Palo Alto Networks
Staff Security Researcher (Advanced Threat Prevention)
Palo Alto Networks, Santa Clara, California, us, 95053
Staff Security Researcher (Advanced Threat Prevention)
You will be part of the team that builds and delivers the threat detection capabilities powering Palo Alto Networks' Advanced Threat Prevention (ATP). The ATP Detection team is responsible for decoding network protocols, identifying applications, and detecting threats across our enterprise customers' networks. As a member of the team, you'll work on a wide range of projects that give customers deep visibility into their network traffic and the ability to prevent exploits, advanced persistent threats (APTs), and other sophisticated attacks. This is a unique opportunity to strengthen your expertise in threat prevention while making a direct impact on securing organizations worldwide. Your impact will include: Researching the root causes of publicly disclosed vulnerabilities and developing effective detection methods, including IPS signatures and ML-based detection. Analyzing and responding to Zero-Day vulnerabilities, delivering IPS protections to customers within 24 hours. Reverse engineering software to uncover previously unknown vulnerabilities. Designing and implementing detection methodologies for emerging attack vectors. Building innovative projects on Linux and Windows systems to advance next-generation security technologies. Your experience should include: Team player with good communication skills and the ability to work with cross-functional groups. Basic understanding of exploit techniques, such as buffer overflows, use-after-free, format string, XSS, SQL injection, CSRF, MITM, and DoS. Familiarity with core network protocols such as HTTP, UDP, FTP, SMTP, DNS, and SMB. Exposure to network traffic analysis tools like tcpdump or Wireshark. Experience with AI/ML is a plus, especially in security contexts. Familiar with Windows/Linux development environment. Programming experience with scripting languages (e.g., Bash, Python, Perl); familiarity with penetration testing tools (Metasploit, Burp Suite, Nmap) or debugging tools (WinDbg, OllyDbg, GDB) is a plus. BS/MS in Computer Science, Computer Engineering, or related field, or equivalent professional/military experience. Experience with Capture the Flag (CTF) is a plus. Contributions to security blogs or talks at conferences (e.g., Black Hat, DEF CON) are highly valued but not required. The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $117000 - $182500/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines.
You will be part of the team that builds and delivers the threat detection capabilities powering Palo Alto Networks' Advanced Threat Prevention (ATP). The ATP Detection team is responsible for decoding network protocols, identifying applications, and detecting threats across our enterprise customers' networks. As a member of the team, you'll work on a wide range of projects that give customers deep visibility into their network traffic and the ability to prevent exploits, advanced persistent threats (APTs), and other sophisticated attacks. This is a unique opportunity to strengthen your expertise in threat prevention while making a direct impact on securing organizations worldwide. Your impact will include: Researching the root causes of publicly disclosed vulnerabilities and developing effective detection methods, including IPS signatures and ML-based detection. Analyzing and responding to Zero-Day vulnerabilities, delivering IPS protections to customers within 24 hours. Reverse engineering software to uncover previously unknown vulnerabilities. Designing and implementing detection methodologies for emerging attack vectors. Building innovative projects on Linux and Windows systems to advance next-generation security technologies. Your experience should include: Team player with good communication skills and the ability to work with cross-functional groups. Basic understanding of exploit techniques, such as buffer overflows, use-after-free, format string, XSS, SQL injection, CSRF, MITM, and DoS. Familiarity with core network protocols such as HTTP, UDP, FTP, SMTP, DNS, and SMB. Exposure to network traffic analysis tools like tcpdump or Wireshark. Experience with AI/ML is a plus, especially in security contexts. Familiar with Windows/Linux development environment. Programming experience with scripting languages (e.g., Bash, Python, Perl); familiarity with penetration testing tools (Metasploit, Burp Suite, Nmap) or debugging tools (WinDbg, OllyDbg, GDB) is a plus. BS/MS in Computer Science, Computer Engineering, or related field, or equivalent professional/military experience. Experience with Capture the Flag (CTF) is a plus. Contributions to security blogs or talks at conferences (e.g., Black Hat, DEF CON) are highly valued but not required. The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $117000 - $182500/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines.