Expoint – all jobs in one place
The point where experts and best companies meet
Limitless High-tech career opportunities - Expoint

Microsoft Security Operations Engineer 
Taiwan, Taoyuan City 
248166052

16.10.2025

Required Qualifications:

  • 1+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
  • Bachelor's Degree in Statistics, Mathematics, Computer Science
    • or related field.
  • Experience with security tooling such as Firewalls, Intrusion detection/prevention systems, or Identity and Access Management (IAM)

While not required, we also look for the followingPreferred Qualifications:

  • 3+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection.
  • Master's Degree in Statistics, Mathematics, Computer Science
    • or related field.
  • CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, PCCSE, PCNSE, PCSAE, CCNP Security, CCIE Security and/or Security+ certification.
  • 1+ years of direct experience designing, deploying, or operating common Identity and Access Management (IAM) tooling
  • Any experience with industrial control systems is preferred (not mandatory)

Background Check Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:Microsoft will accept applications for the role until October 27, 2025.


Responsibilities
  • Proactively identify and investigate potential issues and patterns in security controls and recommend mitigation strategies, while also surfacing opportunities for automation to improve efficiency and effectiveness across the network.
  • Install, upgrade, and maintain security hardware, operating system and software.
  • Identify gaps in security policy and administration, recommend solutions, and implement new and revised security standards, while working with partner teams to drive consistency and awareness.
  • Maintain standards and drive improvements for our customer and partner experience, responding appropriately to emerging issues and advocating for our customer experience through analyzing key metrics, performance indicators, and other data sources (e.g. bugs, unhealthy data pipeline). Escalate, recommend improvements as appropriate to address gaps.
  • Participate in on-call rotation to support security services.
  • With minimal guidance, analyze attempted or successful efforts to compromise systems security and, alongside partner teams, create recommendations to limit exposure, implement response plans, and take action.
  • Analyze potential or actual intrusions identified from monitoring activities and create detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]).
  • Administer globally distributed Authentication, Authorization, and Accounting (AAA) and Privileged Access Management (PAM) functions end-to-end.

Other

  • Embody our and .