Job Board
LogoLogo

Get Jobs Tailored to Your Resume

Filtr uses AI to scan 1000+ jobs and finds postings that perfectly matches your resume

Microsoft Logo

Senior Technical Threat Analyst – Graph & AI-Driven Threat Intelligence

Microsoft

$119,800 - $234,700
Oct 16, 2025
Remote, US
Apply Now

Microsoft is seeking a Senior Technical Threat Analyst to accelerate discovery, contextualization, and attribution of advanced persistent threat (APT) activity, leveraging cutting-edge models to bridge traditional intelligence analysis and applied agentic AI.

Requirements

  • Hands-on experience with graph-based analytic environments (Synapse Vertex, Neo4j, or similar).
  • Moderate coding skills (Python preferred) for automation, custom queries, or model interaction scripting.
  • Working knowledge of agentic AI concepts (prompt chaining, orchestration frameworks, reasoning agents, or RAG-based pipelines).
  • Knowledge of the LLM ecosystem — including model families from OpenAI, Anthropic, Meta, and others — with awareness of strengths, weaknesses, and bias/hallucination considerations.
  • Experience integrating AI tools into threat analysis, hunting, or triage workflows.
  • Familiarity with graph ontology design and CTI data schemas (STIX/TAXII, ATT&CK mappings, etc.).
  • Understanding of cloud environments (Azure, AWS, GCP) and their relevance to threat actor operations.

Responsibilities

  • Lead graph-based hunting and correlation across diverse datasets to surface relationships among indicators, infrastructure, malware, and threat actor activity.
  • Design and implement AI-assisted analytic workflows, applying agentic models to explore, summarize, and reason about complex intelligence questions.
  • Evaluate and compare LLM models (OpenAI GPT, Anthropic Claude, Meta Llama, and others) for accuracy, reliability, and relevance in analytical contexts.
  • Partner with data engineers and AI researchers to prototype intelligent analyst agents capable of multi-hop reasoning and contextual evidence retrieval.
  • Conduct expert-level analysis of nation-state and APT group activity, including tactics, techniques, infrastructure patterns, and geopolitical drivers.
  • Translate graph-based findings into clear, actionable intelligence that supports both defensive operations and executive decision-making.
  • Collaborate across product, research, and operations teams to enhance detection, hunting, and attribution methodologies.

Other

  • Master's Degree in Statistics, Mathematics, Computer Science or related field.
  • 5+ years of experience in cyber threat intelligence, threat hunting, or adjacent disciplines with emphasis on nation-state actor tracking.
  • Ability to meet Microsoft, customer and/or government security screening requirements.
  • Citizenship verification via a valid passport.
  • Travel up to 25%.