We are the Security, Compliance and Management (S+C+M) team; we are committed to defending Microsoft customers from cyber-attacks as well as providing sophisticated tooling for securing important data. S+C fosters an agile development environment, continuously gathering and analyzing data to combat evolving threats. Our mission is to help protect customers with truly innovative proactive protection, advise customers on emerging trends, and engage in valuable partnerships.
As the Research organization within S+C, it’s our job to stay one step ahead of malicious adversaries and predict the threats of the future. We work with partners across Microsoft to innovate new approaches for detecting and tracking threats, attacker techniques, their tools and infrastructure.
We are always learning. Insatiably curious. We lean into uncertainty, take risks, and learn quickly from our mistakes. We build on each other’s ideas, because we are better together. We stand in awe of what humans dare to achieve and are motivated every day to empower others to do and achieve more through our technology and innovation. Together we make a difference for all of our customers, from end-users to Fortune 50 enterprises.
You can read about the team and its services here – Defender Experts (https://docs.microsoft.com/en-us/microsoft-365/security/defender/defenderexpertsforhuntingprev?view=o365-worldwide) AKA DEX
Responsibilities
What we build:
We build innovative security and data compliance products. Our security products are brought together in the Microsoft 365 Defender (M365D)suite. M365Denables Microsoft’s enterprise customers to detect, investigate,understand,and respond to advanced threats on their networks via a combination of behavioral sensors, cloud security analytics,and threat intelligence.
The Microsoft Threat Experts Team is looking for threat hunters! No matter how sophisticated attacker behaviors become, Microsoft 365 Defender (M365D) will help enterprises detect, investigate, and respond to advanced attacks and data breaches on their networks.Our team uses deep knowledge of the attacker landscape and rich telemetry from our sensors to perform root-cause analysis and generate custom alerts, ensuring that M365D customers are well equipped to quickly respond to human adversaries identified in their unique environments.
Ensuring that no human adversary can operate silently begins with experts harnessing the powerful optics provided by M365D, across the attacker kill-chain, coupled with world-class detections. We’re looking for a skilled hunter to harness the power of Microsoft’s trillions of security signals to quickly identify and report the latest human adversary behaviors, drive critical context-rich alerts, build new tools and automations in support of hunting objectives, and drive innovations for detecting advanced attacker tradecraft.
Qualifications
Explore and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, to research and provide new detection mechanisms.
Acquire new and leverage existing knowledge of attacker tools, tactics and procedures to improve security posture of customers.
Self-driven and team cooperated research on novel attack techniques to simulate them in lab on endpoints and cloud infrastructure to identify required detection mechanisms.
Identify need of required tools for research and analysis and effectively engage and collaborate with partners in engineering and data science to develop and maintain them.
Effectively engage and collaborate with partners in data science, threat research to develop and maintain high-fidelity detection rules.
Build hunting tools and automations for use in the discovery of human adversaries.
You would be expected to support a 24/7 operation model that may sometimes involve working in night shifts.
Required experiences.
5+ years of experience in a technical role in the areas of Security Operations, Malware analysis, Threat Intelligence, Cyber Incident Response, or Penetration Testing/Red Team
Comfortable working with extremely large data sets for analysis and visualization, using tools and scripting languages such as: Excel, SQL, Python, Splunk Query Language, Kusto query language and PowerBI
Ability to track, analyze, and brief on new and ongoing cyber-attacks in cloud infrastructure with understanding on AAD, ADFS and popular authentication/authorization protocols like SAML, OAUTH, OpenID connect
In-depth understanding of latest cloud-based techniques used by attackers for persistence, privilege escalation, defense evasion and lateral movement in platforms such as Azure AD, Office 365 and Google Workspace
Functional understanding of common threat analysis models such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK.
Advanced experience using analysis tools (e.g. file/network/OS monitoring tools and/or debuggers) and advanced knowledge of operating system internals and security mechanisms
Excellent cross-group and interpersonal skills, with the ability to articulate business need for detection improvements and strong ability to use data to ‘tell a story’.
At Intouch Guru Solutions, you have the opportunity to deliver innovative solutions to our NetSuite clients. Our team consists of...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> What a Technical Support Voice Process individual does at HP: Manage a high volume of...
Apply For This JobJob Description Job: Operations Primary Location: Asia-India-Chennai Schedule: Full-time Employee Status: Permanent Posting Date: 10/May/2022, 4:32:36 AM Unposting Date: Ongoing...
Apply For This JobFull Job Description Field Representative, to work in the market, generate/collect orders and collection. To follow up with retailers and...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Tech Mahindra Business Services offers you an opportunity to join one of India’s largest International...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Knowledge of software application functionality Knowledge of Cloud services, on premise and low code platforms...
Apply For This Job