About The Position

Do you have a passion for security and excitement about impacting some of the largest and most complex security challenges Microsoft is involved with to protect petabytes of business-critical customer data? We are looking for a Security Response Team (SRT) Investigator with the right mix of technical depth, engineering background, on-line services experience, and collaboration skills to help grow and protect Office 365 cloud services. Microsoft 365 is at the center of Microsoft’s cloud first, devices first strategy bringing together cloud-hosted offerings of our most trusted communications and collaboration services (like Exchange, SharePoint, Teams, and more!) with our cross-platform desktop and mobile clients. As a Senior Security Investigator you will work closely with other cloud and security experts across Microsoft to investigate threats, proactively hunt for compromise, automate capabilities, develop security tooling and data automation, and contribute your experience and expertise to countless other projects. We work in DevOps model within the Security business and need someone who has a passion for automating their way our of having to do the same thing twice and always thinking about how to scale what we do to millions and millions of users, hosts, and operations. You will be working to solve issues related to the latest security trends and early warning indicators, as well as help design solutions for emerging threats. M365 Security is a fast-paced team that constantly provides new opportunities to learn and grow. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

Requirements

  • Doctorate in Statistics, Mathematics, Computer Science, Cyber Security, or related field OR Master's Degree in Statistics, Mathematics, Computer Science, Cyber Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Cyber Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response OR equivalent experience.
  • Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: The successful candidate must have an active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph. Ability to meet Microsoft, customer and/or government security screening requirements are required pre-offer and post-hire for this role. Failure to maintain or obtain the appropriate U.S. Government clearance and/or customer screening requirements may result in employment action up to and including termination.
  • Clearance Verification: This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • Citizenship & Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance.

Nice To Haves

  • Prior experience working with the US Government or US Department of Defense.
  • Bachelor's degree in related discipline such as computer security, computer science, computer engineering or information technology.
  • Good working knowledge of common security, encryption, and protocols such as encryption, PKI, modern authentication and cloud app authorization architectures and protocols such as SAML (Security Assertion Markup Language) or OAUTH.
  • Past experience working in large scale enterprise products: M365 products such as Exchange, SharePoint, Skype, Teams.
  • Deep and practical OS security/internals knowledge for Linux and Windows.
  • Exposure to security related subjects and trends such as digital forensics, reverse engineering, penetration testing, and malware analysis.
  • Experience with the Microsoft cloud and/or stack including O365, Azure, Windows or other Microsoft software/services.
  • Working knowledge of Azure AI Foundry.
  • Ability to work effectively in ambiguous situations and respond favorably to change.
  • Comfortable working in a startup mode on a new team where there is lots of opportunity.
  • Certifications like GCIA, GSLC, GCIH, CISM, CISSP, CEH, Etc. are plus.
  • 4+ years working in cyber security (Information Security, InfoSec, SecOps, Security Operations, SOC, CSOC, analyst, researcher, etc.).

Responsibilities

  • Skilled working with extremely large data sets to answer complex and ambiguous questions, using tools and languages like: SQL, KQL, Jupyter Notebook, Spark, Azure Synapse, R, U-SQL, Python, Splunk, and Power BI.
  • Perform investigation on suspected vulnerable or compromised assets and services, and analyze log data and other artifacts to determine what occurred.
  • Identify potential issues with detection (e.g., false positives, noise). Analyze potential or actual intrusions identified as a result of monitoring activities. Create detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]). Continue to drive automation of detection and response.
  • Plan and execute proactive adversary hunt for malicious activity using myriad log sources, network- and host-based tools, and threat intelligence to identify the threat actors and their tools and techniques.
  • Analyze key metrics and key performance indicators (KPIs) and other data sources (e.g., bugs, unhealthy data pipeline) and identifies trends in security issues and escalates appropriately. Recommend improvements and/or metrics to address gaps in measurement.
  • Proactively identify and investigate potential issues in controls (e.g., network, identity, etc.). Leverage expertise and team members to address and drive down issues accordingly. Identify and/or recognize patterns and recommend potential mitigation strategies.
  • Identify and raise opportunities for automation to improve efficiency and effectiveness. Create automation as appropriate to drive greater efficiency with high value.
  • Embody our company's Culture and Values

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service