

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Role Overview
Required Skills
Advanced knowledge with at least one disassembler (e.g. IDA Pro, Ghidra, Binary Ninja).
Expertise with user-mode and kernel-mode debuggers (e.g. x64dbg, WinDbg, gdb).
Developing and scaling reverse engineering automations (e.g. IDAPython, Ghidra Python, Docker).
Deep understanding of modern malware techniques, including obfuscation and evasion tactics.
Understanding of x86/x64 architecture and IL formats (e.g. .NET).
Proficiency in at least one programming language (e.g. Python, C, C++).
Knowledge of networking protocols (e.g. HTTP, DNS, TCP/IP) and analyzing traffic.
Experience configuring sandboxes to increase hit-rate and accelerate analysis.
Familiarity with prompt engineering and using LLMs to accelerate analysis.
Advanced understanding of modern Windows internals relevant to malware analysis.
Experience transforming/modifying malware to support analysis (e.g. deobfuscation).
Familiarity with script deobfuscation and analysis (e.g. PowerShell, JavaScript)
Preferred Skills
Proven track record of contributing to threat research initiatives
Designing and building next-generation hunt tooling
What we Offer
Hands-on experience with real-world malware and threats.
Access to industry-leading tools and infrastructure.
Opportunity to work on impactful projects that contribute to threat intelligence.
A collaborative and supportive team environment.
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career:
As a Sr. TPE, you will play a key role in providing detailed technical information to our partners, customers, and our internal employees. You will serve as a strategic adviser to the business, providing valuable insights, guidance, and feedback that will drive improvements at Palo Alto Networks. You will work across product teams to deliver this feedback
Your Impact:
Collaborate with Legal, Sales, Product Management, and customers to drive innovation and ensure secure, scalable adoption of cloud-native security solutions.
Lead complex, cross-functional projects that shape the product roadmap and align with field-driven priorities.
Provide actionable feedback to Product Managers to influence development in areas such as cloud posture, workload protection, and identity management.
Design and deliver automation content, playbooks, and integrations that address real-world SOC use cases and cloud security risks.
Contribute to the evolution of Cortex product capabilities by enhancing visibility, risk prioritization, and policy enforcement across multi-cloud environments.
Advocate for best practices in securing modern application architectures using automation, contextual risk insights, and scalable cloud-native controls.
Your Experience
Ability to inspire teams, colleagues, and executives, paired with an ability to execute
Understanding of cloud native security and security operations use cases
Experience managing cross-functional programs in a fast-paced environment, and the ability to manage multiple projects and priorities
Excellent professional presence and confidence working with and advising entry-level through top executives
A team player who creatively and effectively solves complex issues and establishes best practices proactively
Understanding and affinity for technology and a motivation to master product and market details
Strong work ethic, integrity, and organizational skills
At least 2 years of experience with one or more major cloud infrastructure providers
At least 2 years of experience with security orchestration, automation, and response technology
Understanding of securing cloud platforms using security operations automation
Technical knowledge of cloud platforms (AWS, Azure, GCP) and modern application architectures
Excellent written and verbal interpersonal skills with strong presentation abilities
Experience with CSPM tools (e.g., Prisma Cloud etc.) to detect and remediate cloud misconfigurations and risks. - an advantage
Understanding of CIEM principles and hands-on experience with managing cloud entitlements across AWS/Azure/GCP - an advantage
Experience in cloud platforms, infrastructure-as-code, and modern CI/CD pipelines - an advantage
Experience in building SOC workflows & incident response - an advantage
Experience in building SIEM integrations - an advantage
Experience in cloud native programming, scripts, and automation - an advantage
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career
You will work firsthand with our valued customers to address their complex post-sales concerns where analysis of situations or data requires an in-depth evaluation of many factors. You’re a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. You’ll enjoy networking with key contacts outside your own area of expertise, with a strong capability of detailing difficult technical issues to both non-technical and technical professionals.
You will regularly participate in technical discussions with multi-functional teams, creating an environment of transparency that ultimately leads to better products, better working environments, and better cybersecurity. Your quick thinking and support to our clients provides the fast assistance they need to keep their environments secure – which means you’ll need to move quickly, thoughtfully, and provide technical assistance as needed (often, in high pressure situations).
Your Impact
Your Experience
You’ll be involved in implementing new products, transitioning from old products to new, and will fix integrations and critical issues as they are raised – in fact, you’ll seek them out to ensure our clients are safely supported. We fix and identify technical problems, with a pointed focus of providing the best customer support in the industry.
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career
We are seeking an experienced product leader with strong product management fundamentals and a deep understanding of malware detection and threat environments. You will partner closely with engineering, threat research, UX, and go-to-market teams to deliver high-impact product solutions that address real-world cybersecurity challenges. Additionally you will be working directly on surfacing threat insights for customers through the Strata Cloud Manager platform. A key requirement will be a keen sense of which insights to present and how to make them impactful for customers. If you are passionate about combating threats and enjoy network security, you will drive significant impact. This role will need both - strong product management skills and deep technical acumen. While we do not expect you to be a malware researcher, working technical knowledge of malware, threats and product engineering will be required.
Your Impact
Lead the WildFire Product Roadmap – Own the end-to-end product vision, strategy, and execution for WildFire integrations across PANW’s product portfolio.
Drive Malware Detection Innovation – Define detection capabilities and feature prioritization frameworks based on threat landscape shifts, customer insights, and technical feasibility.
Champion the Customer Experience – Represent the voice of the customer by translating user feedback and personas into actionable product decisions.
Measure What Matters – Define and track customer success metrics across the product lifecycle to drive measurable improvements in security efficacy and user satisfaction.
Cross-Functional Leadership – Collaborate with engineering, UX, UXR, sales, marketing, and threat research teams to ensure successful delivery, integration, and launch of features.
Your Experience
Your Exp 5+ years of Product Management experience, preferably in cybersecurity or threat detection technologies.
Proven ability to drive complex product initiatives in cross-functional environments.
Deep understanding and experience building threat insights, workflows and outcomes for security teams.
Strong technical acumen in malware detection, network security, cloud infrastructures, and threat intelligence.
Experience working with or integrating security products such as NGFW, XDR, SIEM, or cloud security solutions.
Data-driven decision-making mindset; familiar with defining KPIs and using metrics to evaluate product performance.
Excellent communication and collaboration skills across technical and non-technical teams.
Bachelor's degree in Engineering, Computer Science, or a related field (advanced degree or certifications in cybersecurity or product management preferred).
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $160000 - $220000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .
All your information will be kept confidential according to EEO guidelines.
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Impact
Work with Systems Engineers and customers on complex deployments to help ensure successful product deployment
Be the domain expert on the Mobile Service Provider Public and Private Infrastructure and concepts to help system engineers with product related questions
Support partner engagements as needed
Utilize performance test equipment to validate device performance
Build out and run lab environments and demo systems to replicate customer environments and real-world simulations
Participate in product beta programs and work with customers, product managers, and engineers to complete testing gather detailed feedback, and replicate issues
Document technical concepts including best practices for deployments to ensure our products are well understood and utilized to the greatest extent possible
Work closely with Product Managers and provide product feedback for future development
Work closely with engineering and support teams on resolving product related issues
Develop and deliver competitive positioning
The job requires approximately 20 percent travel
Your Experience
BS/MS in Computer Science or equivalent experience required
Strong understanding and work experience of next-generation firewalls, Cellular CPE Routers, Cellular modems, IDS/ IPS and associated management systems
Strong Experience with private 4G/ 5G networks
Strong Experience with wireless technologies including 5G, LTE and Wifi
Must have production experience and in-depth working knowledge of wireless protocols including HTTP/2, PFCP, GTPv2-C, GTPv1-C, GTP-U, SCTP
Must have knowledge of IP and routing protocols including IPv6, TCP/IP, UDP, OSPF, VLAN, IPSec, NAT
Good understanding of Mobile Packet Core infrastructure
Good understanding of high availability topologies and technologies such as Active/Passive, Active/Active, VRRP, HSRP
Must have experience with traffic generators such as Spirent, IXIA
Good understanding of network management platforms, APIs and 3rd party integrations
Nice to have knowledge of DevOps, Orchestration and Life-cycle management for containers and other infrastructure components
Nice to have experience with troubleshooting one or more of the Telco Container based or VM based environments for 5G Cloud Native Functions from Ericsson, Nokia, Celona, Druid, Ataya or other.
