CrawlJobs Logo

Cybercrime investigator

https://www.microsoft.com/ Logo

Microsoft Corporation

Location Icon

Location:
Australia , Sydney

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Microsoft’s DCU is a global team of attorneys, investigators, and analysts committed to leading the fight against cybercrime to protect our customers and promote global trust in Microsoft. Through strategic partnerships with Microsoft’s unparalleled threat intelligence community, fraud and abuse teams, and engineering support, DCU develops and employs innovative legal and technical strategies to detect, disrupt, and deter cybercrime, cyber-enabled fraud and scams, and other online threats. DCU sits in Customer Security & Trust (CST) within Microsoft’s Corporate, External, and Legal Affairs (CELA). DCU takes affirmative action to proactively defend against online threats and actors. Since its inception, DCU has filed lawsuits against over 35 malware families, state-sponsored actors, and the developers of cybercrime tools and services (including Cybercrime-as-a-Service platforms). In this role you will investigate major cyber threats—including ransomware, malware, business email compromise (BEC), account takeovers, tech support fraud, and other online scams—while working alongside threat intelligence professionals, security engineers, and fraud investigators to build evidence against criminal and state-sponsored actors. As a DCU investigative expert, you will detect cybercrime, map malicious infrastructure, prevent misuse of Microsoft services, and help make the global online ecosystem safer.

Job Responsibility:

  • Identify and analyze data sources to uncover cybercrime patterns and trends targeting our services and customers
  • Build proof-of-concept and prototype threat-hunting tools, automations, and new capabilities
  • Collaborate with security engineers and cross-company stakeholders to implement comprehensive investigative and enforcement strategies
  • Lead and support complex fraud investigations involving cyber-enabled financial crime, including online scams, business email compromise (BEC), payment fraud, account abuse, and related large-scale fraud activity
  • Conduct analysis on large, complex datasets to detect and investigate anomalies and develop actionable insights and strategies
  • Identify and map malicious technical infrastructure used to facilitate cybercrime
  • Work independently to detect, investigate, and understand new and emerging cybercrime attack vectors
  • Partner with DCU attorneys to develop legal strategies to disrupt and impact online criminal networks
  • Draft criminal referrals for law enforcement
  • Provide expert witness testimony in court filings and proceedings

Requirements:

  • 5+ years experience in Compliance, Finance, Data-Analytics, Investigations, or related field OR equivalent experience
  • 5+ years experience in Compliance, Finance, Data-Analytics, Investigations, or related field OR equivalent experience
  • Proficient with Microsoft SQL Server, KQL, Python, and/or other scripting languages
  • Proficient knowledge of malware analysis, malware reverse engineering, and behavioral malware analysis
  • Demonstrated ability to author clear, accurate, and highly technical investigative reports that translate complex technical findings into actionable insights for non-technical audiences, including legal, executive, and law enforcement stakeholders

Nice to have:

  • Bachelor's degree in business, Accounting, Criminal Justice, Law, International Relations or related field AND 12+ years experience in Compliance, Cyber Finance, Data-Analytics, Investigations, or related field OR equivalent experience
  • Industry certifications related to security and/or investigations (e.g., incident response, computer forensics)
  • Experience with sophisticated threat actor evidence, including familiarity with common Indicators of Compromise (IOCs), Indicators of Activity (IOAs), and Tools, Techniques, and Procedures (TTPs)
  • Extensive experience in attribution, creating threat groups, assessing linkages between established threat groups, and communicating attribution assessments to internal stakeholders
  • Experience leading or supporting complex fraud investigations, including large-scale online fraud, scams, business email compromise (BEC), payment fraud, account abuse, or related cyber-enabled financial crime
  • Proficiency with attacks on endpoints, cloud, network, and identity-based systems, along with strong investigative practices and communication skills
  • Published research (blogs, presentations, etc.) on new threat actor TTPs
  • Experience in cryptocurrency and blockchain investigation tools
  • Advanced skills in analyzing large datasets and developing effective investigative action plans

Additional Information:

Job Posted:
May 14, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cybercrime investigator

