This listing has expired and therefore is not publicly viewable.
|Location||Redmond, WA USA|
|Preferred GIAC Certifications||GPEN|
|Contact Name||Matt Burrough|
Core Services Engineering builds and manages the critical products and services that Microsoft runs on. We boldly pursue big ideas that power transformational advances at Microsoft and for our customers, while helping Microsoft teams work smarter, faster and more securely every day. Core Services Engineering employees have deep technical and business expertise, customer insights, and a clear point of view that comes from first-hand, large-scale experience with Microsoft and industry solutions. We are engineers, technology leaders and experts, digital transformation change agents, and customer advocates. We have exciting opportunities for you to innovate, influence, transform, inspire and grow within our organization and we encourage you to apply to learn more!
Are you passionate about information security? Are you gifted at ethical hacking? Are you intuitively able to understand weakness in systems? Are you fascinated and obsessed with staying current on computing threats? Are you seeking an opportunity to have enterprise wide impact securing Microsoft’s critical assets?
Microsoft’s Digital Security and Risk Engineering (DSRE) is making investments in our world class penetration testing team. Our organization has responsibility for identifying and managing technical security risk across Microsoft’s enterprise environment, including Microsoft Global office locations, worldwide data centers environments, and IT applications and services in Azure.
We have an immediate opening on our team for a security penetration testing engineer with expertise in web applications or development platforms.
Plan, research, and execute testing of computer system and applications to simulate real world attacks on Microsoft IT services and infrastructure.
Assess Microsoft existing security capabilities to detect and respond to emerging threats.
Outline and document risk impacts in executive summary reports and communications to relevant stakeholders.
Perform research to stay current with penetration testing tools, methodologies, tactics, and mitigations.
Develop and maintain penetration testing procedures and methodologies
Summarize test findings and make recommendations for remediation
3+ years of experience in penetration testing/Red Team and security code review experience.
BS in computer science or equivalent experience.
The ideal candidate is a highly motivated technical professional that has a background in red team/penetration testing communication technical topics competently.
Extensive skills in providing written and verbal presentations.
Demonstrated ability to anticipate and manage change in a highly dynamic environment.
Understanding of cloud platforms, internet protocols, and related technologies.
CISSP, Certified Ethical Hacker, or similar certifications.
Experience in penetration testing tools any of the following: Nessus, NMAP, Metasploit, Burp Suite Pro, etc.
Extensive coding skills including any of the following: C#, HTML, ASP.NET, Python, PowerShell.
Background Check: This position will be required to pass the Microsoft Cloud background check and credit history analysis upon hire/transfer and every year thereafter.
Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the Accommodation request form.