<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>11ef34c2-278</externalid>
      <Title>Information Security Engineer</Title>
      <Description><![CDATA[<p>We&#39;re looking for someone who has spent years thinking adversarially about Windows and Active Directory. As an Information Security Engineer focused on Windows and Active Directory, you&#39;ll own the security of Palantir&#39;s global Windows infrastructure.</p>
<p>Your team runs 24/7 prevention, detection, and investigation of security events across our entire environment. The adversaries we face are sophisticated. We need someone who is more so.</p>
<p><strong>Core Responsibilities</strong></p>
<ul>
<li>Own the security posture of Palantir&#39;s Windows and Active Directory estate , hardening, configuration standards, and ongoing validation that those standards hold.</li>
<li>Reduce attack surface across AD: audit and remediate misconfigurations, legacy protocol exposure, excessive privilege, Kerberos delegation abuse, and tier model violations.</li>
<li>Evaluate, deploy, and own the configuration of defensive tooling across the Windows environment: EDR, PAM, identity threat detection, and endpoint hardening controls.</li>
<li>Build and maintain automation for security operations across Windows infrastructure , patching pipelines, configuration drift monitoring, access reviews, and credential hygiene.</li>
<li>Partner with Identity and Infrastructure teams to drive architectural improvements: tiered administration, Protected Users, LAPS, Credential Guard, and authentication policy silos.</li>
<li>Translate findings from assessments and red team exercises into durable fixes , configuration changes, architectural improvements, and policy updates that reduce recurrence.</li>
</ul>
<p><strong>What We&#39;re Looking For</strong></p>
<ul>
<li>Active Directory</li>
<li>Deep, working knowledge of AD architecture: sites and services, replication, trust relationships, delegation models, and the LDAP schema.</li>
<li>Hands-on experience investigating and detecting AD attacks across the full kill chain , from initial enumeration through domain dominance.</li>
<li>Familiarity with attack tooling (BloodHound, Impacket, Rubeus, Mimikatz, CrackMapExec) and, critically, what they leave behind.</li>
<li>Experience hardening AD environments: tiered administration, Protected Users, LAPS, Credential Guard, PAM trusts, and authentication policy silos.</li>
<li>Windows Internals</li>
<li>Thorough understanding of Windows security architecture: access tokens, privilege model, integrity levels, LSASS and credential storage, SAM, and the Security Reference Monitor.</li>
<li>Ability to read and interpret Windows kernel structures, driver behavior, and undocumented APIs when necessary.</li>
<li>Proficiency with low-level analysis tools: WinDbg, Process Monitor, Process Hacker, Volatility, and x64dbg.</li>
<li>Experience with ETW-based telemetry pipelines and building detections on top of raw Windows event data.</li>
<li>Detection &amp; Response</li>
<li>Proven track record writing high-fidelity detection logic, not just tuning vendor signatures.</li>
<li>Experience leading complex incident response investigations, including those involving nation-state or sophisticated criminal actors.</li>
<li>Strong forensic fundamentals across disk, memory, and network artifacts on Windows systems.</li>
</ul>
<p><strong>What We Value</strong></p>
<ul>
<li>Experience with Entra ID (Azure AD), hybrid identity architectures, and cloud-based attack paths that pivot through on-prem AD.</li>
<li>Prior work in adversary simulation, red teaming, or offensive security research , especially against AD targets.</li>
<li>Public contributions: conference talks (BlueHat, BSides, SANS, etc.), blog posts, or open-source tooling.</li>
</ul>
<p><strong>What We Require</strong></p>
<ul>
<li>5+ years of hands-on security experience, with the majority focused on Windows environments and Active Directory.</li>
<li>Proficiency in Python or PowerShell for detection development, automation, and forensic tooling.</li>
<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>
<li>A portfolio of real work: detections you&#39;ve written, research you&#39;ve published, tools you&#39;ve built, or incidents you&#39;ve led.</li>
</ul>
<p><strong>Additional Information</strong></p>
<ul>
<li>The estimated salary range for this position is estimated to be $145,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$145,000 - $200,000/year</Salaryrange>
      <Skills>Active Directory, Windows Internals, Detection &amp; Response, Python, PowerShell, ETW-based telemetry pipelines, Low-level analysis tools, WinDbg, Process Monitor, Process Hacker, Volatility, x64dbg, Entra ID, Hybrid identity architectures, Cloud-based attack paths</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, developing lifesaving drugs, forecasting supply chain disruptions, and more.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/4bfef5e0-6689-4db8-9ffe-ab6df6836845</Applyto>
