Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end-to-end, simplified solutions.
The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
The Defender Experts for XDR group is looking to hire a **_Security Operations Researcher - Defender _**to help us harness the power of Microsoft's trillions of security signals to quickly identify and report the latest human adversary behaviors, drive critical context-rich alerts, build new tools and automations in support of helping customers identify threats, and drive innovations for detecting advanced attacker tradecraft.
- This position is on-site only and will requiere to be on rotation for weekends._
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
**Responsibilities**:
- Identifies potential issues with detection (e.g., false positives, noise). Engages others to escalate appropriately. Analyzes potential or actual intrusions identified as a result of monitoring activities. Creates detections based on available data (e.g., Indicators of Compromise (IOC) and Tools Tactics Procedures (TTP)). Continues to drive automation of detection and response.
- With mínimal guidance, analyzes attempted or successful efforts to compromise systems security. Identifies potential next steps to resolve. Works with partner teams on recommendations to limit exposure. Implements appropriate response plans. Continues to develop ability to analyze independently and make recommendations. Influences others to take action.
- Identifies potential threats based on external trends and recommends prioritization for defense-building capabilities.
- Explore and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, and investigate alerts for enterprise customers.
- Work directly with customers at all levels of their security organization from analyst to CISO to support investigation and response.
- Collaborate with our data science and threat research teams to develop and maintain accurate and durable detections.
- Embody our culture and values.
**Qualifications**:
**Required/Minimum Qualifications**
- 3+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
- OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
- 3+ years of experience in a technical role in the areas of Security Operations, Threat Intelligence, Cyber Incident Response, or Penetration Testing/Red Team.
- 3+ years of experience of working with extremely large data sets, using tools and scripting languages such as: Excel, KQL, Python, Splunk, and PowerBI.
- Fluent in reading, writing and speaking English.
**Other Requirements**
- Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Additional or Preferred Qualifications**
- 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection
- OR Master's Degree in Statistics, Mathematics, Computer Science or related field.
- CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, and/or Security+ certification.
- 3+ years of experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection.
- Advanced knowledge of operating system internals and security mechanisms. Experience analyzing attacker techniques.
-