/r/netsec's Q1 2015 Information Security Hiring Thread

Company: Palantir Technologies

Location: Palo Alto, CA preferred. NY and DC are possibilities.

About Us

Palantir's Information Security team is rapidly growing, and we're looking for expert network defenders to help shape and secure the future of one of the most exciting, engaging, and innovative companies in the industry.

Our Information Security team is responsible for the security of Palantir's people and infrastructure around the globe. As a member of the Information Security team, your technical expertise is second only to your professionalism and passion for security and technology in general. You're a highly motivated team player that thrives on solving problems and tackling new challenges.

We're looking to fill the following roles with awesome, motivated InfoSec professionals:

Information Security Operations Engineer (Computer Incident Response Team)

Mission

You're the first line of defense for protecting Palantir. You are part of an elite team responsible for 24/7 protection, detection, and investigation of security events and active attacks. Your work directly impacts the success of the mission, as you hunt for badness across our global network – wherever it may hide.

Responsibilities

*Actively detect, respond to, and remediate security events across our global infrastructure

*Perform proactive enterprise-wide operations to hunt for sophisticated and previously unknown malware

*Develop new and novel capabilities for uncovering, detecting, and disabling malware

*Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications

*Work closely with other members of the Information Security team to drive changes in the network defense posture of Palantir

Requirements

*Active TS/SCI security clearance or willingness and eligibility to obtain a security clearance

*Broad exposure to security disciplines and deep exposure in one or more (preferably including Digital Forensics or Incident Response)

*Deep forensic experience in one or more major operating system platforms (preferably including Windows, OS X, or Linux)

*Strong investigative mindset with acute attention to detail

*Strong working knowledge of TCP/IP networking and common protocols

Preferred

*Experience reverse engineering malware to develop signatures and countermeasures

*Experience with Yara or OpenIOC frameworks

*Experience performing offensive assessments, penetration testing, exploit development, or vulnerability analysis

*Experience with Python (Preferred), Perl, Ruby, C/C++, or Java

*Experience with investigating intrusion sets or performing exploit analysis

** Information Security Operations Engineer (Threat Intelligence) ** Mission You're tasked with understanding the past, and predicting the future of information security. You will analyze attacks, exploits, trends, and malware to understand the security landscape, and help Palantir defend itself against the most dedicated attackers. Your work will provide important context to security events, and will enable network defenders to hunt for badness across our global network, wherever it may hide.

Responsibilities *Analyze malware, attacks, trends, and historical security events to understand the attacker landscape *Analyze large data-sets to find valuable signal hiding in noise *Assist defenders in hunting badness across our infrastructure *Develop new and novel capabilities for prevention, detection, and deterrence of advanced campaigns *Develop threat intelligence products for internal and external consumption

Requirements *Active security clearance or willingness and eligibility to obtain a security clearance *Broad exposure to security disciplines and deep exposure in one or more (preferably including Digital Forensics or Incident Response) *Advanced knowledge of the threat landscape and threat intelligence methodologies *Strong investigative mindset with acute attention to detail *Experience performing formal threat modeling

Preferred *Experience reverse engineering malware to develop signatures and countermeasures *Experience with Yara or OpenIOC frameworks *Experience performing offensive assessments, penetration testing, exploit development, or vulnerability analysis *Experience with Python (Preferred), Perl, Ruby, C/C++, or Java

** Information Security Operations Engineer (Infrastructure) ** Mission You're designing, building, feeding, and caring for mission-critical systems that power Palantir. You're passionate about supporting the Information Security Team, and the entire Company, by finding new and meaningful ways to drive security change – through infrastructure, policy, process, or tooling. Your day-to-day work impacts the success of the enterprise, and empowers network defenders to hunt for badness across our global network, wherever it may hide.

Responsibilities *Design, build, and maintain mission-critical infrastructure that support information security controls and operations *Perform research and evaluation of new infrastructure, products, services, and security controls to shape the defense posture of Palantir *Deploy, manage, monitor, and tune data feeds, analysis pipelines, and sensors *Understand pain-points for the Information Security team, and find new and novel ways to reduce friction and enable mission success *Assist network defenders in hunting badness across our infrastructure

Requirements *Active TS/SCI security clearance or willingness and eligibility to obtain a security clearance *Strong experience with at least two of the following languages: Python (Preferred), Bash (Preferred), Powershell (Preferred), Perl, Ruby, C/C++, or Java *Strong system engineering, architecture, and administration skills in one or more major operating system platforms: Windows, OS X, or Linux *Strong experience with one or more IDS/IPS platforms *Strong working knowledge of TCP/IP networking and system troubleshooting skills *Strong investigative mindset with the ability to contextualize and understand security events from various sources

Preferred *Experience managing PKI Infrastructure *Experience managing Firewall or VPN platforms *Experience managing endpoint security services and products *Experience performing application security reviews, offensive assessments, penetration testing, exploit development, or vulnerability analysis

How to Apply

Apply via the URLs linked above, or PM me for additional questions/concerns.

/r/netsec Thread