Expoint – all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Limitless High-tech career opportunities - Expoint

Microsoft Cyber Security Engineer 
Taiwan, Taoyuan City 
132664582

02.09.2025

Required Qualifications:

  • 3+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.

Background Check Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

While not required, we also look for the following
Preferred Qualifications:

  • CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, PCCSE, PCNSE, PCSAE, CCNP Security, CCIE Security, CySA, CASP+ and/or CompTIA Security+ certification.
  • Relevant cloud infra certifications such as SC-200, AZ-500, or equivalent
  • Strong background in firewalls or intrusion detection or prevention systems

Responsibilities:

  • Lead investigations into security incidents and coordinate response efforts across IT and OT environments.

  • Develop, tune, and maintain detection rules and threat models within SIEM platforms.

  • Design and implement automated workflows using SOAR tools to streamline incident response.

  • Collaborate with cross-functional teams to improve threat visibility and reduce response times.

  • Support the integration and optimization of Microsoft Defender for Endpoint, Defender for Cloud, Defender for IoT and Sentinel.

  • Contribute to cloud security initiatives, including configuration reviews, logging, and compliance assessments.

  • Assist in securing OT/ICS environments through segmentation, monitoring, and protocol analysis.

  • Contribute to knowledge sharing and documentation.

Other

  • Embody our and .