Senior Security Researcher

Microsoft Microsoft · Big Tech · Redmond, WA +2 · Security Research

Senior Security Researcher role focused on threat hunting within Microsoft Defender Experts. The role involves exploring large datasets to detect advanced attack techniques, generating custom alerts, collaborating with data science and threat research teams, and building hunting tools and automations. Requires a strong background in cybersecurity, data analysis, and potentially machine learning, with a focus on enterprise security and threat intelligence.

What you'd actually do

  1. Explore and correlate large data sets to uncover novel and sophisticated attack techniques, monitor and catalog changes in activity group tradecraft, and generate custom alerts for enterprise customers.
  2. Work with customer support teams to support investigation and response during an enterprise’s time of need.
  3. Collaborate with our data science and threat research teams to develop and maintain accurate and durable cloud-based detections.
  4. Build hunting tools and automations for use in the discovery of human adversaries.

Skills

Required

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.

Nice to have

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.
  • 4+ years of experience in a technical role in the areas of Security Operations, Threat Intelligence, Cyber Incident Response, or Penetration Testing/Red Team.
  • Knowledge of operating system internals and security mechanisms.
  • Experience analyzing attacker techniques that leverage email and cloud-service tactics.
  • Skilled working with extremely large data sets, using tools and scripting languages such as: Excel, SQL, Python, Splunk, and PowerBI.
  • Candidates should have knowledge of operating system internals, security mitigations, and security challenges across Windows, Linux, Mac, Android, and iOS platforms. Familiarity with the kill‑chain model, the MITRE ATT&CK framework, and modern penetration testing techniques is expected.
  • Cross‑group collaboration and communication skills are required, with the ability to clearly articulate the business need for detection improvements.
  • Knowledge of major cloud and productivity platforms, identity systems, and associated security concerns.
  • Experience curating threat intelligence, engaging directly with customers in service delivery roles, and using data to tell a clear story is important.
  • Backgrounds in reverse engineering, DFIR, incident response, or machine learning models are also valuable.
  • Experience with system administration in large enterprise environments—including Windows and Linux systems, network administration, and cloud administration—is preferred.
  • Offensive security experience, including use of tools such as Metasploit, exploit development, OSINT techniques, and designing approaches to test or breach enterprise networks, is beneficial.
  • Advanced technical degrees or cybersecurity certifications such as CISSP, OSCP, CEH, or GIAC are a plus.

What the JD emphasized

  • security screening requirements are required
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • This position requires verification of U.S. citizenship due to citizenship‑based legal restrictions.
  • successful candidate’s citizenship will be verified via a valid passport.

Other signals

  • threat hunting
  • advanced attacks
  • security signals
  • hunting tools and automations
  • custom alerts