Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Microsoft Senior Security Incident Responder – CTJ Poly 
United States, Washington 
99802011

10.12.2024

As a, you willcoordination and leadership duringsecurity incidentsYour passion will show as you step into a crisis and lead teams to a successful resolution. You willbe responsible forYou will also facilitate discussion around trends and early warning indicators, as well as help design solutions to emerging threats.

supporting the DoD (Department of Defense) and civilian agencies.

new opportunities to learn and grow.

Required/Minimum Qualifications:

  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
Other Requirements:

Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • The successful candidate must have an active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph. Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. Failure to maintain or obtain the appropriate U.S. Government clearance and/or customer screening requirements may result in employment action up to and including termination.
  • Clearance Verification : This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.
  • Microsoft Cloud Background Check : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • Citizenship& Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance.


Preferred/Additional Qualifications:

  • Demonstrated ability to work well under pressure while maintaining a professional image and approach.
  • Experience with large scale and complex incidents of all types, including APT, DDoS, malicious insider, web and mobile applications, and data exfiltration.
  • Demonstrated foundational knowledge in information technology, including cloud services, hardware, networking, architecture, protocols, file systems, and operating systems. Performing cyber defense incident and/or vulnerability triage to determine scope, urgency, and potential risk impact.
  • CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, and/or Security+ certification.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Microsoft will accept applications for the role until January 3, 2025.

Responsibilities
  • Analyze potential security issues and develop investigation and resolution plans
  • Facilitate implementation of established plans and procedures
  • Communicate complex and technical issues to diverse audiences, orally and in-writing, in an easily understood, authoritative, and actionable manner
  • Rapidly react to changing situations and develop new plans based on recent discoveries
  • Drive enhancementsacross the technology stackto improve detection, response, and remediation
  • Coordinate with internal and external business partners and security teams at a deeply technical level