Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Microsoft Senior Network Security Service Engineering Manager 
United States, Washington 
180051513

17.12.2024

you will drive our organizational strategy, lead by example, and support team members on their learning journey. You will manage the team that implements and operates modern cloud and on premises cybersecurity controls to defend Microsoft datacenter critical infrastructure from threat actors. Leveraging multiple solutions and partnering with internal and external teams, you will be at the forefront of advancing industrial network cybersecurity capabilities and engaging with leadership to enable shared understanding and commitment to mission.

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

  • This role is located in one or all hub locations - Atlanta, GA, Washington, D.C., Redmond, WA, San Antonio, TX or Phoenix, AZ.
  • Relocation support will be provided, and successful candidates must relocate or reside within 50 miles of the hub office location.
  • This role is eligible for hybrid or remote work, up to 100%.

Required/minimum qualifications

  • Master's Degree in Statistics, Mathematics, Computer Science or related field
    • OR 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), and information technology (IT) operations.

Background Check Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Additional or preferred qualifications

  • 7+ years of experience in infrastructure, cloud or cyber security, and anomaly detection
  • ISSP CISA CISM SANS GCIA GCIH OSCP Security+ 1+ years leading multi-disciplinary team
  • 1+ years leading a security function (e.g., Security Operations Center [SOC], threat and vulnerability management [TVM]).
  • 2+ years people management
  • Doctorate in Statistics, Mathematics, Computer Science or related field
    • OR 7+ years of experience in software development lifecycle, large scale computing, modeling, cyber security, and anomaly detection.


Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities
  • Deliver success through empowerment and accountability by modeling, coaching, and caring.
  • Direct team to address identified security strategy, ensuring proper team resources are available to accomplish goals, and coordinate with partner teams to remediate control failures.
  • Drive team to implement and manage new automation for greater efficiency in security operations while ensuring measurable business impact and solutions across the organization.
    Escalate potential gaps in security policy, provide guidance on current security policies, recommend changes, and drive adoption for new policies.
  • Guide team to meet threat mitigation service levels with internal and external partners and manage relationships with third-party account management.
  • Support end to end security breach protocol by guiding team in responding, investigating, communicating with stakeholders, resolving, and running post-mortem analysis for any security breaches. Coordinate with partner teams to secure data and maintain chain of custody.
  • Guide team to develop monitoring and detection capabilities to identify threats and malicious activity, ensuring adequate resources for mitigation, while also collaborating with internal and external partners to leverage and evangelize best practices.
  • Embody our and