Related skills
powershell windows python active directory bloodhound📋 Description
- Own the security posture of Palantir's Windows and AD estate—hardening and standards validation.
- Reduce AD attack surface by auditing/remediating misconfigs, legacy protocols, privileges, Kerberos, tier models.
- Configure and own defensive tooling on Windows: EDR, PAM, identity threat detection, endpoint hardening.
- Build automation for Windows security: patching pipelines, drift monitoring, access reviews, credential hygiene.
- Partner with Identity/Infrastructure to improve architecture: tiered admin, Protected Users, LAPS, Credential Guard, auth silos.
- Translate assessments/red-team findings into durable fixes: configs, architecture, and policy updates.
🎯 Requirements
- Deep AD architecture knowledge: sites/services, replication, trust, delegation, LDAP schema.
- Hands-on experience detecting AD attacks across the kill chain.
- Familiar with attack tooling: BloodHound, Impacket, Rubeus, Mimikatz, CrackMapExec.
- Experience hardening AD: tiered admin, Protected Users, LAPS, Credential Guard, PAM trusts, auth silos.
- Strong Windows security architecture knowledge: tokens, privileges, integrity, LSASS, SAM.
- Proficiency with low-level tools: WinDbg, Process Monitor, Volatility, x64dbg.
🎁 Benefits
- Medical, dental, and vision insurance; voluntary life.
- Basic life, AD&D, and disability insurance.
- Commuter benefits.
- Paid time off with no accrual.
- 10 paid holidays per year.
- 401(k) plan enrollment.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!