Palo Alto Networks is seeking a Threat Hunting Researcher to join Unit 42's Managed Services group. Threat Hunters in Unit 42 play a critical role in safeguarding organizations against cyber threats by proactively searching for threats across multiple datasets. They are responsible for leading and conducting threat hunting activities related to malware, threat actor groups, and campaign activity.
Job listings
As an Analyst II in Access Management, apply your strong technical experience in IAM and strategic vision to work technically on our initiatives. This role is key to ensuring the evolution of our identity program, supporting the team with technical guidance, acting directly on projects, and being a reference in the construction of secure, scalable solutions aligned with BLIP's needs.
In this leadership role, you will lead the effort within Censys to fingerprint software and services in the Censys Internet Intelligence Platform - like a SIEM for Censys scan data. You will work with members of our Research, Data Engineering, and Product teams to figure out how we can label C2 at scale, discover anomalies across infrastructure, interpret patterns and limitations of our rules engine, and operate as an authority on our detection capabilities.
The Security Incident Command (SIC) team is seeking a senior security incident commander to join our fast-growing team, supporting the orchestration of incident response strategy and communications during critical information security-related incidents. This role involves taking ownership of incident response, developing documentation, delivering communications, and contributing to post-incident reviews to improve incident management and response strategies.
The Security Engineer will play a crucial role in the development of the Firewall Engineering service and will be involved with the onboarding and configuration lifecycle, to ensure customers stay on top of emerging security threats. Responsibilities include guiding engineering design, analysis, implementation, and support of security technologies.
The role of Security Engineering Manager directly impacts the safety and security of millions of users worldwide. Your leadership will be instrumental in addressing emerging threats, developing robust security measures, and ensuring the continued integrity of Ubuntu. Your work will improve the security of millions of people, by addressing potential CVEs and vulnerabilities alongside the lifecycle of Canonical products such as Ubuntu.
As a key member of the cybersecurity operations team, the Cyber Security & Automation Analyst is responsible for protecting internal and client environments across both Managed Service Provider (MSP) and Managed Security Service Provider (MSSP) services. Acting as the front line of defense, this role is focused on monitoring, analysing, and responding to security events, while also leveraging intelligent automation to enhance speed, accuracy, and service efficiency.
The SIM Team are responsible for the provision of security assurance across the Reed Assessment Test Centre Network (TCN). This role involves operating the SIM Team training function, conducting security-based training visits, and supporting TCN compliance with security elements of DVSA contract requirements.
Senior Consultants work with customers to solve their business challenges through the design and deployment of Cybersecurity solutions. Responsible for fulfilling the deliverables in a given statement of work and ensuring that customer expectations are met or exceeded in every engagement; reviewing customer deliverables and involved in customer presales activities.
Engineer secure, automated, and scalable cloud environments across GCP, AWS and Azure. Embed security into Terraform-based provisioning workflows, enforce hardened baselines through golden images and guardrails, and drive technical enforcement of best practices across infrastructure layers, from identity to workloads. Design and implement security controls across cloud environments. Develop and maintain IaC modules and Ansible playbooks for secure infrastructure automation.