Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Principal Cybersecurity Software Engineer 
United States, Massachusetts, Boston 
322370754

17.09.2024

Principal Cybersecurityof the Azure Machine Learning (AzureML) Back Plane team, you willbe tasked withthe security posture of AzureML services and application programming interfaces (APIs), implementingbest practices like isolation, zero-trust, andmonitoring systems.

our culture every day.

Required/Minimum Qualifications:

  • Bachelor's Degree in Computer Science, or related technical discipline AND 6+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python
    • OR equivalent experience.
  • 6+years experienceworking in large-scale high security software systems.
  • Experience withcyber-security best practices

Other Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:

  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred/Additional Qualifications:

  • Bachelor's Degree in Computer Scienceor related technical field AND 8+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python.
    • OR equivalent experience.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:Microsoft will accept applications for the role until September 24, 2024.


Responsibilities
  • Understand and audit AzureML API for best practices, security vulnerabilities.
  • identifyand implement high impact security initiatives in the AzureML system.
  • Codify security and compliance requirements by building and strengthening system defenses against malicious attacks and exploits.
  • like network security rules.
  • Work tomonitorand detect potential attacks before they canimpact
  • Embody our