Senior Threat Hunting Researcher

Palo Alto Networks
Summary
Join Palo Alto Networks as a Senior Threat Hunting Researcher and become a critical part of Unit 42's Managed Services group, safeguarding organizations against cyber threats. Proactively search for threats across multiple datasets, leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity. This role demands a deep understanding of cybersecurity, incident response, threat intelligence, and hands-on technical skills. You will use advanced tools and methodologies to identify anomalies and potential threats, and actively engage in research and experimentation to develop new hunting techniques. Effective communication is crucial for collaboration with various teams and stakeholders. Help multinational organizations stay ahead of adversaries and contribute to making the world a safer place.
Requirements
- Understanding the evolving threat landscape, including attack tools, tactics, and techniques, as well as networking and security fundamentals
- Experience investigating targeted, sophisticated, and/or hidden threats in both endpoints and networks
- 6+ years of relevant experience with a proven track record in cybersecurity research, specializing in either APTs or cybercrime, but with the ability to address the broader threat landscape
- Background in writing detections/hunting queries
- Understanding of APT operations, including attack vectors, propagation, data exfiltration, lateral movement, persistence mechanisms, and more
- Familiarity with organizational cybersecurity measures, including protective tools and remediation techniques
- Excellent written and oral communication skills in English
- Strong attention to detail
- Knowledge of advanced threat hunting methodologies and the ability to develop novel techniques
Responsibilities
- Proactively search for signs of malicious activity within an organization's network
- Use advanced tools and methodologies to identify anomalies and potential threats that may go undetected by traditional security solutions
- Actively engage in research and experimentation to develop new hunting techniques and stay ahead of evolving threats
- Work closely with other teams, such as Incident Response, Threat Intelligence, customers, and cybersecurity leadership, to share findings and coordinate response efforts
Preferred Qualifications
- Experience in an Incident Response environment is a plus
- Proficiency in Python and SQL is beneficial
- Familiarity with reverse engineering is advantageous
- Ability to simplify and clarify complex ideas
- Experience in writing technical blog posts and analysis reports
- Ability to analyze and understand the infrastructure of malicious campaigns
- Self-starter who can work independently and adapt to changing priorities
Benefits
The offered compensation may also include restricted stock units and a bonus