CrawlJobs Logo

Threat Specialist

palantir.com Logo

Palantir Technologies

Location Icon

Location:
United States , Washington, D.C.

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

135000.00 - 200000.00 USD / Year

Job Description:

We’re looking for a security (or national security) professional who is innately curious and has the ability and desire to dive into the details of complex, murky, and sensitive investigations, conducted on behalf of multiple stakeholders with (often) competing and shifting priorities. As a Threat Specialist on the Palantir Security team, you will work alongside various internal teams to analyze potential external and insider threats, and mitigate the risks posed to Palantir assets and people. We are looking for a motivated self-starter who is eager to serve in a hybrid role, fusing operational security (OPSEC) expertise, threat research, and analysis. In this role, you will interface closely with Information Security, Compliance, Legal, Global Security and Investigations teams, as well as other internal/external stakeholders. This role requires established open source investigations and research skills, experience in Counterintelligence (CI), strong analytical writing and briefing/debriefing skills, and an appetite to become more technical; existing technical experience is a plus. You must be able to synthesize complex information from various sources and convey risk, as well as present investigative/analytical assessment data, in a clear and concise manner to internal and externals stakeholders, including company leadership.

Job Responsibility:

  • Monitor, identify, and analyze internal/external security indicators to determine their impact on Palantir assets
  • Synthesize data and findings with general trend research to provide investigative support to teams across Palantir
  • Assess the validity of potential security risks and incidents and triage using solid prioritization skills
  • Collaborate with a variety of disparate stakeholders when required to investigate and remediate internal threats
  • Conduct security awareness training for internal stakeholders to help increase operational security awareness of Palantir employees
  • Explore and leverage open source information repositories to identify threats to employees, customers, and facilities in advance of or in response to actual incidents
  • Evaluate the changing risk environment with high-frequency in geographies where Palantir has interests, including providing updated CI and OPSEC guidance pertinent to those locales

Requirements:

  • 5+ years conducting online/open source investigations and technical security analysis
  • formal training strongly preferred
  • 4+ years professional experience in government, law enforcement, intelligence, or national security conducting analysis/investigations or operations
  • Deep understanding of insider threat tactics, techniques, and procedures
  • Cybersecurity, intelligence, and/or CI experience preferred
  • Experience with open source monitoring tools is a plus
  • Strong written and verbal communication skills and experience presenting technical security concerns and complicated counterintelligence issues to non-technical audience
  • Geographical experience or subject matter expertise outside of the US is preferred
  • Possess active security clearance or the ability to acquire a security clearance
  • Willingness to travel up to 25% of the time if needed, and work a varied schedule based on the needs of the team

Nice to have:

  • Experience with open source monitoring tools is a plus
  • Geographical experience or subject matter expertise outside of the US is preferred
  • existing technical experience is a plus
What we offer:
  • Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance
  • Employees are automatically covered by Palantir’s basic life, AD&D and disability insurance
  • Commuter benefits
  • Take what you need paid time off, not accrual based
  • 2 weeks paid time off built into the end of each year (subject to team and business needs)
  • 10 paid holidays throughout the calendar year
  • Supportive leave of absence program including time off for military service and medical events
  • Paid leave for new parents and subsidized back-up care for all parents
  • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
  • Stipend to help with expenses that come with a new child
  • Employees can enroll in Palantir’s 401k plan

Additional Information:

Job Posted:
February 18, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Specialist

Network Threat Support Specialist

The Network Threat Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree or equivalent military training
  • Experience discovering threats and/or anomalies in network data
  • Experience discovering and responding to network intrusions
  • Experience adjusting security controls to prevent malware and/or intrusion activity
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
Job Responsibility
Job Responsibility
  • Identify adversarial threats and activities against DoD and US government network
  • Analyze and discover threat and intrusion events
  • Leverage technical analysis capabilities to analyze malware and develop methods to defend against malicious activity
  • Respond to and analyze network intrusion and attack events
  • Characterize the capabilities of malware, document how to detect malware, and assess it’s impact
  • Analyze systems and networks of interest, identify network vulnerabilities, and create techniques to exploit networks
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Cyber Analysis Support Specialist

