Jobs

Security Research Engineer-Defender Experts Team
Costa Rica, San José, San José
·
On-site
·
Full-time
·
4w ago
Required Skills
Security Investigations
Threat Analysis
Kusto Query Language
MITRE ATT&CK
Cyber Kill Chain
Windows
Linux
Mac
Overview:
Security represents one of the most critical priorities for customers operating in today’s complex and rapidly evolving threat landscape. Microsoft Security is dedicated to making the world a safer place by delivering an integrated security cloud that protects users, developers, and organizations with end‑to‑end, simplified solutions. Our mission is to secure digital platforms, devices, applications, identities, and cloud environments across heterogeneous customer ecosystems while also protecting Microsoft’s own internal estate.
Our culture is rooted in a growth mindset, excellence, and continuous learning. We encourage teams to bring their best every day, fostering an environment where innovation thrives and where our work positively impacts billions of people worldwide.
Within this mission, the Defender Experts (DEX) team plays a vital role by delivering expert‑led cybersecurity investigations at scale. Using rich telemetry and signals from Microsoft 365 Defender and other Microsoft security technologies, DEX helps customers rapidly understand, validate, and respond to suspicious or malicious activity. Our work gives organizations the clarity and confidence they need to strengthen their security posture.
We are seeking a Senior Security Analyst (Tier 2) with strong experience in security investigations, attacker tradecraft analysis, and multi‑signal correlation. In this role, you will analyze complex security data, apply deep knowledge of the threat landscape, and determine whether activity represents a real threat. You will deliver clear, actionable findings and recommendations that help customers protect their environment. This role requires strong investigative skills, critical thinking, and the ability to differentiate benign from malicious behavior with confidence.
This position is ideal for experienced cybersecurity professionals who thrive on analytical problem‑solving, attacker behavior research, and meaningful customer‑focused security work. It is a great opportunity for individuals motivated by impact, learning, and continuous improvement.
• Availability & Schedule Flexibility
Ability to work a fixed schedule from
**10:**00 a.m. to 7:00 p.m., with flexibility to support weekend and holiday coverage as needed. Must also be willing to participate in an on‑call rotation to respond to high‑priority incidents or urgent operational needs.
-
Responsibilities- Analyze and validate security alerts, anomalies, and behavioral patterns within Microsoft 365 Defender and related telemetry to validate detections and understand attacker intent.
-
Apply attacker methodology frameworks (MITRE ATT&CK, Cyber Kill Chain) to contextualize threats, assess progression, and determine potential impact.
-
Investigate identity centric threats, credential misuse, lateral movement, cloud-based attacks, and modern techniques commonly used in human operated ransomware, Business Email Compromise (BEC), and stealthy persistence campaigns.
-
Correlate large and complex datasets using Kusto Query Language (KQL) and investigate tooling to uncover relationships, patterns and root cause.
-
Differentiate benign, misconfigured, suspicious, and malicious activity with confidence, supported by defensible evidence.
-
Deliver customer facing investigation summaries that clearly articulate what occurred, why it matters, and the recommended next steps.
-
Contribute to continuous improvement efforts by identifying gaps, false positives, attacker trends, and opportunities for tooling or process enhancements.
-
Stay informed on SOC and threat landscape trends, including AI driven attack automation, identity-targeted campaigns, cloud compromise techniques, and evolving redteam tradecraft.
-
Qualifications- Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 1+ year(s) experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 2+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection OR equivalent experience.
-
Minimum 3 years of hands‑on experience in areas such as Security Operations (SOC Tier 2+), Cybersecurity Investigations, Incident Response, or Threat Hunting. Proven ability to analyze alerts and telemetry from EDR/XDR solutions—preferably Microsoft 365 Defender—and conduct investigations involving identity misuse, authentication anomalies, or suspicious access patterns.
-
Solid understanding of operating system internals, security mitigations, and common threats across Windows, Linux, and Mac environments. Familiarity with MITRE ATT&CK and Cyber Kill Chain frameworks to structure, guide, and communicate investigative findings.
-
Advanced English level.
Additional or preferred qualifications:
- Hands-on expertise with Microsoft 365 Defender components, including Endpoint, Identity, Cloud Apps, and Email Protection.
- Prior experience as a Tier-2 or Tier-3 analyst validating alerts, investigations, or threat-intelligence.
- Experience investigating cloud environments (Azure, AWS, GCP) and associated network telemetry.
- Knowledge of major cloud and productivity platforms as well as identity systems and related security concerns
- Familiarity with common identity-based attacks (OAuth abuse, token theft, Kerberos/NTLM anomalies, conditional access bypass patterns).
- Experience with offensive security including tools such as Metasploit, exploit development, Open-Source Intelligence Gathering (OSINT), and designing ways to breach enterprise networks.
- Experience conveying data into clear security narratives (“tell the story”).
- Additional advanced technical degrees or cyber security certifications such as CISSP, OSCP, CEH, or GIAC
- Investigative mindset with excellent critical thinking, pattern recognition, and analytical skills.
- Experience with direct customer communication in a service delivery role.
- Solid interpersonal and cross‑functional collaboration abilities. Capable of clearly articulating investigation results and translating technical insights into business‑driven recommendations for improving detection and response capabilities.
This position will be open for a minimum of 5 days, with applications accepted on an ongoing basis until the position is filled.
Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance with religious accommodations and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.
Total Views
0
Apply Clicks
0
Mock Applicants
0
Scraps
0
Similar Jobs

