המקום בו המומחים והחברות הטובות ביותר נפגשים
for our US Government Cloud. As a Cyber Security Investigator, you will work closely with other cloud and security experts across Microsoft to investigate threats, proactively hunt for compromise, improve and automate processes, develop security tooling and data automation, and contribute your experience and expertise to countless other projects that enhance the security and scalability of our cloud services. You will be a part of defending our customer base focused on identifying new attacks, coordinating large scale response and investigating issues.
Required/Minimum Qualifications:
Other Requirements:
Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
Preferred Qualifications:
• Demonstrated working knowledge of common security, encryption, and protocols such as encryption, PKI, modern authentication and cloud app authorization architectures and protocols such as SAML or OAUTH.
• Practical OS security/internals knowledge for Linux and/or Windows.
• Exposure to security related subjects and trends such as digital forensics, reverse engineering, penetration testing, and malware analysis.
• Experience with the Microsoft cloud and/or stack including Azure, Windows or other Microsoft software/services.
• Certifications like GCIA, GSLC, GCIH, CISM, CISSP, CEH, Etc. are plus.
• Demonstrated ability to understand and communicate technical details with varying levels of management.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:
• Perform cyber investigations on suspected vulnerable or compromised assets and services. Analyze log data and other artifacts to determine what occurred.
• Identify potential issues with detection (e.g., false positives, noise). Analyze potential or actual intrusions identified as a result of monitoring activities. Create detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]).
• Plan and execute proactive adversary hunt for malicious activity using myriad log sources, network- and host-based tools, and threat intelligence to identify the threat actors and their tools and techniques.
• Analyze key metrics and Key Performance Indicators (KPIs) and other data sources (e.g., bugs, unhealthy data pipeline) to identify trends in security issues and escalates appropriately. Recommends improvements and/or metrics to address gaps in measurement.
• Proactively identify and investigate potential issues in security controls (e.g., network, identity, etc.). Leverage expertise and team members to address and drive down issues accordingly. Identify and/or recognize patterns and recommend potential mitigation strategies.
• Identify and raise opportunities for automation to improve efficiency and effectiveness. Create automation as appropriate to drive greater efficiency with high value.
משרות נוספות שיכולות לעניין אותך