Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

Microsoft Threat Analyst 
United States, Washington 
953438564

16.07.2024

Required/Minimum Qualifications:

  • 3+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field

Other Requirements:

  • Microsoft Cloud Background Check: Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
    • This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • 6+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection OR Doctorate in Statistics, Mathematics, Computer Science or related field

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Microsoft will accept applications for the role until July 24, 2024.

Responsibilities
  • Identifies and conducts research into critical security areas, such as competitor products, current attacks, adversary tracking, and academic literature. Aids in the design of solutions to prevent attacks. Designs lead to engineering projects. Investigates the root cause, motivation, and impact of security issues. Incorporates feedback and results from research into future research.
  • Uses research findings to develop guidance on security issues to inform improvements and resolution. Shares within team. Interacts with industry and research partners on ad hoc or as needed basis.
  • Identifies and responds to customer and partner security issues in a timely manner. Spots trends and potential security issues. Advocates for customers and partners. Provides assistance to customers and partners. Leverages partner and customer feedback to improve assistance. Escalates issues as needed. Develops guidance and education that result from resolution of security issues
  • Successful applicants should have experience with the following:   Knowledge of adversary capabilities, infrastructure, and techniques that can be applied to discover and track the adversaries of today and identify the attacks of tomorrow.  Experience producing actionable threat intelligence and characterizing various TTP (tactics, techniques, and procedures), capabilities, infrastructure, and campaigns.    Applied knowledge exploring diverse data types used in threat intelligence analysis, including malware used in campaigns; security telemetry; and network forensics.    Familiarity with a variety of adversary command and control methods and protocols.  Experience supporting incident response and common incident response procedures, processes, and tools.
  • Embody our