Expoint - all jobs in one place
המקום בו המומחים והחברות הטובות ביותר נפגשים
Limitless High-tech career opportunities - Expoint

Microsoft Security Researcher 
Taiwan, Taoyuan City 
559988755

Yesterday


Required Qualifications:

  • 1+ year(s) experience in software development lifecycle, large-scale computing, modeling, cyber security, and/or anomaly detection
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
    • OR equivalent experience
  • Experience in cloud security, with deep knowledge of cloud infrastructure, identity management, and security event analysis.
  • Demonstrated experience in designing and implementing taxonomies and ontologies to structure and interconnect complex IT and security data for risk assessment, threat analysis, and incident response.

Other Requirements

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check:

  • This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • Experience in red teaming or penetration testing within Windows and Azure environments, with an understanding of the latest cybersecurity threats and offensive security tools.
  • Experience with Security Information and Event Management (SIEM) systems or other big data pipelines, including proficiency in Extract, Transform, Load (ETL) processes for analyzing large volumes of security logs and events
  • Ability to build and maintain large, multi-domain graph databases to model cloud assets, identities, activities, anomalous behaviors, and attack paths.
  • Familiarity with cloud security practices and protocols.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:Microsoft will accept applications for the role until May 19th, 2025.


Responsibilities

Develop and maintain an interconnected ontology of taxonomies tailored for use in a large graph database supporting security applications.

Design and model nodes and edges to represent assets, vulnerabilities, networks, and activities for risk management and threat analysis.

Leverage graph queries, data science techniques, and attacker methodologies to identify and demonstrate multi-domain attack paths and strengthen organizational defenses.