Overview
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity.
Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions.
The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate.
Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters – with highly honed threat intelligence analysis skills. MSTIC provides unique insight on threats to protect Microsoft and our customers and is responsible for delivering timely threat intelligence across our product and services teams.
Qualifications
1. Experience producing actionable threat intelligence on targeted and advanced persistent threats enabling network and host defences in external organizations with demonstrable impact
2. Expertise tracking APT adversaries leveraging the Diamond Model to identify and characterize various TTPs, capabilities, infrastructure, and operational campaigns
3. Experience performing actor tracking/investigation/threat intelligence/SOC work
4. A good understanding of how the internet works, that is, relevant network protocols (HTTP, TLS, TCP/IP, UDP, DNS, etc), OAuth.
Familiarity in at least one of the following:
5. (1) cloud intrusion analysis in adversary operations;
6. (2) Analysing sophisticated malware samples used in targeted attacks against large corporate or government entities;
7. (3) Analysing host forensic and log data associated with advanced targeted adversaries
Proven ability to collaborate and establish key threat intelligence partnerships to bolster information sharing and defences
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
Microsoft Cloud Background Check:
- This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.
#MSFTSecurity #MSecR
Responsibilities
8. Perform daily actor tracking, either for nation state actors, or e-crime
9. Define, develop, and implement techniques to discover and track current adversaries and identify the attacks of tomorrow
10. Write Azure Data Explorer (KQL) queries to search in telemetry.
11. Write Storm queries (for the Vertex Synapse tool) to search telemetry
12. Threat intelligence content production - Writing up findings in a clear, unambiguous manner such that your peers can easily understand your investigation, and why and how you came to any conclusions.
13. Work with engineers/developers/data scientists to develop more complex systems that solve analyst’s needs.
Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.Industry leading healthcareEducational resourcesDiscounts on products and servicesSavings and investmentsMaternity and paternity leaveGenerous time awayGiving programsOpportunities to network and connect