Senior Threat Hunter (Tools Developer) -UNIT 42

Tel Aviv-Yafo, Israel

Palo Alto Networks

Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud...

View company page

Company Description

Our Mission

At Palo Alto Networks® everything starts and ends with our mission:

Being the cybersecurity partner of choice, protecting our digital way of life.

Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.

Our Approach to Work

We lead with flexibility and choice in all of our people programs. We have disrupted the traditional view that all employees have the same needs and wants. We offer personalization and offer our employees the opportunity to choose what works best for them as often as possible - from your wellbeing support to your growth and development, and beyond!

Job Description

Your Impact

  • Design, develop, and maintain cutting-edge security hunting infrastructures, ensuring seamless integration within the managed threat hunting team’s cloud environment across various platforms, such as BigQuery Jupyter, and more
  • Engage in collaborative efforts with stakeholders across Palo Alto Networks to identify and craft effective solutions to the evolving landscape of cybersecurity challenges
  • Lead automation projects to significantly bolster our data analysis capabilities, enhancing our ability to conduct effective hunting operations
  • Continuously expand your understanding of the cybersecurity landscape, focusing on e-crime and APT (Advanced Persistent Threat) groups, to inform and refine our hunting strategies

Qualifications

Your Experience

  • 3+ years of relevant experience with a proven track record in one of the following areas - cybersecurity research, incident response, threat hunting, specializing in either APTs  or cybercrime, with the capability to address the broader threat landscape
  • Familiarity with EDR and XSOAR technologies is a significant advantage
  • Familiarity with data science and big data at scale is a significant advantage
  • A minimum of 2 years of dedicated experience in Python development
  • Experience with Jupyter Notebook is highly desirable and will be considered a significant asset
  • Familiarity with DevOps tools and frameworks, viewing them as beneficial to streamlining our operations
  • Demonstrated expertise in architecture and design with an emphasis on creating reliable, scalable, and high-performing solutions
  • The capability to work efficiently and effectively in both team settings and independently - This role demands organization, focus, and a demonstrated ability to lead initiatives to successful outcomes
  • Outstanding communication skills are required, enabling effective collaboration and engagement within and across teams
  • A proactive "Play-to-Win" mindset, dedicated to building, enhancing, solving problems, and achieving outstanding results

Additional Information

The Team

Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.

If you’re looking for a career with access to the brightest minds in cybersecurity, you’ve found it. We have a hunger for researching, hunting out the world’s newest threats and sharing them with our industry to make the digital world a safer place.

You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects — centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we’re constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!

Our Commitment

We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.

Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.

All your information will be kept confidential according to EEO guidelines.

#LI-1234

Is role eligible for Immigration Sponsorship?: No. Please note that we will not sponsor applicants for work visas for this position.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APT Automation Big Data Cloud Cyber crime DevOps EDR Incident response Malware Python Threat intelligence

Perks/benefits: Career development Medical leave Startup environment

Region: Middle East
Country: Israel
Job stats:  10  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.