      <Location>Denver</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>c67c28f8-bb3</externalid>
      <Title>Information Security Engineer</Title>
      <Description><![CDATA[<p>We&#39;re looking for someone who has spent years thinking adversarially about Windows and Active Directory. As an Information Security Engineer focused on Windows and Active Directory, you&#39;ll own the security of Palantir&#39;s global Windows infrastructure. Your team runs 24/7 prevention, detection, and investigation of security events across our entire environment.</p>
<p>Core Responsibilities:</p>
<ul>
<li>Own the security posture of Palantir&#39;s Windows and Active Directory estate , hardening, configuration standards, and ongoing validation that those standards hold.</li>
</ul>
<ul>
<li>Reduce attack surface across AD: audit and remediate misconfigurations, legacy protocol exposure, excessive privilege, Kerberos delegation abuse, and tier model violations.</li>
</ul>
<ul>
<li>Evaluate, deploy, and own the configuration of defensive tooling across the Windows environment: EDR, PAM, identity threat detection, and endpoint hardening controls.</li>
</ul>
<ul>
<li>Build and maintain automation for security operations across Windows infrastructure , patching pipelines, configuration drift monitoring, access reviews, and credential hygiene.</li>
</ul>
<ul>
<li>Partner with Identity and Infrastructure teams to drive architectural improvements: tiered administration, Protected Users, LAPS, Credential Guard, and authentication policy silos.</li>
</ul>
<ul>
<li>Translate findings from assessments and red team exercises into durable fixes , configuration changes, architectural improvements, and policy updates that reduce recurrence.</li>
</ul>
<p>What We&#39;re Looking For:</p>
<ul>
<li>Active Directory</li>
</ul>
<ul>
<li>Deep, working knowledge of AD architecture: sites and services, replication, trust relationships, delegation models, and the LDAP schema.</li>
</ul>
<ul>
<li>Hands-on experience investigating and detecting AD attacks across the full kill chain , from initial enumeration through domain dominance.</li>
</ul>
<ul>
<li>Familiarity with attack tooling (BloodHound, Impacket, Rubeus, Mimikatz, CrackMapExec) and, critically, what they leave behind.</li>
</ul>
<ul>
<li>Experience hardening AD environments: tiered administration, Protected Users, LAPS, Credential Guard, PAM trusts, and authentication policy silos.</li>
</ul>
<ul>
<li>Windows Internals</li>
</ul>
<ul>
<li>Thorough understanding of Windows security architecture: access tokens, privilege model, integrity levels, LSASS and credential storage, SAM, and the Security Reference Monitor.</li>
</ul>
<ul>
<li>Ability to read and interpret Windows kernel structures, driver behavior, and undocumented APIs when necessary.</li>
</ul>
<ul>
<li>Proficiency with low-level analysis tools: WinDbg, Process Monitor, Process Hacker, Volatility, and x64dbg.</li>
</ul>
<ul>
<li>Experience with ETW-based telemetry pipelines and building detections on top of raw Windows event data.</li>
</ul>
<ul>
<li>Detection &amp; Response</li>
</ul>
<ul>
<li>Proven track record writing high-fidelity detection logic, not just tuning vendor signatures.</li>
</ul>
<ul>
<li>Experience leading complex incident response investigations, including those involving nation-state or sophisticated criminal actors.</li>
</ul>
<ul>
<li>Strong forensic fundamentals across disk, memory, and network artifacts on Windows systems.</li>
</ul>
<p>What We Value:</p>
<ul>
<li>Experience with Entra ID (Azure AD), hybrid identity architectures, and cloud-based attack paths that pivot through on-prem AD.</li>
</ul>
<ul>
<li>Prior work in adversary simulation, red teaming, or offensive security research , especially against AD targets.</li>
</ul>
<ul>
<li>Public contributions: conference talks (BlueHat, BSides, SANS, etc.), blog posts, or open-source tooling.</li>
</ul>
<p>What We Require:</p>
<ul>
<li>5+ years of hands-on security experience, with the majority focused on Windows environments and Active Directory.</li>
</ul>
<ul>
<li>Proficiency in Python or PowerShell for detection development, automation, and forensic tooling.</li>
</ul>
<ul>
<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>
</ul>
<ul>
<li>A portfolio of real work: detections you&#39;ve written, research you&#39;ve published, tools you&#39;ve built, or incidents you&#39;ve led.</li>
</ul>
<p>Additional Information:</p>
<ul>
<li>The estimated salary range for this position is estimated to be $145,000 - $200,000/year.</li>
