Expoint – all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Limitless High-tech career opportunities - Expoint

Microsoft Senior Security Operations Engineer 
Taiwan, Taoyuan City 
972687484

21.05.2025

  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incidentresponse

    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
  • 3+ years of experience in technical disciplines outside security space, including general software development, networking, database management, and full-stack development.

Other Requirements:

  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to, the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • Master's Degree
    • OR Doctorate in Statistics, Mathematics, Computer Science
    • OR related field
    • OR 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
  • CISSP CISA CISM SANS GCIA GCIH OSCP Security+
  • Demonstrated coding skills in one or more popular languages and platforms such as: C#, C++, Ruby, Python, and others
  • Experience testing web services, identifying and remediating OWASP top 10 security flaws, and understanding large complex systems.
  • Networking/Identity Isolation, Active Directory, operational security and Linux skills

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:Microsoft will accept applications for the role until May 25, 2025.


Responsibilities
The primary responsibilities of this role include:
  • Security Incident Response
    Independently analyzes prioritized attempted or successful efforts to compromise systems security; recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps; provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.
  • Identification and Detection of Control Failures

  • Recommends automation to improve effectiveness and efficiencies of security operations; supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions; improves solutions over time.
  • Monitoring and Detection
    Builds new detection capabilities; researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.
  • Threat Intelligence and Analysis
    Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry.
  • Data-Driven Analysis
    Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.
  • Penetration Testing
    Understands how weaponized code can be used in operations; determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations.

  • Embody our &