Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Microsoft Principal Security Software Engineer 
United States, Washington 
84131890

17.09.2024

is responsible forsecuring the next-gen Cloud

The idealexperience with native code (C/C++)(code audit, writing

Required/Minimum Qualifications:

  • 7+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cybersecurity, and anomaly detection.

Other Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • + years of experience in a software engineering or security-related field
  • 3+ years of experiencesecurity experience with native code (C/C++) and binaries, such asidentifyingvulnerabilities, reverse engineering, or similar
  • Familiarity with Microsoft Hyper-V
  • Ability to create clarity, energy, and cohesion across the team
  • Publictrack recordof relevant security research, especially around vulnerability discovery
  • Experience exploiting bugs and bypassing security mitigations inoperatingsystems
  • Familiarity with Microsoft Windows architecture

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:Microsoft will accept applications for the role until September 26, 2024.


Responsibilities
  • Lead andparticipatein security reviews toidentifyand mitigate risk in Microsoft products, including design review, code reviews, and fuzzing.
  • Be the primary security contact for teams building new innovative products and technologies in the next version of the Azure platform and virtualization technologies.
  • Identifysecurity vulnerabilities in a wide variety of key virtualization features.
  • Leverage a broad and current understanding of security to devise new protections and exploit mitigations.
  • Interact with the external security community and security researchers.
  • Collaborate with product teams to improve security and articulate the business value of security investments