Enable job alerts via email!

Principal Threat Intelligence Researcher (Unit 42)

Palo Alto Networks

Camden Town

Remote

GBP 70,000 - 90,000

Full time

Today
Be an early applicant

Job summary

A leading cybersecurity firm is seeking a Threat Intelligence Researcher to support incident response and provide actionable insights. The ideal candidate will have over 8 years of experience in cyber threat intelligence, strong communication and organizational skills, and familiarity with AI applications in intelligence workflows. This remote role involves collaboration across geographical boundaries to enhance customer protection and advance cybersecurity standards.

Qualifications

  • 8+ years of relevant experience with threat intelligence integration.
  • Ability to coordinate with cross-organizational threat analysts.
  • Experience in identifying trends from open source and telemetry data.

Responsibilities

  • Provide intelligence support to incident response teams.
  • Produce actionable intelligence findings for IR teams.
  • Develop engaging content such as threat reports and briefings.

Skills

Integrating cyber threat intelligence
Knowledge of cyber security threat actors
Leveraging open source data sets
Strong writing and presentation skills
Organizational skills
Using Deep and Dark Web intelligence
Experience with large language models

Tools

Vertex Synapse
Job description
Overview

We are seeking a Threat Intelligence Researcher for our Unit 42 Intelligence Response Unit. This team plays a critical role in providing timely, actionable threat intelligence and response capabilities to help protect our customers.

Your Impact
  1. Embedded Intelligence Support: Partner with the Unit 42 incident response teams to provide intelligence support to cases and track activity with intelligence value, including high profile cases that may require support outside of normal business hours.
  2. Leveraging Unique Data Holdings: Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings. Utilize these resources to produce unique and valuable insights, enhancing the effectiveness and differentiation of our threat intelligence capabilities. Integrate internal holdings with external information to provide actionable intelligence findings to IR teams.
  3. Contributing to External Engagement: Develop engaging and informative content, including customer briefings, threat reports, and updates on major cyber events. Share insights and expertise internally, with customers, and at security conferences.
  4. Cross-Organizational Collaboration: Collaborate with threat analysts, consultants, and engineers from various teams and departments within the organization. Foster strong relationships and support joint efforts to address complex threats that span multiple areas of expertise.
  5. Leverage AI for Analytic Workflows: Integrate Generative AI, NotebookLM, and other artificial intelligence and machine learning solutions across all phases of the intelligence lifecycle to improve analytic workflows. Use and develop new AI solutions to reduce research toil, query existing intelligence holdings, and accelerate report and presentation creation.
Qualifications
  • 8+ years of relevant professional experience such as integrating cyber threat intelligence into incident response engagements, including demonstrated ability to coordinate with cross‑organizational threat analysts, facilitating collaboration, and aligning efforts to achieve common goals.
  • Strong knowledge of cyber security threat actors, particularly their tactics, techniques, procedures, tooling, and noteworthy attacks.
  • Experience leveraging open source data sets, internal telemetry, and case information to identify technical pivot opportunities, patterns of activity, and trends.
  • Strong writing and presentation skills, with the ability to effectively communicate complex threat intelligence information to diverse audiences.
  • Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands.
  • Track record of using Deep and Dark Web intelligence to identify and report on cyber threats, vulnerabilities, and threat actor TTPs (Tactics, Techniques, and Procedures).
  • Hands‑on experience using large language models (LLMs) to accelerate threat intelligence analysis.
  • Familiarity with Vertex Synapse a plus.

At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.

This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together.

Who We Are

Unit 42 brings together our world‑renowned threat researchers with an elite team of security consultants to create an intelligence‑driven, response‑ready organization. The Unit 42 Threat Intelligence team provides threat research that enables security teams to understand adversary intent and attribution, while enhancing protections offered by our products and services to stop advanced attacks. As threats accelerate, Unit 42 is available to advise customers on the latest risks, assess their readiness, and help them recover when the worst occurs.

Our Commitment

We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.