The Cyber Analysis Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree in liberal arts or sciences or equivalent military training
  • Experience with computer network operations and SIGINT tools and databases
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
  • The ability to work non-standard hours when needed
Job Responsibility
Job Responsibility
  • Conduct research, evaluate technical threat data, and leverage all-source intelligence in a network operations and cyber warfare environment
  • Evaluate cyber threat events to determine their impact on DoD and US Government operations and understand adversary capabilities
  • Leverage multiple analytic tools to conduct research and analyze data
  • Analyze vulnerabilities associated with DoD and US Government networks to determine risk
  • Write collection requirements and tasking for signals intelligence collection systems based on analytic assessments
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Threat Intelligence Analyst

Threat Intelligence Analyst - initial 3-6 month contract. We're seeking a highly...
Location
Location
United Kingdom , Portsmouth or London
Salary
Salary:
Not provided
triarecruitment.com Logo
TRIA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years' experience in Threat Intelligence, SOC or Incident Response
  • Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis
  • Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar
  • Strong experience with Microsoft security tooling, ideally Sentinel and Defender
  • Proficiency in KQL and working knowledge of Python for automation and enrichment
  • Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.)
  • Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats
  • Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams
Job Responsibility
Job Responsibility
  • Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns
  • Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks
  • Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI)
  • Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams
  • Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts
  • Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives
  • Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value
  • Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks
  • Fulltime
Read More
Arrow Right

Threat Analyst

The Threat Analyst is responsible for identifying, investigating, and responding...
Location
Location
United States , Orlando
Salary
Salary:
Not provided
threatlocker.com Logo
ThreatLocker
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3 years of experience in Information Technology with 1 year of specialized work in any of the following IT domains: Active Directory
  • Application Development
  • Network Administration
  • Information Security
  • Experience with virtual machines on VirtualBox, Workstation Pro (Type 2 hypervisor)
  • Bare-metal (type 1) hypervisor experience (ESXi, HyperV) ++
  • Foundational knowledge of Active Directory infrastructure
  • Proficient in PowerShell and Python
  • Strong understanding of foundational Windows OS components: Windows Firewall, Windows Event Logs, Windows file structure, PowerShell
  • Strong understanding of networking and security principles: RFC 1918, DNS, well-known ports, TCP/IP, CIA triad and its relevance to Information Security, AAA Framework
Job Responsibility
Job Responsibility
  • Monitor security tools and systems (SIEM, IDS/IPS, EDR, etc.) for suspicious activity or breaches
  • Analyze security alerts and data to identify potential threats, vulnerabilities, and compromises
  • Build and refine detection capabilities using security tools, threat intelligence, and machine learning models
  • Lead and participate in the response to security incidents (investigating, containing, eradicating, and recovering from threats)
  • Collaborate with cross-functional teams to develop incident handling processes and ensure timely remediation
  • Create detailed post-incident reports, including root cause analysis and recommendations for improvements
  • Develop automated tools and scripts to enhance security detection capabilities and streamline threat detection workflows
  • Maintain and enhance detection tools, including writing custom SNORT, SIGMA, and YARA rules, and updating rulesets in accordance with new threats
  • Conduct forensic analysis and threat hunting to identify malicious activity
  • Review logs from various systems (e.g., firewalls, servers, network devices) to uncover unauthorized activities
  • Fulltime
Read More
Arrow Right
New

