Principal Security Researcher

Microsoft Microsoft · Big Tech · Redmond, WA +2 · Security Research

Principal Security Researcher focused on designing and executing advanced adversary simulations using AI-enabled and agentic systems. The role involves evaluating AI-driven detections and defenses, translating attacker tradecraft into actionable insights, and contributing to the development of AI-driven security research workflows.

What you'd actually do

  1. Design and execute purple team simulations that emulate real-world threat actors, techniques, and campaigns across endpoint, identity, cloud, and email surfaces, incorporating both human-driven and agentic execution models.
  2. Partner closely with Microsoft Defender engineering, research, and threat intelligence teams to evaluate detection coverage, investigation quality, and response effectiveness.
  3. Analyze telemetry using Kusto / KQL to validate detection logic, uncover gaps, and measure signal quality at scale.
  4. Translate attacker tradecraft into actionable insights for defenders, including detection recommendations, telemetry requirements, and investigation improvements.
  5. Design, build, and leverage AI-enabled and agentic systems to automate simulation workflows, generate attack variations, validate detections, and accelerate post-simulation analysis.

Skills

Required

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field
  • 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • Ability to meet Microsoft, customer and/or government security screening requirements

Nice to have

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field
  • 5+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • 8+ years of incident response, threat hunting, and/or SOC experience
  • Experience leveraging and producing threat intelligence at the campaign or actor level
  • Advanced knowledge of MITRE ATT&CK and threat modeling methodologies
  • Security related certifications such as: GCIA, GMON, GCIH, CISA

What the JD emphasized

  • AI-first environment
  • agentic systems
  • LLM-driven workflows
  • AI-enabled and agentic systems

Other signals

  • AI-first environment
  • agentic systems
  • LLM-driven workflows
  • scale simulation design, automation, and validation
  • AI-enabled and agentic systems to automate simulation workflows
  • Evaluate the effectiveness of AI-driven detections and defenses