the world, including defence, intelligence, and commercial applications. We are trusted by our customers to protect their mission-critical information in the face of advancedpersistent threats. Our offensive security engineers emulate these real-world threats and provide critical signal on attack vectors to help improve our security … opportunities to work with our Protect team to identify vulnerabilities in our product infrastructure and help define relevant security controls. Help defend a unique threat environment. Palantir offers an unparalleled opportunity to ply your craft on the bleeding edge of technology, software … and AI. With a wide range of customers and global impact, our software is under constant threat from advancedpersistent threats (APT). You get to think like an attacker and provide outside-the-box thinking on how to misuse our products. Core Responsibilities Perform offensive security More ❯
in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advancedpersistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest and engagement in cyber … also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies. What you will do in this role: Implement and evolve Canonical … and guide the remediation of security threats and cyber attacks Grow the presence and thought leadership of Canonical SecOps practice Contribute to open source threat intelligence initiatives Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical Develop Canonical SecOps learning and development More ❯
corporate systems, while avoiding detection from common security tools. Demonstrated knowledge of tactics related to malicious insider activity, organized crime/fraud groups, and threat actors, both state and non-state sponsored. Solid understanding of offensive and pentest technologies. Ability to provide remediations recommendation based on test and automated … security testing result. Deep understanding of how an advance persistentthreat and their tactics, procedure and technics. Solid understanding of Enterprise Backend to Frontend system architecture. Familiarity with defender techniques, security monitoring and SIEM tools. Strong ability to analyse and distil complex issues and present succinct updates to More ❯