Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Security Operations Engineer 
United States 
791242810

17.12.2024

Required Qualifications:

  • Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
    • OR 3+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response.
  • Experienced with security policy, security trends and mitigation strategies.


Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:

  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • Master's Degree in Statistics, Mathematics, Computer Science or related field
    • OR 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
  • CISSP CISA CISM SANS GCIA GCIH OSCP Security+.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities
  • You will ensure accuracy and comprehensiveness in security policy, and design mitigation strategies for identified gaps. You’ll also collaborate with internal and external parties to ensure service level agreements are reached when addressing threats.
  • You will design for the customer experience by sharing best practices, interacting directly with customers, and resolving issues. You’ll also recommend mitigation strategies based on identified security trends.
  • Under guidance, you will analyze specific aspects of attempts to compromise systems security. You’ll also use monitoring techniques to identify intrustions.
  • You will understand how weaponized code can be used and recommend potential detections and signatures for defense capabilities.
  • Design evolving common infrastructure architecture for our organization.
  • Support development teams with securing applications and services.
  • You will stay relevant with emerging Azure features including risk and security principles.
  • Partner with engineering, program management and operations personnel within the FastTrack organization implementing secure infrastructure improvements to processes and technologies.
  • Embody our and