Jonathan Or is a Principal Security Researcher at Microsoft, where he leverages his extensive expertise in operating system internals and low-level development to enhance the security posture of Microsoft products and technologies. With a profound understanding of various operating systems, including Windows, Linux, macOS, and...
Jonathan Or is a Principal Security Researcher at Microsoft, where he leverages his extensive expertise in operating system internals and low-level development to enhance the security posture of Microsoft products and technologies. With a profound understanding of various operating systems, including Windows, Linux, macOS, and Android, Jonathan excels in both userland and kernel-level analysis. His deep knowledge of computer architecture underpins his work in malware reversing and vulnerability research, where he employs advanced tools such as IDA, gdb, and WinDbg to dissect and analyze malicious software.
In his current role, Jonathan is pivotal in advancing Windows Advanced Threat Protection (ATP) through innovative cloud-based detection mechanisms. He is responsible for critical security initiatives, including anti-tampering strategies, kernel exploit detection, and ransomware remediation. His work in red-teaming encompasses vulnerability research, penetration testing, and comprehensive code reviews, ensuring that Microsoft’s security frameworks are robust and resilient against emerging threats. Jonathan's commitment to enhancing mitigation strategies is evident in his coding efforts, where he employs programming languages like Python and C# to develop and refine security solutions.
Jonathan’s multidisciplinary approach, which integrates concepts from game theory and intelligent agents, allows him to anticipate and counteract potential security threats effectively. His contributions not only bolster Microsoft’s security infrastructure but also set industry standards for best practices in software security research. As a passionate and dedicated researcher, Jonathan Or continues to push the boundaries of security technology, making significant strides in protecting users and organizations from evolving cyber threats.