Expoint – all jobs in one place
The point where experts and best companies meet
Limitless High-tech career opportunities - Expoint

Microsoft Principal Security Researcher - Research 
Taiwan, Taoyuan City 
665085429

17.07.2025

Note Regarding Current Security Situation in Israel:

AI Security, Identity Protection,SaaS Defense

In this role,research and build defenses across AI systems, agentic protocols, Identity platforms, and SaaS applications. One day you might analyze a new class of AI prompt injection attacks orabuse, the nextbe hunting through data or creating novel protection mechanisms for them.


Qualifications
  • + years of computer security industry experience with knowledge of adversary tradecraft, security operations, incident response, threat hunting, and of emerging threats and techniques for attacks against moderncloudenvironments.
  • 4+ years of experience researching, prototyping, and driving engineering requirements for threat protection systems.
  • BSc. or M.Sc. in Computer Science, Software Engineering, or relevant practical experience (e.g.service in elite technology unit in IDF).
  • Code fluency in either C#, Python or Rust.
  • A drive to tackle hard problems withlevelof ambiguity.
  • Strong knowledge of the security threat landscape, with experience in the modern attacker kill chain and MITRE ATT&CK—especially in cloud, application, identity, and AI-related threat scenarios.
  • Team player – open to ideas and enjoys working with others to achieve shared goals.
  • Experience leading aprojectfrom start to finish—includingidea, design, coding, testing, and ongoing maintenance.
  • Familiarity with cloud environments, and hybrid cloud enterprise services.
Responsibilities
  • Research and develop detection methods for new and advanced attack techniques-from exploits to implants. Build end-to-endPoCs, from offensive testing to scalable detection, acrossall ourcloudand identity
  • Stay up to date on the latest attack trends and build strong detections across the kill chain—covering agentic AI&LLM threats,cloudand identity-based attacks.
  • security products, implement detectionideasandvalidatetheir effectiveness using a data-driven approach.
  • identifydetection gaps, capabilities, assumptions, and improvements.
  • Provide cybersecurityexpertise