Principal Vulnerability Researcher (Unit 42)
Reston, Virginia, United States
Palo Alto Networks
Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud...Company Description
Our Mission
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
We have the vision of a world where each day is safer and more secure than the one before. These aren’t easy goals to accomplish – but we’re not here for easy. We’re here for better. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Disruption is at the core of our technology and on our way of work to meet the needs of our employees now and in the future through FLEXWORK, our approach to how we work. We’re changing the nature of work from benefits to learning, location to leadership, we’ve rethought and recreated every aspect of the employee experience at Palo Alto Networks. And because it FLEXes around each individual employee based on their individual choices, employees are empowered to push boundaries and help us all evolve, together.
Job Description
Your Career
As a Principal Vulnerability Researcher, you will play a crucial role in our mission to secure our customer base against the latest cybersecurity threats. Your primary focus will be on identifying vulnerability usage within our clients' environments, researching potential exploitation methods, and developing strategies for mitigation. Additionally, you will contribute to our thought leadership by writing insightful blogs on the most current vulnerabilities released publicly, raising awareness and educating our clients and the wider community about how to protect themselves from emerging vulnerabilities. This role will serve as a subject matter expert for Unit 42 for in the wild exploitation.
Key Responsibilities:
Conduct in-depth research into vulnerabilities and understand their potential impact on our customer base.
Analyze and evaluate systems, networks, and applications for weaknesses that could be exploited by attackers.
Analyze proof-of-concept exploits for identified vulnerabilities to assess the risk level and validate mitigation strategies.
Ability to Hunt for vulnerabilities across multiple external and internal telemetry datasets. Help in the identification and analysis of potential abuse of the vulnerabilities
Collaborate with the product teams to recommend and implement effective countermeasures and security enhancements.
Stay abreast of the latest cybersecurity trends, threat intelligence, and vulnerability disclosures to ensure our defenses are always a step ahead.
Write compelling and informative blog posts on recent vulnerabilities, exploitation techniques, and best practices for cybersecurity, contributing to the community's knowledge base.
Participate in cybersecurity conferences and forums, representing Palo Alto Networks and sharing insights from your research.
Perform customer notification of identified exploitation as identified.
Enrich threat intelligence related to vulnerabilities in our central threat knowledge repository.
Write public threat briefings related to new and impactful vulnerabilities exploited in the wild.
Respond to internal and external requests for information (RFI) related to vulnerabilities.
Qualifications
(Optional, but a plus) Experience with Vertex Synapse
Bachelor's degree in Computer Science, Information Security, or a related field. A Master's degree or higher is a plus.
Proven experience in vulnerability research, threat hunting, security analysis, or a similar role within the cybersecurity domain.
Strong understanding of network protocols, operating systems, and application security principles.
Proficiency in programming and scripting languages such as Python.
Familiarity with penetration testing tools and techniques.
Excellent analytical and problem-solving skills, with a keen eye for detail with a focus on vulnerability analysis.
Ability to communicate complex security concepts clearly and persuasively, both verbally and in writing.
A passion for cybersecurity and a commitment to staying informed about the latest developments in the field.
Excellent written and verbal communication.
Experience presenting to C-level executives.
Additional Information
Our Commitment
We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
Palo Alto Networks is evolving and changing the nature of work to meet the needs of our employees now and in the future through FLEXWORK, our approach to how we work. From benefits to learning, location to leadership, we’ve rethought and recreated every aspect of the employee experience at Palo Alto Networks. And because it FLEXes around each individual employee based on their individual choices, employees are empowered to push boundaries and help us all evolve, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Is role eligible for Immigration Sponsorship?: No. Please note that we will not sponsor applicants for work visas for this position.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Application security C Computer Science Exploits Pentesting Python Scripting Security analysis Threat intelligence Vulnerabilities
Perks/benefits: Career development Conferences
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs