Principal Security Researcher

Microsoft Microsoft · Big Tech · Redmond, WA +2 · Security Research

Principal Security Researcher (Red Team) at Microsoft, focused on using AI and agentic systems to scale offensive security research, adversary emulation, and tooling development. The role involves designing and executing complex attack simulations, developing advanced offensive tools, and evaluating defensive systems, with a strong emphasis on AI-enabled automation and adaptive attack paths.

What you'd actually do

  1. Lead the design and execution of complex, multi-stage adversary simulations across endpoint, identity, cloud, and SaaS environments.
  2. Architect and develop advanced offensive tooling, including scalable C2 frameworks, custom implants, and malware tradecraft.
  3. Conduct deep research into modern attacker techniques, including novel evasion strategies, cloud abuse patterns, and identity-based attacks.
  4. Drive threat modeling and adversary emulation strategy, aligning simulations with real-world campaigns and emerging threats.
  5. Design and implement AI-enabled and agentic systems to automate offensive operations, generate adaptive attack paths, and scale simulation complexity.

Skills

Required

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field
  • 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • offensive security
  • adversary emulation
  • offensive tooling
  • malware development

Nice to have

  • 5+ years of experience in red teaming, offensive security, or adversary emulation
  • Security related certifications such as OSCP, OSCE, OSEP, OSWE, GPEN, GXPN, GREM
  • Expertise in C2 framework design, implant development, and offensive infrastructure
  • Background in malware development, reverse engineering, or exploit development
  • Experience leveraging and producing threat intelligence at the campaign or actor level
  • Knowledge of MITRE ATT&CK and threat modeling methodologies

What the JD emphasized

  • AI-enabled offensive research
  • agentic systems
  • LLM-driven workflows

Other signals

  • AI-enabled offensive research
  • agentic systems to automate offensive operations
  • LLM-driven workflows to scale attack development