About The Position

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Microsoft Security Research, is at the front line of defending Microsoft customers and the broader ecosystem against the world's most sophisticated threat actors. Our Applied Threat Intelligence Production team transforms raw signal from Microsoft's scale of telemetry into actionable, customer-facing intelligence that empowers defenders, informs product decisions, and shapes the public narrative on the threat landscape. We partner deeply across Microsoft Threat Intelligence, product engineering, research, marketing, and communications to ship intel that moves markets and protects organizations everywhere.

Requirements

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field.
  • OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.
  • OR equivalent experience.
  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Nice To Haves

  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.
  • OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 8+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection.
  • OR equivalent experience.
  • 5+ years of experience in cyber threat intelligence, threat hunting, incident response, or a closely related security discipline.
  • Demonstrated experience producing finished threat intelligence reporting for technical audiences.
  • Attribution experience creating threat groups, assessing connections between established threat groups, and communicating attribution assessments to internal stakeholders and customers in a timely manner.
  • Working experience with Microsoft Sentinel and Microsoft Defender XDR (or directly comparable SIEM/XDR platforms).
  • Understanding of adversary tradecraft, the cyber kill chain, and frameworks such as MITRE ATT&CK, the Diamond Model, and structured analytic techniques.
  • Written and verbal communication skills, with a portfolio of public or customer-facing intelligence writing.
  • Experience analyzing endpoint, cloud, identity, and network telemetry.
  • Familiarity with scripting or data analysis tools (Python, KQL, SQL, PowerShell).
  • Understanding of OS internals, network protocols, and common attack techniques.
  • Exposure to reverse engineering or malware analysis.
  • Functional understanding of common threat analysis models such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK.
  • Programming or scripting background (Python, PowerShell, C#, C++, etc.).

Responsibilities

  • Author and publish high-impact threat intelligence reports (actor profiles, campaign analyses, trend reports, TTP deep-dives, vulnerability profiles) for both customer-facing and internal audiences.
  • Build and refine the pipelines, tooling, and workflows that allow Microsoft to stream insightful cyber threat intelligence to customers machine speed.
  • Represent Microsoft Threat Intelligence in customer briefings, industry conferences, and cross-industry working groups.
  • Translate technical findings into clear, actionable insights for security operations teams and technical stakeholders.
  • Partner with product, engineering, and research teams to operationalize intelligence into Microsoft security platforms (e.g., Defender XDR, Sentinel, customer briefings).
  • Contribute to scalable workflows and pipelines that improve how threat intelligence is generated, refined, and delivered to customers.
  • Support customer engagements (briefings, responses, and discussions) with accurate and timely intelligence insights.
  • Collaborate within the team to improve analytic tradecraft, knowledge sharing, and intelligence quality.

Benefits

  • Certain roles may be eligible for benefits and other compensation.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Education Level

Ph.D. or professional degree

© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service