Applied Scientist II - Disruption Research
Microsoft
Applied Scientist II - Disruption Research
Herzliya, Tel Aviv, Israel
Save
Overview
Are you a passionate Applied Scientist ready to make a global impact Join our elite AI and data science team driving Microsoft Defender's groundbreaking autonomous protection system: Automatic Attack Disruption.
As cyber threats grow more sophisticated, Microsoft Defender safeguards enterprises by detecting, investigating, and automatically disrupting advanced attacks and data breaches. Our team builds the AI models behind this mission, alongside the data analytics systems that drive data-informed decisions and operational excellence at scale.
Qualifications
- M.Sc. in Computer Science (or equivalent)
- You have hands-on experience as an full time employee (FTE) in Machine Learning using scikit-learn, PyTorch, or similar frameworks.
- You have hands-on experience in Software Development
Preferred Qualifications
- Cyber security background and keen interest
- Publications of AI-related research
- Experience with large-scale data systems (e.g., Spark).
- Software development in C/Java/C++
- Capable of driving challenging projects from an idea to production
- Able to learn new technologies quickly and independently
- Great people skills, teamwork, and collaboration
# MSFTSecurity #AttackDisruption #MTPRIL #MSFTSecurityIL #MTPILhiring
Responsibilities
If you are a talented Applied Scientist with strong technical skills, a passion for turning data and research into real-world impact, and the ambition to design, experiment, and ship innovative ML and AI solutions, we would love to talk to you!
In our tean you will:
- Develop ML models to detect and disrupt cyberattacks.
- Collaborate with security experts to integrate their knowledge into ML models.
- Work with truly Big Data sources to create and refine high-quality training datasets.
- Ship your ML models to production, monitor performance and improve.
- Stay informed about the latest advancements in ML/AI and apply these to complex cybersecurity challenges.