Senior & Principal Security Researcher

Microsoft Microsoft · Big Tech · United States · Security Research

Senior/Principal Security Researcher on the Global Hunting, Oversight, and Strategic Triage (GHOST) team. The role involves performing threat hunts, assisting with investigations, developing threat intelligence, and cultivating investigation best practices into Microsoft tooling and products. Researchers will support a global team to identify and catalog new attacker TTPs, victims, and deliver customer notifications to protect worldwide enterprise customers and empower customers to protect themselves via constantly improving Microsoft products.

What you'd actually do

  1. Performing deep analysis of attacker activity in on-premises and cloud environments
  2. Identifying potential threats, allowing for proactive defense before an actual incident
  3. Notifying customers regarding imminent attacker activity
  4. Providing recommendations to improve customers’ cybersecurity posture going forward and performing threat intelligence knowledge transfer to prepare customers to defend against today’s threat landscape
  5. Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities

Skills

Required

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • equivalent experience
  • Citizenship & Citizenship Verification
  • Ability to meet Microsoft, customer and/or government security screening requirements

Nice to have

  • proficient analytical background

What the JD emphasized

  • deep analysis of attacker activity
  • threat hunting tools
  • threat intelligence knowledge transfer
  • security screening requirements

Other signals

  • threat hunting
  • threat intelligence
  • security tooling
  • customer notifications
  • attacker TTPs