Customer Focus Analyst (Unit 42 MDR) - Remote Weekend Shift
New York, NY jobs
Our Mission At Palo Alto Networks , we're united by a shared mission-to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you're ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you're in the right place.
Who We Are
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Job Description
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Job Summary
Unit 42's Managed Detection and Response (MDR) service is growing fast - and we're building a customer-centric team that blends technical expertise with direct customer engagement. As a Customer Focus Analyst, you'll act as the front line of communication between our MDR analysts and our customers, helping bridge the gap between incident response and customer understanding.
You'll not only support investigations and incident triage, but also help onboard customers, answer technical questions about reports, alerts, and the service, and manage ongoing communications to ensure clarity, alignment, and satisfaction.
This role is ideal for someone who is technical at their core, but enjoys customer interactions, driving clarity, and ensuring our partners feel confident and supported in their cybersecurity journey.
Key Responsibilities
Be part of a customer-focused sub-function of the Unit 42 MDR team, dedicated to proactive communication and technical guidance
Support onboarding activities for new customers
Monitor incoming communication from customers (e.g., via email, comments), triage and route issues as needed, and answer technical questions around reports, alerts, and recommendations
Collaborate with MDR analysts to ensure the customer's technical questions about incidents or threats are fully addressed
Own the customer communication lifecycle during ongoing incidents - ensure timely updates, clarity, and alignment on next steps
Help drive consistency and quality in how incidents and threat intelligence are communicated externally
Escalate and advocate for customer issues internally across Product, Engineering, and the broader Unit 42 team
Qualifications
Preferred Qualifications
1+ years of experience in a customer-facing cybersecurity role such as professional services, customer success, or customer support - must, Tier 1/2 SOC analyst experience
Hands-on experience with tools such as EDR, SIEM, SOAR, or XDR
Strong customer communication skills - verbal and written - with the ability to explain complex technical details clearly
Experience reviewing, drafting, or presenting incident reports and security findings
Familiarity with Cortex XDR or Cortex XSOAR
Experience onboarding new security services or clients
Additional Information
Salary Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $104500/YR - $169100/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Managed Threat Detection Manager (Unit 42 MDR) - Remote
Spokane, WA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team.
Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business.
As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires.
Your Impact
Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats
Qualifications
Your Experience
At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment
Additional Information
The Team
The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques.
Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Remote Chemistry Expert (PhD)
Riverside, CA jobs
Remote contract for PhDs in Chemistry, Chemical Engineering, or related fields. Work on cutting-edge projects with top AI labs while earning up to $50+/hour, fully remote, with flexible weekly hours. No AI experience required
Help fine-tune large language models (like ChatGPT) using your chemistry knowledge. You'll design problems, check how well AI solves them, and work with researchers to build better benchmarks.
Responsibilities:
Design advanced chemistry problems to test AI performance (e.g., chemical engineering, biochemistry).
Develop clear, step-by-step solutions with rigorous logic.
Evaluate AI outputs for accuracy and quality of reasoning.
Collaborate with researchers to refine benchmarks across undergraduate to PhD-level chemistry topics.
Requirements:
PhD (pursuing or completed) in Chemistry, Chemical Engineering, Biochemistry, or related field.
Strong chemistry reasoning and problem-solving skills across advanced domains.
Ability to communicate complex ideas clearly in writing and provide structured feedback.
No AI experience required
Perks:
Fully remote, flexible work.
Work on cutting-edge AI projects with leading LLM companies.
Offer Details:
Pay rate: $50+/hour (depends on role and candidate expertise).
Assessment: Shortlisted experts complete an evaluation before selection.
Assignments: Contract roles with defined start/end dates; up to 40 hrs/week.
Note: As part of assessments you will go through an AI video interview.
