โ† back to jobs
> job detail
M
๐Ÿ‘ฝOther

Principal Applied Threat Intelligence Analyst

Microsoft ยท Redmond, WA,US
// classified as
Other (Adjacent or hard to classify.)
posted
1d ago
location
Redmond, WA,US
languages
c, python
tools
โ€”
> stack
cpython
> education
doctorate
> description
As a Principal Applied Threat Intelligence Analyst, you will: Author and publish high-impact threat intelligence reports (actor profiles, campaign analyses, trend reports, TTP deep-dives, vulnerability profiles) for both customer-facing and internal audiences. Translate complex technical findings into clear, prescriptive guidance for security operations teams, executives, and the broader defender community. Mentor analysts and contribute to tradecraft, analytic standards, and team-wide knowledge sharing. Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. These requirements include, but are not limited to the following specialized security screenings: Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 5+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 8+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 12+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. OR equivalent experience. 10 + years of experience in cyber threat intelligence, threat hunting, incident response, or a closely related security discipline. Demonstrated experience producing finished threat intelligence reporting for technical and/or executive audiences. Attribution experience creating threat groups, assessing connections between established threat groups, and communicating attribution assessments to internal stakeholders and customers in a timely manner. Understanding of adversary tradecraft, the cyber kill chain, and frameworks such as MITRE ATT&CK, the Diamond Model, and structured analytic techniques. Written and verbal communication skills, with a portfolio of public or customer-facing intelligence writing. Experience with endpoint, cloud, network, and identity-based attacks and datasets. Comprehensive OS security/internals knowledge. Understanding of network protocols and analytical experience with network infrastructure data & telemetry. Reverse-engineering with static and behavioral binary analysis experience. Functional understanding of common threat analysis models such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK. Programming or scripting background (Python, PowerShell, C#, C++, etc.)