Threat Specialist

We’re looking for a security (or national security) professional who is innately...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 200000.00 USD / Year
palantir.com Logo
Palantir Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years conducting online/open source investigations and technical security analysis
  • formal training strongly preferred
  • 4+ years professional experience in government, law enforcement, intelligence, or national security conducting analysis/investigations or operations
  • Deep understanding of insider threat tactics, techniques, and procedures
  • Cybersecurity, intelligence, and/or CI experience preferred
  • Experience with open source monitoring tools is a plus
  • Strong written and verbal communication skills and experience presenting technical security concerns and complicated counterintelligence issues to non-technical audience
  • Geographical experience or subject matter expertise outside of the US is preferred
  • Possess active security clearance or the ability to acquire a security clearance
  • Willingness to travel up to 25% of the time if needed, and work a varied schedule based on the needs of the team
Job Responsibility
Job Responsibility
  • Monitor, identify, and analyze internal/external security indicators to determine their impact on Palantir assets
  • Synthesize data and findings with general trend research to provide investigative support to teams across Palantir
  • Assess the validity of potential security risks and incidents and triage using solid prioritization skills
  • Collaborate with a variety of disparate stakeholders when required to investigate and remediate internal threats
  • Conduct security awareness training for internal stakeholders to help increase operational security awareness of Palantir employees
  • Explore and leverage open source information repositories to identify threats to employees, customers, and facilities in advance of or in response to actual incidents
  • Evaluate the changing risk environment with high-frequency in geographies where Palantir has interests, including providing updated CI and OPSEC guidance pertinent to those locales
What we offer
What we offer
  • Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance
  • Employees are automatically covered by Palantir’s basic life, AD&D and disability insurance
  • Commuter benefits
  • Take what you need paid time off, not accrual based
  • 2 weeks paid time off built into the end of each year (subject to team and business needs)
  • 10 paid holidays throughout the calendar year
  • Supportive leave of absence program including time off for military service and medical events
  • Paid leave for new parents and subsidized back-up care for all parents
  • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
  • Stipend to help with expenses that come with a new child
  • Fulltime
Read More
Arrow Right
New

Threat Specialist

We’re looking for a security (or national security) professional who is innately...
Location
Location
United States , Denver
Salary
Salary:
135000.00 - 200000.00 USD / Year
palantir.com Logo
Palantir Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years conducting online/open source investigations and technical security analysis
  • formal training strongly preferred
  • 4+ years professional experience in government, law enforcement, intelligence, or national security conducting analysis/investigations or operations
  • Deep understanding of insider threat tactics, techniques, and procedures
  • Cybersecurity, intelligence, and/or CI experience preferred
  • Experience with open source monitoring tools is a plus
  • Strong written and verbal communication skills and experience presenting technical security concerns and complicated counterintelligence issues to non-technical audience
  • Geographical experience or subject matter expertise outside of the US is preferred
  • Possess active security clearance or the ability to acquire a security clearance
  • Willingness to travel up to 25% of the time if needed, and work a varied schedule based on the needs of the team
Job Responsibility
Job Responsibility
  • Monitor, identify, and analyze internal/external security indicators to determine their impact on Palantir assets
  • Synthesize data and findings with general trend research to provide investigative support to teams across Palantir
  • Assess the validity of potential security risks and incidents and triage using solid prioritization skills
  • Collaborate with a variety of disparate stakeholders when required to investigate and remediate internal threats
  • Conduct security awareness training for internal stakeholders to help increase operational security awareness of Palantir employees
  • Explore and leverage open source information repositories to identify threats to employees, customers, and facilities in advance of or in response to actual incidents
  • Evaluate the changing risk environment with high-frequency in geographies where Palantir has interests, including providing updated CI and OPSEC guidance pertinent to those locales
What we offer
What we offer
  • Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance
  • Employees are automatically covered by Palantir’s basic life, AD&D and disability insurance
  • Commuter benefits
  • Take what you need paid time off, not accrual based
  • 2 weeks paid time off built into the end of each year (subject to team and business needs)
  • 10 paid holidays throughout the calendar year
  • Supportive leave of absence program including time off for military service and medical events
  • Paid leave for new parents and subsidized back-up care for all parents
  • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
  • Stipend to help with expenses that come with a new child
  • Fulltime
Read More
Arrow Right
New

