Palo Alto Networks is seeking a Threat Hunting Researcher to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity.
Job listings
The Security Incident Command (SIC) team is seeking a senior security incident commander to join our fast-growing team, supporting the orchestration of incident response strategy and communications during critical information security-related incidents. This role involves taking ownership of incident response, developing documentation, delivering communications, and contributing to post-incident reviews to improve incident management and response strategies.
This is a rare opportunity to build a company from zero, backed by experienced operators, advisors, and early capital. Working closely with the Cyber Practice, engineering team, and CPTO, this role will shape the companyβs product and GTM strategy by proposing innovative and differentiated opportunities based on market gaps and technological capabilities. The ideal person thrives in ambiguity, enjoys investigating emerging technologies, and is passionate about protecting AI systems and applications from AI-specific threats.
We are seeking a knowledgeable and motivated Certified CMMC Professional (CCP) to support the delivery of CMMC readiness and advisory services for clients in the Defense Industrial Base (DIB). This role serves as a trusted advisor, assisting clients with documentation, gap assessments, remediation planning, and readiness activities in preparation for formal CMMC assessments conducted by Certified Third-Party Assessment Organizations (C3PAOs).
This role supports the identification and mitigation of threats and vulnerabilities using Microsoft Defender Vulnerability Management and Nexpose Rapid7. Youβll work closely with senior engineers and SOC analysts to help protect our environment and grow your expertise in threat analysis and risk reduction.
Maintain and execute the Cybersecurity, risk and compliance program while being responsible for development, establishment, and communication of security policies, standards, and guidelines as well as the education and awareness of these requirements; ongoing enhancement of the security risk assessment processes and procedures ensuring alignment with establishing industry standard security metrics.
Play a key role in enabling customers to strengthen their cyber resilience through effective deployment, integration, and operational use of Picus solutions. You will manage the full post-sales deployment lifecycle, ensuring smooth installation, configuration, and integration of Picus products into diverse customer environments. This includes understanding customer architectures, preparing for any necessary deployment requirements, and integrating Picus with SIEM, EDR, XDR, NGFW, WAF, and other security technologies.
This is a remote role with a critical leadership function in our Security Operations Centre (SOC). You will guide a team of SOC Analysts, handle escalated cases, and ensure high-quality incident response and customer service. As a SOC Team Lead, you will lead and mentor a team of SOC Analysts, providing technical guidance and professional development feedback and manage escalated cases.
The Associate Cybersecurity Analyst will support the daily operations of EQTβs cybersecurity program, including monitoring security events and maintaining key security tools such as log management, email security, firewalls, CASB, EDR, and risk management platforms. This role will assist in deploying new features within existing toolsets, managing phishing simulations, and responding to user security inquiries.
This role is client-facing and requires the Principal Consultant to lead and produce deliverables based on proactive services engagements. The Principal Consultant will work directly with multiple customers and key stakeholders (security teams, system and network administrators and owners, C-Suite, etc.) to manage and deliver proactive incident preparedness engagements, as well as wider proactive assessments and services.