Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Senior Security Researcher 
United States, Washington 
698040517

20.11.2024

Required/Minimum Qualifications:

  • 5+ year's experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection.
    • OR Master's Degree in Statistics, Mathematics, Computer Science or related field.
  • Identifies, conducts, and supports others in conducting research into critical security areas, such as: current attacks, adversary tracking, and the broader cyber security landscape.
  • Contributes to customer-facing products and professional community through publications.
  • Experience querying large data sets via Kusto Query Language (KQL) or other similar query languages
  • Experience developing and scaling threat intelligence insights on top of large sets of security data (Alerts, incident, event, & intelligence telemetry).

Other Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Additional or Preferred Qualifications:

  • 6+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
  • Background in or understanding of data science concepts & frameworks
  • Experience writing customer-facing threat intelligence products
  • Experience writing on threat actors and their activities, malicious tools, common techniques, and vulnerabilities.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities

Responsibilities include:

  • Researching, analyzing, and contextualizing threat actor, tool, technique and vulnerability related threat intelligence.
  • Writing customer-facing profiles on the latest cyber security threats.
  • Creating briefings and briefing internal and external teams on the latest security threats. - Adapting your writing style to create new content based on business needs and customer feedback.
  • Ability to develop dashboards and reporting to effectively convey threat intelligence insights to key internal stakeholders and customers in briefings and reports.