<b>Overview</b><br><div><p><span xml:lang="EN-US" data-contrast="auto">In the age of generative intelligence, </span><span xml:lang="EN-US" data-contrast="auto">Securing AI</span><span xml:lang="EN-US" data-contrast="auto"> is no longer a technical afterthought—it is the </span><span xml:lang="EN-US" data-contrast="auto">central mission</span><span xml:lang="EN-US" data-contrast="auto"> that underpins trust, innovation, and responsible progress. As AI systems evolve from passive tools to autonomous agents, the risks they introduce— data leakage, model manipulation, agent sprawl, and regulatory non-compliance—demand a new security paradigm</span> <span xml:lang="EN-US" data-contrast="auto"> </span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></div><div><p><span xml:lang="EN-US" data-contrast="auto">Securing AI Is Mission-Critical</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></div><div><ol style="list-style-type: decimal;" role="list" start="1"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":0,"335559685":720,"335559991":360,"469769242":[65533,0],"469777803":"left","469777804":"%1.","469777815":"multilevel"}" data-listid="53" data-font="Segoe UI,Times New Roman" data-leveltext="%1." aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">AI Is a New Attack Surface</span> <br><span xml:lang="EN-US" data-contrast="auto">AI models and agents interact with vast, sensitive datasets and operate across cloud platforms. This opens up novel threat vectors such as prompt injection, system prompt leakage, model theft, and unbounded consumption.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ol></div><div><ol style="list-style-type: decimal;" role="list" start="2"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":0,"335559685":720,"335559991":360,"469769242":[65533,0],"469777803":"left","469777804":"%1.","469777815":"multilevel"}" data-listid="53" data-font="Segoe UI,Times New Roman" data-leveltext="%1." aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Security Must Be Built-In, Not Bolted-On</span> <br><span xml:lang="EN-US" data-contrast="auto">Traditional perimeter defenses are insufficient. AI security must be embedded across the compute, data, identity, and networking planes—just as we did before AI, but now with added complexity and urgency </span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ol></div><div><ol style="list-style-type: decimal;" role="list" start="3"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":0,"335559685":720,"335559991":360,"469769242":[65533,0],"469777803":"left","469777804":"%1.","469777815":"multilevel"}" data-listid="53" data-font="Segoe UI,Times New Roman" data-leveltext="%1." aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Trustworthy AI Requires Security by Design</span> <br><span xml:lang="EN-US" data-contrast="auto">Microsoft’s SFI —Secure by Design, Secure by Default, Security Operation—guide the development of AI systems that are resilient, transparent, and compliant from the ground up.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ol></div><div><p><span xml:lang="EN-US" data-contrast="auto">Microsoft’s approach to Securing AI is not siloed—it’s </span><span xml:lang="EN-US" data-contrast="auto">integrated across Defender, Purview, Entra, Sentinel, Azure AI Foundry, and Agent 365</span><span xml:lang="EN-US" data-contrast="auto">. This ecosystem enables:</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="54" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Real-time threat detection and response.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="54" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Multi-cloud coverage and telemetry.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="54" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Secure development pipelines with CI/CD scanning.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="4" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="54" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Governance of agentic systems and model registries</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></li></ul></div><div><p><span xml:lang="EN-US" data-contrast="auto">To meet the rapidly evolving demands of </span><span xml:lang="EN-US" data-contrast="auto">Agentic Intelligence</span><span xml:lang="EN-US" data-contrast="auto"> and the complex security challenges it introduces, it is imperative that we build a </span><span xml:lang="EN-US" data-contrast="auto">world-class security team</span><span xml:lang="EN-US" data-contrast="auto">. This team must be composed of </span><span xml:lang="EN-US" data-contrast="auto">exceptionally talented individuals</span><span xml:lang="EN-US" data-contrast="auto"> with deep expertise in both </span><span xml:lang="EN-US" data-contrast="auto">AI and cybersecurity</span><span xml:lang="EN-US" data-contrast="auto">, capable of navigating the technical, ethical, and operational dimensions of secure AI deployment.</span><span data-ccp-props="{"201341983":0,"335559739":160,"335559740":278}"> </span></p></div><div><p><span xml:lang="EN-US" data-contrast="auto">Securing AI is not just a technical requirement—it is the </span><span xml:lang="EN-US" data-contrast="auto">mission-critical task</span><span xml:lang="EN-US" data-contrast="auto"> of our time. As AI systems become more autonomous and integrated into core business functions, the risks they pose grow exponentially. Only by investing in a team that understands both the </span><span xml:lang="EN-US" data-contrast="auto">power of AI</span><span xml:lang="EN-US" data-contrast="auto"> and the </span><span xml:lang="EN-US" data-contrast="auto">principles of trust and protection</span><span xml:lang="EN-US" data-contrast="auto"> can we ensure that innovation proceeds responsibly and securely.</span><span data-ccp-props="{"201341983":0,"335559739":160,"335559740":278}"> </span></p><p>Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. </p></div><br><br><b>Responsibilities</b><br><div><div><p><span xml:lang="EN-US" data-contrast="auto"> As a </span><span xml:lang="EN-US" data-contrast="auto">Solution Engineer GBB – Security for AI</span><span xml:lang="EN-US" data-contrast="auto">, you will be at the forefront of Microsoft’s AI-driven security strategy. This role is designed for technical leaders who thrive in high-impact customer engagements and are passionate about secure AI adoption.