
Principal Security Researcher – Detection Engineering (DE)
The Detection Engineering (DE) team in the CISO organization at Microsoft is seeking an experienced, motivated and self-driven Principal Security Researcher to join a growing team of detection engineers, data scientists and automation engineers. In…
Precio: Private Aggregate Measurement via Oblivious Shuffling
This talk presents Precio, a secure aggregation system for computing layered histograms and sums over secret shared data in a client-server setting. Precio is motivated by private ad measurement scenarios, where online advertisers and ad…
Precio
Precio is a Rust library that implements the Precio protocol for computing private layered histograms and sums.
Sandi: A System for Accountability
Kim Laine presents a novel reputation system called Sandi, which aims to create trust between two otherwise distrusting parties. Concretely, Sandi focuses on online communication scenarios, where two communicating parties do not know each other,…
Senior Applied & Data scientist – Defender Experts (DEX) Research team
he Defender Experts (DEX) Research team is looking for a passionate and curious Data Scientist to join this high-impact team. In this role, you’ll partner with researchers, hunters, and detection engineers to explore attacker behavior,…
Security Researcher II – Security for AI
Join our threat protection research team and be part of a team who contributes to Microsoft’s most advanced and innovative security solutions. In this role, you’ll research and build defenses across AI systems, agentic protocols,…
Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library
We’re rewriting parts of Microsoft’s SymCrypt cryptographic library in Rust to improve memory safety and defend against side-channel attacks, enabling formal verification while maintaining backward compatibility via a Rust-to-C compiler.
Senior Security Researcher, MDA Research – Microsoft Security
Cloud Apps and Identity Research team (CAIR) is looking for a Security Researcher with expertise about Identity based attacks and threats. The ideal candidate can demonstrate strong knowledge of common authentication protocols and technologies both…
FrodoKEM: A conservative quantum-safe cryptographic algorithm
The recent advances in quantum computing offer many advantages—but also challenge current cryptographic strategies. Learn how FrodoKEM could help strengthen security, even in a future with powerful quantum computers.