Expoint – all jobs in one place
The point where experts and best companies meet
Limitless High-tech career opportunities - Expoint

Microsoft Security Researcher 
Taiwan, Taoyuan City 
174304328

02.09.2025


• Hands-on experience in cybersecurity research, preferably in endpoint or network-based threat scenarios.

• Familiarity with cloud environments (e.g., Azure, AWS) and understanding of security challenges in hybrid or multi-cloud infrastructures.

• Strong grasp of modern attacker techniques, including MITRE ATT&CK and full kill-chain methodologies. • Experience in threat hunting across diverse signal sources (on-prem, hybrid, and cloud).

• Coding proficiency in at least one of the following: C, C++, C#, Python, or Rust.

• Curious, analytical mindset with the ability to thrive in ambiguous and evolving threat landscapes.

• Excellent collaboration and communication skills, with experience working in cross-functional, global teams.

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check:
- This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.


Responsibilities

• Provide cybersecurity expertise as needed during security escalations and incidents to help protect Microsoft and our customers

• Proactively hunt across diverse signal sources — including on-premises, hybrid, and cloud environments • Stay current with the latest cyberattack trends and design robust, sophisticated detection logic across the full attacker kill-chain.

• Build and implement innovative automated disruption capabilities that autonomously detect and mitigate attacks in real time.

• Collaborate with engineering and product teams to design security sensors, validate protection ideas, and measure effectiveness using data-driven approaches.

• Contribute to the broader security community by authoring technical blogs, sharing research findings, and presenting at leading security conferences.