Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Microsoft Principal Security Researcher 
Taiwan, Taoyuan City 
352551221

17.04.2025

CISO organization is lookinga visionarytechiques to incidents to refine them,Thisprincipal level position will drive the discovery and developmentcutting-edge techniques to detect, analyze, and prevent cyber attacks.are looking to create mechanical advantagenewmethods to uncover attacks.

Required/Minimum Qualifications

  • years experiencein software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Doctorate in Statistics, Mathematics, ComputerScienceor related field.
  • Demonstrated understandingofattacker tradecraft especially attacksinthe cloud (suchasEntra,Azure, and M365).
  • Proficiencyinscripting or programming in languages such asPython.
  • Proficiencyincloud query languages such asKusto.
  • Experience communicating/presenting to an executive audience oncomplex research that generates actionable insights.


Other Requirements:

  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Additional or Preferred Qualifications:

  • years experiencein software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Doctorate in Statistics, Mathematics, ComputerScienceor relatedfield
  • Experience identifying malicious activity in a detection system at scale to protect an environment, product, or service

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities
  • Inventand develop novel detection methodsforidentifying cyber attacks.
  • Leadin-depth research projects on emerging attack vectors, tactics, and techniques used by advanced threat actors.
  • Familiaritywithgraph analytic techniques applied to the cyber domain
  • Leveragemachine learning, statistical analysis, and other analytics to uncover stealthy and sophisticated threats.
  • Partnerwiththreat hunters, redteam, and blueteam members on attack detection