Senior Manager, Threat Intel Research

Palo Alto Networks Logo

Palo Alto Networks

💵 $199k-$322k
📍Remote - United States

Summary

Join Palo Alto Networks as a Senior Manager, Cyber Threat Intelligence to lead the Fusion Intelligence Team (FIT). FIT focuses on accelerated threat intelligence collection and analysis, pivoting from OSINT to internal data. You will collaborate with researchers and engineers, ensuring intelligence findings enhance research, consulting, customer insights, and product integrations. Responsibilities include rapid OSINT fusion, leveraging unique data holdings, people management, participation in rapid response efforts, and contributing to external engagement. The ideal candidate possesses deep technical experience in cyber threat intelligence, expertise in building and mentoring teams, and strong communication skills. A competitive salary and benefits package are offered.

Requirements

  • Deep technical experience in Cyber Threat Intelligence including actionable knowledge of cyber adversary groups, tactics, and techniques
  • Ability to leverage multiple telemetry types and intelligence sources to generate unique insights into potential threats and associate malicious activity
  • Demonstrated expertise in building and mentoring effective cyber threat intelligence teams, cultivating a strong culture of collaboration, open communication, and the consistent sharing of threat insights and analytical methodologies. Committed to providing opportunities for professional development within the team
  • Demonstrated experience in identifying, analyzing, and implementing process improvements within cyber threat intelligence workflows to enhance efficiency, accuracy, and the overall quality of intelligence products and outcomes. Experience leveraging AI capabilities to support intelligence processes
  • Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment
  • Strong writing and presentation skills, with the ability to effectively communicate complex threat intelligence information to diverse audiences
  • Proficiency in developing and maintaining scripts to streamline intelligence workflows, enhance efficiency, and improve data accuracy
  • Bachelor’s Degree or equivalent military experience - an advanced degree such as MS is a plus

Responsibilities

  • Rapid OSINT fusion: Determine the credibility and relevance of OSINT and integrate it with other available data to build a more complete cyber threat intelligence picture. Enter priority intelligence findings, indicators of compromise (IOCs), and threat actor information into the organization's threat intelligence knowledge repository. Ensure continuous updates to threat actor, industry, region, and malware profiles. Continually enhance team workflows to improve the scalability and effectiveness of the team's analytical capabilities
  • Leverage unique data holdings and partner across teams: Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) data, and partner information. Utilize these resources to produce and communicate the most unique and valuable insights, enhancing the effectiveness and differentiation of our threat intelligence capabilities. Produce Intelligence Bulletins, Threat Briefs, and other sharable content based on unique findings derived from the team’s analysis. Partner with other research and product teams to build joint capabilities and ensure findings are leveraged to the full extent
  • People management and career development: Manage and mentor a team of analysts. Foster their professional growth, provide guidance, and facilitate skill development to ensure a high-performing and cohesive team
  • Participate in rapid response efforts: Support the Intelligence Response Unit’s mission as the point organization for major cyber events (e.g. Log4j, SolarWinds) across all of Palo Alto Networks. Lead or assist with rapid response efforts, providing timely coordination across teams and supporting response actions with intelligence investigations
  • Contribute to external engagement: Amplify Unit 42 presence and credibility in the marketplace through thought leadership, including via speaking engagements, publishing threat research, and media exposure

Preferred Qualifications

Familiarity with Vertex Synapse preferred

Benefits

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $199,000 - $322,500/YR. The offered compensation may also include restricted stock units and a bonus

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.

Similar Remote Jobs