Security Detection Engineer - CTJ - Poly

Redmond, Washington, United States

Full Time Clearance required USD 81K - 174K

Microsoft

Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today.

View company page

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

 

The Microsoft Security Response Center (MSRC) is looking for a Security Detection Engineer for our US Government Cloud. As a Security Detection Engineer, you will work as part of a team that streamlines security data collection and alerting to deliver actionable insights for our security team. We are looking for candidates to work on solutions that protect Microsoft services against cyberattacks and insider threats. Our team consists of engineers with expertise in large-scale software systems, security analysis, big data, and machine learning. We delight in digging in deep to analyze the billions of events and terabytes of data generated each day by all the Microsoft Cloud services for evidence of suspicious activity.

MSRC seeks motivated, experienced security professionals to join our team. There are few places in Microsoft that have as much direct impact on as many customers as the Microsoft Security Response Center’s SOC and Incident Response Teams. The SOC within the Microsoft Security Response Center (MSRC) is the front line that defends our customers that use Microsoft's Cloud platform and online services. The government security team further specializes to defend national security objectives supporting the DoD and civilian agencies.

 

The successful candidate will have passion for cybersecurity, data analytics, and data science and possesses demonstrated collaboration project management stills. We are a fast-paced team that constantly provides new opportunities to learn and grow.

 

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

Responsibilities

• Applying knowledge of attacker techniques to uncover threats by analyzing log data, building, and tuning detections.
• Drawing together signals from multiple sources and platforms to infer and detect attacker techniques.
• Utilizing software engineering fundamentals to ensure consistent and repeatable delivery of high quality, high true positive detections.
• Coding and scripting in C#, PowerShell, Python, and various low-code or no-code platforms.
• Executing the dev-sec-ops approach to software delivery by designing, coding, testing, deploying, and operating components of the Microsoft Cloud's security monitoring systems.

 

Embody our culture and values.

Qualifications

Required/Minimum Qualifications:

  • 1+ year of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response.
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
  • 1+ year(s) of experience with big data and SIEM solutions such as ArcSight, Splunk, ElasticSearch, Logstash, Azure Data Explorer, Azure Log Analytics, Azure Data Lake, or Azure Sentinel
    • OR 1+ year(s) of experience working with large data sets using tools and languages like: SQL, KQL, Jupyter Notebook, Spark, Azure Synapse, R, U-SQL, Python, Splunk, and PowerBI.
Other Requirements:

Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:   

  • The successful candidate must have an active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph. Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. Failure to maintain or obtain the appropriate U.S. Government clearance and/or customer screening requirements may result in employment action up to and including termination.
  • Clearance Verification: This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter. 
  • Citizenship & Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance
Preferred/Additional Qualifications:
  • Experience developing and operationalizing data science insights to aid in solving cybersecurity challenges.
  • Exposure to security related subjects and trends such as digital forensics, reverse engineering, penetration testing,
  • Experience using red team reports to inform changes to detections
  • Experience with threat modeling and designing purple team engagements to evaluate detection efficacy
  • Experience with software engineering tooling such as CI/CD, git, and testing
  • Background/Familiarity with AI, prompt engineering, and Large Language Models
  • Experience with the Microsoft cloud and/or stack including O365, Azure, Windows or other Microsoft software/services
  • Certifications like GCIA, GSLC, GCIH, CISM, CISSP, CEH, Etc. are plus.
Security Operations Engineering IC2 - The typical base pay range for this role across the U.S. is USD $81,900 - $160,200 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $105,600 - $174,600 per year.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-pay

Microsoft will accept applications for the role until June 7, 2024

 

Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances.  We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the Accommodation request form.

 

Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.

 

#Clearancejob #MSFTSecurity

Apply now Apply later
  • Share this job via
  • or

Tags: Analytics ArcSight Azure Big Data C CEH CI/CD CISM CISSP Clearance Cloud Computer Science Data Analytics DoD Elasticsearch Forensics GCIA GCIH Government agency GSLC Incident response LLMs Machine Learning Mathematics Monitoring Pentesting Polygraph PowerShell Python Red team Reverse engineering Scripting SDLC Security analysis Security Clearance SIEM SOC Splunk SQL Top Secret Top Secret Clearance Windows

Perks/benefits: Career development Medical leave Startup environment Team events

Region: North America
Country: United States
Job stats:  13  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.