This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Cloud & AI organization accelerates Microsoft’s mission and ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. IAM Protect safeguards Microsoft’s most critical cloud workloads by reducing risk in the Trusted Computing Base (TCB). We identify adversary paths, shrink the TCB’s attack surface, improve tenant/service isolation, and ensure high-fidelity telemetry exists to detect and respond at speed. We’re hiring a Principal Security Operations Engineer - Systems Architect to lead the technical architecture for TCB risk reduction. You will design and drive end-to-end solutions that (1) identify and quantify risk, (2) shrink TCB footprint and collapse unneeded trust edges, (3) raise isolation guarantees across identity, networking, compute, storage, and supply chain, and (4) expand/validate telemetry coverage required for prevention, detection, and response. This role is deeply technical and hands-on: you’ll author reference architectures, hardening patterns, and guardrails; host design reviews with partner teams; and lead cross-company risk burndown campaigns that land durable controls - not just playbooks.
Job Responsibility:
Own the TCB security architecture: threat model key trust boundaries, define target states, and codify compensating controls
Lead risk identification & key results frameworks: quantify breach paths, set objective success criteria, and measure risk residuals
Architect isolation patterns (identities, secrets, network paths, compute/storage seams) and drive enforcement with engineering owners
Design telemetry baselines and validation loops (coverage, quality, retention) to support operations, and close gaps with productized pipelines
Run burndown campaigns: prioritize work, produce decision docs, sequence mitigations, and hold the line on SLAs
Requirements:
Master's Degree in Statistics, Mathematics, Computer Science, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
Doctorate in Statistics, Mathematics, Computer Science, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
Bachelor's Degree in Statistics, Mathematics, Computer Science, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
OR equivalent experience
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role
These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter
Nice to have:
10+ years of experience in security engineering, security operations, or technical program management with a focus on large-scale, cloud or enterprise environments
Strong experience building automated solutions for vulnerability management, threat detection, and security configuration drift
Strong understanding of security graph models, adversary techniques, attack path analysis, or breach path quantification, with an attacker mindset to identify weak links in the services/systems before adversaries exploit them
Hands-on experience with automation of telemetry/logging pipelines to validate security coverage at scale
Demonstrated expertise in identity, secrets, or infrastructure security, with hands-on experience reducing risk through technical controls, policy enforcement, or automation
Experience with AI/ML in security contexts, such as anomaly detection, predictive modeling, or triaging security signals using large datasets
Strong ability to translate complex technical risk into prioritized plans of action and measurable outcomes
Proven track record of driving cross-team initiatives across engineering, security, and operations organizations
Experience with data analysis and reporting, using telemetry, logs, or metrics to inform decisions and measure progress
Proficiency in Kusto/KQL and the ability to design and build tooling that scales across environments and teams
Excellent written and verbal communication skills, including the ability to influence technical and executive audiences