Full-Time Threat Hunting Researcher (Unit 42) - Remote
Palo Alto Networks is hiring a remote Full-Time Threat Hunting Researcher (Unit 42) - Remote. The career level for this job opening is Experienced and is accepting Worldwide based applicants remotely. Read complete job description before applying.
Palo Alto Networks
Job Title
Posted
Career Level
Career Level
Locations Accepted
Salary
Share
Job Details
One primary responsibility of this role is to proactively search for signs of malicious activity within an organization's network. Our Threat Hunting Researchers use advanced tools and methodologies to identify anomalies and potential threats that may go undetected by traditional security solutions.
Your Impact:
- Help multinational organizations stay one step ahead of adversaries and cyber threats.
- Collaborate and guide our customers on the best ways to enhance their defenses and readiness for future events.
- Improve Palo Alto Networks' solutions by identifying and analyzing new threats, tactics, and actors.
- Influence the industry by sharing knowledge and findings.
- Collaborate with multiple research and development groups.
- Contribute to making the world a safer and better place.
Why to choose us:
- Perform threat hunting activities on a wide variety of data sources every day.
- Work on the latest cybersecurity research projects and attacks on a daily basis.
- Build hypotheses, execute manual hunting techniques, gather and analyze results, perform forensic activities, and deliver reports.
Your Experience:
- Understanding the evolving threat landscape, including attack tools, tactics, and techniques, as well as networking and security fundamentals.
- Experience investigating targeted, sophisticated, and/or hidden threats in both endpoints and networks.
- 4+ years of relevant experience with a proven track record in cybersecurity research, specializing in either APTs or cybercrime, but with the ability to address the broader threat landscape.
- Background in writing detections/hunting queries
- Understanding of APT operations, including attack vectors, propagation, data exfiltration, lateral movement, persistence mechanisms, and more.
- Familiarity with organizational cybersecurity measures, including protective tools and remediation techniques.
- Excellent written and oral communication skills in English.
- Strong attention to detail.
- Knowledge of advanced threat hunting methodologies and the ability to develop novel techniques.