Expoint – all jobs in one place
The point where experts and best companies meet
Limitless High-tech career opportunities - Expoint

Microsoft Security Research Internship Opportunities 
Taiwan, Taoyuan City 
304884189

02.09.2025

As a Security Research Intern, under supervision you will design and conduct security research including malware analysis, threat and vulnerability analysis, adversary tracking, threat intelligence, detection and remediation development and other technology application focuses related to the understanding of the threat landscape with intent to disrupt adversaries or provide protection via defensive products and services. You will help generate solutions including first party mitigation, and working closely with customers and partners, support operational security and security incidents as well as security reviews and reporting.

Required Qualifications:

  • Candidate must be enrolled in a full time bachelor's or masters program in an area relevant for the role during the academic term immediately before their internship.
  • Must have at least one semester or term of school remaining following the completion of the internship

Preferred Qualifications:

  • Currently pursuing a Master's Degree in Statistics, Mathematics, Computer Science or related field

The base pay range for this internship is USD $5610.00 - $11010.00 per month. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $7270.00 - $12030.00 per month.Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:


Responsibilities
  • Begin to analyze threat trends and anomalies to determine operational impact. Determine vectors that introduce threat and potential mitigation strategies. Learn about systemic security issues and how to address them.
  • Process threat reporting from internal and external sources. Provide discrete threat data based on intelligence requirements or customer requests.
  • Identify security defects or vulnerabilities and deficiencies in security guidance.
  • Contribute code to technical implementation and automation of solutions to address security issues, such as signature detection, malware, threat analysis, or reverse engineering. Use results from research and experimentation to support architecture or product direction.
  • Identify areas of dependency and overlap with other teams or team members. Provide constructive input so the work is integrated and timely. Communicate the status of deliverables and dependencies to meet schedule.
  • Engage in measures to protect tools, techniques, information, and results of security practices. Respond to incidents for systems or products as needed. Use results of pen testing to improve products and services.