Threat Specialist

We’re looking for a security (or national security) professional who is innately...
Location
Location
United States , New York
Salary
Salary:
135000.00 - 200000.00 USD / Year
palantir.com Logo
Palantir Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years conducting online/open source investigations and technical security analysis
  • formal training strongly preferred
  • 4+ years professional experience in government, law enforcement, intelligence, or national security conducting analysis/investigations or operations
  • Deep understanding of insider threat tactics, techniques, and procedures
  • Cybersecurity, intelligence, and/or CI experience preferred
  • Experience with open source monitoring tools is a plus
  • Strong written and verbal communication skills and experience presenting technical security concerns and complicated counterintelligence issues to non-technical audience
  • Geographical experience or subject matter expertise outside of the US is preferred
  • Possess active security clearance or the ability to acquire a security clearance
  • Willingness to travel up to 25% of the time if needed, and work a varied schedule based on the needs of the team
Job Responsibility
Job Responsibility
  • Monitor, identify, and analyze internal/external security indicators to determine their impact on Palantir assets
  • Synthesize data and findings with general trend research to provide investigative support to teams across Palantir
  • Assess the validity of potential security risks and incidents and triage using solid prioritization skills
  • Collaborate with a variety of disparate stakeholders when required to investigate and remediate internal threats
  • Conduct security awareness training for internal stakeholders to help increase operational security awareness of Palantir employees
  • Explore and leverage open source information repositories to identify threats to employees, customers, and facilities in advance of or in response to actual incidents
  • Evaluate the changing risk environment with high-frequency in geographies where Palantir has interests, including providing updated CI and OPSEC guidance pertinent to those locales
What we offer
What we offer
  • Medical, dental, and vision insurance
  • Voluntary life insurance
  • Basic life, AD&D and disability insurance
  • Commuter benefits
  • Take what you need paid time off
  • 2 weeks paid time off built into the end of each year
  • 10 paid holidays
  • Supportive leave of absence program including time off for military service and medical events
  • Paid leave for new parents and subsidized back-up care for all parents
  • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
  • Fulltime
Read More
Arrow Right

Cyber Threat Specialist

Critical role within the Cyber Threat Intelligence Team. As a Threat Specialist ...
Location
Location
Australia , Victoria
Salary
Salary:
Not provided
woolworths.com.au Logo
Woolworths Supermarkets
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7+ years of tested cyber security experience within high-pressure environments, including SOC, NOC, and CIRT ecosystems
  • Expert-level mastery in network intrusion, detection, and response, with a current and sharp understanding of the modern threat landscape
  • Deep-seated intuition for malicious code, with the specialised skills required to understand the anatomy of an attack
  • Seamlessly applying the MITRE ATT&CK® framework and Cyber Kill Chain methodology to map adversary behavior and anticipate the 'next move'
  • Broad spectrum confidence across an array of security applications, ensuring the right tool is leveraged for the right threat at the right time
  • Advanced proficiency in Open Source Intelligence, turning public data into actionable defensive strategies
  • A rare ability to translate complex cyber risks into tangible business outcomes, ensuring security initiatives drive organisational value rather than just technical compliance
  • Comprehensive end-to-end exposure to Incident Response (IR), from initial triage through to post-mortem and long-term hardening
  • Equally effective as an individual contributor or a collaborative team player, maintaining peak performance in both autonomous and integrated environments
Job Responsibility
Job Responsibility
  • Maintain awareness of the cyber threat landscape by conducting research to contribute to formal threat reports and curate actionable intelligence
  • Triage, tune, and customise threat alerts while incorporating curated Indicators of Compromise (IOCs) into the existing threat framework
  • Identify and prioritise detection opportunities using SIEM and EDR tools, mapped against the Mitre ATT&CK framework for comprehensive coverage
  • Conduct threat hunting, trigger incident response workflows, and provide dedicated intelligence support during major security incidents
  • Proactively raise security risks and recommend appropriate controls to strengthen the organisation's defensive posture
  • Assist with the zero-day vulnerability process and ensure all technical documentation remains current and accurate
  • Drive continuous improvement by streamlining workflows through the strategic use of automation and advanced tooling
  • Fulltime
Read More
Arrow Right