Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Microsoft Senior Security Researcher 
United States, Washington 
726877091

20.11.2024

Qualifications - Required:

  • 5+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Master's Degree in Statistics, Mathematics, Computer Science or related field.

Qualifications - Other Requirements:

Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check:
- This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • 6+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
    • OR Doctorate in Statistics, Mathematics, Computer Science or related field.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Microsoft will accept applications for the role until December 4, 2024.

Responsibilities
  1. Design solutions for optimizing analyses of (& reverse engineering) entities, telemetry and behavioral data and advance state-of-the-art of threat detection, protection and remediation.
  2. Create actionable insights and proof-of-concepts from analysis to drive develop durable detection & prevention strategies across the entire kill-chain, highlight protection gaps and drive product improvements.
  3. Protects tools, techniques, information, and results of security practices; assesses efficacy of operational security (e.g., red-on-red pen testing). Develops new techniques to evaluate operational security; teaches others to master techniques.
  4. Identifies, prioritizes, and targets complex security issues that cause negative impact to customers. Creates and drives adoption of relevant mitigations. Suggests and drives appropriate guidance, models, response, and remediation for issues. Drives program and process of mitigation (e.g., automation).
  5. Work with internal and external teams to forge new and improve existing partnerships that help mature the product and derive better insights
  6. Condense findings and communicate these verbally and in writing to researchers, developers and engineers through visualizations conveying clear, concise and powerful messages