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="49" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Lead technical strategy, planning, and execution for AI Security solutions including </span><span xml:lang="EN-US" data-contrast="auto">Microsoft Agent 365, Defender for Cloud</span><span xml:lang="EN-US" data-contrast="auto">, </span><span xml:lang="EN-US" data-contrast="auto">Purview Data Security</span><span xml:lang="EN-US" data-contrast="auto">, and </span><span xml:lang="EN-US" data-contrast="auto">Defender for AI workloads</span><span xml:lang="EN-US" data-contrast="auto">.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div></div><div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="49" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Design secure architectures, drive PoCs, and ensure successful deployments tailored to customer needs.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="49" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Act as a </span><span xml:lang="EN-US" data-contrast="auto">Technical Pathfinder</span><span xml:lang="EN-US" data-contrast="auto"> across MDC and Purview consumptive SKUs, delivering demos, workshops, and technical validation.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="4" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="49" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Translate customer use cases into </span><span xml:lang="EN-US" data-contrast="auto">repeatable winning patterns</span><span xml:lang="EN-US" data-contrast="auto"> and champion their adoption across teams.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="5" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="49" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Collaborate with STU/ATU, CXE, and CSU to drive revenue, deployment, and consumption.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="49" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Influence product roadmap and GTM strategy using customer insights and UAT frameworks.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><p><span xml:lang="EN-US" data-contrast="auto">Core Priorities</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="50" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Incubate and Scale Strategic Sales Motions</span><span xml:lang="EN-US" data-contrast="auto">: Lead technical incubation and convert learnings into scalable architectures.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="50" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Drive Complex, High-Impact Engagements</span><span xml:lang="EN-US" data-contrast="auto">: Serve as technical lead for security workloads, advising C-level stakeholders.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="50" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Scale Through Enablement</span><span xml:lang="EN-US" data-contrast="auto">: Share best practices and support readiness across field and partner teams.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="4" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="50" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Lead with Adaptive Expertise</span><span xml:lang="EN-US" data-contrast="auto">: Deepen technical and consultative skills to co-create solutions in ambiguous spaces.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div></div><br><br><b>Qualifications</b><br><div><p><span xml:lang="EN-US" data-contrast="auto">Required Skills</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="51" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Deep technical proficiency in AI security products and architecture.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="51" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Strong understanding of competitors like </span><span xml:lang="EN-US" data-contrast="auto">Palo Alto Networks</span><span xml:lang="EN-US" data-contrast="auto">, </span><span xml:lang="EN-US" data-contrast="auto">AWS</span><span xml:lang="EN-US" data-contrast="auto">, and </span><span xml:lang="EN-US" data-contrast="auto">GCP (Wiz)</span><span xml:lang="EN-US" data-contrast="auto">.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="51" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Consultative selling, storytelling, and solution narrative development.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="4" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="51" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Ability to orchestrate cross-functional collaboration and coach peers.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="5" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="51" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Familiarity with Zero Trust, cloud posture, app security, SASE, and DLP.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><p><span xml:lang="EN-US" data-contrast="auto">Skilling Expectations</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="52" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Participate in </span><span xml:lang="EN-US" data-contrast="auto">GBB Academy</span><span xml:lang="EN-US" data-contrast="auto">, </span><span xml:lang="EN-US" data-contrast="auto">Secure AI Airlift Deep Dive</span><span xml:lang="EN-US" data-contrast="auto">, and </span><span xml:lang="EN-US" data-contrast="auto">Compete Workshops</span><span xml:lang="EN-US" data-contrast="auto">.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="52" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Complete technical certifications (L300–L400), hands-on labs, and PoC challenges.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="52" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Engage in skilling paths covering AI foundations, security foundations, and cross-solution selling.</span><span data-ccp-props="{"134233117":true,"201341983":0,"335559739":120,"335559740":240}"> </span></p></li></ul></div> <br><p>This position will be open for a minimum of 5 days, with applications accepted on an ongoing basis until the position is filled.</p><br><hr><br><p>Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance with religious accommodations and/or a reasonable accommodation due to a disability during the application process, read more about <a href="https://careers.microsoft.com/v2/global/en/accessibility.html"><b><u>requesting accommodations.</u></b></a></p>