This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Microsoft Detection and Response Team (DART) are seeking a skilled and experienced lead investigator to join our team, who is the first port of call for many customers during a security incident. This role presents an opportunity to be the tip of the spear during incident response engagements, the key point of contact and decision maker throughout an incident. You will be presenting investigative findings to stakeholders from every part of the business with a particular focus on the executive team members. Hands on experience and knowledge of all aspects of large-scale incident response management is key along with strong leadership skills, ideally with experience in both on premises and cloud environments. The ability to communicate technical content with clarity and context is a priority, alongside solid knowledge of nation state and cybercrime attack techniques. A desire to fail fast and learn quickly is critical, along with strong analytical and critical thinking skills. Along with leading reactive incident response cases for some of the most esteemed businesses in the world, lead investigators should be able to build trust and drive significant change in any business they come into contact with, have excellent documentation skills, and be confident in disseminating knowledge both across the team and across partner teams within Microsoft. Thought leadership is a key priority, in the form of written and spoken content delivered both internally and externally. Any successful candidate should also embody Microsoft’s culture and values.
Job Responsibility:
Contextualizing and prioritizing findings to put together a comprehensive account and briefing of the events that transpired during a security incident
Pulling together multiple disparate events to build and communicate a cohesive timeline of activity
Collaborating with stakeholders at every level of the business, including legal, compliance, cybersecurity, engineering, and executive functions
Communicating key objectives and results with clarity and context
Managing all of the complexities of large-scale cybersecurity investigations for global multi-national organizations, serving as the primary point of contact
Leading research and analysis of security threats, and sharing findings across the team
Identifying, conducting, and supporting others in conducting research into critical security areas, such as current attacks, adversary tracking, and academic literature
Analyzing complex issues using multiple data sources to develop insights and identify security problems and threats
Creating new solutions to mitigate security issues
Recommending prioritization and validation methods for technical indicators, developing tools to automate analyses
Leads efforts to clean, structure, and standardize data and data sources
leads data quality efforts to ensure timely and consistent access to data sources
Developing written content for publication on Microsoft blog platforms
Developing presentations for delivery at internal and external conferences
Use the unique experiences of Microsoft Incident Response to create unique storytelling moments
Lead from the front by ideating, mentoring, and supporting thought leadership efforts across the team
Completing operational tasks and readiness with timeliness and accuracy
Following Microsoft policies, compliance, and procedures
Leading by example and guiding team members on operational tasks, readiness, and compliance
Requirements:
Doctorate in Computer Science, Computer Security, or related field
Master's Degree in Computer Science, Computer Security, or related field AND several years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
Bachelor's Degree in Computer Science, Computer Security, or related field AND several years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
equivalent experience
Experience in high pressure incident response environments
Lead and manage high-profile incident response efforts for some of the world’s largest businesses
Coordinate and lead all key stakeholders as the primary point of contact for major incidents
Identify gaps early in the engagement process and request appropriate resources to fill those gaps
Balance the need for rapid recovery with data collection and evidence preservation
Direct activities to secure Enterprise-scale environments and assess potential data exfiltration or data collection
Management of large scale incidents in a follow-the-sun format
Contextual application of MITRE Attack Framework and or OSI Model
Delivery of complex and technical discussions effectively to customer representatives of varying levels
Security Certifications in any of the following: OSCP, CISSP, SANS Certifications, SC Certifications from Microsoft
Experience working with methods utilized for evidence collection, maintenance of chain of custody and associated documentation, evidence storage and analysis, and evidentiary reporting
Eligibility or currently active government security clearance