CrawlJobs Logo

Defensive Security Analyst

palantir.com Logo

Palantir Technologies

Location Icon

Location:
United States , Washington, D.C.

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

145000.00 - 200000.00 USD / Year

Job Description:

As a Defensive Security Analyst, you are responsible for the security of Palantir’s people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general. Our ideal candidate works well on a team, is highly motivated, and enjoys solving problems and taking on new challenges. In this role, you'll independently manage SOC systems that are essential to our security posture, ensuring they are properly engineered, maintained, and monitored.

Job Responsibility:

  • Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats
  • Develop alerting and detection strategies to identify malicious or anomalous behavior
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics
  • Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications
  • Perform enterprise-wide operations to uncover sophisticated and undetected threats
  • Partner closely with other members of the Information Security team to lead changes in the company's network defense posture
  • Provide expertise in a supporting capacity for incident response activities and digital forensics state preservation, including the capture and preservation of system logs, volatile memory captures, and hard drive (physical or virtual) image captures
  • Conduct host forensics, network, forensics, log analysis, and malware triage in support of hunt operations
  • Interface with client contact(s) and staff in a constructive and professional manner
  • Utilize common forensic and incident response tools

Requirements:

  • TS/SCI Clearance
  • Established experience in operating in SOC environment, either through relevant experience or qualifications
  • Experience with programming or scripting languages such as PowerShell, Python, and Bash

Nice to have:

  • Knowledge of operating and maintaining a SIEM
  • Knowledge of cloud architectures, particularly AWS
  • Experience in penetration testing
  • Ability to quickly learn new technologies and have an ongoing desire to stay current with the latest technologies
  • Ability to train others on the use of forensic and incident response techniques and tools
What we offer:
  • Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance
  • Employees are automatically covered by Palantir’s basic life, AD&D and disability insurance
  • Commuter benefits
  • Relocation assistance
  • Take what you need paid time off, not accrual based
  • 2 weeks paid time off built into the end of each year (subject to team and business needs)
  • 10 paid holidays throughout the calendar year
  • Supportive leave of absence program including time off for military service and medical events
  • Paid leave for new parents and subsidized back-up care for all parents
  • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
  • Stipend to help with expenses that come with a new child
  • Employees can enroll in Palantir’s 401k plan

Additional Information:

Job Posted:
February 18, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Defensive Security Analyst

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst in Annapolis Juncti...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area such as JCAC, UCT, NWBC/INWT, Cyber Defense Operations can count towards experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K SIGN-ON BONUS AFTER SIX-MONTHS ON CONTRACT
Read More
Arrow Right

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Cyber Defense Analyst

The cyber defense analyst for Services within the Business, Functions and Techno...
Location
Location
Mexico , Ciudad De Mexico
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders’ pain-points (data/reporting, false positives, processes)
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Conduct security reviews to check for security compliance to Bank’s requirements
  • Identify areas of repeating SIRT incidents, related trending and work with technology team and ISO contacts in reducing repeat volume instances
  • Identify opportunities for improving SIRT workflow efficiencies and developing reporting which better reports on root causes for bringing down repeat instance volumes
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
Job Responsibility
Job Responsibility
  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders’ pain-points (data/reporting, false positives, processes)
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Conduct security reviews to check for security compliance to Bank’s requirements
  • Identify areas of repeating SIRT incidents, related trending and work with technology team and ISO contacts in reducing repeat volume instances
  • Identify opportunities for improving SIRT workflow efficiencies and developing reporting which better reports on root causes for bringing down repeat instance volumes
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
  • Fulltime
Read More
Arrow Right

Information Security Lead Analyst

As part of Citi Infrastructure Defense team, the analyst position will participa...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years of experience with multiple security disciplines and strong understanding of layered defense concepts
  • Deep understanding of TCP/IP technologies and knowledge of network routing protocols
  • Experience defining enterprise security strategy and ecosystem across diverse products
  • Strong hands on experience with firewall and proxy technologies (Bluecoat, Squid, NGINX)
  • Large Scale Network and Security design experience is essential
  • Work with and understand regulatory and risk management requirements
  • Strong unix / linux experience
  • Scripting (Python/Perl/Bash)
  • University / College degree in any STEM area or equivalent industry/technology knowledge
Job Responsibility
Job Responsibility
  • Identify opportunities to automate and standardize information security controls
  • Resolve any vulnerabilities or issues detected in an application or infrastructure
  • Analyze source code to mitigate identified weaknesses and vulnerabilities within the system
  • Review and validate automated testing results and prioritize actions that resolve issues based on overall risk
  • Scan and analyze applications with automated tools, and perform manual testing if necessary
  • Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions
  • Direct the development and delivery of secure solutions by coordinating with business and technical contacts
  • Assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup
What we offer
What we offer
  • Opportunity to work on the internal security posture for a large financial and thus shaping the industry overall
  • Exposure to a broad range of investment technology businesses and products
  • Access to our word class testing lab with physical hands on using hundreds of devices in the IT security ecosystem
  • Fulltime
Read More
Arrow Right

