This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are seeking a driven and analytical MDR Shift Analyst to join the Unit 42 Managed Detection and Response (MDR) team at Palo Alto Networks. In this role, you will help monitor customer environments, detect potential threats, and respond to cyber incidents affecting our customers’ internal systems and business operations. As part of our MDR team, you will analyze security alerts generated by industry-leading tools such as Cortex XDR, investigate suspicious activity, and work collaboratively with internal security teams to contain and remediate incidents. This role requires strong analytical skills, attention to detail, and the ability to follow established security investigation processes while communicating findings clearly. The ideal candidate is a quick learner and effective communicator who thrives in fast-paced environments and enjoys solving complex security challenges. You will play an important role in protecting customer environments while contributing to the continuous improvement of Palo Alto Networks security capabilities. This position requires flexibility to work in a 24x7 rotational shift schedule based on business and customer needs.
Job Responsibility:
Monitor customer environments and investigate alerts generated by security technologies including Cortex XDR and other endpoint and network detection platforms
Detect, triage, and respond to cybersecurity incidents impacting customer environments
Own and manage the incident lifecycle, from initial detection through investigation, containment, remediation, and closure
Perform threat analysis to identify malicious activity, suspicious behaviors, and potential security incidents
Collaborate with Security Research, Threat Intelligence, and Threat Hunting teams to detect and respond to emerging threats
Provide clear and actionable updates to internal teams and customers regarding incident findings and remediation recommendations
Document incident investigations, response actions, and security findings to maintain strong operational visibility
Provide feedback to product, research, engineering, and threat teams to help improve detection capabilities across Palo Alto Networks products
Contribute to operational improvements by helping refine investigation processes, playbooks, and response workflows
Work closely with a global team supporting customers across different industries and regions
Requirements:
3+ years of experience working in a Security Operations Center (SOC), Incident Response (IR), or Managed Security Services environment
Hands-on experience with security technologies such as: EDR (Endpoint Detection and Response)
SIEM platforms
SOAR platforms
Firewall technologies
Strong understanding of cyberattack techniques, threat vectors, and common attack patterns
Experience investigating security alerts and performing incident triage
Ability to analyze logs, endpoint activity, and security telemetry to determine potential threats
Excellent written and verbal communication skills in English
Nice to have:
Experience working with Cortex XDR or Cortex XSOAR
Familiarity with malware analysis or reverse engineering concepts
Security certifications such as: CEH (Certified Ethical Hacker)
CompTIA CySA+
Other relevant cybersecurity certifications
Experience working in a managed security or MDR environment