Cybercrime Investigator

Microsoft’s Digital Crimes Unit (DCU) is hiring a Cybercrime Investigator to lea...
Location
Location
United States , Redmond
Salary
Salary:
96500.00 - 188400.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years experience in compliance, finance, data-analytics, investigations, or related field OR equivalent experience
  • Citizenship & Citizenship Verification: This position requires verification of US citizenship due to citizenship-based legal restrictions
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter
  • Bachelor's Degree in Business, Accounting, Criminal Justice, Law, International Relations or related field AND 8+ years experience in compliance, cyber, finance, data-analytics, investigations, or related field OR equivalent experience
  • 4+ years experience with the following skills and knowledge: Analytical tools such as: Microsoft SQL Server, I2 Analyst Notebook, Paterva Maltego, Kusto (Azure Data Explorer), Python, and other scripting languages
  • Certifications related to security and/or investigations in incident response and computer forensics
  • Malware analysis, malware reverse engineering, and behavioral malware analysis
  • Threat actor evidence, including familiarity with common Indicators of Compromise (IOCs), Indicators of Activity (IOAs), and Tools, Techniques, and Procedures (TTPs)
  • Supporting complex fraud investigations, including large scale online fraud, scams, business email compromise (BEC), payment fraud, account abuse, or related cyber-enabled financial crime
  • Authoring clear, accurate, highly technical investigative reports involving complex technical findings, with actionable insights for non-technical audiences
Job Responsibility
Job Responsibility
  • Identify and analyze data sources to uncover cybercrime patterns and trends targeting our services and customers
  • Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities
  • Collaborate with security engineers and cross-company stakeholders to implement comprehensive investigative and enforcement strategies
  • Lead and support complex fraud investigations involving cyber‑enabled financial crime, including online scams, business email compromise (BEC), payment fraud, account abuse, and related large‑scale fraud activity
  • Conduct analysis on large, complex data sets to detect and investigate anomalies, develop actionable insights and strategies
  • Identify and map malicious technical infrastructure used to facilitate cybercrime
  • Work independently to detect, investigate, and understand new and emerging cybercrime attack vectors
  • Partner with DCU attorneys to develop legal strategies to disrupt and impact online criminal networks
  • Drafting criminal referrals for law enforcement
  • Provide expert witness testimony in court filings and proceedings
  • Fulltime
Read More
Arrow Right

Senior Investigator

Microsoft’s Digital Crimes Unit (DCU) has an immediate opening for a highly qual...
Location
Location
Belgium , Brussels
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree & demonstrable experience in cyber investigations, threat intelligence, or cyber defense operations
  • Willingness to provide expert witness testimony in court filings and proceedings that will be made public
  • Proficient with Microsoft SQL Server, KQL, Python, and/or other scripting languages
  • Proficient knowledge of malware analysis, malware reverse engineering, and behavioral malware analysis
  • Demonstrated ability to author clear, accurate, and highly technical investigative reports that translate complex technical findings into actionable insights for non-technical audiences, including legal, executive, and law enforcement stakeholders
  • Ability to meet Microsoft, customer, and/or government security screening requirements for this role (including specialized security screenings)
  • Microsoft Cloud Background Check: required upon hire/transfer and every two years thereafter
  • Collaborative, team-first mindset
  • Proficient written and verbal communication skills, including the ability to translate complex technical findings for a broad range of stakeholders (e.g., law enforcement, legal counsel, and executives)
Job Responsibility
Job Responsibility
  • Identify and analyze data sources to uncover cybercrime patterns and trends targeting our services and customers
  • Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities
  • Collaborate with security engineers and cross-company stakeholders to implement comprehensive investigative and enforcement strategies
  • Lead and support complex fraud investigations involving cyber‑enabled financial crime, including online scams, business email compromise (BEC), payment fraud, account abuse, and related large‑scale fraud activity
  • Conduct analysis on large, complex data sets to detect and investigate anomalies, develop actionable insights and strategies
  • Identify and map malicious technical infrastructure used to facilitate cybercrime
  • Work independently to detect, investigate, and understand new and emerging cybercrime attack vectors
  • Partner with DCU attorneys to develop legal strategies to disrupt and impact online criminal networks
  • Drafting criminal referrals for law enforcement
  • Provide expert witness testimony in court filings and proceedings
  • Fulltime
Read More
Arrow Right

