Finding the best job has never been easier
Share
Required Qualifications
· 5+ years experience in software development lifecycle, large scale computing, modeling, cyber security, anomaly detection
Preferred Qualifications
· 6+ years experience in software development lifecycle, large scale computing, modeling, cyber security, anomaly detection
· Certified Information Systems Security Professional (CISSP) Certification, Security+ Certification, or relevant certification.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:
• Build and lead Microsoft’s end-to-end response process for security vulnerabilities in the hardware virtualization space, including:
o Lead the triage, analysis, and prioritization of hardware virtualization security vulnerabilities and collaborate with both industry partners and internal teams to deliver remediation to customers.
o Lead complex or large-scale security reviews and drive operational security and security incidents.
o Design and deliver external and internal security guidance for hardware virtualization security vulnerabilities and mitigations.
• Exercise and grow subject matter expertise in hardware virtualization security, up-stream and down-stream security operation processes, and provide clarity and guidance to others through sharing, coaching, conferences, and other means.
• Develop, monitor, and analyze key performance data to identify and deliver process improvements and automation.
• Exercise technical curiosity to collect and analyze security data, partner, and customer feedback, and partner across security disciplines to help address security issues, patterns, and trends.
• Helps to make connections and assist in developing agreements between groups to clarify priorities and identify dependencies.
These jobs might be a good fit