Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Microsoft Security Researcher 
Ireland, Dublin 
541062697

Yesterday

Required Qualifications

o Currently pursuing a Bachelor's or Master’s Degree in Statistics, Mathematics, Computer Science or related field

· Must have at least one additional quarter/semester of school remaining following the completion of the internship.

  • Strong quantitative skills (e.g., as demonstrated by your degree course in a quantitative field such as Mathematics, Statistics, Computer Science, Engineering, etc.).
  • Curiosity and passion for problem solving; ability to learn new skills quickly and apply them to threat tracking problems
  • Experience applyingdata-driven inference methods such as statistics, data miningormachine learningto data at scale.
  • withunderstanding of cloud architectures and distributed computing such asApache Spark.


Qualifications

  • Demonstrable experience inapplying a researchmethodology totelemetry in the security domain to detect and track malicious activityfor new and novel threat actor TTPs.
  • Track record of prototyping new innovative ideas and seeing them through to production.
  • Knowledge of cloud identity TTPs and applying this to threat detection at scale.
Responsibilities

· Begin to analyze threat trends and anomalies to determine operational impact. Determine vectors that introduce threat and potential mitigation strategies. Learn about systemic security issues and how to address them.

· Process threat reporting from internal and external sources. Provide discrete threat data based on intelligence requirements or customer requests.

· Identify security defects or vulnerabilities and deficiencies in security guidance.

· Contribute code to technical implementation and automation of solutions to address security issues, such as signature detection, malware, threat analysis, or reverse engineering. Use results from research and experimentation to support architecture or product direction.

· Identify areas of dependency and overlap with other teams or team members. Provide constructive input so the work is integrated and timely. Communicate the status of deliverables and dependencies to meet schedule.

· Engage in measures to protect tools, techniques, information, and results of security practices. Respond to incidents for systems or products as needed. Use results of pen testing to improve products and services.