Your work will be instrumental in shaping the next generation of threat graph technologies, empowering the security team to protect complex, heterogeneous cloud ecosystems with actionable insights. Research and prototype novel graph-based techniques for threat detection, attribution, and prioritization in collaboration with internal and external security teams. Mentor, guide, and drive best practices among researchers and detection engineers on advanced graph-based threat hunting and incident reā¦
Responsibilities
We are seeking a Threat Graph Researcher with a deep expertise in modeling, analyzing, and interpreting large-scale threat graphs to advance the frontiers of cloud security. The ideal candidate will possess hands-on experience architecting and deploying graph-based detection solutions, including designing graph schemas, implementing algorithms for malicious pattern discovery, and operationalizing analytics for multi-tenant environments. Design and maintain scalable threat graphs that model entities such as devices, identity, threat actors, TTPs, infrastructure, and campaigns. Collaborate with threat protection researchers, data scientists, and detection engineers to enrich graph models with contextual insights and refine detection and response strategies, to provide comprehensive threat coverage and response capabilities. Translate complex raw security data into actionable graph intelligence that enhances the effectiveness of security operations for a global customer base.
Required Qualifications
4+ years of experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments. Strong understanding of graph theory, graph databases (e.g., Neo4j, TigerGraph), and graph analytics with proficiency in Python or similar languages for data analysis and prototyping. Experience working with large-scale datasets, distributed systems and graph analytics projects. Ability to translate complex threat data into graphs and actionable insights. Experience with machine learning or statistical modelling applied to graph data. Knowledge of adversary infrastructure tracking, malware analysis, or campaign clustering. Extensive hands-on experience with cloud platformsāincluding, but not limited to, Azureāas well as a deep understanding of multi-cloud security challenges and solutions.
Original Posting
This role is sourced from Microsoft. Apply on Microsoft careers page