Principal Threat Intelligence Analyst (Unit 42) - Remote

Santa Clara, CA, United States

Applications have closed

Palo Alto Networks

Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud...

View company page

Company Description

Our Mission

At Palo Alto Networks® everything starts and ends with our mission:

Being the cybersecurity partner of choice, protecting our digital way of life.

We have the vision of a world where each day is safer and more secure than the one before. These aren’t easy goals to accomplish – but we’re not here for easy. We’re here for better. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.

We’re changing the nature of work. Palo Alto Networks is evolving to meet the needs of our employees now and in the future through FLEXWORK, our approach to how we work. From benefits to learning, location to leadership, we’ve rethought and recreated every aspect of the employee experience at Palo Alto Networks.  And because it FLEXes around each individual employee based on their individual choices, employees are empowered to push boundaries and help us all evolve, together. 

Job Description

Your Career

As a Principal Threat Intelligence Analyst within the Unit 42 Threat Intelligence team, you will bring expert knowledge of all things cyber. You will be responsible for staying up to date on global current threats to various industries and identifying emerging trends in threat data. You will be able to clearly document and communicate these findings in various formats to ensure threat intelligence data is influencing other areas in and outside of Unit 42. You will be a clear self-starter with the ability to understand high-level tasking and use your own knowledge and skills to meet goals and deadlines. Consistent collaboration with other researchers and teams will be necessary for your success in this role.

Your Impact

  • Demonstrate expertise in collecting and analyzing threat intelligence data across all categories of cyber threats
  • Document and communicate emerging threats, trends, and their potential impact in a timely manner
  • Translate your threat intelligence collection into a format tailored to our customer needs
  • Ability to collate your threat intelligence into internal systems
  • Be able to communicate an adversary’s actions based on attack frameworks such as MITRE ATT&CK
  • Conduct pivot analysis using both closed and open-source datasets across the entire threat landscape
  • Be able to conduct quick-turnaround threat analysis and feedback support for high-visibility threat research and urgent requests for information
  • Clearly communicate and deliver threat intelligence knowledge in verbal and written formats to technical and non-technical audiences
  • Demonstrate thought leadership across Unit 42 bringing new ideas to the table
  • Foster strong collaboration with key stakeholders across different functional teams

Qualifications

Your Experience

  • 5+ years experience in threat intelligence focused on a variety of threats including but not limited to - ransomware, nation-state, cyber-crime, supply-chain/3rd party risks, cloud, mobile, dark web, offensive security, and insider threats
  • Expert understanding of the adversary’s attack lifecycle, TTPs, and high-fidelity indicators of compromise
  • Experience with tools to data for analysis, such as passive DNS, network infrastructure and host-based information
  • Proven communicator and collaborator
  • Strong verbal and written communication skills
  • Clear ability to lead tasks/projects independently and provide recommendations for process improvement
  • Proven record as a problem solver in complex and often ambiguous situations
  • Drive to overcome the most challenging obstacles and look for ways to improve results
  • Ability to understand and assimilate different points of view, manage time, and prioritize work based on project needs and deadlines

Bonus 

  • Advanced training and education in cyber threat analysis
  • Ability to interpret and action internal and external reports including technical malware analysis
  • Knowledge of scripting languages to facilitate data collection and analysis
  • Has served as a mentor or team lead
  • Experienced public speaker at large industry conferences
  • Comfortable working within a remote team

Additional Information

The Team

Unit 42 brings together our world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. The Unit 42 Threat Intelligence team provides threat research that enables security teams to understand adversary intent and attribution while enhancing protections offered by our products and services to stop advanced attacks. As threats escalate, Unit 42 is available to advise customers on the latest risks, assess their readiness, and help them recover when the worst occurs.

Our Commitment

We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.

Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.

All your information will be kept confidential according to EEO guidelines.

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer, the starting salary (includes on-target earnings = base + on target incentives for sales roles) is expected to be between $139,400/yr to $205,000/yr. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.

#LI-BA2

Covid-19 Vaccination Information for Palo Alto Networks Jobs

  • Vaccine requirements and disclosure obligations vary by country.
  • Unless applicable law requires otherwise, you must be vaccinated for COVID or qualify for a reasonable accommodation if:
    • The job requires accessing a company worksite
    • The job requires in-person customer contact and the customer has implemented such requirements
    • You choose to access a Palo Alto Networks worksite
  • If you have questions about the vaccine requirements of this particular position based on your location or job requirements, please inquire with the recruiter.

Tags: Cloud DNS Malware MITRE ATT&CK Offensive security Scripting Threat intelligence Threat Research TTPs

Perks/benefits: Career development Conferences Medical leave Salary bonus

Regions: Remote/Anywhere North America
Country: United States
Job stats:  37  6  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.