Enable job alerts via email!

Principal Security Researcher

Microsoft

United Kingdom

On-site

GBP 60,000 - 80,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading technology company in the United Kingdom is seeking a cybersecurity analyst to perform in-depth analysis of threats and to enhance customer security postures. The candidate should have experience in the software development lifecycle and strong skills in threat hunting. This position offers various benefits and requires a background check upon hiring.

Qualifications

  • Experience in software development lifecycle, large-scale computing, modeling, cybersecurity, threat hunting, or anomaly detection.
  • Proficient experience in relevant technical fields or a Doctorate.
  • Knowledge of third-party cybersecurity solutions, especially EDR and SIEM.

Responsibilities

  • Perform deep analysis of attacker activity in environments.
  • Identify potential threats and provide recommendations.
  • Build proof-of-concept threat hunting tools and automations.

Skills

Cybersecurity
Threat hunting
Anomaly detection
Software development lifecycle
Data analysis

Education

Master's Degree in Statistics, Mathematics, Computer Science, or related field
Doctorate in Statistics, Mathematics, Computer Science, or related field

Tools

SQL
Kusto Query Language (KQL)
Windows internals
Forensic analysis tools (X-Ways Forensics, WinHex, etc.)
Microsoft Azure
Microsoft Defender 365

Job description

Responsibilities

This role is part of a collaborative team, assisting our customers with:

  • Performing deep analysis of attacker activity in on-premises and cloud environments
  • Identifying potential threats, allowing for proactive defense before an actual incident
  • Notifying customers regarding imminent attacker activity
  • Providing recommendations to improve customers’ cybersecurity posture and performing threat intelligence knowledge transfer to prepare customers to defend against today’s threat landscape
  • Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities
  • Driving product and tooling improvements by conveying learnings from threat hunting and incident response at scale to engineering partner teams
  • Identifying, prioritizing, and targeting complex security issues that negatively impact customers, creating and driving adoption of relevant mitigations, and providing proactive guidance
  • Synthesizing research findings into recommendations for mitigation of security issues, sharing across teams, and driving change based on research findings
Qualifications

Required/Minimum Qualifications:

  • Experience in software development lifecycle, large-scale computing, modeling, cybersecurity, threat hunting, and/or anomaly detection OR a Master's Degree in Statistics, Mathematics, Computer Science, or related field
  • Microsoft Cloud Background Check: This position requires passing the Microsoft Cloud background check upon hire/transfer and every two years thereafter

Additional or Preferred Qualifications:

  • Proficient experience in software development lifecycle, large-scale computing, modeling, cybersecurity, threat hunting, and/or anomaly detection OR Doctorate in Statistics, Mathematics, Computer Science, or related field
  • Proven knowledge of security fundamentals across Microsoft platforms (Client, Server, Cloud)
  • Strong understanding of malware and the modern threat landscape, especially identity-based attacks
  • Familiarity with SQL or Kusto Query Language (KQL) queries, or experience with large database/SIEM query languages such as Splunk, Humio, Kibana, etc.
  • Understanding of Jupyter Notebooks or building equivalent threat hunting automations with scripting languages
  • Consulting background and Active Directory expertise
  • Experience with forensic analysis tools like X-Ways Forensics, WinHex, Encase, FTK, etc.
  • Knowledge of Microsoft Azure and/or Office365 platforms
  • Experience with forensic log artifacts in SIEM logs, web server logs, AV logs, protection logs (HIDS/NIDS)
  • Familiarity with Microsoft Defender 365 security stack, especially Advanced Hunting query writing
  • Excellent understanding of Windows internals and trace evidence locations
  • Knowledge of third-party cybersecurity solutions, especially EDR and SIEM solutions
  • Linux and/or macOS forensic analysis and threat hunting skills
  • Relevant technical certifications (e.g., Azure, SharePoint, CISSP, SANS GIAC)
  • Ability to obtain and maintain a Security Clearance
Microsoft is an equal opportunity employer. All qualified applicants will receive consideration without regard to various protected characteristics. If you need assistance or a reasonable accommodation due to a disability during the application or recruiting process, please send a request via the Accommodation request form. Benefits and perks may vary depending on employment nature and country.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.