Job Description
Our Mission
At Palo Alto Networks®, we’re united by a shared mission—to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you’re ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you’re in the right place.
Who We Are
In order to be the cybersecurity partner of choice, we must trailblaze the path and shape the future of our industry. This is something our employees work at each day and is defined by our values: Disruption, Collaboration, Execution, Integrity, and Inclusion. We weave AI into the fabric of everything we do and use it to augment the impact every individual can have. If you are passionate about solving real-world problems and ideating beside the best and the brightest, we invite you to join us!
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Job Summary
Job Summary
As a client-facing Consultant in our Reactive Services team, you will support and contribute to incident response engagements, helping customers investigate and respond to cybersecurity incidents. You will work alongside senior team members and engage with stakeholders to deliver clear, actionable insights throughout the incident lifecycle.
Key Responsibilities
Support reactive incident response engagements, assisting in digital forensics investigations and incident containment activities
Perform host-based forensic analysis across Windows, Linux, and macOS systems to identify Indicators of Compromise (IOCs)
Assist in investigating data breaches using forensic and SIEM tools (e.g., EnCase, FTK, Splunk) to help determine the source and scope of malicious activity
Analyze logs from firewalls, endpoints, web, and other systems to identify evidence of compromise
Collaborate with internal teams and client stakeholders to support remediation efforts and improve overall security posture
Contribute to the development of client deliverables, helping translate technical findings into clear, actionable insights
Communicate findings effectively to both technical and non-technical audiences with guidance from senior team members
Travel as needed (approximately 30%) to support client engagements
Qualifications
Basic Qualifications
3 years of experience in digital forensics, incident response, cybersecurity operations, or related field
Hands-on experience with at least one of the following: endpoint forensics, log analysis, SIEM, or EDR tools
Foundational understanding of operating systems (Windows, Linux, macOS) and common attack vectors
Experience analyzing security events and identifying Indicators of Compromise (IOCs)
Strong problem-solving skills and ability to work in fast-paced, high-pressure environments
Preferred Qualifications
Experience with tools such as EnCase, FTK, Splunk, CrowdStrike, Carbon Black, or similar
Familiarity with incident response frameworks and methodologies
Understanding of attacker tactics, techniques, and procedures (TTPs)
Strong communication skills with the ability to explain technical concepts clearly
Relevant certifications (e.g., GCFA, GCIH, Security)
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary commission target (for sales/com-missioned roles) is expected to be the annual range listed below. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here .
$102,000.00 ... (truncated, view full listing at source)