Palo Alto Networks
Principal Security Researcher (Advanced Threat Prevention)
Palo Alto Networks, Santa Clara, California, us, 95053
Principal Security Researcher (Advanced Threat Prevention)
You will be part of the team that builds and delivers the threat detection capabilities powering Palo Alto Networks' Advanced Threat Prevention (ATP). The ATP detection team is responsible for decoding network protocols, identifying applications, and detecting threats across our enterprise customers' networks. As a Principal Security Researcher, you will play a key leadership role in shaping detection methodologies and driving multiple projects in parallel. You will not only propose innovative ideas and deliver them into production, but also mentor and guide other researchers, ensuring the team continues to raise the bar. This is a unique opportunity to influence Palo Alto Networks' detection strategy at scale, while making a measurable impact on protecting enterprises worldwide from advanced threats. Your impact includes: Propose innovative detection ideas and lead the design and delivery of 23 major projects simultaneously. Mentor and guide 23 junior or mid-level researchers, providing both technical direction and career development support. Drive advanced research into vulnerabilities, Zero-Day exploits, and emerging attack vectors, and translate findings into effective IPS and ML-based detections. Ensure rapid response to Zero-Day vulnerabilities with IPS protections released to customers within 24 hours. Reverse engineering efforts to uncover new vulnerabilities and build proactive defenses. Define detection methodologies for complex or emerging attack vectors, ensuring scalability and robustness across products. Partner with product, QA, and cross-functional engineering teams to align detection strategy with product roadmap and customer needs. Represent the team in technical discussions internally and externally, helping shape industry direction in threat prevention. Your experience includes: Strong leadership and communication skills with proven ability to mentor and guide other researchers. Deep technical expertise in exploit techniques such as buffer overflows, use-after-free, format string, XSS, SQL injection, CSRF, MITM, and DoS. Extensive knowledge of core network protocols including HTTP, UDP, FTP, SMTP, DNS, and SMB. Proficiency in analyzing network traffic using tcpdump, Wireshark, or equivalent tools. Experience applying AI/ML to security problems is highly desirable. Advanced proficiency in Windows and Linux development environments. Strong programming skills in scripting and system-level languages (Python, Bash, Perl, C/C++). Hands-on experience with penetration testing tools (Metasploit, Burp Suite, Nmap) and debugging tools (WinDbg, OllyDbg, GDB) is a strong plus. BS/MS in Computer Science, Computer Engineering, or related field, or equivalent professional/military experience. Demonstrated track record of successfully leading multiple projects end-to-end with measurable impact. Publications or presentations at top security conferences (e.g., Black Hat, DEF CON) are a strong plus. Ability to influence detection strategy within the team and across related groups. Compensation offered for this position will depend on qualifications, experience, and work location. The starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $157,000 - $255,000/YR. The offered compensation may also include restricted stock units and a bonus.
You will be part of the team that builds and delivers the threat detection capabilities powering Palo Alto Networks' Advanced Threat Prevention (ATP). The ATP detection team is responsible for decoding network protocols, identifying applications, and detecting threats across our enterprise customers' networks. As a Principal Security Researcher, you will play a key leadership role in shaping detection methodologies and driving multiple projects in parallel. You will not only propose innovative ideas and deliver them into production, but also mentor and guide other researchers, ensuring the team continues to raise the bar. This is a unique opportunity to influence Palo Alto Networks' detection strategy at scale, while making a measurable impact on protecting enterprises worldwide from advanced threats. Your impact includes: Propose innovative detection ideas and lead the design and delivery of 23 major projects simultaneously. Mentor and guide 23 junior or mid-level researchers, providing both technical direction and career development support. Drive advanced research into vulnerabilities, Zero-Day exploits, and emerging attack vectors, and translate findings into effective IPS and ML-based detections. Ensure rapid response to Zero-Day vulnerabilities with IPS protections released to customers within 24 hours. Reverse engineering efforts to uncover new vulnerabilities and build proactive defenses. Define detection methodologies for complex or emerging attack vectors, ensuring scalability and robustness across products. Partner with product, QA, and cross-functional engineering teams to align detection strategy with product roadmap and customer needs. Represent the team in technical discussions internally and externally, helping shape industry direction in threat prevention. Your experience includes: Strong leadership and communication skills with proven ability to mentor and guide other researchers. Deep technical expertise in exploit techniques such as buffer overflows, use-after-free, format string, XSS, SQL injection, CSRF, MITM, and DoS. Extensive knowledge of core network protocols including HTTP, UDP, FTP, SMTP, DNS, and SMB. Proficiency in analyzing network traffic using tcpdump, Wireshark, or equivalent tools. Experience applying AI/ML to security problems is highly desirable. Advanced proficiency in Windows and Linux development environments. Strong programming skills in scripting and system-level languages (Python, Bash, Perl, C/C++). Hands-on experience with penetration testing tools (Metasploit, Burp Suite, Nmap) and debugging tools (WinDbg, OllyDbg, GDB) is a strong plus. BS/MS in Computer Science, Computer Engineering, or related field, or equivalent professional/military experience. Demonstrated track record of successfully leading multiple projects end-to-end with measurable impact. Publications or presentations at top security conferences (e.g., Black Hat, DEF CON) are a strong plus. Ability to influence detection strategy within the team and across related groups. Compensation offered for this position will depend on qualifications, experience, and work location. The starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $157,000 - $255,000/YR. The offered compensation may also include restricted stock units and a bonus.