Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Cybersecurity Infrastructure Engineer 
United States 
74481893

10.09.2024


Required/Minimum Qualifications

  • 5+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Master's Degree in Statistics, Mathematics, Computer Science or related field.
  • 3+ years of experience with Threat Actor containment during an incident, rapid recovery of critical infrastructure (primarily Active Directory rebuild and restoration), and eviction of a Threat Actor after an investigation
  • 3+ years of Active Directory and associated components (Kerberos, NTLM, Group Policy, Backup and Disaster Recovery, DNS, AD tiering models, gMSAs)
  • Proficiency in one or more query languages (KQL, SPL, SQL, etc.)

Additional or Preferred Qualifications

  • 6+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Doctorate in Statistics, Mathematics, Computer Science or related field
  • Experience in PowerShell and bash scripting
  • Experience with third-party security products, including but not limited to, Splunk, CrowdStrike Falcon, QRadar, etc.
  • Experience with Microsoft Public Key Infrastructure (PKI) implementations, Active Directory Federation Services (AD FS)
  • Understanding and working knowledge of the Linux and MacOS platforms
  • Experience with two or more of Microsoft’s portfolio of Artificial Intelligence (AI) products such as Security Copilot, Bing Copilot, Github Copilot, Office Copilot and Windows Copilot
  • Understanding of DevOps, concepts such as Version Control, Infrastructure as code, CI/CD Pipelines, Frameworks, Configuration Management and Continuous Monitoring.
  • Experience with management of virtualization platforms such as Hyper-V, VMware, etc.
  • Experience with IP network management including routing, firewalls, access control lists, DHCP, packet analysis, and troubleshooting network traffic flow
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Technical Delivery

This role will work as part of a collaborative team assisting our top customers with:

  • Ability to contextualize and prioritize adversary containment and recovery efforts across multiple workstreams
  • Ability to quickly build and execute a recovery plan as a response to large-scale impactful incidents involving ransomware and destructive adversarial campaigns
  • Deploying forensic collection tooling across a wide range of complex environments
  • Identifying potential threats – allowing for proactive defence before an actual incident
  • Providing recommendations to improve cybersecurity posture going forward
  • Performing knowledge transfer to prepare customers to defend against today’s threat landscape

Security threats are constantly evolving, and so does the Microsoft Incident Response team. To that end, this role will involve:

  • Researching, analyzing, and summarizing security threats and response capabilities, sharing across the team
  • Identifying, conducting, and supporting others in conducting research into critical security areas, such as current attacks, adversary tracking, and academic literature
  • Creating and documenting new solutions to mitigate security issues
  • Recommending prioritization and validation methods for technical indicators, develops tools to automate analyses
  • Leads efforts to clean, structure, and standardize data and data sources; leads data quality efforts to ensure timely and consistent access to data sources

Thought Leadership

This role includes the ability to be at the forefront of Microsoft Security thought leadership by:

  • Developing written content for publication on Microsoft blog platforms
  • Developing presentations for delivery at internal and external conferences
  • Use the unique experiences of Microsoft Incident Response to create unique storytelling moments

Operational Excellence

Be maintained by:

  • Completing operational tasks and readiness with timeliness and accuracy.
  • Following Microsoft policies, compliance, and procedures (e.g., Enterprise Services Authorization Policy, Standards of Business Conduct, labor logging, expenses, travel guidelines).
  • Leading by example and guiding team members on operational tasks, readiness, and compliance.

Embody our