
Security Researcher
- הרצליה
- משרה קבועה
- משרה מלאה
- Identifying potential threats, allowing for proactive defense before an actual incident
- Providing recommendations to improve customers’ cybersecurity posture going forward and performing threat intelligence knowledge transfer to prepare customers to defend against today’s threat landscape
- Driving product and tooling improvements by conveying learnings from threat hunting and incident response at scale to engineering partner teams
- Identifying, prioritizing, and targeting complex security issues that cause negative impact to customers. Creating and driving adoption of relevant mitigations and providing proactive guidance
- Working with others to synthesize research findings into recommendations for mitigation of security issues. Sharing across teams. Driving change within team based on research findings.Qualifications:Required Qualifications:
- 3+ years of experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection from the industry
- Fluency in English (reading, writing reports, speaking)
- Understanding the fundamentals of coding, Python preferably (no need to know how to write actual code)
- Strong understanding of malware and the modern threat landscape, especially identity-based attacks
- Familiarity and understanding of SQL or Kusto Query Language (KQL) queries (or experience with large database/SIEM query languages such as Splunk/Humio/Kibana, etc.)
- Familiarity and understanding of Jupyter Notebooks, or building equivalent threat hunting automations with scripting languages
- Active Directory subject matter expertise
- Experience with sophisticated threat actor evidence including familiarity with typical Indicators of Compromise (IOCs), Indicators of Activity (IOAs) and Tools, Techniques and Procedures (TTPs)
- Use of forensic analysis tools such as X-Ways Forensics®, WinHex®, Encase®, FTK®, etc
- Microsoft Azure and/or Office365 platform knowledge and experience
- Experience with various forensic log artifacts found in SIEM logs, web server logs, AV logs, protection logs such as HIDS and NIDS logs
- Familiarity with Microsoft Defender 365 security stack (for Endpoints, Identity, Cloud, etc), especially with Advanced Hunting query writing
- Excellent understanding of Windows internals and where trace evidence can be found
- Knowledge of third-party cybersecurity solutions, especially EDR and SIEM solutions
- Linux and/or macOS forensic analysis and threat hunting skills
- Technical certifications based on domain (e.g., Azure, SharePoint)
- Investigation/Cybersecurity/Digital Forensics/DFIR certifications (e.g. CISSP, SANS GIAC, etc)#GHOSTMicrosoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the .