Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career
As a Sr. TPE, you will play a key role in providing detailed technical information to our partners, customers, and our internal employees. You will be a strategic adviser to the business, driving valuable insight, guidance and feedback back into Palo Alto Networks. You will work across product teams to deliver this feedback
Your Impact
- Drive innovation within the modern Security Operations Center (SOC) by developing content and capabilities aligned with Cortex and detection-focused workflows
- Collaborate with legal, sales, product, and customer-facing teams to translate security operations needs into actionable product improvements
- Lead and coordinate cross-functional initiatives across product management, engineering, and field teams for high-impact security use cases. Build high-quality content for the Cortex Marketplace including detection rules, parsers, dashboards, and other SOC-enabling artifacts
- Provide structured product feedback to influence roadmap decisions based on real-world SecOps challenges and opportunities
- Create detailed documentation and usage guides tailored for analysts, detection engineers, and security practitioners
- Promote operational excellence by designing scalable detection and response workflows grounded in industry best practices and threat-informed defense
Your Experience
- Ability to inspire and align teams across functions, paired with strong execution and delivery skills.
- 2+ years of experience in security operations, threat detection, incident response, or detection engineering roles
- Solid understanding of SIEM, log analytics, data normalization, and detection lifecycle management (rule creation, tuning, suppression, enrichment)
- Hands-on experience with XSIAM or similar platforms (Splunk, QRadar, Sentinel, etc.) is a strong plus
- Strong technical writing and communication skills, with the ability to convey complex ideas clearly to both technical and non-technical audiences
- Skilled in scripting or automation (Python, JavaScript, etc.) for detection development or incident investigation tasks
- Experience managing multiple projects or programs in dynamic, fast-paced environments with cross-functional visibility
- Familiarity with cloud infrastructure (AWS, Azure, GCP), especially as it relates to telemetry ingestion, detection engineering, or automated response — a significant advantage
- Experience with CNAPP solutions (e.g., Prisma Cloud, Wiz, Orca) and integrating cloud posture, workload protection, or entitlement data into SecOps workflows — an advantage
- Bonus: Exposure to infrastructure-as-code, CI/CD pipelines, or cloud-native services and their intersection with SecOps
All your information will be kept confidential according to EEO guidelines.