5+ years conducting online/open source investigations and technical security analysis; formal training strongly preferred
4+ years professional experience in government, law enforcement, intelligence, or national security conducting analysis/investigations or operations
What We Value
Deep understanding of insider threat tactics, techniques, and procedures
Cybersecurity, intelligence, and/or CI experience preferred
Experience with open source monitoring tools is a plus
Strong written and verbal communication skills and experience presenting technical security concerns and complicated counterintelligence issues to non-technical audience
Geographical experience or subject matter expertise outside of the US is preferred
Possess active security clearance or the ability to acquire a security clearance
Willingness to travel up to 25% of the time if needed, and work a varied schedule based on the needs of the team
Core Responsibilities
Monitor, identify, and analyse internal/external security indicators to determine their impact on Palantir assets
Synthesise data and findings with general trend research to provide investigative support to teams across Palantir
Assess the validity of potential security risks and incidents and triage using solid prioritisation skills
Collaborate with a variety of disparate stakeholders when required to investigate and remediate internal threats
Conduct security awareness training for internal stakeholders to help increase operational security awareness of Palantir employees
Explore and leverage open source information repositories to identify threats to employees, customers, and facilities in advance of or in response to actual incidents
Evaluate the changing risk environment with high-frequency in geographies where Palantir has interests, including providing updated CI and OPSEC guidance pertinent to those locales