated, and/or hidden threats in both endpoints and networks.
- 6+ years of relevant experience with a proven track record in cybersecurity research, specializing in either APTs or cybercrime, but with the ability to address the broader threat landscape.
- Background in writing detections/hunting queries.
- Understanding of APT operations, including attack vectors, propagation, data exfiltration, lateral movement, persistence mechanisms, and more.
- Familiarity with organizational cybersecurity measures, including protective tools and remediation techniques.
- Excellent written and oral communication skills in English.
- Strong attention to detail.
- Knowledge of advanced threat hunting methodologies and the ability to develop novel techniques.
- Experience in an Incident Response environment is a plus.
- Proficiency in Python and SQL is beneficial.
- Familiarity with reverse engineering is advantageous.
- Ability to simplify and clarify complex ideas.
- Experience in writing technical blog posts and analysis reports.
- Ability to analyze and understand the infrastructure of malicious campaigns.
- Self-starter who can work independently and adapt to changing priorities.