Our Mission
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Your Career
We are seeking a Principal Cyber Threat Intelligence Researcher to join our Fusion Intelligence Team (FIT), which is part of the Intel Response Unit within our broader Unit 42 Threat Intelligence organization. FIT’s mission is to conduct accelerated threat intelligence collection and analysis with a focus on pivoting from open-source intelligence to internal holdings to contextualize, cluster, and develop insights into emerging and ongoing threat activity. You will have the opportunity to collaborate with world-class researchers and engineers across Palo Alto Networks, ensuring high caliber intelligence drives additional cyber threat intel research, consultant engagements, customer and executive insights, and product integrations.
Your Impact
As a Principal Researcher on the Fusion Intelligence Team, your primary responsibilities will include:
Accelerate OSINT fusion: Integrate open source into intelligence workflows by leveraging commercial enrichment sources and threat research to build a more complete cyber threat picture. Conduct accelerated analysis to enhance the depth and breadth of Palo Alto Network’s threat intelligence knowledge repository, and bolster our knowledge of threat activity to provide more comprehensive insights for customers.
Leverage unique data holdings and partner across teams: Harness the full weight of the company’s unique data holdings, including product telemetry, front line Incident Response (IR) data, and partner information. Utilize these resources to produce and communicate the most unique and valuable insights, enhancing the effectiveness and differentiation of our threat intelligence capabilities.
Author tactical and strategic intelligence products: Produce rapid intelligence products for customers based on unique findings derived from the team’s analysis. Partner with other research and product teams to build joint capabilities and ensure findings are leveraged to the full extent. Ensure threat actors, industry, region, and malware profiles are continuously updated on a recurring basis..
Leverage AI for Analytic Workflows: Integrate Generative AI, NotebookLM, and other artificial intelligence and machine learning solutions across all phases of the intelligence lifecycle to improve analytic workflows. Use and develop new AI solutions to reduce research toil, query existing intelligence holdings, and accelerate report and presentation creation.
Your Experience
10-12 years of experience in cyber threat intelligence, threat hunting, or combination of technical and strategic analysis
Expert-level experience in Cyber Threat Intelligence including actionable knowledge of cyber adversary groups, tactics, and techniques, malware analysis, and hunting methodologies.
Expert-level understanding of how to extract intelligence from technical data sources (malware, netflow, internet scan data, attack surface topologies, etc.).
Strong understanding of the cyber threat landscape and able to contextualize how adversary advancement or new campaigns either reflects status quo or is a demonstrated shift.
Strong experience with hypergraph modeling and clustering process-level details within the context of threat activity.
Ability to contextualize cyber events, identify how the events fit into a current or historical pattern, the impact on an industry or organization, and tailored defensive recommendations.
Ability to leverage multiple telemetry types and intelligence sources to generate unique insights into potential threats and associate malicious activity.
Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
Strong writing and presentation skills, with the ability to effectively communicate complex threat intelligence information to diverse audiences.
Proficiency in developing and maintaining scripts to streamline intelligence workflows, enhance efficiency, and improve data accuracy.
Familiarity with Vertex Synapse preferred.
Experience with prompt engineering and leveraging Google’s AI capabilities to support development of intelligence products.
Bachelor’s Degree or equivalent military experience – an advanced degree such as MS is a plus.
The Team
Unit 42 brings together our world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response ready organization. The Unit 42 Threat Intelligence team provides threat research that enables security teams to understand adversary intent and attribution, while enhancing protections offered by our products and services to stop advanced attacks. As threats escalate, Unit 42 is available to advise customers on the latest risks, assess their readiness, and help them recover when the worst occurs.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $162,700 – $263,150/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at [email protected].
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
This job listing has been manually reviewed by the Jobicy Trust & Safety Team for compliance with our posting guidelines, including verification of the company's legitimacy, accuracy of job details, clarity of remote work policy, and absence of misleading or fraudulent content.
For safety tips, see our guides, and please let us know if you need any assistance.

Create a free account with us to save a history of all jobs you've shown interest in.
You can also continue as a guest if you prefer.
Similar Data Science & Analytics remote jobs
Jobicy
578 professionals pay to access exclusive and experimental features on Jobicy
Free
USD $0/month
For people just getting started
Plus
USD $8/month
Everything in Free, and: