New RJRP now shows Market-Observed Roles alongside verified postings — scored by our Hiring Activity algorithm. How it works →
🔍
Market-Observed Role 🔍 Observed Likely Active (65-79)
This role was detected through Palantir's hiring system and hasn't been verified directly by the employer. Our algorithm scored it as Likely Active (65-79) based on freshness, specificity, and company patterns. What does this mean? →

Information Security Engineer - Endpoint

Palantir
🔍 Observed
78
Hiring Activity Score
Likely Active (65-79)
  • Base score
  • Posted 1 days ago
  • has location, quality description (4383 chars)
  • 238 new listings in 30d (×0.98 age 1d)
  • 3 skills
  • Direct ATS (lever)
How the Hiring Activity Score works →
New York, NY First seen 1 day, 17 hours ago Last seen 5 hours, 22 minutes ago Lever
Apply on Lever Search Google for This Role

ATS links often expire — Google search finds the latest posting

Job Description

A World-Changing Company Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more. The Role We're looking for someone who has spent years thinking adversarially about Windows and Active Directory — not just operating them, but understanding every layer of how they can be abused, detected, and hardened.

If you've written detections for DCSync, built hunting pipelines around Kerberos ticket anomalies, or reverse-engineered a novel persistence mechanism in a Windows kernel driver, this is the team you want to be on. As an Information Security Engineer focused on Windows and Active Directory, you'll own the security of Palantir's global Windows infrastructure. Your team runs 24/7 prevention, detection, and investigation of security events across our entire environment.

The adversaries we face are sophisticated. We need someone who is more so. Core Responsibilities Own the security posture of Palantir's Windows and Active Directory estate — hardening, configuration standards, and ongoing validation that those standards hold.

Reduce attack surface across AD: audit and remediate misconfigurations, legacy protocol exposure, excessive privilege, Kerberos delegation abuse, and tier model violations. Evaluate, deploy, and own the configuration of defensive tooling across the Windows environment: EDR, PAM, identity threat detection, and endpoint hardening controls. Build and maintain automation for security operations across Windows infrastructure — patching pipelines, configuration drift monitoring, access reviews, and credential hygiene.

Partner with Identity and Infrastructure teams to drive architectural improvements: tiered administration, Protected Users, LAPS, Credential Guard, and authentication policy silos. Translate findings from assessments and red team exercises into durable fixes — configuration changes, architectural improvements, and policy updates that reduce recurrence. What We're Looking For Active Directory Deep, working knowledge of AD architecture: sites and services, replication, trust relationships, delegation models, and the LDAP schema.

Hands-on experience investigating and detecting AD attacks across the full kill chain — from initial enumeration through domain dominance. Familiarity with attack tooling (BloodHound, Impacket, Rubeus, Mimikatz, CrackMapExec) and, critically, what they leave behind. Experience hardening AD environments: tiered administration, Protected Users, LAPS, Credential Guard, PAM trusts, and authentication policy silos.

Windows Internals Thorough understanding of Windows security architecture: access tokens, privilege model, integrity levels, LSASS and credential storage, SAM, and the Security Reference Monitor. Ability to read and interpret Windows kernel structures, driver behavior, and undocumented APIs when necessary. Proficiency with low-level analysis tools: WinDbg, Process Monitor, Process Hacker, Volatility, and x64dbg.

Experience with ETW-based telemetry pipelines and building detections on top of raw Windows event data. Detection & Response Proven track record writing high-fidelity detection logic, not just tuning vendor signatures. Experience leading complex incident response investigations, including those involving nation-state or sophisticated criminal actors.

Strong forensic fundamentals across disk, memory, and network artifacts on Windows systems. What We Value Experience with Entra ID (Azure AD), hybrid identity architectures, and cloud-based attack paths that pivot through on-prem AD. Prior work in adversary simulation, red teaming, or offensive security research — especially against AD targets.

Public contributions: conference talks (BlueHat, BSides, SANS, etc.), blog posts, or open-source tooling. What We Require 5+ years of hands-on security experience, with the majority focused on Windows environments and Active Directory. Proficiency in Python or PowerShell for detection development, automation, and forensic tooling.

Active TS/SCI security clearance, or eligibility and willingness to obtain one. A portfolio of real work: detections you've written, research you've published, tools you've built, or incidents you've led.

Skills

rust python go
Job Information
  • Company:
    Palantir
  • Location:
    New York, NY
  • Job Type:
    Full-Time
  • Experience Level:
    Senior
  • Source:
    Lever
  • Status:
    Active
Activity Score
78 /100
Likely Active (78)

Higher scores indicate more likely active hiring based on listing freshness, company activity, and other signals. Learn more →

+
🔍

We now show two types of job listings

Same commitment to real jobs. More opportunities for you. Here's how it works.

✓ Verified Employer-Verified Posts

These jobs were posted directly to RJRP by the employer. The company has been verified through our multi-step process. This is our gold standard — the employer is real, the job is real, and you can apply with confidence.

✓ 100% employer verified
🔍 Observed Market-Observed Roles

These roles were detected through employer hiring systems like Workday. They haven't been verified by the employer directly, so we score each one using our Hiring Activity Score — an algorithm that analyzes freshness, specificity, company hiring patterns, and more to estimate whether the role is actively being filled.

📊 Only high-scoring listings are shown

Our promise hasn't changed. We will never show you a listing we can't stand behind. Market-observed roles must pass our scoring threshold before they appear on RJRP. Anything that looks like a ghost job, a talent pipeline, or a dead listing gets filtered out — you'll never see it.