Threat Hunting Researcher, Unit 42 MTH (MSIAM)

Other Jobs To Apply

<p><b>Our Mission</b></p><p></p><p>At Palo Alto Networks®, we’re united by a shared mission—to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you’re ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you’re in the right place.</p><p></p><p><b>Who We Are</b></p><p></p><p>In order to be the cybersecurity partner of choice, we must trailblaze the path and shape the future of our industry. This is something our employees work at each day and is defined by our values: Disruption, Collaboration, Execution, Integrity, and Inclusion. We weave AI into the fabric of everything we do and use it to augment the impact every individual can have. If you are passionate about solving real-world problems and ideating beside the best and the brightest, we invite you to join us!</p><p></p>This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.<p style="text-align:inherit !important"></p><p style="text-align:left !important"><b>Job Summary</b></p><p style="text-align:inherit !important"></p><p><span style="color:#000000"><b><u>Threat Hunter (MTH) - Job Description </u></b></span></p><p><br><br></p><p>Your impact<span style="color:#000000"><b> </b></span></p><ul><li style="color:#000000 !important"><p><span style="color:#000000"><span>Help multinational organizations stay one step ahead of adversaries and cyber threats.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Collaborate and guide our customers on the best ways to enhance their protection and readiness for future events.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Improve Palo Alto Networks' solutions by identifying and analyzing new threats and tactics.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Influence the industry by sharing knowledge and findings.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Collaborate with multiple research and development groups.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Contribute to making the world a safer and better place.</span></span></p></li></ul><p><br><br></p><h2><span>Why to choose us</span></h2><ul><li style="color:#000000 !important"><p><span style="color:#000000"><span>Perform threat hunting activities on any data source every day.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Deal with the latest cybersecurity research projects and attacks on a daily basis.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Build hypotheses, execute manual hunting techniques, gather and analyze results, perform forensic activities, and deliver reports.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Join a global team of experts who handle threats and adversaries on a global scale daily.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Enhance your knowledge and experience in all domains of cybersecurity: Network, Endpoint, Cloud, IoT, Mobile devices, and 3rd-party vendor data sources.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Develop, create, and execute new hunting hypothesis methodologies to uncover threats, understand their root causes, and attribute them.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>We believe in automation and scaling.</span></span></p></li><li style="color:#000000 !important"><p><span style="color:#000000"><span>Leverage big data to discover threats and multiple threat intelligence.</span></span></p></li></ul><h2><span>Qualifications</span></h2><p><span style="color:#000000"><span>Your Experience</span></span></p><ul><li><p><span style="color:#000000"><span>Understanding the threat landscape, including attack tools, tactics, and techniques, as well as networking and security fundamentals.</span></span></p></li><li><p><span style="color:#000000"><span>Experience investigating targeted, sophisticated, or hidden threats in both endpoints and networks</span></span></p><ul><li><p>3+ years of relevant experience with a proven track record in cybersecurity research, specializing in either APTs or cybercrime, but with the ability to address the broader threat landscape.</p></li><li><p>Background in forensic analysis and incident response tools (both Dynamic and Static, such as IDA Pro, Ollydbg, and Wireshark) to identify threats and assess the extent and scope of compromises.</p></li><li><p>Understanding of APT operations, including attack vectors, propagation, data exfiltration, lateral movement, persistence mechanisms, and more.</p></li><li><p>Familiarity with organizational cybersecurity measures, including protective tools and remediation techniques.</p></li></ul></li><li><p>Excellent written and oral communication skills in English.</p></li><li><p>Strong attention to detail.</p></li><li><p>Knowledge of advanced threat hunting methodologies and the ability to develop novel techniques.</p></li><li><p>Experience in an Incident Response environment is a plus.</p></li><li><p>Proficiency in Python and SQL is beneficial.</p></li><li><p>Familiarity with reverse engineering is advantageous.</p></li><li><p>Ability to simplify and clarify complex ideas.</p></li><li><p>Experience in writing technical blog posts and analysis reports.</p></li><li><p>Ability to analyze and understand the infrastructure of malicious campaigns.</p></li><li><p>Self-starter who can work independently and adapt to changing priorities.</p></li></ul><p><br><br></p><h2><span style="color:#000000"><span>Additional Information</span></span></h2><p><span style="color:#000000"><span><b>The Team</b></span></span></p><p><span style="color:#000000"><span>We’re not your ordinary Threat Hunting team. We’re a diverse and global group of security professionals who deal with big data and challenge the status quo in order to always be one step ahead of adversaries and protect our customers from cyber threats.</span></span></p><p><span style="color:#000000"><span>Being a threat hunting as part of the team of the fastest-growing high-tech cybersecurity company is a once-in-a-lifetime opportunity. You’ll be joined by the brightest minds in technology, and our global teams are on the front line of defense against cyberattacks.</span></span></p><p><span style="color:#000000"><span><b>Our Commitment</b></span></span></p><p><span style="color:#000000"><span>We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.</span></span></p><p><span style="color:#000000"><span>We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at <span style="overflow-wrap: break-word; display: inline; text-decoration: inherit; hyphens: auto;">accommodations@paloaltonetworks.com.</span></span></span></p><p><span style="color:#000000"><span>Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.</span></span></p><p><span style="color:#000000"><span>All your information will be kept confidential according to EEO guidelines.</span></span></p><p><br><br></p><p></p><p><b>Qualifications </b></p><p></p><p><b>Compensation Disclosure</b></p><p></p><p>The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/com-missioned roles) is expected to be the annual range listed below. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found <a href="https://benefits.paloaltonetworks.com/" target="_blank" rel="noopener noreferrer"><span style="color:#0000ff"><u>here</u></span></a>.</p><p></p>- /yr<p style="text-align:inherit !important"></p><p style="text-align:left !important"><b>Our Commitment </b></p><p style="text-align:inherit !important"></p><p style="text-align:left !important">We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.</p><p style="text-align:inherit !important"></p><p style="text-align:left !important">We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at  <a href="mailto:accommodations@paloaltonetworks.com?subject=Accommodation%20Assistance" target="_blank" rel="noopener noreferrer"><span style="color:#0000ff"><u><span style="overflow-wrap: break-word; display: inline; text-decoration: inherit; hyphens: auto;">accommodations@paloaltonetworks.com</span></u></span></a>.</p><p style="text-align:inherit !important"></p><p style="text-align:left !important">Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.</p><p style="text-align:inherit !important"></p><p style="text-align:left !important">All your information will be kept confidential according to EEO guidelines.</p><p style="text-align:inherit !important"></p>Is role eligible for Immigration Sponsorship? No. Please note that we will not sponsor applicants for work visas for this position.<p><span style="color:#000000"><span style="font-size:14px"> </span></span></p><p><span style="color:#000000"><span style="font-size:14px"><span></span> </span></span></p>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...