Finding the best job has never been easier
Share
Other Requirments
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role.
This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
Perfered Qualifications
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:
• Monitoring and Detection
Identifies potential issues with detection (e.g., false positives, noise); engages others to escalate appropriately. Analyzes potential or actual intrusions identified as a result of monitoring activities. Creates detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]). Continues to drive automation of detection and response.• Translate Security Policy and Standards into Effective Controls
• Collaboration
With minimal guidance, works with internal and external parties to push solutions to the environment to address threats.• Data-Driven Analysis
Analyzes key metrics and key performance indicators (KPIs) and other data sources (e.g., bugs, unhealthy data pipeline) and identifies trends in security issues and escalates appropriately. Recommends improvements and/or metrics to address gaps in measurement. Leverages multiple sources of data in conducting and interpreting analysis. Evaluates data sets for anomalies and other patterns.• Penetration Testing
• Automation
Identifies and raises opportunities for automation to improve efficiency and effectiveness. Creates automation as appropriate to drive greater efficiency with high value.• Identification and Detection of Control Failures
• Security Incident Response
• Threat Intelligence and Analysis
Identifies potential threats based on external trends and recommends prioritization for defense-building capabilities.
These jobs might be a good fit