Senior Software Engineer (Tech Lead) - Message Security Detection
Abnormal Security · Hybrid - Bangalore, India

Sr Software Engineer - Secret Clearance Colorado Springs, Colorado
Lockheed Martin · colorado springs

Principal Technical Marketing Engineer (Data Security) Santa Clara, CA 02/04/2026
Palo Alto Networks · santa clara

Sr Staff Software Engineer (Malware Research - Antivirus Systems)
Palo Alto Networks · Santa Clara, CA

Privileged Access Management Engineer
Morgan Stanley · Budapest, Budapest, Hungary
About Microsoft
Reviews
3.8
5 reviews
Work Life Balance
4.1
Compensation
4.3
Culture
3.4
Career
3.2
Management
3.0
65%
Recommend to a Friend
Pros
Excellent compensation and benefits package
Four-day workweek with improved work-life balance
Supportive managers and teams
Cons
High-pressure environment causing anxiety
Unprofessional interview processes
Limited creative work opportunities
Salary Ranges
5,571 data points
Junior/L3
Mid/L4
Junior/L3 · Advertising Client Success
2 reports
$163,358
total / year
Base
$141,875
Stock
-
Bonus
-
$163,358
$163,358
Interview Experience
7 interviews
Difficulty
3.7
/ 5
Duration
14-28 weeks
Offer Rate
14%
Experience
Positive 14%
Neutral 29%
Negative 57%
Interview Process
1
Application Review
2
Recruiter Screen
3
Technical Phone Screen
4
Technical Interview
5
Onsite/Virtual Interviews
6
Final Round
7
Offer
Common Questions
Coding/Algorithm
System Design
Behavioral/STAR
Technical Knowledge
Past Experience
News & Buzz
Microsoft loses $400 billion in few hours, what's behind one of the worst stock market days for the compa - Times of India
Source: Times of India
News
·
5w ago
Microsoft Stock Tumbles 12.1% In Worst Day For Company In Years - HuffPost
Source: HuffPost
News
·
5w ago
Microsoft: The 'question' the company needs to answer - Yahoo Finance
Source: Yahoo Finance
News
·
5w ago
AI is a planet-sized bubble — and Microsoft's slump is a taste of the crash to come, tech guru Erik Gordon says - Business Insider
Source: Business Insider
News
·
5w ago