Jobs
My ads
My job alerts
Sign in
Find a job Career Tips Companies
Find

Principal security researcher

Microsoft
Security researcher
Posted: 5 August
Offer description

Overview

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

Do you have a passion for helping Microsoft’s clients defend themselves against targeted exploitation?

Are you interested in being intimately involved in the latest, cutting-edge developments in the security industry and having a direct impact on the security of all Microsoft customers?

Do you want to be on the front lines of helping our customers go toe-to-toe against advanced adversaries?

Are you interested in a fast-paced job full of new opportunities?

If so, you may be a fit for a Principal Security Researcher role for the Global Hunting, Oversight, and Strategic Triage (GHOST) team!

We are looking for an experienced Principal Security Researcher with a strong analytical background to join our team to perform threat hunts, assist with investigations, develop threat intelligence, and to cultivate investigation best practices into Microsoft tooling and products. Researchers will support a global team to identify and catalog new attacker TTPs, victims, and deliver customer notifications to protect worldwide enterprise customers and empower customers to protect themselves via constantly improving Microsoft products.

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.

Qualifications

Required/Minimum Qualifications:

Experience in software development lifecycle, large-scale computing, modelling, cybersecurity, threat hunting and/or anomaly detection

OR Master's Degree in Statistics, Mathematics, Computer Science or related field.

Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.


Additional or Preferred Qualifications:

1. Proficient experience in software development lifecycle, large-scale computing, modeling, cybersecurity, threat hunting and/or anomaly detection
2. OR Doctorate in Statistics, Mathematics, Computer Science or related field.
3. Proven knowledge of security fundamentals across Microsoft platforms (Client, Server, Cloud)
4. Strong understanding of malware and the modern threat landscape, especially identity-based attacks
5. Familiarity and understanding of SQL or Kusto Query Language (KQL) queries (or experience with large database/SIEM query languages such as Splunk/Humio/Kibana, etc.)
6. Familiarity and understanding of Jupyter Notebooks, or building equivalent threat hunting automations with scripting languages
7. Consulting background
8. Active Directory subject matter expertise
9. Experience with sophisticated threat actor evidence including familiarity with typical Indicators of Compromise (IOCs), Indicators of Activity (IOAs) and Tools, Techniques and Procedures (TTPs)
10. Use of forensic analysis tools such as X-Ways Forensics®, WinHex®, Encase®, FTK®, etc
11. Microsoft Azure and/or Office365 platform knowledge and experience
12. Experience with various forensic log artifacts found in SIEM logs, web server logs, AV logs, protection logs such as HIDS and NIDS logs
13. Familiarity with Microsoft Defender 365 security stack (for Endpoints, Identity, Cloud, etc), especially with Advanced Hunting query writing
14. Excellent understanding of Windows internals and where trace evidence can be found
15. Knowledge of third-party cybersecurity solutions, especially EDR and SIEM solutions
16. Linux and/or macOS forensic analysis and threat hunting skills
17. Technical certifications based on domain (e.g., Azure, SharePoint)
18. Project Management certifications (e.g., PMP, Scrum)
19. Investigation/Cybersecurity/Digital Forensics/DFIR certifications (e.g. CISSP, SANS GIAC, etc)
20. Ability to obtain and maintain a Security Clearance.

Responsibilities

Responsibilities:

This role is part of a collaborative team, assisting our customers with:

21. Performing deep analysis of attacker activity in on-premises and cloud environments
22. Identifying potential threats, allowing for proactive defence before an actual incident
23. Notifying customers regarding imminent attacker activity
24. Providing recommendations to improve customers’ cybersecurity posture going forward and performing threat intelligence knowledge transfer to prepare customers to defend against today’s threat landscape
25. Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities
26. Driving product and tooling improvements by conveying learnings from threat hunting and incident response at scale to engineering partner teams
27. Identifying, prioritizing, and targeting complex security issues that cause negative impact to customers. Creating and driving adoption of relevant mitigations and providing proactive guidance
28. Working with others to synthesize research findings into recommendations for mitigation of security issues. Sharing across teams. Driving change within team based on research findings.
Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.Industry leading healthcareEducational resourcesDiscounts on products and servicesSavings and investmentsMaternity and paternity leaveGenerous time awayGiving programsOpportunities to network and connect

Apply
Create E-mail Alert
Job alert activated
Saved
Save
Similar job
Principal security researcher
Microsoft
Security researcher
Similar job
Principal security researcher – microsoft red team
Cheltenham
Microsoft
Security researcher
Similar job
Sr. security researcher ii (remote)
Reading (Berkshire)
CrowdStrike
Security researcher
See more jobs
Similar jobs
Microsoft recruitment
Home > Jobs > Education jobs > Security researcher jobs > Principal Security Researcher

About Jobijoba

  • Career Advice
  • Company Reviews

Search for jobs

  • Jobs by Job Title
  • Jobs by Industry
  • Jobs by Company
  • Jobs by Location
  • Jobs by Keywords

Contact / Partnership

  • Contact
  • Publish your job offers on Jobijoba

Legal notice - Terms of Service - Privacy Policy - Manage my cookies - Accessibility: Not compliant

© 2025 Jobijoba - All Rights Reserved

Apply
Create E-mail Alert
Job alert activated
Saved
Save