Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

Microsoft Corporation Threat Intel Analyst in Canberra, Australia

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

Microsoft Threat Intelligence Center provides unique insight on threat to protect Microsoft and our customers. Do you consider yourself an expert on targeted threats, human-operated ransomware, and intrusion detection? We’re looking for an innovative threat intelligence experts with proven technical leadership capability to help protect Microsoft and its customers against targeted attacks by identifying and tracking sophisticated adversaries. You are a seasoned cybersecurity leader with experience of managing people from a range of disciplines including both analysts and developers. You care deeply about the customer experience, and that drives how you prioritize the technical work of the team. You are results-driven, with a focus on delivering new threat intelligence value to start protecting customers early, and an iterative approach for incremental improvements thereafter. You enjoy finding creative ways to leverage new technologies.

Responsibilities

  • In this role, you will be responsible for identifying and tracking sophisticated adversaries.

  • You need to be persuasive in getting buy-in for your ideas both within MSTIC and from key engineering groups across Microsoft, such as the Microsoft Defender anti-malware team, working in partnership with them to protect both Microsoft assets and Microsoft’s wider customer base through improved product and service offerings.

  • You will strengthen existing partnerships and build new ones with key organizations to deliver benefits to Microsoft and its customers.

  • Applied knowledge of the phases of a cyber operation—particularly how to work across the phases to uncover new intelligence—is essential.

  • You will have experience working with products and services to improve security for customers, both strategic and tactical threat intelligence customers, including evaluating their requirements, and with a diverse organization to gain support for your ideas.

  • A demonstrated capability to coherently present potentially sensitive threat intelligence to a wide variety of audiences in public forums and experience working with a variety of external partners on sensitive threat intelligence issues is required.

Qualifications

Required Qualifications:

  • In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement techniques both to discover and track the adversaries of today and identify the attacks of tomorrow.

  • Experience producing actionable threat intelligence on targeted and advanced persistent adversaries, enabling network and host defenses in external organizations with demonstrable impact.

  • Tracked APT adversaries over a period of at least one year, ascertaining and characterizing various TTPs, capabilities, infrastructure, and campaigns.

  • Applied knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics, including methods of data collection and analytic techniques; and network forensics, including common protocols and how those are used in adversary operations.

  • Applied knowledge of a variety of adversary command and control methods and protocols.

  • Experience supporting incident response and being deeply familiar with common incident response procedures, processes, and tools.

Other Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

#MSFTSecurity #MSTIC #MSecR

What’s Next?

Even if you feel you may not meet 100% of the criteria, please apply. You may exceed your own expectations, or we may have another opportunity that suits your potential.  While we’re not able to reach out directly to every applicant, we will always do our best to help you feel heard and supported throughout the experience.  

In the meantime, please see our FAQs, (https://careers.microsoft.com/us/en/faq) Interview Tips and Accessibility Support (https://careers.microsoft.com/us/en/accommodationrequest) for more information on our recruitment process.  

Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations (https://careers.microsoft.com/v2/global/en/accessibility.html) .

DirectEmployers