Job Details

ID #51837466
Estado Washington
Ciudad Redmond
Full-time
Salario USD TBD TBD
Fuente Microsoft Corporation
Showed 2024-06-04
Fecha 2024-06-04
Fecha tope 2024-08-03
Categoría Etcétera
Crear un currículum vítae
Aplica ya

Senior Detection Engineer

Washington, Redmond, 98052 Redmond USA
Aplica ya

Does protecting over 1 billion customers and making the cyber world a better place sound exciting? Do you have what it takes to be part of the top security response team in the world? Are you passionate about solving the threat detection and security response challenges of Cloud Computing?The Microsoft Security Response Center (MSRC) is seeking a motivated, self-driven and experienced Senior Detection Engineer to join our team. You will be responsible for identifying emerging threats, analyzing attack techniques, and devising effective detection methods to fuse multiple sources of security data collection and alerts to deliver actionable insights for our incident responder team, and partnering with engineering teams across the company to contribute to the ongoing improvement of our cybersecurity products and services protecting Microsoft and its customer.The successful candidate will be passionate about strengthening our cloud defenses by developing automated response actions, data enrichments, passion for leadership, mentorship, and cybersecurity. We are a fast-paced team that constantly provides new opportunities to learn and grow.Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.This role requires rotation based on-call responsibilities (every 6 weeks) to support escalations during US shift hours (6 AM – 6PM PST)Responsibilities

Conduct proactive and reactive evaluation and tuning of detections to reduce noise and investigation time.

Continuous research to identify potential threats and translate data into actionable insights for faster and better response. 

Automate data handling, security tasks, data curation and automated responses to increase SOC efficiency using scripts, Logic Apps, Python and various Azure-based tools. 

Develop and update cloud abuse detection rules, indicators, and signatures as well as drive gaps in telemetry and improve alert fidelity by collaborating with detection authors and product teams.

Research and stay updated on the latest cloud abuse trends, tactics, techniques, and procedures (TTPs) of threat actors to reduce blind spots by authoring new detections from various telemetry sources such as logs, network traffic, threat intelligence.

Develop metric dashboards and insights for SOC cases

Other

Embody our Culture (https://www.microsoft.com/en-us/about/corporate-values) and Values (https://careers.microsoft.com/us/en/culture)

QualificationsRequired/Minimum QualificationsRequired/Minimum Qualifications· 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident responseo OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.Other Requirements:Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:

Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.

Additional or Preferred Qualifications· 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detectiono OR Master's Degree or Doctorate in Statistics, Mathematics, Computer Science or related field.· CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, and/or Security+ certification

Security Monitoring and Response: You have experience with MITRE or other attack frameworks and how to use it to identify and close gaps in detection capabilities. You understand the incident response lifecycle and can be on-call rotation. You are comfortable reverse-engineering attacks through analysis and prototyping meaningful detections to prevent and mitigate threat and abuse actors. You can critically analyze the flow of data, its position within the environment, and how it can be analyzed for detection and protection purposes.

Previous experience in applying knowledge to uncover threats based on log data within Cloud Service Provider (CSP) environments (Azure AAD, Azure Resources, Event logs, Firewall, etc.) To build, analyze, and tune detections.

Hands-on experience with Microsoft Cloud Security Technologies such as Azure Sentinel, Azure Defender, MDE, Application Governance, Defender for Cloud Apps, Azure Data Explorer and Azure Log Analytics or similar products like ArcSight, Splunk and Logstash; excellent understanding of prioritizing risk and threats.

Automated Response and insights: Experience working with extremely large data sets to answer complex and ambiguous questions, using tools and languages like: SQL, KQL, Jupyter Notebook, Spark, R, U-SQL, Python, Splunk, and PowerBI and ability to automate repeatable security tasks through scripts or logic apps.

Empathetic communication: You communicate nuanced ideas clearly, whether you're explaining technical decisions in writing or brainstorming in real time. In disagreements, you engage thoughtfully with other perspectives and compromise when needed.

Expectation to learn new tools and techniques every day.

Deep understanding of adversary and cyber intel frameworks such as kill-chain model, ATT&CK framework, Diamond Model and Advanced Persistent Threat (APT) performing Detection and Threat hunting within Cloud Service Provider (CSP) environments. 

Hands-on experience with developer environment tools like Continuous Integration/Continuous Delivery (CI/CD), Azure DevOps, GitHub, and Agile Scrum 

Ability to work effectively in ambiguous situations and respond favorably to change. 

Software Engineering IC4 - The typical base pay range for this role across the U.S. is USD $117,200 - $229,200 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $153,600 - $250,200 per year.Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-payMicrosoft will accept applications for the role until June 8, 2024.#securitysoar #MSFTSecurityMicrosoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations (https://careers.microsoft.com/v2/global/en/accessibility.html) .

Aplica ya Suscribir Reportar trabajo