Malware Reverse Engineer

at  Microsoft

Dublin, County Dublin, Ireland -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate17 Aug, 2024Not Specified18 May, 20242 year(s) or abovePlatforms,Consideration,Powershell,Citizenship,Debuggers,Javascript,Web Applications,Triage,Color,Datasets,Artifacts,Ethnicity,C++,Ordinances,Actionscript,Interpersonal Skills,Html,Visual Basic,Python,Programming Languages,Regulations,Automation,JavaNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions.
The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
The Microsoft Threat Intelligence Center (MSTIC) tracks nation state and criminal actors to protect Microsoft and Microsoft’s customers. The actors we track are often highly technical, and maintain good operational security. Tracking actors like this requires persistence and ingenuity and is done by combining intelligence analysts, reverse engineers, developers and data scientists.
Some of the successful investigations that MSTIC has performed include discovering and disrupting supply chain attacks from North Korean actors, identifying attacks from Iranian actors against universities and research organisations, and monitoring new techniques deployed by Russian actors.
MSTIC also co-operate with the Digital Crimes Unit (DCU) to prevent cybercrime, particularly ransomware. Our team in Dublin is expanding and we’re looking for individuals who can perform reverse engineering to assist analyst in performing investigations into nation state and e-crime actors.
Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

QUALIFICATIONS

  • Experience in reverse engineering malware that are associated with APT or financially motivated groups
  • Knowledge of Windows OS internals and Windows API
  • Demonstrated experience analyzing malicious desktop, mobile and web applications developed in common programming languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc.
  • Demonstrated experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions.
  • Demonstrated experience analyzing packed and obfuscated programs, scripts, and shellcode.
  • Demonstrated experience identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies.
  • Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity.
  • Demonstrated interpersonal skills (adaptability, inclusiveness, optimism, curiosity, empathy, courage, respect) which support the development of high functioning teams.
    Ability to meet Microsoft, customer and/or government security screening requirements are required for this role.

These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check:

  • This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.

MSFTSecurity #MSTIC

Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations

Responsibilities:

  • Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s threat actor pursuit mission, services, and products.
  • Reverse engineering & binary analysis to include dynamic and static malware analysis.
  • Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.
  • Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services.
  • Maintaining up to date and in-depth technical understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs).
  • Maintaining up to date and in-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement techniques to discover and track the adversaries of today and identify the attacks of tomorrow.Maintaining up to date and in-depth knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations.
-


REQUIREMENT SUMMARY

Min:2.0Max:7.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Proficient

1

Dublin, County Dublin, Ireland