Microsoft is looking for a Principal Security Engineering Manager to help secure Microsoft Windows products and devices, focusing on offensive security and security engineering. This role involves leading a team of security engineers to discover vulnerabilities, develop mitigations, and collaborate with Windows product engineering teams.
Responsibilities:
- Lead strategy and execution of team to identify and mitigate risk in Microsoft products, including design review, code reviews, and fuzzing
- Be the primary leader and influential voice to manage threats & business risks, and systematic mitigation plan across entire the org
- Leverage a broad and current understanding of security to devise new protections and exploit mitigations, through internal and external security community and groups
- Collaborate and drive accountability with product teams to improve security and articulate the business value of security investments
- Manage & grow high performance team with learn-it-all and frontier culture
Requirements:
- Master's Degree in Statistics, Mathematics, Computer Science, or related field AND 6+ years experience in security or related field OR Bachelor's Degree in Statistics, Mathematics, Computer Science, or related field AND 8+ years experience in security or related field OR equivalent experience
- 3+ years people management
- Ability to meet Microsoft, customer and/or government security screening requirements are required for this role
- 3+ years of experience security experience with native code (C/C++) and binaries, such as identifying vulnerabilities, reverse engineering, or similar, demonstrating ability to lead exploit mitigations and platform-level defense techniques
- Ability to create clarity, energy, and cohesion across the team
- Ability to influence and drive security initiatives across groups
- 3+ years of managing 20+ teams
- 10+ years of experience in a software engineering or security-related engineering
- Demonstrated experience in security research, especially around vulnerability discovery
- Experience exploiting bugs and bypassing security mitigations in operating systems
- Familiarity with Microsoft Windows architecture