</ul>
<ul>
<li>Our benefits aim to promote health and wellbeing across all areas of Palantirians’ lives. We work to continuously improve our offerings and listen to our community as we design and update them.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$145,000 - $200,000/year</Salaryrange>
      <Skills>Active Directory, Windows Internals, ETW-based telemetry pipelines, Low-level analysis tools, Python, PowerShell, Forensic fundamentals, Incident response, Security clearance, Entra ID, Hybrid identity architectures, Cloud-based attack paths, Adversary simulation, Red teaming, Offensive security research</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and more.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/1e77a5e8-9843-4516-a186-7c24f0ff07a0</Applyto>
      <Location>Boulder</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>183e35b9-072</externalid>
      <Title>Information Security Engineer</Title>
      <Description><![CDATA[<p>As an Information Security Engineer, you are responsible for the security of Palantir&#39;s people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general.</p>
<p>In this role, you&#39;ll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir&#39;s mission as you seek to make it challenging for our adversaries and protect our global network.</p>
<p><strong>Core Responsibilities</strong></p>
<ul>
<li>Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats.</li>
<li>Develop alerting and detection strategies to identify malicious or anomalous behaviour.</li>
<li>Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics.</li>
<li>Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications.</li>
<li>Investigate enterprise-wide operations to uncover sophisticated and undetected threats.</li>
<li>Partner closely with other members of the Information Security team to lead changes in the company&#39;s network defence posture.</li>
</ul>
<p><strong>What We Value</strong></p>
<ul>
<li>Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence.</li>
<li>Deep exposure in Incident Response or Detection Engineering.</li>
<li>Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.).</li>
<li>Strong working knowledge of TCP/IP networking and common protocols.</li>
</ul>
<p><strong>What We Require</strong></p>
<ul>
<li>Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.).</li>
<li>Proficiency in Python (preferred), PowerShell, or similar.</li>
<li>Active security clearance or eligibility to obtain a security clearance.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>security, forensics, threat intelligence, incident response, detection engineering, TCP/IP networking, Python, PowerShell</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and more. It is a global organisation.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/f110dd36-0df3-4586-96c6-a095b461d3d4</Applyto>
      <Location>London</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>ea2a34b7-0fb</externalid>
      <Title>Information Security Engineer</Title>
      <Description><![CDATA[<p>As an Information Security Engineer, you are responsible for the security of Palantir&#39;s people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general.</p>
<p>In this role, you&#39;ll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir&#39;s mission as you seek to make it challenging for our adversaries and protect our global network.</p>
<p><strong>Core Responsibilities</strong></p>
<ul>
<li>Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats.</li>
<li>Develop alerting and detection strategies to identify malicious or anomalous behavior.</li>
<li>Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics.</li>
<li>Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications.</li>
<li>Investigate enterprise-wide operations to uncover sophisticated and undetected threats.</li>
<li>Partner closely with other members of the Information Security team to lead changes in the company&#39;s network defense posture.</li>
</ul>
<p><strong>What We Value</strong></p>
<ul>
<li>Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence.</li>
<li>Deep exposure in Incident Response or Detection Engineering.</li>
<li>Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.).</li>
<li>Strong working knowledge of TCP/IP networking and common protocols.</li>
</ul>
<p><strong>What We Require</strong></p>
<ul>
<li>Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.).</li>
<li>Proficiency in Python (preferred), PowerShell, or similar.</li>
<li>Active TS/SCI security clearance or eligibility to obtain a security clearance.</li>
</ul>
<p><strong>Additional Information</strong></p>
<p>The estimated salary range for this position is estimated to be $135,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$135,000 - $200,000/year</Salaryrange>
      <Skills>Python, PowerShell, TCP/IP networking, Common protocols, AWS, Azure, Windows, OS X, Linux</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and locate missing children.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/e2a8360a-710a-4185-b2a9-3b7d9fe590b1</Applyto>
      <Location>Redwood City</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>9d60098e-6f3</externalid>
      <Title>Information Security Engineer</Title>
      <Description><![CDATA[<p>As an Information Security Engineer, you will be responsible for the security of Palantir&#39;s people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general.</p>
<p>In this role, you&#39;ll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir&#39;s mission as you seek to make it challenging for our adversaries and protect our global network.</p>
<p><strong>Core Responsibilities:</strong></p>
<ul>
<li>Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats.</li>
<li>Develop alerting and detection strategies to identify malicious or anomalous behavior.</li>
<li>Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics.</li>
<li>Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications.</li>
<li>Investigate enterprise-wide operations to uncover sophisticated and undetected threats.</li>
<li>Partner closely with other members of the Information Security team to lead changes in the company&#39;s network defense posture.</li>
</ul>
<p><strong>What We Value:</strong></p>
<ul>
<li>Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence.</li>
<li>Deep exposure in Incident Response or Detection Engineering.</li>
<li>Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.).</li>
<li>Strong working knowledge of TCP/IP networking and common protocols.</li>
</ul>
<p><strong>What We Require:</strong></p>
<ul>
<li>Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.).</li>
<li>Proficiency in Python (preferred), PowerShell, or similar.</li>
<li>Active TS/SCI security clearance or eligibility to obtain a security clearance.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$135,000 - $200,000/year</Salaryrange>
      <Skills>security, forensics, threat intelligence, incident response, detection engineering, python, powershell, tcp/ip networking, common protocols</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and locate missing children.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/36703f67-6fae-445c-9277-f946121faaa0</Applyto>
      <Location>Denver</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>8ce6960a-e63</externalid>
      <Title>Information Security Engineer</Title>
      <Description><![CDATA[<p>As an Information Security Engineer, you will be responsible for the security of Palantir&#39;s people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general.</p>
<p>In this role, you&#39;ll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir&#39;s mission as you seek to make it challenging for our adversaries and protect our global network.</p>
<p><strong>Core Responsibilities:</strong></p>
<ul>
<li>Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats.</li>
<li>Develop alerting and detection strategies to identify malicious or anomalous behavior.</li>
<li>Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics.</li>
<li>Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications.</li>
<li>Investigate enterprise-wide operations to uncover sophisticated and undetected threats.</li>
<li>Partner closely with other members of the Information Security team to lead changes in the company&#39;s network defense posture.</li>
</ul>
<p><strong>What We Value:</strong></p>
<ul>
<li>Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence.</li>
<li>Deep exposure in Incident Response or Detection Engineering.</li>
<li>Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.).</li>
<li>Strong working knowledge of TCP/IP networking and common protocols.</li>
</ul>
<p><strong>What We Require:</strong></p>
<ul>
<li>Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.).</li>
<li>Proficiency in Python (preferred), PowerShell, or similar.</li>
<li>Active TS/SCI security clearance or eligibility to obtain a security clearance.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$135,000 - $200,000/year</Salaryrange>
      <Skills>security, forensics, threat intelligence, incident response, detection engineering, python, powershell, tcp/ip networking, common protocols</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and locate missing children.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/1124402c-2088-40c6-b6aa-b9ef7777519b</Applyto>
      <Location>Palo Alto</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
  </jobs>
</source>