מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Required/Minimum Qualifications:
· 5+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection.
o OR Master's Degree in Statistics, Mathematics, Computer Science or related field.
. 5+ years of experience in a technical role in the areas of Security Operations, Threat Intelligence, Cyber Incident Response, or Penetration Testing/Red Team.
. 5+ of working with extremely large data sets, using tools and scripting languages such as: Excel, KQL, Python, Splunk, and PowerBI.
Other Requirements:
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter.
Additional or Preferred Qualifications:
· 6+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
o OR Doctorate in Statistics, Mathematics, Computer Science or related field
Advanced knowledge of operating system internals and security mechanisms.
. Experience analyzing attacker techniques
. Knowledge of kill-chain model, ATT&CK framework, and modern penetration testing techniques
. Knowledge of operating system internals, OS security mitigations & understanding of Security challenges in
Windows, Linux, Mac, Android & iOS platforms
. Experience with cloud environments and network signals
. Knowledge of major cloud and productivity platforms as well as identity systems and related security concerns
. Experience with curation of Threat Intelligence
. Ability to use data to 'tell a story'
. Experience with reverse engineering, digital forensics (DFIR) or incident response, or machine learning models
. Experience with system administration in a large enterprise environment including Windows and Linux servers and workstations, network administration, cloud administration
. Experience with offensive security including tools such as Metasploit, exploit development, Open Source Intelligence Gathering (OSINT), and designing ways to breach enterprise networks
. Additional advanced technical degrees or cyber security certifications such as CISSP, OSCP, CEH, or GIAC
• Hunt directly in customers environments with proactive and reactive guidance.
• Explore and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, and investigate alerts for enterprise customers.
• Work directly with customers at all levels of their security organization from analyst to CISO to support investigation and response.
• Collaborate with our data science and threat research teams to develop and maintain accurate and durable detections.
משרות נוספות שיכולות לעניין אותך