Information Security Engineer - Endpoint

Palantir Palantir · Enterprise · New York, NY · Information Security

Information Security Engineer focused on Windows and Active Directory infrastructure, responsible for security posture, reducing attack surface, deploying defensive tooling, building automation, driving architectural improvements, and translating findings into durable fixes. Requires deep knowledge of AD architecture, experience investigating AD attacks, familiarity with attack tooling, hardening experience, understanding of Windows security architecture, ability to analyze low-level Windows structures, proficiency with analysis tools, experience with ETW telemetry, and proven track record writing high-fidelity detection logic.

What you'd actually do

  1. Own the security posture of Palantir's Windows and Active Directory estate — hardening, configuration standards, and ongoing validation that those standards hold.
  2. Reduce attack surface across AD: audit and remediate misconfigurations, legacy protocol exposure, excessive privilege, Kerberos delegation abuse, and tier model violations.
  3. Evaluate, deploy, and own the configuration of defensive tooling across the Windows environment: EDR, PAM, identity threat detection, and endpoint hardening controls.
  4. Build and maintain automation for security operations across Windows infrastructure — patching pipelines, configuration drift monitoring, access reviews, and credential hygiene.
  5. Partner with Identity and Infrastructure teams to drive architectural improvements: tiered administration, Protected Users, LAPS, Credential Guard, and authentication policy silos.

Skills

Required

  • Python
  • PowerShell
  • Windows Security
  • Active Directory
  • Incident Response
  • Security Engineering
  • Endpoint Security
  • Threat Detection
  • Forensics
  • Vulnerability Management
  • Automation

Nice to have

  • Entra ID (Azure AD)
  • Hybrid Identity
  • Cloud Security
  • Adversary Simulation
  • Red Teaming
  • Offensive Security Research
  • Public Contributions (talks, blogs, open-source)

What the JD emphasized

  • Deep, working knowledge of AD architecture
  • Hands-on experience investigating and detecting AD attacks across the full kill chain
  • Familiarity with attack tooling
  • Experience hardening AD environments
  • Thorough understanding of Windows security architecture
  • Ability to read and interpret Windows kernel structures, driver behavior, and undocumented APIs
  • Proficiency with low-level analysis tools
  • Experience with ETW-based telemetry pipelines and building detections on top of raw Windows event data
  • Proven track record writing high-fidelity detection logic
  • Experience leading complex incident response investigations
  • Strong forensic fundamentals
  • 5+ years of hands-on security experience
  • Proficiency in Python or PowerShell
  • Active TS/SCI security clearance
  • A portfolio of real work