Threat Specialist

Palantir Technologies
London
1 year ago
Applications closed

Related Jobs

View all jobs

Cyber Security Specialist – Training Course

Cyber Security Specialist – Training Course

Senior Microsoft Security Specialist

Farnborough Lead SOC Content

Lead SIEM Engineer

AI Security Engineer

A World-Changing CompanyPalantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.The RoleWe’re looking for a security (or national security) professional who is innately curious and has the ability and desire to dive into the details of complex, murky, and sensitive investigations, conducted on behalf of multiple stakeholders with (often) competing and shifting priorities.As a Threat Specialist on the Palantir Security team, you will work alongside various internal teams to analyse potential external and insider threats, and mitigate the risks posed to Palantir assets and people. We are looking for a motivated self-starter who is eager to serve in a hybrid role, fusing operational security (OPSEC) expertise, threat research, and analysis. In this role you will interface closely with Information Security, Compliance, Legal, Global Security and Investigations teams, as well as other internal/external stakeholders. This role requires established open source investigations and research skills, experience in Counterintelligence (CI), strong analytical writing and briefing/debriefing skills, and an appetite to become more technical; existing technical experience is a plus. You must be able to synthesise complex information from various sources and convey risk, as well as present investigative/analytical assessment data, in a clear and concise manner to internal and externals stakeholders, including company leadership.

Core Responsibilities

Monitor, identify, and analyse internal/external security indicators to determine their impact on Palantir assets Synthesise data and findings with general trend research to provide investigative support to teams across Palantir Assess the validity of potential security risks and incidents and triage using solid prioritisation skills Collaborate with a variety of disparate stakeholders when required to investigate and remediate internal threats Conduct security awareness training for internal stakeholders to help increase operational security awareness of Palantir employees Explore and leverage open source information repositories to identify threats to employees, customers, and facilities in advance of or in response to actual incidents Evaluate the changing risk environment with high-frequency in geographies where Palantir has interests, including providing updated CI and OPSEC guidance pertinent to those locales

What We Value

Deep understanding of insider threat tactics, techniques, and procedures Cybersecurity, intelligence, and/or CI experience preferred Experience with open source monitoring tools is a plus Strong written and verbal communication skills and experience presenting technical security concerns and complicated counterintelligence issues to non-technical audience Geographical experience or subject matter expertise outside of the US is preferred Possess active security clearance or the ability to acquire a security clearance Willingness to travel up to 25% of the time if needed, and work a varied schedule based on the needs of the team

What We Require

5+ years conducting online/open source investigations and technical security analysis; formal training strongly preferred 4+ years professional experience in government, law enforcement, intelligence, or national security conducting analysis/investigations or operations

Life at PalantirWe want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at and note that our offerings may vary by region.In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office.If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please and let us know how we can help.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.