Palo Alto Networks is seeking a Threat Hunting Researcher to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity.
Job listings
This role supports the identification and mitigation of threats and vulnerabilities using Microsoft Defender Vulnerability Management and Nexpose Rapid7. Youβll work closely with senior engineers and SOC analysts to help protect our environment and grow your expertise in threat analysis and risk reduction.
The Huntress Adversary Tactics team researches, hunts, and discovers threats in customer networks. The Threat Intelligence Analyst will aggregate threat data and build reports for customers, write blog posts and marketing materials, and work with Security Researchers and Analysts to obtain more context about threat data. They foster collaborative environments between the Product, Marketing, and Security Operations Center teams.
We are seeking an experienced Cyber Threat Intelligence (CTI) Analyst to join our Threat Research team in identifying, analysing, and communicating emerging cyber threats. This role focuses on deep technical research, adversary tracking and collaboration across teams to support ExtraHopβs detection and intelligence capabilities.
As a Senior Security Ops Analyst at Vanta, you will be responsible for helping us protect consumer data and Vantaβand continue to earn the trust of our customers. Youβll help configure, maintain, and monitor security tools and infrastructure, and partner with Security Engineers to implement preventative measures. Youβll be responsible for the triage, analysis, and investigation of security alerts, and escalate and support potential security incidents from detection to resolution.
Looking for a security-minded, hands-on senior individual with extensive Security Architecture and Engineering experience to support our security solution programs, focused on Privileged Access Management (PAM). The candidate must have strong operational knowledge of the security tool landscape and have a track record of optimizing and automating processes to achieve measurable gains in efficiency and accuracy.
Investigating and responding to security incidents and threat attempts to protect our cloud-based environment. Collaborating closely with IT, Cloud Security, and engineering teams to develop projects, mitigation plans, enhance cybersecurity observability, and help deliver a product our customers can trust.
As a Principal Consultant for SOC Transformation & XSIAM Deployment, you will be a seasoned leader at the forefront of our most strategic customer engagements. You will leverage consultative presence, deep technical mastery, and executive influence to guide customers through complex SOC transformations. Your primary role is to drive these large-scale programs, ensuring the successful execution of foundational elements.