Consultant, DFIR, Reactive Services (Unit 42) - Remote

Palo Alto NetworksBurbank, CA
1dRemote

About The Position

At Palo Alto Networks®, we’re united by a shared mission—to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you’re ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you’re in the right place. Who We Are In order to be the cybersecurity partner of choice, we must trailblaze the path and shape the future of our industry. This is something our employees work at each day and is defined by our values: Disruption, Collaboration, Execution, Integrity, and Inclusion. We weave AI into the fabric of everything we do and use it to augment the impact every individual can have. If you are passionate about solving real-world problems and ideating beside the best and the brightest, we invite you to join us! This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters. Job Summary As a client-facing Consultant in our Reactive Services team, you will support and contribute to incident response engagements, helping customers investigate and respond to cybersecurity incidents. You will work alongside senior team members and engage with stakeholders to deliver clear, actionable insights throughout the incident lifecycle.

Requirements

  • 3+ years of experience in digital forensics, incident response, cybersecurity operations, or related field
  • Hands-on experience with at least one of the following: endpoint forensics, log analysis, SIEM, or EDR tools
  • Foundational understanding of operating systems (Windows, Linux, macOS) and common attack vectors
  • Experience analyzing security events and identifying Indicators of Compromise (IOCs)
  • Strong problem-solving skills and ability to work in fast-paced, high-pressure environments

Nice To Haves

  • Experience with tools such as EnCase, FTK, Splunk, CrowdStrike, Carbon Black, or similar
  • Familiarity with incident response frameworks and methodologies
  • Understanding of attacker tactics, techniques, and procedures (TTPs)
  • Strong communication skills with the ability to explain technical concepts clearly
  • Relevant certifications (e.g., GCFA, GCIH, Security+)

Responsibilities

  • Support reactive incident response engagements, assisting in digital forensics investigations and incident containment activities
  • Perform host-based forensic analysis across Windows, Linux, and macOS systems to identify Indicators of Compromise (IOCs)
  • Assist in investigating data breaches using forensic and SIEM tools (e.g., EnCase, FTK, Splunk) to help determine the source and scope of malicious activity
  • Analyze logs from firewalls, endpoints, web, and other systems to identify evidence of compromise
  • Collaborate with internal teams and client stakeholders to support remediation efforts and improve overall security posture
  • Contribute to the development of client deliverables, helping translate technical findings into clear, actionable insights
  • Communicate findings effectively to both technical and non-technical audiences with guidance from senior team members
  • Travel as needed (approximately 30%) to support client engagements

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service