Principal Security Operations Engineer at Microsoft
Redmond, Washington, United States -
Full Time


Start Date

Immediate

Expiry Date

17 Feb, 26

Salary

0.0

Posted On

19 Nov, 25

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Security Operations, Incident Response, Automation, Cyber Security, Threat Analytics, Data Analysis, Vulnerability Management, Cloud Security, Technical Program Management, Identity Security, Anomaly Detection, Policy Enforcement, Risk Metrics, Mentorship, AI/ML in Security, Telemetry, Kusto/KQL

Industry

Software Development

Description
Investigate security incidents, help contain threats, and provide technical support for high-impact response efforts. Partner across engineering and security teams to coordinate cross-team efforts, resolve blockers, and accelerate progress on high-impact initiatives. Apply a data-driven approach to define, track, and report risk metrics, giving leaders clear visibility into progress and gaps. Serve as a technical advisor and mentor to security engineers, sharing best practices for automation and secure-by-design patterns. Drive automation and efficiency by improving pipelines, validation frameworks, and onboarding flows to reduce manual effort. Bachelor's Degree in Statistics, Mathematics, Computer Science or related field. OR 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response. 7+ years of experience in security engineering, security operations, or technical program management with a focus on large-scale, cloud or enterprise environments. Understanding of security graph models, adversary techniques, attack path analysis, or breach path quantification, with an attacker mindset to identify weak links in the services/systems before adversaries exploit them. Hands-on experience with automation of telemetry/logging pipelines to validate security coverage at scale. Demonstrated expertise in identity, secrets, or infrastructure security, with hands-on experience reducing risk through technical controls, policy enforcement, or automation. Ability to translate complex technical risk into prioritized plans of action and measurable outcomes. Proven track record of driving cross-team initiatives across engineering, security, and operations organizations. These requirements include, but are not limited to the following specialized security screenings: Master's Degree or Doctorate Statistics, Mathematics, Computer Science or related field. OR 10+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection. CISSP CISA CISM SANS GCIA GCIH OSCP Security+. 2+ years leading a security function (e.g., Security Operations Center [SOC], threat and vulnerability management [TVM]). Experience building automated solutions for vulnerability management, threat detection, and security configuration drift. Experience with AI/ML in security contexts, such as anomaly detection, predictive modeling, or triaging security signals using large datasets. Experience with data analysis and reporting, using telemetry, logs, or metrics to inform decisions and measure progress. Proficiency in Kusto/KQL and the ability to design and build tooling that scales across environments and teams.
Responsibilities
Investigate security incidents and help contain threats while providing technical support for high-impact response efforts. Partner across engineering and security teams to coordinate efforts and accelerate progress on initiatives.
Loading...