Threat Hunter Analyst

Remote, REMOTE, United States

Palo Alto Networks

Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud...

View company page

Company Description

Our Mission

At Palo Alto Networks® everything starts and ends with our mission:

Being the cybersecurity partner of choice, protecting our digital way of life.

We have the vision of a world where each day is safer and more secure than the one before. These aren’t easy goals to accomplish – but we’re not here for easy. We’re here for the better. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.

We’re changing the nature of work. Palo Alto Networks is evolving to meet the needs of our employees now and in the future through FLEXWORK, our approach to how we work. From benefits to learning, location to leadership, we’ve rethought and recreated every aspect of the employee experience at Palo Alto Networks.  And because it FLEXes around each individual employee based on their individual choices, employees are empowered to push boundaries and help us all evolve, together.

Your Career

Palo Alto Networks is seeking a Threat Hunt Analyst  to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity. This position requires a cross-disciplinary approach that involves a deep understanding of cybersecurity, incident response, threat intelligence, and hands-on technical skills.

One primary responsibility of this role is to proactively search for signs of malicious activity within an organization's network. Our Analysts use advanced tools and methodologies to identify anomalies and potential threats that may go undetected by traditional security solutions. Additionally, our Analysts should actively engage in research and experimentation to develop new hunting techniques and stay ahead of evolving threats.

Effective communication is crucial in this role. Analysts must work closely with other teams, such as Incident Response, Threat Intelligence, Customers, and cybersecurity leadership, to share findings and coordinate response efforts

Job Description

Your Impact

  • Monitor Customer Communications: Actively monitor channels like emails, ticket systems, and Zoom to quickly identify and prioritize cybersecurity inquiries, ensuring prompt and attentive customer service.

  • Incident Investigation: Provide initial support in incident investigations, working with customers to understand incidents fully and gather necessary data, while escalating complex cases as needed.

  • Threat Inquiry Response: Stay informed about the latest cybersecurity developments and use this knowledge to address customer questions about emerging threats, offering clear guidance and mitigation strategies.

  • Technical Query Support: Utilize XQL expertise to assist customers with complex queries for data analysis and incident investigations using Palo Alto Networks XDR, helping them gain valuable insights.

  • Educational Support: Clearly explain the technical aspects of threats and Palo Alto Networks' XDR product to customers, advising on best practices for threat detection, analysis, and response.

  • Collaborate Internally: Work closely with internal teams like MDR, threat intelligence, and research to provide holistic support to customers and improve Palo Alto Networks' offerings based on customer feedback.

  • Documentation and Reporting: Maintain detailed records of customer interactions and contribute to creating incident reports and knowledge base articles to support both customers and internal teams.

  • Ongoing Learning: Engage in continuous learning and training to enhance your cybersecurity and threat hunting skills, keeping abreast of new threats, technologies, and best practices to better support customers.

Qualifications

Your Experience

  • At least 4 years in SOC, IR, Hunting  or MDR teams, skilled in EDR, SIEM, SOAR, and firewalls. Must understand attack trends and excel in threat detection.

  • Technical Skills: Proficiency in EDR, SIEM, SOAR, and firewalls is essential. A strong background in SQL or similar is preferred.

  • Work Ethic: Candidates should thrive in both independent and team environments, display strong organizational skills, focus, and leadership or significant contribution capabilities.

  • Communication: Must have excellent communication skills, able to clarify technical concepts and collaborate effectively, with a strong customer-first orientation.

  • Mindset: Looking for proactive individuals with a "Play-to-Win" attitude, dedicated to advancing in cybersecurity, solving problems creatively, and achieving exceptional outcomes.

Additional Information

The Team

Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.

If you’re looking for a career with access to the brightest minds in cybersecurity, you’ve found it. We have a hunger for researching, hunting out the world’s newest threats and sharing them with our industry to make the digital world a safer place.

You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects — centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we’re constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!

 

Our Commitment

We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.

Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.

All your information will be kept confidential according to EEO guidelines.

Is role eligible for Immigration Sponsorship?: Yes

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  145  34  1

Tags: EDR Firewalls Incident response Malware SIEM SOAR SOC SQL Threat detection Threat intelligence XDR

Perks/benefits: Career development Medical leave

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.