This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Do you have a passion for security and excitement about impacting some of the largest and most complex security challenges Microsoft is involved with to protect petabytes of business-critical customer data? We are looking for a Security Response Team (SRT) Investigator with the right mix of technical depth, engineering background, on-line services experience, and collaboration skills to help grow and protect Office 365 cloud services. Microsoft 365 is at the center of Microsoft’s cloud first, devices first strategy bringing together cloud-hosted offerings of our most trusted communications and collaboration services (like Exchange, SharePoint, Teams, and more!) with our cross-platform desktop and mobile clients. As a Senior Security Investigator you will work closely with other cloud and security experts across Microsoft to investigate threats, proactively hunt for compromise, automate capabilities, develop security tooling and data automation, and contribute your experience and expertise to countless other projects. We work in DevOps model within the Security business and need someone who has a passion for automating their way our of having to do the same thing twice and always thinking about how to scale what we do to millions and millions of users, hosts, and operations. You will be working to solve issues related to the latest security trends and early warning indicators, as well as help design solutions for emerging threats. M365 Security is a fast-paced team that constantly provides new opportunities to learn and grow.
Job Responsibility:
Skilled working with extremely large data sets to answer complex and ambiguous questions, using tools and languages like: SQL, KQL, Jupyter Notebook, Spark, Azure Synapse, R, U-SQL, Python, Splunk, and Power BI
Perform investigation on suspected vulnerable or compromised assets and services, and analyze log data and other artifacts to determine what occurred
Identify potential issues with detection (e.g., false positives, noise)
Analyze potential or actual intrusions identified as a result of monitoring activities
Create detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP])
Continue to drive automation of detection and response
Plan and execute proactive adversary hunt for malicious activity using myriad log sources, network- and host-based tools, and threat intelligence to identify the threat actors and their tools and techniques
Analyze key metrics and key performance indicators (KPIs) and other data sources (e.g., bugs, unhealthy data pipeline) and identifies trends in security issues and escalates appropriately
Recommend improvements and/or metrics to address gaps in measurement
Proactively identify and investigate potential issues in controls (e.g., network, identity, etc.)
Leverage expertise and team members to address and drive down issues accordingly
Identify and/or recognize patterns and recommend potential mitigation strategies
Identify and raise opportunities for automation to improve efficiency and effectiveness
Create automation as appropriate to drive greater efficiency with high value
Embody our company's Culture and Values
Requirements:
Doctorate in Statistics, Mathematics, Computer Science, Cyber Security, or related field
OR Master's Degree in Statistics, Mathematics, Computer Science, Cyber Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Cyber Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
OR equivalent experience
Active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph
Verification of U.S. citizenship
Nice to have:
Prior experience working with the US Government or US Department of Defense
Bachelor's degree in related discipline such as computer security, computer science, computer engineering or information technology
Good working knowledge of common security, encryption, and protocols such as encryption, PKI, modern authentication and cloud app authorization architectures and protocols such as SAML (Security Assertion Markup Language) or OAUTH
Past experience working in large scale enterprise products: M365 products such as Exchange, SharePoint, Skype, Teams
Deep and practical OS security/internals knowledge for Linux and Windows
Exposure to security related subjects and trends such as digital forensics, reverse engineering, penetration testing, and malware analysis
Experience with the Microsoft cloud and/or stack including O365, Azure, Windows or other Microsoft software/services
Working knowledge of Azure AI Foundry
Ability to work effectively in ambiguous situations and respond favorably to change
Comfortable working in a startup mode on a new team where there is lots of opportunity
Certifications like GCIA, GSLC, GCIH, CISM, CISSP, CEH, Etc. are plus
4+ years working in cyber security (Information Security, InfoSec, SecOps, Security Operations, SOC, CSOC, analyst, researcher, etc.)