מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Required Qualifications:
Other Qualifications:
Preferred Qualifications:
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:
Microsoft will accept applications for the role until December 27, 2024.
In-depth technical knowledge of adversary capabilities, infrastructure, and techniques to define, develop, and implement the techniques in discovering and tracking the adversaries of today and identify the attacks of tomorrow. Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis. Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s TI analysts, services, and products Reverse engineering & binary analysis to include dynamic and static malware analysis. Experienced user of static analysis tooling (e.g., IDA Pro, Ghidra etc.) Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services Maintaining a deep understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs)
משרות נוספות שיכולות לעניין אותך