Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career
The Principal Consultant will be one of the early joiners in the team, and as such should have a hands-on mentality, ability to work on complex engagements independently, and flexibility to be involved in various work streams depending on their skills and business needs. You will be a clear self-starter who understands how to complete high-level tasking and uses your knowledge and skills to meet goals and deadlines. While the individual will liaise with Unit 42’s Threat Intelligence researchers, the majority of their time will be spent in client engagements.
Your Impact
- Assist Unit 42 Consulting Director of Threat Intelligence Consulting Services in developing and delivering a threat-informed service offering to international clients
- Act as a subject matter expert on cyber threat intelligence for clients and internal teams
- Plan, research, and write analytical reports including client-specific threat assessments and event-based briefings
- Deliver threat intelligence maturity assessments and threat intelligence capability building services, including recommendations to improve client’s threat intelligence practices
- OSINT and deep dark web monitoring for victim-centric intelligence
- Interface with the wider Unit 42 Security Consulting and Palo Alto Networks product teams to identify mitigating actions to TTPs exploited by threat actors
- Amplify Unit 42s’ presence and credibility in the marketplace through thought leadership, including via speaking engagements, and blog articles on threat intelligence topics
Your Experience
- 7+ years of demonstrated experience in a threat intelligence team, ideally in a consulting capacity but in-house experience is also a plus
- Excellent English written and verbal communications skills
- Experience in producing tailored threat reports on a strategic and tactical level for consumers ranging from senior management to technical analysts
- Deep understanding of cybercriminal and state-sponsored groups, their TTPs and high level mitigations
- Understanding of how threat intelligence is made actionable within client organisations including incident response, detection engineering, red teaming, threat hunting and/or risk management
- Strong familiarity with the Mitre ATT&CK framework
- Passionate about cyber threat intelligence and its tradecraft, attention to details.
- Nice to have
- While we do not expect you to tick all the boxes, a successful candidate will have a combination of some of the following
- Experience in intelligence led-red team exercises like CORIE, CBEST, TIBER, iCAST
- Knowledge of threat actors hunting tools and techniques (e.g. VT, Passive DNS)
- Experience in incident response, digital forensics, threat hunting, or red teaming
- Experience in risk management consulting advising clients on appropriate security controls
- Experience in building organizational incident preparedness including tabletop exercises, incident response planning or crisis management
- Additional language skills to interface with regional clients (ideally Japanese)
- Proficiency in Python or other scripting languages to automate tasks
- Cybersecurity industry certifications such as CRTIA, CCTIM, GCTI are a plus but not essential
All your information will be kept confidential according to EEO guidelines.