We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Principal Security Researcher

Microsoft
United States, Washington, Redmond
Apr 16, 2025
OverviewSecurity represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. The CISO organization is looking for a visionary Principal Security Researcher to join the CTO's security research team. We are seeking a Principal Security Researcher who will lead complex research initiatives, apply techiques to incidents to refine them, and collaborate across engineering, data science, and threat intelligence teams to shape the future of cyber defense. This principal level position will drive the discovery and development of cutting-edge techniques to detect, analyze, and prevent cyber attacks. We are looking to create mechanical advantage with new methods to uncover attacks. Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
ResponsibilitiesInvent and develop novel detection methods for identifying cyber attacks.Lead in-depth research projects on emerging attack vectors, tactics, and techniques used by advanced threat actors.Familiarity with graph analytic techniques applied to the cyber domainLeverage machine learning, statistical analysis, and other analytics to uncover stealthy and sophisticated threats.Partner with threat hunters, redteam, and blueteam members on attack detection
Applied = 0

(web-77f7f6d758-rcqbq)