The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
Responsibilities
Successful applicants should have experience with the following:
- In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement the techniques both to discovery and track the adversaries of today and identify the attacks of tomorrow.
- Experience producing actionable Threat Intelligence on targeted and advanced persistent adversaries enabling network and host defenses in external organizations with demonstrable impact.
- Tracked APT adversaries over a period of at least one year ascertaining and characterizing various TTPs, capabilities, infrastructure, and campaigns.
- Experience applying knowledge across all critical elements and common data types used in Threat Intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations.
- Applied knowledge of a variety of adversary command and control methods and protocols.
- Experience supporting incident response and deeply familiar with common incident response procedures, processes, and tools.
Qualifications
- 3+ years experience in cybersecurity, and/or anomaly detectiono
- OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
- Demonstrated experience working cross-team and with external partners.
- Demonstrated experience working across the intelligence lifecycle.
- Demonstrated experience delivering intelligence findings both written and verbally.
- Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
- Microsoft Cloud Background Check:This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.
Additional or Preferred Qualifications
- 4+ years experience in software development lifecycle, large-scale computing, modeling, cyber-security, and/or anomaly detection
- OR Master's Degree in Statistics, Mathematics, Computer Science or related field
Security Research IC3 - The typical base pay range for this role across the U.S. is USD $94,300 - $182,600 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $120,900 - $198,600 per year.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-pay
Microsoft will accept applications and processes offers for these roles on an ongoing basis.
#MSFTSecurity #MSTIC #MSecR