Cyber Security Threat Analyst

San Jose, California, United States
Aug 06, 2019
,Year,$ LPA
Citizen, Green Card Holder
3 Years
Job Description
Microsoft is hiring Cyber Security Threat Analyst.
 
We are looking for a passionate data driven security analyst who is ready to jump in and help us deliver innovative and scalable solutions that can protect the company and our customers.
 
Responsibilities
  • Collect, process and analyze open source reporting as well as 1st and 3rd party threat intelligence feeds for relevance to Microsoft.
  • Work with security teams and risk managers to provide data driven insights into existing and emerging threats.
  • Leverage threat intelligence to improve the prioritization of preventative controls and mitigations to improve defenses of Microsoft.
  • Deliver relevant and actionable Indicators of Compromise (IOCs) to teams across Microsoft to improve our ability to detect threats in our environment.
  • Support response to internal incidents by managing intelligence collected during investigations and building a common understanding of threat activities. 
Qualifications
  • A minimum of a Bachelor’s degree in Computer Science or Engineering, or a related field, or equivalent alternative education, skills, and/or practical experience is required
  • 3+ years of Information Security or relevant consulting experience.
  • Very strong understanding of cyber threat attack vectors, how they are used, and methods to detect and mitigate them.
  • Strong analysis skills and the ability to bring complex data together to answer security and risk related questions.
  • Good understanding of prevention, detection and response capabilities (Firewalls, Intrusion Detection Systems, Log Analysis, anti-malware, SIEM etc.) and how they help prevent and detect attacks.
  • Experience analyzing security events and logs.
  • Familiar with expected data types and sources needed to conduct incident investigations.
  • Good presentation skills and experience distilling complex security topics into concise and relevant material for both security and non-security professionals.
  • Worked as an incident responder or as a tier 2/3 SOC analyst.
  • Experience as an intelligence analyst and comfortable with the collection, analysis, processing, and dissemination of intelligence.
  • Understanding of risk management techniques and frameworks.
  • Familiar with SQL and the ability to query relational databases. Experience with Hadoop, HDInsight, and GraphDBs is also helpful.
  • Experience with business intelligence and analysis tools such as Tableau, PowerBI, Maltego, Analyst Notebook and Excel.