About Turing:
Based in San Francisco, California, Turing is the world's leading research accelerator for frontier AI labs and a trusted partner for global enterprises deploying advanced AI systems. Turing supports customers in two ways: first, by accelerating frontier research with high-quality data, advanced training pipelines, plus top AI researchers who specialize in coding, reasoning, STEM, multilinguality, multimodality, and agents; and second, by applying that expertise to help enterprises transform AI from proof of concept into proprietary intelligence with systems that perform reliably, deliver measurable impact, and drive lasting results on the P&L.
After applying, you will receive an email with a login link. Please use that link to access the portal and complete your profile.
Know amazing talent? Refer them at turing.com/referrals, and earn money from your network.
Managed Threat Detection Manager (Unit 42 MDR) - Remote
Kent, WA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team.
Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business.
As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires.
Your Impact
Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats
Qualifications
Your Experience
At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment
Additional Information
The Team
The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques.
Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Work From Home -Remote Text Quality Evaluator
Fort Lauderdale, FL jobs
Earn up to $16 USD/hourly and work remotely and flexibly.
Outlier, a platform owned and operated by Scale AI, is looking for English speakers to contribute their expertise toward training and refining cutting-edge AI systems. If you're passionate about improving models and excited by the future of AI, this is your opportunity to make a real impact.
What You'll Do
Adopt a “user mindset” to produce natural data to meet the realistic needs you have or would use AI for.
Evaluate AI outputs by reviewing and ranking responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What We're Looking For
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Have
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Pay & Logistics
Base Rate: depending on location: US $16.07, GB £ 13.30 GBP, CA $20.50 CAD, AU $26.25 AUD, IE €14.60 EUR, NZ $26.00 NZD
Bonuses: Additional pay available based on project performance.
Type: Freelance/1099 contract - not an internship.
Location: 100% remote
Schedule: Flexible hours - you choose when and how much to work.
Payouts: Weekly via our secure platform.
This is a freelance position that is paid on a per-hour basis. We don't offer internships as this is a freelance role. You also must be authorized to work in your country of residence, and we will not be providing sponsorship since this is a 1099 contract opportunity. However, if you are an international student, you may be able to sign up if you are on a visa. You should contact your tax/immigration advisor with specific questions regarding your circumstances. We are unable to provide any documentation supporting employment at this time. Please be advised that compensation rates may differ for non-US locations.
Work From Home -English Writing and Content Reviewing Expertise Sought for AI Training
Johns Creek, GA jobs
Earn up to $16 USD/hourly and work remotely and flexibly.
Outlier, a platform owned and operated by Scale AI, is looking for English speakers to contribute their expertise toward training and refining cutting-edge AI systems. If you're passionate about improving models and excited by the future of AI, this is your opportunity to make a real impact.
What You'll Do
Adopt a “user mindset” to produce natural data to meet the realistic needs you have or would use AI for.
Evaluate AI outputs by reviewing and ranking responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What We're Looking For
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Have
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Pay & Logistics
Base Rate: depending on location: US $16.07, GB £ 13.30 GBP, CA $20.50 CAD, AU $26.25 AUD, IE €14.60 EUR, NZ $26.00 NZD
Bonuses: Additional pay available based on project performance.
Type: Freelance/1099 contract - not an internship.
Location: 100% remote
Schedule: Flexible hours - you choose when and how much to work.
Payouts: Weekly via our secure platform.
This is a freelance position that is paid on a per-hour basis. We don't offer internships as this is a freelance role. You also must be authorized to work in your country of residence, and we will not be providing sponsorship since this is a 1099 contract opportunity. However, if you are an international student, you may be able to sign up if you are on a visa. You should contact your tax/immigration advisor with specific questions regarding your circumstances. We are unable to provide any documentation supporting employment at this time. Please be advised that compensation rates may differ for non-US locations.
Managed Threat Detection Manager (Unit 42 MDR) - Remote
San Jose, CA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team.
Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business.
As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires.
Your Impact
Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats
Qualifications
Your Experience
At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment
Additional Information
The Team
The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques.
Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
QA Tester (Hiring Immediately)
Omaha, TX jobs
Join a global community of talented professionals to shape the future of AI. Earn up to $15 USD/hr and additional rewards based on quality of submission.
Have you got what it takes to succeed The following information should be read carefully by all candidates.
Outlier is committed to improving the intelligence & safety of AI models. Owned and operated by Scale AI, weve recently been featured in Forbes for partnering experts with top AI labs to provide the high quality data for LLMs. We believe AI can only perform as well as the data its trained on. Thats why we work with contributors from all over the world, who help improve AI models by providing expert human feedback. This data has led to AI advancements for the world's leading AI labs and large language model builders.
Weve built a best-in-class remote work platform for our freelance contributors to provide valuable, specialized skills, and we in turn strive to provide them with a positive experience based on our core pillars of reliability, transparency, and flexibility.
What you will be doing
We are looking for someone who speaks fluent English to contribute their expertise toward training and refining cutting-edge AI systems.
Adopt a user mindset to produce natural data to meet the realistic needs you have or would use AI for.
Use the tool of rubrics to address user needs in a structured way.
Evaluate AI outputs by reviewing and ranking reasoning and problem-solving responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What were looking for
Education: Bachelors degree or higher (or currently enrolled).
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Haves:
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Compensation and benefits
Earn up to $15 USD/hr, paid out weekly
Rates vary based on quality, accuracy, and time spent. Paid via PayPal & AirTM
Free access to
Model Playground
Interact, experiment and engage with leading large language models free of cost
Flexible schedule and
time commitment
No contracts, no 9-to-5. You control your schedule. (Most experts spend 5-10 hours/week, up to 40 hours working from home
Join a global community of
Coding experts
Join a global network of experts contributing to advanced AI tools
Disclaimer: For non-core work, such as during initial project onboarding or project overtime phases, lower rates may apply. Certain projects offer incentive payments. Please review the payment terms for each project.
Equal Opportunity Employer: Outlier is committed to fostering a diverse and inclusive work environment. xevrcyc We welcome applicants from all backgrounds and celebrate diversity in our workforce.
Remote Biology Expert (PhD)
Bakersfield, CA jobs
Remote contract for PhDs in Biology, Biotechnology, Biochemistry, or related fields. Work on cutting-edge projects with top AI labs while earning up to $50+/hour, fully remote, with flexible weekly hours. No AI experience required
Help fine-tune large language models (like ChatGPT) using your biology knowledge. You'll design problems, check how well AI solves them, and work with researchers to build better benchmarks.
Responsibilities:
Design advanced biology questions to test AI performance.
Develop clear, step-by-step solutions with rigorous logic.
Evaluate AI outputs for accuracy and quality of reasoning.
Collaborate with researchers to refine benchmarks across undergraduate to PhD-level biology topics.
Requirements:
PhD (pursuing or completed) in Biology, Biotechnology, Biochemistry, or a related field.
Strong biology reasoning and problem-solving skills across advanced domains.
Ability to communicate complex ideas clearly in writing and provide structured feedback.
No AI experience required
Perks:
Fully remote, flexible work.
Work on cutting-edge AI projects with leading LLM companies.
Offer Details:
Pay rate: $50+/hour (depends on role and candidate expertise).
Assessment: Shortlisted experts complete an evaluation before selection.
Assignments: Contract roles with defined start/end dates; up to 40 hrs/week.
Note: As part of assessments you will go through an AI video interview.
About Turing:
Based in San Francisco, California, Turing is the world's leading research accelerator for frontier AI labs and a trusted partner for global enterprises deploying advanced AI systems. Turing supports customers in two ways: first, by accelerating frontier research with high-quality data, advanced training pipelines, plus top AI researchers who specialize in coding, reasoning, STEM, multilinguality, multimodality, and agents; and second, by applying that expertise to help enterprises transform AI from proof of concept into proprietary intelligence with systems that perform reliably, deliver measurable impact, and drive lasting results on the P&L.
