Responsibilities (Text Only)
In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement strategies for discovering and tracking adversaries of today and identifying future attack methods.
Proven ability to build strategic relationships with key threat intelligence partners in government and industry. You will be persuasive in gaining buy-in for your ideas within the Microsoft Threat Intelligence Center and from key engineering groups across Microsoft, working collaboratively to protect Microsoft assets and enhance products and services for our wider customer base.
Qualifications (Text Only)
Applied knowledge of the Diamond Model (Adversary, Infrastructure, Capability, Victim) and how these features interact during adversary operations, especially how to pivot through the model to uncover new intelligence.
Understanding of adversary phases of operation and how to work across these phases to gather intelligence.
At least 4 years of experience producing actionable threat intelligence on targeted and advanced persistent adversaries, with demonstrable impact on network and host defenses in external organizations.
Knowledge of critical elements and data types used in threat intelligence analysis, including malware analysis, host and log forensics, data collection methods, analytic techniques, and hunting in cloud environments.
Strong interpersonal skills such as adaptability, inclusiveness, optimism, curiosity, empathy, courage, and respect, supporting high-functioning teams.
Ability to clearly present sensitive threat intelligence to diverse audiences, including in public forums.
Over 4 years of experience working with external partners on sensitive threat intelligence issues.
#J-18808-Ljbffr