We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Security Researcher II

Microsoft
United States, Texas, Irving
7000 State Highway 161 (Show on map)
May 10, 2025
OverviewSecurity represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. Do you enjoy the challenge of discovering and analyzing vulnerabilities in software and services to understand how they work and how an attacker might exploit them? Are you excited by the idea of analyzing real-world exploits and researching new attack techniques? Are you passionate about driving meaningful security improvements into products and services to better protect billions of customers? Do you want to be part of an inclusive & collaborative team that invests in the growth and success of one another? The Microsoft Security Response Center (MSRC) is responsible for detecting, protecting, and responding to threats that affect Microsoft's products and services. We are looking for a motivated Security Researcher (Open Source) to join our team.As part of MSRC, our team (Vulnerability & Mitigations Team) is responsible for analyzing vulnerabilities found in Microsoft's products and services to determine their root cause, severity, and security impact. This analysis plays a critical role in shaping the security updates that are deployed to customers. The knowledge that we gain from analyzing vulnerabilities also informs the offensive and defensive security research performed by our team. As part of this research, our team works collaboratively with many teams across Microsoft to investigate, develop, and deploy security features that help discover and mitigate the biggest threats to customers.This role is targeted towards open-source security (OSS) vulnerability response and research. where you will be focused on vulnerability response for open-source software and services used, and produced by Microsoft. You will assess the impact of these vulnerabilities identified and issue advice for the remediation of affected products. You will have the chance to conduct novel vulnerability research in open-source software that Microsoft relies on and develop mitigation strategies for enhancing our products' security posture. You will collaborate with other security researchers, developers, and community members to responsibly address security issues in open-source projects. This is a unique opportunity to have a positive impact on improving safety for customers around the world and to work on challenging real-world security problems as part of a supportive and collaborative team.Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
ResponsibilitiesResponsibilities Conducting Research Identifies and conducts research into critical security areas, such as competitor products, current attacks, adversary tracking, and academic literature. Aids in the design of solutions to prevent attacks. Designs lead to engineering projects. Investigates the root cause, motivation, and impact of security issues. Incorporates feedback and results from research into future research. Uses research findings to develop guidance on security issues to inform improvements and resolution. Shares within team. Interacts with industry and research partners on ad hoc or as needed basis. Performs analysis using multiple data sources to generate insights. Considers common and potential threat scenarios and dependencies in analyses. Attends to and understands connections between identified issues and up- and-down stream processes. Helps to drive resolution to systemic security issues. Aids in the creation of new solutions to mitigate security issues. Makes tradeoffs to balance security and operational needs. Prioritizes and validates technical indicators. Aggregates threat data into categories and themes that align to intelligence requirements or customer requests. Takes into consideration relative risk factors, history of published vulnerabilities and existing security knowledge into their analysis. Develops tools to assist in automating the analysis of a component or feature area. Cleans, structures, and standardizes data and data sources. Supports data quality efforts to ensure timely and consistent access to data sources. Curates sources of data and partners to develop and sustain data access. Understands how to find new data sources. Solution Generation Identifies and addresses underlying causes of security shortcomings. Develops security guidance and models to address shortcomings and to build best practices. Suggests and drives appropriate guidance, models, response, and remediation for issues. Drives end-to-end solution for technical implementation and automation related to specific kinds or classes of security issues (e.g., signature detection, malware, threat analysis, reverse engineering). Develops higher level awareness of other kinds of security issues outside areas of expertise. Works across disciplines to solve specific issues. Uses results from research and experimentation to guide architecture or product direction. Identifies and responds to customer and partner security issues in a timely manner. Spots trends and potential security issues. Advocates for customers and partners. Provides assistance to customers and partners. Leverages partner and customer feedback to improve assistance. Escalates issues as needed. Develops guidance and education that result from resolution of security issues. Orchestration Identifies areas of dependency and overlap with other teams or team members. Provides constructive input so the work is integrated and timely. Communicates status with others to allow for timely resolution and coordination. Helps teams identify risks, dependencies and other blocking issues. Enables others to take action to resolve issues. Protects tools, techniques, information, and results of security practices. Assesses efficacy of operational security (e.g., red-on-red pen testing). Begins to master techniques. Supports the management of incidents by applying technical knowledge to diagnose and triage issues with a commitment to maintaining the quality of products and services. Takes notes during incidents and participates in postmortem and root-cause analysis processes. Creates analysis report. Follows up on the findings and recommendations, escalating blocking issues as needed. Identifies potential security vulnerabilities by reviewing documentation and specifications. Develops facts and libraries of guidance. Industry Leadership Exhibits subject matter expertise in class or set of security issues, tools, mitigations, and processes (e.g., architecture, failure modes, attack chain, threat modeling, vulnerabilities). Provides guidance to others in areas of expertise. Maintains current knowledge by investing time and effort. Proactively seeks opportunities to learn. Demonstrates appropriate risk taking and ethical behavior. Learns and understands the current state of the industry, including knowledge of tools, techniques, strategies, and processes that can be utilized to improve security. Maintains knowledge of current trends within the industry. Other Embody our culture and values
Applied = 0

(web-7fb47cbfc5-6j2jx)