After applying, you will receive an email with a login link. Please use that link to access the portal and complete your profile.
Know amazing talent? Refer them at turing.com/referrals, and earn money from your network.
Customer Focus Analyst (Unit 42 MDR) - Remote Weekend Shift
Albany, NY jobs
Our Mission At Palo Alto Networks , we're united by a shared mission-to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you're ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you're in the right place.
Who We Are
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Job Description
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Job Summary
Unit 42's Managed Detection and Response (MDR) service is growing fast - and we're building a customer-centric team that blends technical expertise with direct customer engagement. As a Customer Focus Analyst, you'll act as the front line of communication between our MDR analysts and our customers, helping bridge the gap between incident response and customer understanding.
You'll not only support investigations and incident triage, but also help onboard customers, answer technical questions about reports, alerts, and the service, and manage ongoing communications to ensure clarity, alignment, and satisfaction.
This role is ideal for someone who is technical at their core, but enjoys customer interactions, driving clarity, and ensuring our partners feel confident and supported in their cybersecurity journey.
Key Responsibilities
Be part of a customer-focused sub-function of the Unit 42 MDR team, dedicated to proactive communication and technical guidance
Support onboarding activities for new customers
Monitor incoming communication from customers (e.g., via email, comments), triage and route issues as needed, and answer technical questions around reports, alerts, and recommendations
Collaborate with MDR analysts to ensure the customer's technical questions about incidents or threats are fully addressed
Own the customer communication lifecycle during ongoing incidents - ensure timely updates, clarity, and alignment on next steps
Help drive consistency and quality in how incidents and threat intelligence are communicated externally
Escalate and advocate for customer issues internally across Product, Engineering, and the broader Unit 42 team
Qualifications
Preferred Qualifications
1+ years of experience in a customer-facing cybersecurity role such as professional services, customer success, or customer support - must, Tier 1/2 SOC analyst experience
Hands-on experience with tools such as EDR, SIEM, SOAR, or XDR
Strong customer communication skills - verbal and written - with the ability to explain complex technical details clearly
Experience reviewing, drafting, or presenting incident reports and security findings
Familiarity with Cortex XDR or Cortex XSOAR
Experience onboarding new security services or clients
Additional Information
Salary Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $104500/YR - $169100/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Managed Threat Detection Manager (Unit 42 MDR) - Remote
Long Beach, CA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team.
Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business.
As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires.
Your Impact
Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats
Qualifications
Your Experience
At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment
Additional Information
The Team
The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques.
Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Remote Biology Expert (PhD)
Chula Vista, CA jobs
Remote contract for PhDs in Biology, Biotechnology, Biochemistry, or related fields. Work on cutting-edge projects with top AI labs while earning up to $50+/hour, fully remote, with flexible weekly hours. No AI experience required
Help fine-tune large language models (like ChatGPT) using your biology knowledge. You'll design problems, check how well AI solves them, and work with researchers to build better benchmarks.
Responsibilities:
Design advanced biology questions to test AI performance.
Develop clear, step-by-step solutions with rigorous logic.
Evaluate AI outputs for accuracy and quality of reasoning.
Collaborate with researchers to refine benchmarks across undergraduate to PhD-level biology topics.
Requirements:
PhD (pursuing or completed) in Biology, Biotechnology, Biochemistry, or a related field.
Strong biology reasoning and problem-solving skills across advanced domains.
Ability to communicate complex ideas clearly in writing and provide structured feedback.
No AI experience required
Perks:
Fully remote, flexible work.
Work on cutting-edge AI projects with leading LLM companies.
Offer Details:
Pay rate: $50+/hour (depends on role and candidate expertise).
Assessment: Shortlisted experts complete an evaluation before selection.
Assignments: Contract roles with defined start/end dates; up to 40 hrs/week.
Note: As part of assessments you will go through an AI video interview.
