Threat Hunting Researcher

Palo Alto Networks
Summary
Join Palo Alto Networks as a Threat Hunting Researcher and play a critical role in safeguarding organizations against cyber threats. Proactively search for threats across multiple datasets, lead and conduct threat hunting activities related to malware, threat actor groups, and campaign activity. This position demands a deep understanding of cybersecurity, incident response, threat intelligence, and hands-on technical skills. You will proactively search for malicious activity within an organization's network, using advanced tools and methodologies to identify anomalies and potential threats. Actively engage in research and experimentation to develop new hunting techniques. Effective communication is crucial, requiring close collaboration with various teams and stakeholders. Help multinational organizations stay ahead of adversaries and contribute to making the world a safer place.
Requirements
- Understanding the evolving threat landscape, including attack tools, tactics, and techniques, as well as networking and security fundamentals
- Experience investigating targeted, sophisticated, and/or hidden threats in both endpoints and networks
- 4+ years of relevant experience with a proven track record in cybersecurity research, specializing in either APTs or cybercrime, but with the ability to address the broader threat landscape
- Background in writing detections/hunting queries
- Understanding of APT operations, including attack vectors, propagation, data exfiltration, lateral movement, persistence mechanisms, and more
- Familiarity with organizational cybersecurity measures, including protective tools and remediation techniques
- Excellent written and oral communication skills in English
- Strong attention to detail
- Knowledge of advanced threat hunting methodologies and the ability to develop novel techniques
Responsibilities
- Perform threat hunting activities on a wide variety of data sources every day
- Work on the latest cybersecurity research projects and attacks on a daily basis
- Build hypotheses, execute manual hunting techniques, gather and analyze results, perform forensic activities, and deliver reports
- Join a global team of experts who handle threats and adversaries on a global scale daily
- Enhance your knowledge and experience in all domains of cybersecurity: Network, Endpoint, Cloud, and 3rd-party vendor data sources
- Develop, create, and execute new hunting hypothesis methodologies to uncover threats, understand their root causes, and attribute them
Preferred Qualifications
- Experience in an Incident Response environment is a plus
- Proficiency in Python and SQL is beneficial
- Familiarity with reverse engineering is advantageous
- Ability to simplify and clarify complex ideas
- Experience in writing technical blog posts and analysis reports
- Ability to analyze and understand the infrastructure of malicious campaigns
- Self-starter who can work independently and adapt to changing priorities
Benefits
The offered compensation may also include restricted stock units and a bonus