$ads={1}
We are seeking an experienced Security Researcher with a background in data science to join our dynamic and innovative team at Microsoft. As a Security Researcher at Microsoft, you will play a vital role in developing the next generation of cutting-edge machine learning models and algorithms to detect and mitigate email security threats.
Responsibilities
Responsibilities:
- Demonstrate an understanding of the current and former threat landscape, including major trends, activity groups, and tooling used by both prolific and obscure threat actors.
- Develop complex detections using static, dynamic, and hybrid detection engines, such as Yara, ClamAV, Suricata/Snort, Sigma, and Zeek.
- Focus on signature performance, maintenance, testing, and the overall lifecycle management of signatures.
- Conduct in-depth analysis for threats such as phishing, malware, and exploits
- Utilize sandboxing technologies to analyze and understand malicious behaviors, including development, advanced usage, and interpretation of outputs.
- Conduct thorough threat hunting and analysis using large and diverse datasets to identify false negatives, detect gaps, and improve our overall security posture.
- Document and track advanced threat activity, including major crimeware, nation state entities, and other threat groups.
- Leverage cyber threat intelligence concepts to enhance detection and response capabilities.
- Automate security processes through scripting or coding languages, particularly Python.
- Apply knowledge of KQL (Kusto Query Language) to perform advanced data analysis and investigations.
- Analyze network traffic using PCAP, netflow, or other log sources to identify and respond to security incidents.
- Effectively collaborate with teams and individuals outside of the security team.
- Build, develop, and maintain processes and procedures to enhance operational efficiency and effectiveness.
- Mentor team members and provide training to internal and external teams
Qualifications
Required/Minimum Qualifications
- 3+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
- OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
Other Requirements:
- Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter.
Additional or Preferred Qualifications
- 4+ years experience in software development lifecycle, large-scale computing, modeling, cyber-security, and/or anomaly detection
- OR Master's Degree in Statistics, Mathematics, Computer Science or related field
- Network penetration testing and intrusion remediation experience.
- Have data knowledge, and ability to analyze and present complex data visually in a meaningful way
- Ability to collaborate effectively with colleagues from various disciplines.
- Ability to lead analysts across geographically separated teams
- Able to deliver in emergency response situations
- Innovative thinking to solve hard problems in ways that meet both customer and business goals
- Experience with data analysis and cyber threat investigations in Azure
- Advanced understanding of the current and former threat landscape, including major trends, activity groups, and tooling used by the most prolific to obscure threat activity groups.
- Proficiency in sandboxing technologies, including development, advanced usage, and interpretation of outputs.
- Ability to document and track advanced threat activity, including major crimeware, nation state entities, and other groups.
- Familiarity with cyber threat intelligence concepts.
- Proficiency in automation using scripting or coding languages, especially Python.
- Knowledge of KQL (Kusto Query Language).
- Experience in network traffic analysis using PCAP, netflow, or other logs.
- Experience conducting threat hunting and analysis using large and diverse datasets.
- Experience mentoring team members
Security Research IC3 - The typical base pay range for this role across the U.S. is USD $94,300 - $182,600 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $120,900 - $198,600 per year.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-pay
#MSecR #MSSecurity