Microsot logo

Senior Insider Threat Analyst - CTJ - Top Secret

Microsot
Full-time
Remote
$153,600 - $250,200 USD yearly

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

 

Microsoft is seeking a Senior Threat Intelligence Analyst-  CTJ - Top Secret to join our Insider Threat team, a critical function in safeguarding our company and customers from evolving security threats. Security remains one of our highest priorities in an increasingly complex threat landscape, and this role offers a unique opportunity to contribute to that mission.

In this position, you will collaborate closely with the National Security Team (NST) and other key stakeholders across legal, security, and investigative teams to proactively identify, assess, and mitigate insider risks. Your expertise will play a pivotal role in protecting Microsoft’s operations, ensuring compliance, and strengthening our security posture.


Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.



Identification and Detection of Control Failures

  • Designs solutions to address identified control issues (e.g., network, identity, high security), taking intended and unintended consequences into account. Operationalizes and scales a program and solution appropriately. Identifies high priority opportunities and makes data-driven recommendations for efficiencies to improve security posture (e.g., streamline processes, automate). Assists team with technical acumen as needed.

Automation

  • Recommends automation to improve effectiveness and efficiencies of security operations. Supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions. Improves solutions over time.

Translate Security Policy and Standards into Effective Controls

  • Contributes to security policy and standards. Maintains accurate and comprehensive security policy and standards. Designs mitigation strategies to addresses identified gaps in policy. Educates others (e.g., business partners, peers, industry) on security policy. Recognizes patterns and trends and recommends solutions for improvement. Recommends refinement of security policy and standards.

Collaboration

  • Collaborates with internal and external parties to ensure service level agreement (SLAs) are reached when addressing threats. Supports development of requirements for solutions. Defines new requirements and feature sets.

Customer/Partner Experience

  • Drives improvements in customer and partner experience by sharing best practices and interacting with customers. Ensures proper resources are engaged to address issue and prevent recurrence. Designs for the customer experience. Develops and implements metrics for customer satisfaction. Ensures alignment to customer and partner experience standards. Gathers future requirements directly from customers. Designs to maximize customer experience. Creates partnership and advocacy with customers. Educates business partners to influence behavior to make different decisions that enhance security posture. Defines customer and partner requirements, anticipates needs, and measures quality of experience.

Data-Driven Analysis

  • Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.

Security Incident Response

  • Independently analyzes prioritized attempted or successful efforts to compromise systems security. Recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps. Provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.

Monitoring and Detection

  • Builds new detection capabilities. Researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.

Red/Purple Team Operations

  • Understands how weaponized code can be used in operations. Determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations.

Threat Intelligence and Analysis

  • Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry.

Other 



Required/Minimum Qualifications 

  • 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response 
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field. 

Other Requirements 

 

Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: 

  • The successful candidate must have an active U.S. Government Top Secret Security Clearance.  Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. Failure to maintain or obtain the appropriate clearance and/or customer screening requirements may result in employment action up to and including termination.
  • Clearance Verification: This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.    
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.   
  • Citizenship & Citizenship Verification: This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customer and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance 

Preferred/Additional Qualifications 

  • 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection 
    • OR Master's Degree or Doctorate in Statistics, Mathematics, Computer Science or related field. 
    • CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, and/or Security+ certification. 

 

Security Operations Engineering IC4 - The typical base pay range for this role across the U.S. is USD $117,200 - $229,200 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $153,600 - $250,200 per year.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

https://careers.microsoft.com/us/en/us-corporate-pay

 

Microsoft will accept applications for the role until April 3rd, 2025

 

Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances.  We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the Accommodation request form.

 

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-pay  

 

#MSFTSecurity #CISOOrg