Required Qualifications:
- 5 to 7 years of technical experience in cyber security research, includingproficiencywith tools such as SQL, KQL, Scala, Python,JupyterNotebook, Spark, R, U-SQL, and Power BI. Experience automating repeatable security tasks through scripts or logic apps.
- Experience with security monitoring and response, including use of MITRE or other attack frameworks toidentifyand address gaps in detection capabilities. Knowledge of thedetectionresponse lifecycle and participation in on-call rotations. Skills in reverse-engineering attacks,analysingand prototyping detections to prevent and mitigate threats and abuse. Ability toanalysedata flow within environments for detection and protection purposes.
- Practical experience applying knowledge to detect threats using log data from Cloud Service Provider (CSP) environments, such as Azure AAD, Azure Resources, event logs, and firewalls. Experienced in building andanalysingnew TTPs and creating detections.
Preferred Qualifications:
An exceptionally well-qualified candidate will meet one or more of the following criteria:
- Bachelor's degree in related discipline such as computer security, computer science, computer engineering or information technology.
- Deep understanding of adversary and cyber intel frameworks such as kill-chain model, ATT&CK framework, Diamond Model and Advanced Persistent Threat(APT) performingDetection andresearchwithin Cloud environments.
- Deep and practical OSsecurity/internals knowledge for Linux and Windows
- Hands-on experience building Azure-based services with Azure Resource Manager (ARM), ARM templates, ARM policy, IaaS, VMSS,KeyVault, EventHub, Azure Active Directory (AAD), etc.
- Hands-on experience with developer environment tools like Continuous Integration/Continuous Delivery (CI/CD), Azure DevOps, GitHub, and Agile Scrum
- Ability to work effectively in ambiguous situations and respondfavourablyto change.
- Self-motivated and comfortable working in a startup mode on a new team where there is lots of opportunity.
- Certifications like GCIA, GSLC, GCIH, CISM, CISSP, CEH, etc. are plus
Background Check Requirements:
Applicants must have the ability to meet Microsoft, customer, and/or government security screening requirements required for this role.These requirements include, but are not limited to, the following:
to passthe Microsoft Cloud background check upon hire/transfer and every two years thereafter.