Finding the best job has never been easier
Share
Required Qualifications:
Other Requirements:
Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
Preferred Qualifications:
2+ year experience writing detections within big data and SIEM solutions such as ArcSight, Splunk, ElasticSearch, Logstash, Azure Data Explorer, Azure Log Analytics, Azure Data Lake, or Azure Sentinel
Skilled working with extremely large data sets to answer complex and ambiguous questions, using tools and languages like: SQL, KQL, Jupyter Notebooks, Spark, Azure Synapse, R, U-SQL, Python, Splunk, Scala, and PowerBI.
Experience with the MITRE ATT&CK Framework.
Demonstrated ability to understand and communicate technical details with varying levels of management.
Experience developing and operationalizing data science insights to aid in solving cybersecurity challenges.
Exposure to security-related subjects and trends such as digital forensics, reverse engineering, and penetration testing.
Experience using red team reports to inform incident response and detection development.
Experience with threat modeling and designing purple team engagements to evaluate detection efficacy.
Experience with software engineering tools such as CI/CD, Azure DevOps, git, and Agile Scrum.
Background/familiarity with AI, prompt engineering, and Large Language Models.
Experience with Windows, Azure, and O365.
Certifications such as GCIA, GSLC, GCIH, CISM, CISSP, CEH, etc. are a plus.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:
• Apply knowledge of attacker techniques to uncover threats by analyzing log data resulting in the development and tuning of detections.
• Aggregate signals from multiple sources and platforms to infer and detect attacker techniques.
• Utilize software engineering fundamentals to ensure consistent and repeatable delivery of high quality/high fidelity detections.
• Craft complex queries against a variety of log sources to isolate concerning/anomalous behavior that could be crafted into a detection.
• Execute the dev-sec-ops approach to software delivery by designing, coding, testing, deploying, and operating components of the Microsoft Cloud security monitoring systems.
• Think holistically about the threat landscape in our cloud(s) and use this understanding to evolve our monitoring posture.
These jobs might be a good fit