Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Junior Security Researcher 
Canada, Ontario, Ottawa 
950586327

24.12.2024

Required/Minimum Qualifications

  • 3+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
  • 2+ years of experience in reverse engineering malware that are associated with APT or financially motivated groups

Additional or Preferred Qualifications

  • 4+ years experience in software development lifecycle, large-scale computing, modeling, cyber-security, and/or anomaly detection
  • o OR Master's Degree in Statistics, Mathematics, Computer Science or related field
  • 2+ years experience analyzing malicious desktop, mobile and web applications developed in common programming languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc.
  • 2+ years experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions.
  • Knowledge of Windows Operating Systems (OS) internals and Windows API Demonstrated capability to coherently present potentially sensitive threat intelligence to a wide variety of audiences in public and private settings.
  • Demonstrated interpersonal skills (adaptability, inclusiveness, optimism, curiosity, empathy, courage, respect) which support the development of high functioning teams.
  • Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity.
  • Familiarity with legacy and modern software and system protection mythologies and technologies Demonstrated experience working with SQL-based databases and Big Data solutions.
  • Experience working closely with threat intelligence analysts to understand their workflow and analytic problems and turning those into large-scale analytics.
  • Demonstrated experience analyzing packed and obfuscated programs, scripts, and shellcode.
  • Demonstrated experience identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies
  • Experience with malware used in conjunction with ransomware is highly preferred.

Security Research IC3 - The typical base pay range for this role across Canada is CAD $83,600 - CAD $159,600 per year.

Find additional pay information here:

Responsibilities
  • Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s threat actor pursuit mission, services, and products. Reverse engineering & binary analysis to include dynamic and static malware analysis. Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.
  • Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services.
  • Maintaining up to date and in-depth technical understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs).
  • Maintaining up to date and in-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement techniques to discover and track the adversaries of today and identify the attacks of tomorrow.
  • Maintaining up to date and in-depth knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations
  • Embody our