Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Microsoft Senior Security Operations Engineer 
United States, Washington 
685334509

20.11.2024
Required/Minimum Qualifications
  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.

Other Requirments

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role.

This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Additional or Preferred Qualifications

  • 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection
    • OR Master's Degree or Doctorate in Statistics, Mathematics, Computer Science or related field.
  • CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, and/or Security+ certification.
  • Experience in technical disciplines outside security space, including general software development, networking, database management, and full-stack development.
  • Demonstrated coding skills in one or more popular languages and platforms such as: C#, C++, Ruby, Python, and others.
  • Experience testing web services, identifying and remediating OWASP top 10 security flaws, and understanding large complex systems quickly.
  • Networking/Identity Isolation, Active Directory, operational secruity and Linux skills

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities
The primary responsibilities of this role include:


• Security Incident Response
Independently analyzes prioritized attempted or successful efforts to compromise systems security; recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps; provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.• Identification and Detection of Control Failures
• Automation
Recommends automation to improve effectiveness and efficiencies of security operations; supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions; improves solutions over time.• Monitoring and Detection
Builds new detection capabilities; researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.• Threat Intelligence and Analysis
Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry• Data-Driven Analysis
Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.• Penetration Testing
Understands how weaponized code can be used in operations; determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations

• Other

Embody our