Information Security Analyst

The Information Security Analyst will play a key role in safeguarding the organi...
Location
Location
United States , Atlanta
Salary
Salary:
Not provided
oceanbluecorp.com Logo
Ocean Blue Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in information security, Cybersecurity, IT, or related field
  • or equivalent 1 year
  • or Preference will be given to candidates with relevant State of Georgia Experience
  • Hands-on experience with Splunk, CrowdStrike Falcon, and Tenable Nessus/Tenable.sc.
  • Strong understanding of CUI protection requirements and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA)
  • Experience with incident response, vulnerability management, and risk assessments
  • Strong analytical, documentation, and communication skills
Job Responsibility
Job Responsibility
  • Conduct continuous monitoring of enterprise systems using CrowdStrike (EDR), Splunk (SIEM), and Tenable (Vulnerability Management)
  • Detect, investigate, and respond to potential threats and incidents impacting CUI and overall system security
  • Maintain dashboards, alerts, and reports to ensure proactive detection and escalation of risks
  • Perform ongoing vulnerability assessments with Tenable, track remediation efforts, and validate closure of findings
  • Support patch management and configuration management processes to reduce the attack surface
  • Deliver metrics and risk posture updates to leadership
  • Maintain and update System Security Plans (SSPs) to document the implementation of security controls
  • Support external and internal audits (IRS, CMS, SSA, NIST, FISMA) by providing required evidence, documentation, and remediation tracking
  • Assist in compliance with evolving frameworks (e.g., NIST SP 800-53 Rev. 5)
  • Triage, analyze, and document security incidents across enterprise systems
Read More
Arrow Right

Security Analyst

WiseTech Global is an Engineer led company, with a focus on building secure, sca...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
blumeglobal.com Logo
Blume Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Understanding of a broad range of information security tools, techniques and controls
  • Min 6 years of experience
  • Operating systems
  • Threat mitigation techniques
  • Enterprise Vulnerability Management processes
  • Understanding of malware analysis and/or network/endpoint forensics techniques/processes
  • Emerging cyber threats
  • Extraction of Indicators of Compromise (IoC) and how to leverage this information to enhance the security monitoring capability
  • Hands-on experience with Microsoft ATP Portals
  • Familiar with O365 Security and Compliance centers
Job Responsibility
Job Responsibility
  • Providing front line protection and defense for thousands of users globally
  • Partnering with our Security function to provide monitoring and analysis, working with a variety of tools
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst. Use information co...
Location
Location
United States , Harlem, GA; Annapolis Junction, MD
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area (e.g., JCAC, UCT, NWBC/INWT, Cyber Defense Operations) may count toward experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K sign-on bonus after six-months on contract
Read More
Arrow Right

Computer Network Defense Analyst

Hoplite Solutions is seeking experienced Computer Network Defense Analysts (CNDA...
Location
Location
United States
Salary
Salary:
Not provided
hoplitesolutions.com Logo
Hoplite Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph clearance
  • STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field (extended military cyber training courses may be counted toward degree requirement)
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Demonstrative experience w/SIGINT and AMOD
  • Experience in network or system administration
  • Documented foreign language proficiency may count toward experience requirements
  • Specific labor category determined by years of experience + educational degrees and/or equivalencies
Job Responsibility
Job Responsibility
  • Use information collected from a variety sources to identify potential vulnerabilities, respond to cyber events, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Support a wide range of data transport possibilities
  • Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • Paid holidays and vacation
  • Fully covered healthcare
  • Short- and long-term disability
  • Up to 7% 401(k) matching
  • Referral bonuses
  • Tuition reimbursement
  • Fulltime
Read More
Arrow Right