Security Engineer

Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologie...
Location
Location
United States , Menlo Park
Salary
Salary:
238065.00 - 250250.00 USD / Year
meta.com Logo
Meta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s degree (or foreign degree equivalent) in Computer Science, Engineering, Applied Sciences, Mathematics, Physics or related field
  • Requires completion of a university-level course, research project, internship, or thesis in the following: Developing tools using an interpreted programming language (PHP, Python, Ruby, or PowerShell)
  • Internet security issues and threat landscape
  • Operating systems internals (OSX, Windows, Linux, or mobile platforms)
  • Relational Databases (SQL or PL*SQL)
  • TCP/IP Networking
  • Networking services (DNS, SMTP, or DHCP)
  • Ability to work with technical partners and formulate solutions to complex problems
Job Responsibility
Job Responsibility
  • Provide security guidance on a stream of new projects and technologies
  • Develop and improve technical products to facilitate cybercrime investigations
  • Enhance the security and integrity posture of the company platforms
  • Partner with other engineering teams to develop solutions to surface and respond to threats
  • Identify and consult on the design of infrastructure to detect and investigate abuse
  • Review external reports and perform internal research to identify abuse across a variety of business domains
  • Analyze, assess, and respond to various internet threats
  • Assist with technical investigation, enforcement, and engineering efforts toward predictable high-quality execution
  • Review case reports and code
  • Act as a subject matter expert and assist with technical security strategy
What we offer
What we offer
  • bonus
  • equity
  • benefits
  • Fulltime
Read More
Arrow Right

Senior Risk Functional Specialist

Payment Risk Operations is at the heart of what makes Airbnb a place where anyon...
Location
Location
United States
Salary
Salary:
82000.00 - 96000.00 USD / Year
airbnb.com Logo
Airbnb
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 3+ years professional experience in fraud, abuse, or cybercrime investigations
  • Minimum of 1+ years professional experience related to stored value risk (e.g. gift cards, coupons, credits, incentives)
  • Detail-oriented, highly analytical, and strong project management skills
  • Ability to understand opposing points of view on highly complex issues
  • Strong ability to gather information from various internal sources
  • Capacity to draw actionable insights from dashboards and reports
  • Risk policy creation and/or administration experience
  • Basic SQL
  • Experience with data visualization and business intelligence tools (e.g. Tableau, Superset)
  • CFE or equivalent certifications
Job Responsibility
Job Responsibility
  • Oversee operational procedures and escalations related to stored value payment products (e.g. gift cards)
  • Review performance metrics for business and vendor feedback
  • Work with operational stakeholders and cross-functional partners to enact change to improve products and processes
  • Apply Airbnb core values in all work
  • Protect community by reviewing and making exceptional decisions for platform exemptions
  • Own incident resolution of risky pay-in procedures from escalation to closure
  • Navigate complex operational issues by partnering with Legal, Public Affairs, and other teams to respond to regulatory inquiries
  • Tell the story through data by drafting business requirements and concept briefs
What we offer
What we offer
  • Bonus
  • Equity
  • Benefits
  • Employee Travel Credits
  • Fulltime
Read More
Arrow Right

Cyber Intelligence Analyst

Rapid7 is looking for a Cyber Intelligence Analyst to join our Cyber Threat Inte...
Location
Location
Czechia , Prague
Salary
Salary:
Not provided
rapid7.com Logo
Rapid7
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1–2 years of experience in cyber intelligence, or a related technical role
  • Analytical Skills: Ability to analyze threat data, identify patterns, and draw evidence-based conclusions
  • Research Capability: Ability to carry out structured online research using open-source intelligence methods
  • Foundational understanding of cyber threats, attack vectors, and common cybercrime techniques
  • Experience investigating phishing, data leaks, malware, or other external threats
  • Familiarity with extracting and analyzing threat data such as IPs, domains, URLs, and malware artifacts
  • Accountable for managing investigations within defined workflows and ticketing systems, owning cases end-to-end and delivering timely, accurate, and high-quality outcomes
  • Works collaboratively with cross-functional stakeholders to collect relevant context, align on findings, and support informed decision-making
  • Strong written English with the ability to communicate clearly and concisely, able to summarize complex findings clearly for customer-facing and internal audiences
  • Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success
Job Responsibility
Job Responsibility
  • Respond to customer RFIs within defined scope and SLAs, using approved intelligence tools and research techniques
  • Investigate cyber threats such as phishing, data leakage, ransomware, DDoS, and impersonation activities
  • Collect, analyze, and document intelligence from OSINT, platform data, and dark web sources
  • Identify threat indicators, attacker behavior, and relevant context to assess potential customer impact
  • Produce clear, concise, and customer-ready intelligence outputs, including reports and investigation summaries
  • Escalate complex or out-of-scope findings in accordance with established workflows
  • Collaborate with internal teams including MDR, SOC, Remediation, and Customer Success as needed
Read More
Arrow Right

Cyber Intelligence Analyst

Rapid7 is looking for a Cyber Intelligence Analyst to join our Cyber Threat Inte...
Location
Location
Czechia , Prague
Salary
Salary:
Not provided
rapid7.com Logo
Rapid7
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1–2 years of experience in cyber intelligence, or a related technical role
  • Analytical Skills: Ability to analyze threat data, identify patterns, and draw evidence-based conclusions
  • Research Capability: Ability to carry out structured online research using open-source intelligence methods
  • Foundational understanding of cyber threats, attack vectors, and common cybercrime techniques
  • Experience investigating phishing, data leaks, malware, or other external threats
  • Familiarity with extracting and analyzing threat data such as IPs, domains, URLs, and malware artifacts
  • Comfortable working within investigation workflows and ticketing systems, taking ownership of assigned cases from intake through resolution to ensure timely, accurate, and high-quality outputs
  • Works closely with cross-functional stakeholders to gather context and communicate findings
  • Strong written English with the ability to communicate clearly and concisely, able to summarize complex findings clearly for customer-facing and internal audiences
  • Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success.
Job Responsibility
Job Responsibility
  • Respond to customer RFIs within defined scope and SLAs, using approved intelligence tools and research techniques
  • Investigate cyber threats such as phishing, data leakage, ransomware, DDoS, and impersonation activities
  • Collect, analyze, and document intelligence from OSINT, platform data, and dark web sources
  • Identify threat indicators, attacker behavior, and relevant context to assess potential customer impact
  • Produce clear, concise, and customer-ready intelligence outputs, including reports and investigation summaries
  • Escalate complex or out-of-scope findings in accordance with established workflows
  • Collaborate with internal teams including MDR, SOC, Remediation, and Customer Success as needed
Read More
Arrow Right
New

Fraud Threat Intelligence Analyst

We are seeking a Fraud Threat Intelligence Analyst to join our growing team and ...
Location
Location
Salary
Salary:
Not provided
q6cyber.com Logo
Q6 Cyber
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1–5 years of experience monitoring/researching underground fraud communities such as Telegram, markets, DarkWeb forums and other illicit platforms
  • Knowledgeable in underground financial crimes and fraud ecosystems (e.g., payment card fraud, check fraud and more)
  • You have a solid grasp of the current fraud landscape
  • You understand the mechanics of Check Fraud, Debit/Credit Card Abuse, and First-Party vs. Third-Party Fraud
  • You have a forensic mindset and enjoy digging into the data to find the truth
  • Strong interpersonal and teamwork skills, with the ability to work independently and meet individual objectives
  • Excellent verbal and written communication skills
  • Proactive and resourceful problem-solver with a strong investigative mindset
  • High interest in combating cybercrime and fraud
  • Positive, can-do attitude and willingness to learn
Job Responsibility
Job Responsibility
  • Monitor and analyze underground communities (e.g., DarkWeb marketplaces, forums, Telegram, and more) related to financial crimes, fraud and other illicit activities
  • Collect and synthesize intelligence on new and emerging fraud techniques, tools, services, leveraging both open-source and internal collection systems
  • Produce high-quality intelligence reports, briefings, and presentations tailored for clients
  • Track and assess fraud-related TTPs to support trend analysis, customer needs, and business objectives
  • Engage regularly with clients to deliver intelligence findings, provide context, and offer actionable recommendations
What we offer
What we offer
  • competitive compensation package and comprehensive benefits package
Read More
Arrow Right

Intelligence Intermediate Analyst

Are you looking for a career move that will place you in a global financial orga...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of relevant experience in cyber threat intelligence, security analysis, or a related field
  • Bachelor’s degree (or equivalent experience) required and advanced degrees are welcome- preferably in a STEM major, computer science, or cyber technology
  • Strong analytical and investigative skills with clear, concise communication abilities in English
  • Working knowledge in one or more of the following areas: Advanced Persistent Threat, Third Party Risks/Threats, Cybercrime, Extremist Groups and Cyber Terrorists, Hacktivism, Distributed Denial of Service attacks, Fraud, Malware, Mobile Threats
Job Responsibility
Job Responsibility
  • Analyze cyber threat alerts and intelligence reports to identify and assess risks to Citi
  • Monitor cyber threat actors and trends (e.g. APTs, fraud, hacktivism, malware)
  • Investigate and report on security incidents, breaches, and data threats
  • Create and use custom tools to support threat analysis and intelligence collection
  • Collaborate with internal teams and external partners, including law enforcement and industry peers
  • Prepare high-quality briefings and written intelligence products for leadership
  • Research new threat sources, technologies, and analytical methods
  • Support automation and innovation in intelligence workflows and tooling
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right