Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Microsoft Security Operations Engineer 
United States, Washington 
313528068

20.11.2024
Required Qualifications:
  • 3+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.

Other Requirments

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role.

This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Perfered Qualifications

  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection
    • OR Master's Degree in Statistics, Mathematics, Computer Science or related field.
  • CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, and/or Security+ certification.
  • Experience in understanding and remediating security vulnerabilities in large complex systems quickly.
  • • Experience in technical disciplines outside security space, including general software development, networking, database management, and full-stack development.
  • Demonstrated coding skills in one or more popular languages and platforms such as: C#, C++, Ruby, Python, and others.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities
The primary responsibilities of this role include:


• Monitoring and Detection
Identifies potential issues with detection (e.g., false positives, noise); engages others to escalate appropriately. Analyzes potential or actual intrusions identified as a result of monitoring activities. Creates detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]). Continues to drive automation of detection and response.• Translate Security Policy and Standards into Effective Controls
• Collaboration
With minimal guidance, works with internal and external parties to push solutions to the environment to address threats.• Data-Driven Analysis
Analyzes key metrics and key performance indicators (KPIs) and other data sources (e.g., bugs, unhealthy data pipeline) and identifies trends in security issues and escalates appropriately. Recommends improvements and/or metrics to address gaps in measurement. Leverages multiple sources of data in conducting and interpreting analysis. Evaluates data sets for anomalies and other patterns.• Penetration Testing
• Automation
Identifies and raises opportunities for automation to improve efficiency and effectiveness. Creates automation as appropriate to drive greater efficiency with high value.• Identification and Detection of Control Failures
• Security Incident Response
• Threat Intelligence and Analysis
Identifies potential threats based on external trends and recommends prioritization for defense-building capabilities.