Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Microsoft Senior Detection Engineer - CTJ POLY 
United States, Washington 
157908933

04.02.2025


Required Qualifications:

  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), and information technology (IT) operations
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.

Other Requirements:

Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • The successful candidate must have an active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph. Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. Failure to maintain or obtain the appropriate U.S. Government clearance and/or customer screening requirements may result in employment action up to and including termination.
  • Clearance Verification: This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.
    Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • Citizenship & Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance.

Preferred Qualifications:

  • 2+ year experience writing detections within big data and SIEM solutions such as ArcSight, Splunk, ElasticSearch, Logstash, Azure Data Explorer, Azure Log Analytics, Azure Data Lake, or Azure Sentinel

  • Skilled working with extremely large data sets to answer complex and ambiguous questions, using tools and languages like: SQL, KQL, Jupyter Notebooks, Spark, Azure Synapse, R, U-SQL, Python, Splunk, Scala, and PowerBI.

  • Experience with the MITRE ATT&CK Framework.

  • Demonstrated ability to understand and communicate technical details with varying levels of management.

  • Experience developing and operationalizing data science insights to aid in solving cybersecurity challenges.

  • Exposure to security-related subjects and trends such as digital forensics, reverse engineering, and penetration testing.

  • Experience using red team reports to inform incident response and detection development.

  • Experience with threat modeling and designing purple team engagements to evaluate detection efficacy.

  • Experience with software engineering tools such as CI/CD, Azure DevOps, git, and Agile Scrum.

  • Background/familiarity with AI, prompt engineering, and Large Language Models.

  • Experience with Windows, Azure, and O365.

  • Certifications such as GCIA, GSLC, GCIH, CISM, CISSP, CEH, etc. are a plus.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities

• Apply knowledge of attacker techniques to uncover threats by analyzing log data resulting in the development and tuning of detections.
• Aggregate signals from multiple sources and platforms to infer and detect attacker techniques.
• Utilize software engineering fundamentals to ensure consistent and repeatable delivery of high quality/high fidelity detections.
• Craft complex queries against a variety of log sources to isolate concerning/anomalous behavior that could be crafted into a detection.
• Execute the dev-sec-ops approach to software delivery by designing, coding, testing, deploying, and operating components of the Microsoft Cloud security monitoring systems.
• Think holistically about the threat landscape in our cloud(s) and use this understanding to evolve our monitoring posture.