Principal Security Researcher - Threat Hunting

Details of the offer

Overview The mission of Microsoft Security Response Center (MSRC) is to enable Microsoft to build the most trusted devices and services, while keeping our company safe and our data protected.

As part of the Microsoft Security organization, and a steward of Microsoft and our customer's data, a core function of MSRC is ensuring the security of every aspect of the business.

MSRC is responsible for company-wide information security and compliance, with a strategic focus on information protection, assessment, awareness, governance, and enterprise business continuity.

As customer zero, we deploy and secure these services inside Microsoft and then share best practices with enterprise customers at scale across the globe.

We have exciting opportunities for you to innovate, influence, transform, inspire and grow within our organization and we encourage you to apply to learn more!

Do you want to join the Microsoft GHOST team as a Principal Security Researcher?

Do you have an interest in helping Microsoft's clients defend themselves against targeted exploitation? Are you interested in being intimately involved in the latest, cutting edge developments in the security industry and having a direct impact on the security of all Microsoft customers?

Do you want to be on the front lines of helping our customers go toe-to-toe against advanced adversaries? Are you interested in a fast-paced job full of new opportunities?

If so, you might be a candidate for the Global Hunting, Oversight, and Strategic Triage team (GHOST).

We are looking for an experienced Principal Security Researcher with required analytical background to join our team to perform threat hunts, assist with investigations, develop threat intelligence, and to cultivate investigation best practices into Microsoft tooling and products.

Researchers will support a global team to identify and catalog new attacker Tools, Techniques and Procedures (TTPs), victims, and deliver customer notifications to protect worldwide enterprise customers and empower customers to protect themselves via constantly improving Microsoft products.

We are looking to fill multiple roles across levels. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day.

In doing so, we create life-changing innovations that impact billions of lives around the world.

Microsoft's mission is to empower every person and every organization on the planet to achieve more.

Qualifications Required Qualifications: 7+ years experience in large-scale computing, modeling, cybersecurity, and/or anomaly detection OR experience with threat hunting/digital forensics/reverse engineering/incident response, etc. OR Master's Degree in Statistics, Mathematics, Computer Science or related field.

Other Requirements: Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications: Investigation/Cybersecurity/Digital Forensics/DFIR (Digital Forensic Incident Response) certifications (e.g. Certified Information Systems Security Professional (CISSP), SysAdmin, Audit, Network and Security (SANS), Global Information Assurance Certification (GIAC), etc.) Technical certifications based on domain (e.g., Azure, SharePoint) Experience with Active Directory and/or cloud identity Experience with sophisticated threat actor evidence including familiarity with typical Indicators of Compromise (IOCs), Indicators of Activity (IOAs) and Tools, Techniques and Procedures (TTPs) Use of forensic analysis tools such as X-Ways Forensics, WinHex, Encase, FTK, etc. Microsoft Azure and/or Office365 platform knowledge and experience Experience with various forensic log artifacts found in Security Information and Event Management (SIEM) logs, web server logs, Antivirus (AV) logs, protection logs such as Host-based Intrusion Detection System (HIDS) and Network Intrusion Detection System (NIDS) logs Familiarity with Microsoft Defender 365 security stack (for Endpoints, Identity, Cloud, etc), especially with Advanced Hunting query writing Understanding of Windows and Azure internals and where trace evidence can be found Knowledge of third-party cybersecurity solutions, especially Extended Detection and Response (EDR) and Security Information and Event Management (SIEM) solutions Experience working with consulting companies is a plus Linux and/or macOS forensic analysis and threat hunting skills Responsibilities This role is part of a collaborative team, assisting our customers with:

Leading analysis of attacker activity in on-premises and cloud environments Identifying potential threats, allowing for proactive defense before an actual incident Notifying customers regarding imminent attacker activity Providing recommendations to improve customers' cybersecurity posture going forward and performing threat intelligence knowledge transfer to prepare customers to defend against today's threat landscape Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities Driving product and tooling improvements by conveying learnings from threat hunting and incident response at scale to engineering partner teams Identifying, prioritizing, and targeting complex security issues that cause negative impact to customers. Creating and driving adoption of relevant mitigations and providing proactive guidance Collaborating with others to synthesize research findings into recommendations for mitigating security issues and sharing them across teams.

Driving change within the team based on the research findings.

If you are looking for a role that will allow you to use your knowledge and experience to strengthen the security posture of customers, you will have a bright future within Microsoft's Global Hunting Oversight and Strategic Triage team.

Benefits Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work:

Industry leading healthcare Educational resources Discounts on products and services Savings and investments Maternity and paternity leave Generous time away Giving programs Opportunities to network and connect
#J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Jobleads

Requirements

Software Applications Support Manager Salesforce

Job Description A growing company is looking for a Software Applications Support Manager to help support software applications within a large CRM/Salesforce ...


Sunstone Talent - Canterbury

Published 19 days ago

Database Developer

Your Title: Database Developer Job Location: Christchurch, New Zealand Our Department: Business Systems Are you looking for a database development role in a ...


Trimble - Canterbury

Published 19 days ago

Software Applications Support Manager (Salesforce/Crm/Erp)

Software Applications Support Manager (Salesforce/CRM/ERP) A growing company is looking for a Software Applications Support Manager to help support software ...


Sunstone Talent - Canterbury

Published 19 days ago

Support Lead

Support Lead Forklift license essential 6pm starts Extra allowances paid You might recognise this role as a Charge Hand - the roles are very similar. Day...


Nz Post - Canterbury

Published 19 days ago

Built at: 2024-11-14T05:02:06.716Z