About Turing:
Based in San Francisco, California, Turing is the world's leading research accelerator for frontier AI labs and a trusted partner for global enterprises deploying advanced AI systems. Turing supports customers in two ways: first, by accelerating frontier research with high-quality data, advanced training pipelines, plus top AI researchers who specialize in coding, reasoning, STEM, multilinguality, multimodality, and agents; and second, by applying that expertise to help enterprises transform AI from proof of concept into proprietary intelligence with systems that perform reliably, deliver measurable impact, and drive lasting results on the P&L.
After applying, you will receive an email with a login link. Please use that link to access the portal and complete your profile.
Know amazing talent? Refer them at turing.com/referrals, and earn money from your network.
Managed Threat Detection Manager (Unit 42 MDR) - Remote
Santa Ana, CA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team.
Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business.
As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires.
Your Impact
Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats
Qualifications
Your Experience
At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment
Additional Information
The Team
The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques.
Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Work From Home -English Writing and Content Reviewing Expertise Sought for AI Training
Pinellas Park, FL jobs
Earn up to $16 USD/hourly and work remotely and flexibly.
Outlier, a platform owned and operated by Scale AI, is looking for English speakers to contribute their expertise toward training and refining cutting-edge AI systems. If you're passionate about improving models and excited by the future of AI, this is your opportunity to make a real impact.
What You'll Do
Adopt a “user mindset” to produce natural data to meet the realistic needs you have or would use AI for.
Evaluate AI outputs by reviewing and ranking responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What We're Looking For
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Have
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Pay & Logistics
Base Rate: depending on location: US $16.07, GB £ 13.30 GBP, CA $20.50 CAD, AU $26.25 AUD, IE €14.60 EUR, NZ $26.00 NZD
Bonuses: Additional pay available based on project performance.
Type: Freelance/1099 contract - not an internship.
Location: 100% remote
Schedule: Flexible hours - you choose when and how much to work.
Payouts: Weekly via our secure platform.
This is a freelance position that is paid on a per-hour basis. We don't offer internships as this is a freelance role. You also must be authorized to work in your country of residence, and we will not be providing sponsorship since this is a 1099 contract opportunity. However, if you are an international student, you may be able to sign up if you are on a visa. You should contact your tax/immigration advisor with specific questions regarding your circumstances. We are unable to provide any documentation supporting employment at this time. Please be advised that compensation rates may differ for non-US locations.
AI Trainer -Remote Text Quality Evaluator
Valdosta, GA jobs
Earn up to $16 USD/hourly and work remotely and flexibly.
Outlier, a platform owned and operated by Scale AI, is looking for English speakers to contribute their expertise toward training and refining cutting-edge AI systems. If you're passionate about improving models and excited by the future of AI, this is your opportunity to make a real impact.
What You'll Do
Adopt a “user mindset” to produce natural data to meet the realistic needs you have or would use AI for.
Evaluate AI outputs by reviewing and ranking responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What We're Looking For
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Have
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Pay & Logistics
Base Rate: depending on location: US $16.07, GB £ 13.30 GBP, CA $20.50 CAD, AU $26.25 AUD, IE €14.60 EUR, NZ $26.00 NZD
Bonuses: Additional pay available based on project performance.
Type: Freelance/1099 contract - not an internship.
Location: 100% remote
Schedule: Flexible hours - you choose when and how much to work.
Payouts: Weekly via our secure platform.
This is a freelance position that is paid on a per-hour basis. We don't offer internships as this is a freelance role. You also must be authorized to work in your country of residence, and we will not be providing sponsorship since this is a 1099 contract opportunity. However, if you are an international student, you may be able to sign up if you are on a visa. You should contact your tax/immigration advisor with specific questions regarding your circumstances. We are unable to provide any documentation supporting employment at this time. Please be advised that compensation rates may differ for non-US locations.
Managed Threat Detection Manager (Unit 42 MDR) - Remote
Fremont, CA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team.
Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business.
As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires.
Your Impact
Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats
Qualifications
Your Experience
At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment
Additional Information
The Team
The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques.
Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Customer Focus Analyst (Unit 42 MDR) - Remote Weekend Shift
Cheektowaga, NY jobs
Our Mission At Palo Alto Networks , we're united by a shared mission-to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you're ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you're in the right place.
Who We Are
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Job Description
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Job Summary
Unit 42's Managed Detection and Response (MDR) service is growing fast - and we're building a customer-centric team that blends technical expertise with direct customer engagement. As a Customer Focus Analyst, you'll act as the front line of communication between our MDR analysts and our customers, helping bridge the gap between incident response and customer understanding.
You'll not only support investigations and incident triage, but also help onboard customers, answer technical questions about reports, alerts, and the service, and manage ongoing communications to ensure clarity, alignment, and satisfaction.
This role is ideal for someone who is technical at their core, but enjoys customer interactions, driving clarity, and ensuring our partners feel confident and supported in their cybersecurity journey.
Key Responsibilities
Be part of a customer-focused sub-function of the Unit 42 MDR team, dedicated to proactive communication and technical guidance
Support onboarding activities for new customers
Monitor incoming communication from customers (e.g., via email, comments), triage and route issues as needed, and answer technical questions around reports, alerts, and recommendations
Collaborate with MDR analysts to ensure the customer's technical questions about incidents or threats are fully addressed
Own the customer communication lifecycle during ongoing incidents - ensure timely updates, clarity, and alignment on next steps
Help drive consistency and quality in how incidents and threat intelligence are communicated externally
Escalate and advocate for customer issues internally across Product, Engineering, and the broader Unit 42 team
Qualifications
Preferred Qualifications
1+ years of experience in a customer-facing cybersecurity role such as professional services, customer success, or customer support - must, Tier 1/2 SOC analyst experience
Hands-on experience with tools such as EDR, SIEM, SOAR, or XDR
Strong customer communication skills - verbal and written - with the ability to explain complex technical details clearly
Experience reviewing, drafting, or presenting incident reports and security findings
Familiarity with Cortex XDR or Cortex XSOAR
Experience onboarding new security services or clients
Additional Information
Salary Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $104500/YR - $169100/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
AI Trainer -Remote Text Quality Evaluator
San Juan, TX jobs
Earn up to $16 USD/hourly and work remotely and flexibly.
Outlier, a platform owned and operated by Scale AI, is looking for English speakers to contribute their expertise toward training and refining cutting-edge AI systems. If you're passionate about improving models and excited by the future of AI, this is your opportunity to make a real impact.
What You'll Do
Adopt a “user mindset” to produce natural data to meet the realistic needs you have or would use AI for.
Evaluate AI outputs by reviewing and ranking responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What We're Looking For
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Have
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Pay & Logistics
Base Rate: depending on location: US $16.07, GB £ 13.30 GBP, CA $20.50 CAD, AU $26.25 AUD, IE €14.60 EUR, NZ $26.00 NZD
Bonuses: Additional pay available based on project performance.
Type: Freelance/1099 contract - not an internship.
Location: 100% remote
Schedule: Flexible hours - you choose when and how much to work.
Payouts: Weekly via our secure platform.
This is a freelance position that is paid on a per-hour basis. We don't offer internships as this is a freelance role. You also must be authorized to work in your country of residence, and we will not be providing sponsorship since this is a 1099 contract opportunity. However, if you are an international student, you may be able to sign up if you are on a visa. You should contact your tax/immigration advisor with specific questions regarding your circumstances. We are unable to provide any documentation supporting employment at this time. Please be advised that compensation rates may differ for non-US locations.
Work From Home -English Writing and Content Reviewing Expertise Sought for AI Training
North Miami, FL jobs
Earn up to $16 USD/hourly and work remotely and flexibly.
