Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT). 36. * Graduate degree in engineering or equivalent discipline. 3-.
Responsibilities
Perform proactive threat hunting using hypothesis, and telemetry from endpoints, identities, cloud and network. Develop hunting queries using Kusto Query Language (KQL) or similar to uncover suspicious patterns and behaviors. Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies. Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows. Contribute to incident documentation, detection playbooks, and operational runbooks.
Required Qualifications
5 years of experience in cybersecurity (SOC, IR, Threat Hunting, Red Team). Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations. Proficiency in KQL, Python, or similar scripting languages for data analysis and automation. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs. Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics. This role requires the candidate to work in shifts.
Original Posting
This role is sourced from Microsoft. Apply on Microsoft careers page