jobify_logo ×
  • מִשׁתַמֵשׁ
  • התחברות/הרשמה
  • עמוד הבית
  • מי אנחנו
  • מעסיקים מובילים
  • צרו קשר
  • תנאי שימוש
  • מדיניות פרטיות
  • הצהרת נגישות
קרן עזריאלי טקסט בעברית עם סמל אינסוף social_security the_israeli_employment_service work_office המקום
jobify_logo
  • מי אנחנו
  • מעסיקים מובילים
  • פרסום משרה חינם
  • צרו קשר
דילוג לתוכן

עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!

במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.

מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.

Senior Security Researcher - Microsoft Threat Intelligence Center (MSTIC)

Microsoft

Microsoft Microsoft

  • תל אביב - יפו
  • Indeed
Indeed

Senior Security Researcher - Microsoft Threat Intelligence Center (MSTIC)

Microsoft

Microsoft Microsoft

  • תל אביב - יפו
  • bag_icon מלאה
  • coins_icon 35,000-55,000 ₪ (הערכה מבוססת AI)
    זוהי הערכת טווח שכר מבוססת AI ולא פרסום של המעסיק
  • Indeed
Indeed

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

Are you passionate about reverse engineering malware? Do you enjoy partnering, collaborating, and driving work with different security & engineering teams to keep the company safe?
The Microsoft Threat Intelligence Center (MSTIC) has a unique opportunity for you!

The Microsoft Threat Intelligence Center (MSTIC) is growing fast and looking for a seasoned malware reverse engineer with experience supporting threat intelligence analysis and security services and products. Are you passionate about reversing malware?

MSTIC is responsible for delivering timely threat intelligence across our products & services teams, assisting with our engineering response to security issues/incidents and assisting with government policy outreach for the company.

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
Responsibilities

Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s threat actor pursuit mission, services, and products.
Reverse engineering & binary analysis to include dynamic and static malware analysis.
Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.
Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services.
Maintaining up to date and in-depth technical understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs).
Maintaining up to date and in-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement techniques to discover and track the adversaries of today and identify the attacks of tomorrow.
Maintaining up to date and in-depth knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations

Qualifications
5+ years of experience in reverse engineering malware that are associated with APT or financially motivated groups

In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement the techniques to discover and track the adversaries of today and identify the attacks of tomorrow.

Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.

Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s TI analysts, services, and products

Reverse engineering & binary analysis to include dynamic and static malware analysis. Experienced user of static analysis tooling (e.g., IDA Pro, Ghidra etc.)

Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services

Maintaining a deep understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs)

Knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations.

Preferred Qualifications:
Proven knowledge of Windows OS internals and Windows API

Demonstrated experience analyzing malicious desktop, mobile and web applications developed in common programming languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc.

Demonstrated experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions

Demonstrated experience analyzing packed and obfuscated programs, scripts, and shellcode

Demonstrated experience identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies

Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity

Familiarity with legacy and modern software and system protection mythologies and technologies

Demonstrated experience working with SQL-based databases and Big Data solutions

Experience working closely with threat intelligence analysts to understand their workflow and analytic problems and turning those into large-scale analytics

Demonstrated capability to coherently present potentially sensitive threat intelligence to a wide variety of audiences in public and private settings

Demonstrated interpersonal skills (adaptability, inclusiveness, optimism, curiosity, empathy, courage, respect) which support the development of high functioning teams

#MSTIC #MSFTSecurity

Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.


במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.

מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.

משרות נוספות מומלצות עבורך
  • רשימת משאלות

    Senior Malware Researcher

    • map_icon תל אביב - יפו
    Dream

    Dream

לכל המשרות של Senior Malware Analyst

ניתן לצפות במשרות שסימנת בכל שלב תחת התפריט הראשי בקטגוריית 'משרות שאהבתי'

המקום קרן עזריאלי טקסט בעברית עם סמל אינסוף
  • מי אנחנו
  • מעסיקים מובילים
  • צרו קשר
  • תנאי שימוש
  • מדיניות פרטיות
  • הצהרת נגישות

2026 Ⓒ ג'וביפיי - כל הזכויות שמורות

קרן עזריאלי טקסט בעברית עם סמל אינסוף social_security the_israeli_employment_service israel_innovation_authority work_office המקום
המערכת בונה את הפרופיל התעסוקתי שלך

עוד רגע...

המערכת זיהתה ששינית את הנתונים באזור האישי ומעדכנת את ההמלצות על תפקידים ומשרות בהתאם.

מצטערים, לא הצלחנו לנתח בהצלחה את הנתונים שהזנת.
אתם מוזמנים לנסות להזין שוב או להעלות קובץ קורות חיים במידה ויש לכם.
בהצלחה

הגעת להגבלה היומית של שלושה עדכונים בפרופיל האישי ביום

loader

הבקשה שלך נשלחה בהצלחה!

יש באפשרותך לשלוח בקשה לקבלת ייעוץ אישי ללא עלות מיועצת קריירה.

באפשרותך לשלוח בקשה לקבלת ייעוץ אישי ללא עלות

  • בעיה טכנית

  • סיוע בכתיבת קורות חיים או בהכנה לראיון עבודה

  • התאמה של משרות

  • אחר:

פנייתך נשלחה בהצלחה. נציג מטעם ארגון נכי צהל ייצור איתך קשר בהקדם