Palo Alto Networks, Inc.

Industry: Information Technology

About Palo Alto Networks, Inc.

Palo Alto Networks is the world's cybersecurity leader. Our technologies give 60,000 enterprise customers the power to protect billions of people worldwide. The company was founded in March 2005 and is headquartered in Santa Clara, CA.

Military Friendly Ratings

We rate how Military Friendly® an organization is within 6 different categories. Learn more about our methodology.

The ratings below reflect the extent to which each organization exceeds the benchmark standards for Military Friendly®.

Hiring & Onboarding

Opportunity & Advancement

Culture & Commitment

Support & Retention

Policies & Compliance

Recruiting & Sourcing

Why Work at the Company?

At Palo Alto Networks, our values of disruption, execution, collaboration, integrity and inclusion guide everything we do to protect our digital way of life. Those values are deeply held principles of the women and men who have proudly represented our Armed Services. Our shared vision of a world where each day is safer and more secure than the one before – is fundamental to who we are. It's by design that hiring veterans are critical to Palo Alto Networks. Our veterans have found a new mission in cybersecurity, shifting from battlefields to the latest, most demanding threat of our age.

Top Jobs

Computer Hardware Engineers


Research, design, develop, and test computer or computer-related equipment for commercial, industrial, military, or scientific use. May supervise the manufacturing and installation of computer or computer-related equipment and components.

Top Degrees

Computer and Information Systems Security/Information Assurance

A program that prepares individuals to assess the security needs of computer and network systems, recommend safeguard solutions, and manage the implementation and maintenance of security devices, systems, and procedures. Includes instruction in computer architecture, programming, and systems analysis; networking; telecommunications; cryptography; security system design; applicable law and regulations; risk assessment and policy analysis; contingency planning; user access issues; investigation techniques; and troubleshooting.