Outlier, a platform owned and operated by Scale AI, is looking for English speakers to contribute their expertise toward training and refining cutting-edge AI systems. If you're passionate about improving models and excited by the future of AI, this is your opportunity to make a real impact.
What You'll Do
Adopt a “user mindset” to produce natural data to meet the realistic needs you have or would use AI for.
Evaluate AI outputs by reviewing and ranking responses from large language models.
Contribute across projects depending on your specific skillset and experience.
What We're Looking For
Analytical and Problem-Solving Skills: Ability to develop complex, professional-level prompts and evaluate nuanced AI reasoning.
Strong Writing: Clear, concise, and engaging writing to explain decisions or critique responses.
Attention to Detail: Commitment to accuracy and ability to assess technical aspects of model outputs.
Nice to Have
Experience in fields like literature, creative writing, history, philosophy, theology, etc.
Prior writing or editorial experience (content strategist, technical writer, editor, etc.).
Interest or background in AI, machine learning, or creative tech tools.
Pay & Logistics
Base Rate: depending on location: US $16.07, GB £ 13.30 GBP, CA $20.50 CAD, AU $26.25 AUD, IE €14.60 EUR, NZ $26.00 NZD
Bonuses: Additional pay available based on project performance.
Type: Freelance/1099 contract - not an internship.
Location: 100% remote
Schedule: Flexible hours - you choose when and how much to work.
Payouts: Weekly via our secure platform.
This is a freelance position that is paid on a per-hour basis. We don't offer internships as this is a freelance role. You also must be authorized to work in your country of residence, and we will not be providing sponsorship since this is a 1099 contract opportunity. However, if you are an international student, you may be able to sign up if you are on a visa. You should contact your tax/immigration advisor with specific questions regarding your circumstances. We are unable to provide any documentation supporting employment at this time. Please be advised that compensation rates may differ for non-US locations.
Customer Focus Analyst (Unit 42 MDR) - Remote Weekend Shift
Syracuse, NY jobs
Our Mission At Palo Alto Networks , we're united by a shared mission-to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you're ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you're in the right place.
Who We Are
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Job Description
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Job Summary
Unit 42's Managed Detection and Response (MDR) service is growing fast - and we're building a customer-centric team that blends technical expertise with direct customer engagement. As a Customer Focus Analyst, you'll act as the front line of communication between our MDR analysts and our customers, helping bridge the gap between incident response and customer understanding.
You'll not only support investigations and incident triage, but also help onboard customers, answer technical questions about reports, alerts, and the service, and manage ongoing communications to ensure clarity, alignment, and satisfaction.
This role is ideal for someone who is technical at their core, but enjoys customer interactions, driving clarity, and ensuring our partners feel confident and supported in their cybersecurity journey.
Key Responsibilities
Be part of a customer-focused sub-function of the Unit 42 MDR team, dedicated to proactive communication and technical guidance
Support onboarding activities for new customers
Monitor incoming communication from customers (e.g., via email, comments), triage and route issues as needed, and answer technical questions around reports, alerts, and recommendations
Collaborate with MDR analysts to ensure the customer's technical questions about incidents or threats are fully addressed
Own the customer communication lifecycle during ongoing incidents - ensure timely updates, clarity, and alignment on next steps
Help drive consistency and quality in how incidents and threat intelligence are communicated externally
Escalate and advocate for customer issues internally across Product, Engineering, and the broader Unit 42 team
Qualifications
Preferred Qualifications
1+ years of experience in a customer-facing cybersecurity role such as professional services, customer success, or customer support - must, Tier 1/2 SOC analyst experience
Hands-on experience with tools such as EDR, SIEM, SOAR, or XDR
Strong customer communication skills - verbal and written - with the ability to explain complex technical details clearly
Experience reviewing, drafting, or presenting incident reports and security findings
Familiarity with Cortex XDR or Cortex XSOAR
Experience onboarding new security services or clients
Additional Information
Salary Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $104500/YR - $169100/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.