Expoint - all jobs in one place
Finding the best job has never been easier
Limitless High-tech career opportunities - Expoint

Microsoft Senior Insider Threat Analyst 
Taiwan, Taoyuan City 
820823006

15.05.2025


Required/Minimum Qualifications

  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incidentresponse
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.

Other Requirements

  • Microsoft Cloud Background Check : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • Citizenship & Citizenship Verification:This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customers and is subject to certain citizenship-based restrictions whererequiredorpermittedby applicable law. To meet this legal requirement, citizenship will be verified via a valid passport.
  • Citizenship & Citizenship Verification:This role will require access to information that is controlled for export under U.S. export control regulations, potentially under the International Traffic in Arms Regulations or the Export Administration Regulations.As a condition of employment, the successful candidate willbe requiredto provide proof of citizenship, U.S. permanent residency or other protected status under 8 U.S.C.§1324b(a)(3) for assessment of eligibility to access the export-controlled information. To meet this legal requirement, citizenship will be verified via a valid passport.


Preferred/Additional Qualifications

  • 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection
    • ORMaster's Degreeor Doctorate in Statistics, Mathematics, ComputerScienceor related field.
    • CISSP,CISA,CISM,SANS,GCIA,GCIH,OSCP, and/orSecurity+certification.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Identification and Detection of Control Failures

  • Designs solutions to address identified control issues (e.g., network, identity, high security), taking intended and unintended consequences into account. Operationalizes and scales a program and solution appropriately. Identifies high priority opportunities and makes data-driven recommendations for efficiencies to improve security posture (e.g., streamline processes, automate). Assists team with technical acumen as needed.

Automation

  • Recommends automation to improve effectiveness and efficiencies of security operations. Supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions. Improves solutions over time.

Translate Security Policy and Standards into Effective Controls

  • Contributes to security policy and standards. Maintains accurate and comprehensive security policy and standards. Designs mitigation strategies to addresses identified gaps in policy. Educates others (e.g., business partners, peers, industry) on security policy. Recognizes patterns and trends and recommends solutions for improvement. Recommends refinement of security policy and standards.

Collaboration

  • Collaborates with internal and external parties to ensure service level agreement (SLAs) are reached when addressing threats. Supports development of requirements for solutions. Defines new requirements and feature sets.

Customer/Partner Experience

  • Drives improvements in customer and partner experience by sharing best practices and interacting with customers. Ensures proper resources are engaged to address issue and prevent recurrence. Designs for the customer experience. Develops and implements metrics for customer satisfaction. Ensures alignment to customer and partner experience standards. Gathers future requirements directly from customers. Designs to maximize customer experience. Creates partnership and advocacy with customers. Educates business partners to influence behavior to make different decisions that enhance security posture. Defines customer and partner requirements, anticipates needs, and measures quality of experience.

Data-Driven Analysis

  • Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.

Security Incident Response

  • Independently analyzes prioritized attempted or successful efforts to compromise systems security. Recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps. Provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.

Monitoring and Detection

  • Builds new detection capabilities. Researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.

Red/Purple Team Operations

  • Understands how weaponized code can be used in operations. Determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations.

Threat Intelligence and Analysis

  • Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry.

Other

  • Embody our and