Summary
Join Palo Alto Networks' Unit 42 MDR team as a driven problem solver. You will be responsible for detecting and responding to cyber incidents affecting customers' internal businesses, utilizing Cortex XDR. The ideal candidate is a quick learner and effective communicator, proficient in analyzing threat alerts and following established processes. You will own the incident lifecycle, provide critical feedback to improve products, and collaborate with various teams to remediate and detect emerging threats. This is a shift position requiring coverage of US, EMEA, and APAC time zones. The role offers the opportunity to work on challenging projects within a growing and passionate team.
Requirements
- 1+ years of experience in a multi tiered SOC/IR
- Experienced with Technologies such as EDR, SIEM, SOAR, FW
- A well established familiarity with attack trends and vectors
- Excellent written and oral communication skills in English
Responsibilities
- Detect and respond to cyber incidents facing customersβ internal business
- Analyze threat alerts that fire from our Cortex XDR
- Own an incident lifecycle from outbreak to full remediation
- Provide critical feedback to the different product, research and engineering and threat hunting teams to help improve the products for the entire Palo Alto Networksβ customer base
- Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats
Preferred Qualifications
- Some degree of Malware Analysis
- CEH / CompTIA CYSA+ certifications
- Hands-on experience with Cortex XSOAR or Cortex XDR
Benefits
- FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees
- Mental and financial health resources
- Personalized learning opportunities
- Restricted stock units
- A bonus