Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Cambridge Residency Programme – Post Doc Researcher Security Systems 
United Kingdom, England, Cambridge 
686172684

17.09.2024

Security and Systems

  • New systems and virtualizationsoftware, languages, runtimes, protocols, and libraries that can guarantee safety and security by
  • New services such as databases,transparency services, andAIplatforms that utilizehigh-assurance components to ensure end-to-end securityand privacy
  • New security primitives in general purpose processors and specializedhardwareaccelerators
  • New analysis,

As a key member of our innovative team, you will play a crucial role in advancing the field of security, privacy and confidential computing.

Required/Minimum Qualifications:

An ideal candidate has the following qualifications.

  • Ph.D.or equivalentresearch experience in Security and Privacy, Operating Systems, and/or Computer Arch
  • seareas, demonstrated through publications in reputable conferences and journals.
  • Familiarity withsecurity principles and practices in securing systems in cloud computing environments, with focus on virtualization and/or microarchitectural security.
  • Proficiency in programming languages such as C and/or Rust, and their use in system-level development, operating systems, virtualization is highly desirable.
  • Strong collaboration and communication skills, with the ability to work effectively in a cross-functional team and present research findings to both technical and non-technical audiences.
  • Demonstrated ability to analyse complex problems, propose innovative solutions, and implement them effectively.
Responsibilities

Conduct cutting-edge research in the areas of systemsand virtualizationa focus on enhancing the securityand performance of cloud computing environments, leading to top-tier publications.

develop prototypes that experimentally validate this research.

Conduct thorough security assessments of systems, identifying potential vulnerabilities and proposing mitigation strategies.