Expoint – all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Limitless High-tech career opportunities - Expoint

Microsoft Security Researcher II 
Taiwan, Taoyuan City 
319418510

Today

Minimum Qualifications:

  • Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
    • OR 3+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection.
  • 3+ years of software development/research experience utilizing knowledge of security/threat landscape Practical Windows internals knowledge (other OS experience may count).
  • 1+ years of experience with Reverse Engineering: familiar with debuggers, disassemblers, protocols, file formats.

Other Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

Microsoft Cloud Background Check:

  • This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • Master's Degree in Statistics, Mathematics, Computer Science or related field.
    • OR 4+ years experience in software development lifecycle, large-scale computing, modeling, cyber-security, and/or anomaly detection.
  • Offensive security research experience.
  • Digital forensics skills Programming skills in C, C++, C# or willingness to learn Industry recognized author of security research papers, blogs, or books Low-level/security knowledge of other operating systems.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Microsoft will accept applications for the role until August 21, 2025.

Responsibilities

As a Security Researcher II, you will:

  • Research emerging attack vectors and techniques.
  • Analyze detection and prevention gaps and understand root cause.
  • Design and develop detection, prevention and disruption solutions to thwart advanced attacks.
  • Synthesize in-field telemetry to judge the state of threat coverage and share insights.
  • Identify trends, foresee landscape direction and propose enhancements to meet the needs.
  • Collaborate across teams to address systemic security issues.
  • Guide design of AI based solutions to tackle hard security problems.