This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Microsoft Customer Success Security is looking for a Senior Threat Intelligence Analyst responsible for producing and delivering threat intelligence content to customers. You will work closely with internal Microsoft stakeholders, such as Engineering and the Detection and Response Team (DART), to develop finished intelligence reports with timely and relevant content. This TI team will present highly technical research and threat information to a range of customer audiences across multiple industries around the world. The intelligence reports will complement usage of Microsoft security products in proactive and reactive incident response situations. This role requires cross-team and cross-geo collaboration.
Job Responsibility:
Create and track threat intelligence reports to support customers and internal stakeholders
Engage with internal stakeholders to ensure threat intelligence content integrates with various product and service groups within Microsoft
Ensure threat intelligence deliverables cover critical and time-sensitive threats, as well as creating new reports that close any identified gaps
Requirements:
Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
OR equivalent experience
5+ years producing finished intelligence content on threat actors and attacker techniques including written reports, presentations, and visuals covering attribution, threat detection and hunting guidance, and remediation recommendations
5+ years leading multi-disciplinary team of threat intelligence analysts leveraging incident response data
Proven ability to develop new threat intelligence content types, standards, and processes
Expertise in managing customer escalations and complex work streams with quick turnaround deliverables
Knowledge of customer requirements across a variety of industries and geos
Experience working with engineering resources to develop automated intelligence solutions
Proven track record of working across cross-functional teams including threat hunters, incident responders, and customer delivery representatives
Incident response or intrusion remediation experience
Expertise in providing dedicated finished intelligence support to customers
Experience developing business strategy around threat intelligence production and delivery
Demonstrated oral and written communication, organization and interpersonal skills
Nice to have:
Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 5+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 8+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 12+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection