Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Principal Security Researcher 
United States, Washington 
14855275

24.12.2024

Required Qualifications:

  • 7+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • o OR Doctorate in Statistics, Mathematics, Computer Science or related field.
  • In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement the techniques to discover and track the adversaries of today and identify the attacks of tomorrow.
  • Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.
  • Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s TI analysts, services, and products.
  • Reverse engineering & binary analysis to include dynamic and static malware analysis. Experienced user of static analysis tooling (e.g., IDA Pro, Ghidra etc.).
  • Knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations.

Other Qualifications:

  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check:
    - This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.


Preferred Qualifications:

    • Demonstrated experience analyzing malicious desktop, mobile and web applications developed in common programming languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc.
    • Demonstrated experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions.
    • Demonstrated experience analyzing packed and obfuscated programs, scripts, and shellcode, including experience in identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies.
    • Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity.
    • Experience working closely with threat intelligence analysts to understand their workflow and analytic problems and turning those into large-scale analytics.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Microsoft will accept applications for the role until December 27, 2024.

Responsibilities

In-depth technical knowledge of adversary capabilities, infrastructure, and techniques to define, develop, and implement the techniques in discovering and tracking the adversaries of today and identify the attacks of tomorrow.    Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.    Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s TI analysts, services, and products Reverse engineering & binary analysis to include dynamic and static malware analysis. Experienced user of static analysis tooling (e.g., IDA Pro, Ghidra etc.)   Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services Maintaining a deep understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs)