Strong technical knowledge of adversary capabilities, infrastructure, and techniques.
Ability to define, develop, and implement techniques to discover and track current adversaries and identify future attacks
Expertise in tracking APT adversaries using the Diamond Model Ability to identify and characterize various TTPs, capabilities, infrastructure, and operational campaigns In-depth experience in producing actionable threat intelligence on targeted and advanced persistent adversaries.
Demonstrable impact in enabling network and host defenses in external organizations.
Applied knowledge across all critical elements and common data types used in threat intelligence analysis Knowledge of malware used in targeted adversary campaigns.
Familiarity with host and log forensics, including methods of data collection and analytic techniques Understanding of network forensics, including common protocols and how they are used in adversary operations.
Applied knowledge of a variety of adversary command and control methods and protocols Strong experience in supporting incident response.
Familiarity with common incident response procedures, processes, and tools.
Cloud Hunting experience
Responsibilities
As a threat intelligence analyst, you will track sophisticated adversaries and use your technical knowledge of adversary capabilities, infrastructure, and techniques.
You will define, develop, and implement techniques to discover and track current adversaries and identify the attacks of tomorrow. You will produce actionable intelligence and proactively drive hunting, detection and Microsoft's threat actor understanding.
In this role you will be responsible for collaborating with stakeholders from MSTIC and key security groups across Microsoft, working in partnership with them to protect both Microsoft and Microsoft’s customers.
You will strengthen existing partnerships and build new ones with key organizations to deliver benefits to Microsoft and its customers.