Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Microsoft Security Research Internship Opportunities 
Israel 
49118144

17.09.2024

As a Security Research Intern, under supervision you will design and conduct security research including malware analysis, threat and vulnerability analysis, adversary tracking, threat intelligence, detection and remediation development and other technology application focuses related to the understanding of the threat landscape with intent to disrupt adversaries or provide protection via defensive products and services. You will help generate solutions including first party mitigation and working closely with customers and partners and support operational security and security incidents as well as security reviews and reporting.

Qualifications

Required Qualifications:

  • Currently pursuing a Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
  • Must have at least 3 additional semesters of school remaining (graduation: January 2026 and on )
  • Must have some background in Cybersecurity
Responsibilities
  • Begin to analyze threat trends and anomalies to determine operational impact. Determine vectors that introduce threat and potential mitigation strategies. Learn about systemic security issues and how to address them.
  • Process threat reporting from internal and external sources. Provide discrete threat data based on intelligence requirements or customer requests.
  • Identify security defects or vulnerabilities and deficiencies in security guidance.
  • Contribute code to technical implementation and automation of solutions to address security issues, such as signature detection, malware, threat analysis, or reverse engineering. Use results from research and experimentation to support architecture or product direction.
  • Identify areas of dependency and overlap with other teams or team members. Provide constructive input so the work is integrated and timely. Communicate the status of deliverables and dependencies to meet schedule.
  • Engage in measures to protect tools, techniques, information, and results of security practices. Respond to incidents for systems or products as needed. Use results of pen testing to improve products and services.