The point where experts and best companies meet
Share
Other Requirments
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role.
This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
Additional or Preferred Qualifications
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:
• Security Incident Response
Independently analyzes prioritized attempted or successful efforts to compromise systems security; recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps; provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.• Identification and Detection of Control Failures
• Automation
Recommends automation to improve effectiveness and efficiencies of security operations; supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions; improves solutions over time.• Monitoring and Detection
Builds new detection capabilities; researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.• Threat Intelligence and Analysis
Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry• Data-Driven Analysis
Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.• Penetration Testing
Understands how weaponized code can be used in operations; determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations
• Other
Embody our
These jobs might be a good fit