Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. Do you have a passion for helping Microsoft’s clients defend themselves against targeted exploitation? Are you interested in being intimately involved in the latest, cutting-edge developments in the security industry and having a direct impact on the security of all Microsoft customers? Do you want to be on the front lines of helping our customers go toe-to-toe against advanced adversaries? Are you interested in a fast-paced job full of new opportunities? If so, you may be a fit for a Senior Security Researcher role for the Global Hunting, Oversight, and Strategic Triage (GHOST) team! We are looking for an experienced Senior Security Researcher with a strong analytical background to join our team to perform threat hunts, assist with investigations, develop threat intelligence, and to cultivate investigation best practices into Microsoft tooling and products. Researchers will support a global team to identify and catalog new attacker TTPs, victims, and deliver customer notifications to protect worldwide enterprise customers and empower customers to protect themselves via constantly improving Microsoft products. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day. Qualifications Required/Minimum Qualifications 5+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection OR Master's Degree in Statistics, Mathematics, Computer Science or related field . Other Requirements: Citizenship & Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter. Additional or Preferred Qualifications 7+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection OR Doctorate in Statistics, Mathematics, Computer Science or related field . Proven knowledge of security fundamentals across Microsoft platforms (Client, Server, Cloud) Strong understanding of malware and the modern threat landscape, especially identity-based attacks Familiarity and understanding of SQL or Kusto Query Language (KQL) queries (or experience with large database/SIEM query languages such as Splunk/Humio/Kibana, etc.) Familiarity and understanding of Jupyter Notebooks, or building equivalent threat hunting automations with scripting languages Consulting background Active Directory subject matter expertise Experience with sophisticated threat actor evidence including familiarity with typical Indicators of Compromise (IOCs), Indicators of Activity (IOAs) and Tools, Techniques and Procedures (TTPs) Microsoft Azure and/or Office365 platform knowledge and experience Experience with various forensic log artifacts found in SIEM logs, web server logs, AV logs, protection logs such as HIDS and NIDS logs Familiarity with Microsoft Defender 365 security stack (for Endpoints, Identity, Cloud, etc), especially with Advanced Hunting query writing Excellent understanding of Windows internals and where trace evidence can be found Knowledge of third-party cybersecurity solutions, especially EDR and SIEM solutions Linux and/or macOS forensic analysis and threat hunting skills Technical certifications based on domain (e.g., Azure, SharePoint) Project Management certifications (e.g., PMP, Scrum) Ability to obtain and maintain a United States Security Clearance. Security Research IC4 - The typical base pay range for this role across the U.S. is USD $119,800 - $234,700 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $158,400 - $258,000 per year. Security Research IC5 - The typical base pay range for this role across the U.S. is USD $139,900 - $274,800 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $188,000 - $304,200 per year. Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: Microsoft will accept applications and processes offers for these roles on an ongoing basis. #GHOST #MSFTSecurity
...procedures; adheres to laboratory and hospital safety policies and procedures. Job Requirements: ~ MT: Bachelors degree in Medical Technology or related science or graduation from an accredited school for Medical Technology, required and ASCP Board of Registry (...
...the Role Were looking for a Field Social Media Manager to own Facebook and Instagram content... .... ~ Comfortable traveling 50%+ and working in fast-moving, member-facing... ...location campaign and the KPI it moved. Flexible work from home options available....
...Job Description Job Description Remote (Must Reside in U.S. Eastern or Central Time... ...Metropolitan area is seeking a driven Sr. Accounting professional to join their expanding... ...statements, payroll, and recordkeeping Manage accounts payable (processing ~100 monthly...
...System which makes everything possible. The second shift Assembler I (DeltaDyne) is responsible for building assemblies and subassemblies... ...other chemicals. Basic Math Skills (i.e. Shop Math) and Computer literate (i.e. MS Office Excel). Work overtime as assigned....
...About the Role: The Chief of Staff (CoS) collaborates directly with the President of S&P Global Mobility to drive the effectiveness of the Office of the President across strategic, operational, and cross-functional priorities. This high-impact role blends strategic...