The point where experts and best companies meet
Share
Effective protection against malicious adversaries requires a deeply connected understanding of enterprises’ diverse digital estate, rich Threat Intelligence (TI), and knowledge of all user and system interactions; yet few organizations have this. It’s a formidable and continuously expanding problem. An organization’s rapidly changing networks, systems, identities, devices, and applications has led to significantly higher security data volumes, increasing numbers of data silos and unanticipated blind spots; a phenomenon beyond human scale that has challenged existing solutions and is the breeding ground for cyber-attacks. To deal with this challenge security developers (security ISVs, enterprise developers, MSSPs, SIs, detection engineers, security researchers) are saddled with the tedious and time-consuming task of solving data engineering problems as a prerequisite to building protection. They spend weeks learning a multitude of new APIs and try to figure out how to cost-effectively find, move, store, normalize, retain, govern and compliantly use growing volumes of security data.
Required/minimum qualifications:
Other Requirements:
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter.
Additional or preferred qualifications:
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:Microsoft will accept applications for the role until January 23, 2025.
These jobs might be a good fit