Excellent cross-organizational collaboration skills
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Impact
This Engineering Escalation role is positioned to intercept and assist or drive technical escalations that come to the executive level in engineering
Escalations of this type are extremely critical and are driven by the account teams in the field
You will speak with executive levels at customers, delivering among other things, discussions about the situation, explaining the root cause or progress toward it, providing status internally, and addressing technical questions during customer interaction.
Your Experience
BE /B.tech or equivalent technical graduation is mandatory or equivalent military experience required
Career level experience in support service, technical support or similar troubleshooting related role
Technical lead in area of expertise related to cyberspace equipment vendor or network security organisation
Required Technical skills -
Configuring and troubleshooting dynamic routing protocols (BGP and OSPF primarily)
L1-L3 (ISO model) troubleshooting
Broad understanding of and ability to analyze and troubleshoot Internet applications and protocols
Troubleshooting VPNs (IPSec and SSL tunnels)
Pcap analysis (via Wireshark and other tools)
Hardware troubleshooting for telecommunications equipment
C, C++ and python programming languages(Good to have)
Additional information
Able to explain complex technical issues to non-technical people
Able to have open discussions on network design, network security and related technical topics
Helpful certifications -
Advanced certification for network equipment vendors (e.g. JNCIE, JNCP, CCIE, CCNA, CCNP, CCA etc)
Cloud deployment for AWS, GCP, Azure or KVM based solutions)
We define the industry, instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career
You will work firsthand with our valued customers to address their complex post–sales concerns where analysis of situations or data requires an in–depth evaluation of many factors. You're a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. You'll enjoy networking with key contacts outside your own area of expertise, with a strong capability of detailing difficult technical issues to both non–technical and technical professionals.
You will regularly participate in technical discussions with multi–functional teams, creating an environment of transparency that ultimately leads to better products, better working environments, and better cybersecurity. Your quick thinking and support to our clients provides the fast assistance they need to keep their environments secure - which means you'll need to move quickly, thoughtfully, and provide technical assistance as needed (often, in high pressure situations).
Your Impact
Your Experience
Minimum
Preferred
You'll be involved in implementing new products, transitioning from old products to new, and will fix integrations and critical issues as they are raised - in fact, you'll seek them out to ensure our clients are safely supported. We fix and identify technical problems, with a pointed focus of providing the best customer support in the industry.
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Role Overview
Required Skills
Advanced knowledge with at least one disassembler (e.g. IDA Pro, Ghidra, Binary Ninja).
Expertise with user-mode and kernel-mode debuggers (e.g. x64dbg, WinDbg, gdb).
Developing and scaling reverse engineering automations (e.g. IDAPython, Ghidra Python, Docker).
Deep understanding of modern malware techniques, including obfuscation and evasion tactics.
Understanding of x86/x64 architecture and IL formats (e.g. .NET).
Proficiency in at least one programming language (e.g. Python, C, C++).
Knowledge of networking protocols (e.g. HTTP, DNS, TCP/IP) and analyzing traffic.
Experience configuring sandboxes to increase hit-rate and accelerate analysis.
Familiarity with prompt engineering and using LLMs to accelerate analysis.
Advanced understanding of modern Windows internals relevant to malware analysis.
Experience transforming/modifying malware to support analysis (e.g. deobfuscation).
Familiarity with script deobfuscation and analysis (e.g. PowerShell, JavaScript)
Preferred Skills
Proven track record of contributing to threat research initiatives
Designing and building next-generation hunt tooling
What we Offer
Hands-on experience with real-world malware and threats.
Access to industry-leading tools and infrastructure.
Opportunity to work on impactful projects that contribute to threat intelligence.
A collaborative and supportive team environment.
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit