Security Engineer II - Windows Security (multiple Positions)

Microsoft Microsoft · Big Tech · Redmond, WA +1 · Penetration Testing

Security Engineer II - Windows Security role at Microsoft focuses on offensive security and security engineering for Windows. Responsibilities include security design reviews, code reviews, penetration testing, vulnerability research, and developing mitigations to secure Windows products and devices.

What you'd actually do

  1. Participate in security reviews to identify and mitigate risk in Microsoft products, including design reviews, code reviews, and fuzzing.
  2. Be the security contact for teams building new innovative products and technologies in the next version of Windows and devices.
  3. Identify security vulnerabilities in a wide variety of key OS features such as network protocols, security features, and Microsoft devices.
  4. Leverage a broad and current understanding of security to devise new protections.
  5. Interact with the external security community and security researchers.

Skills

Required

  • Master's Degree in Statistics, Mathematics, Computer Science, or related field AND 1+ year(s) experience in security or related field OR Bachelor's Degree in Statistics, Mathematics, Computer Science, or related field AND 2+ years experience in security or related field OR equivalent experience.
  • Ability to meet Microsoft, customer and/or government security screening requirements

Nice to have

  • 2+ years identifying vulnerabilities in operating systems and/or native (C/C++) applications.
  • 5+ years of experience in a software engineering or security-related engineering.
  • Public track record of relevant security research, especially around vulnerability discovery.
  • Experience exploiting bugs and bypassing security mitigations in operating systems.
  • Familiarity with Microsoft Windows architecture.

What the JD emphasized

  • native code (C/C++)
  • penetration testing
  • OS security fundamentals
  • public track record of relevant security research
  • exploiting bugs
  • bypassing security mitigations