{"id":554,"date":"2026-01-10T19:25:37","date_gmt":"2026-01-10T19:25:37","guid":{"rendered":"https:\/\/coderseditor.com\/itjobs\/?post_type=job_listing&#038;p=554"},"modified":"2026-01-10T19:25:39","modified_gmt":"2026-01-10T19:25:39","slug":"research-intern-msrc-ai-security-research-psw-graduate-student","status":"publish","type":"job_listing","link":"https:\/\/coderseditor.com\/itjobs\/job\/research-intern-msrc-ai-security-research-psw-graduate-student\/","title":{"rendered":"Research Intern &#8211; MSRC AI Security Research (PSW\/Graduate\/Student)"},"content":{"rendered":"<div>\n<p><span data-contrast=\"auto\">The Microsoft Security Response Center (MSRC) works to protect customers and Microsoft from current and emerging threats to security and privacy. Within MSRC, our AI Vulnerabilities and Mitigations team analyzes all reported security vulnerabilities in Microsoft\u2019s AI systems and develops new mitigations through deep research.<\/span><\/p>\n<\/div>\n<div>\n<p><span data-contrast=\"auto\">We are looking for Research Interns to work with us on developing new mitigations for AI systems. Our team is uniquely placed to solve real-world security and privacy challenges, through\u00a0cutting-edge\u00a0scientific research, informed by vulnerability data from\u00a0production\u00a0AI systems.<\/span> <span data-contrast=\"auto\">Some of our team\u2019s recent research and collaborations include:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/div>\n<div>\n<ul>\n<li><span data-contrast=\"auto\">TaskTracker: Catching LLM Task Drift with Activation Deltas\u00a0<\/span><a href=\"https:\/\/arxiv.org\/abs\/2406.00799\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/arxiv.org\/abs\/2406.00799<\/span><\/a><\/li>\n<li><span data-contrast=\"auto\">LLMail-Inject Adaptive Prompt Injection Challenge <\/span><a href=\"https:\/\/microsoft.github.io\/llmail-inject\/\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/microsoft.github.io\/llmail-inject\/<\/span><\/a><span data-contrast=\"auto\">)\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Highlight &amp; Summarize <\/span><a href=\"https:\/\/arxiv.org\/abs\/2508.02872\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/arxiv.org\/abs\/2508.02872<\/span><\/a><\/li>\n<li><span data-contrast=\"auto\">Design Patterns for Securing LLM Agents against Prompt Injections <\/span><a href=\"https:\/\/arxiv.org\/abs\/2506.08837\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/arxiv.org\/abs\/2506.08837<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Compromising Autonomous LLM Agents Through Malfunction Amplification <\/span><a href=\"https:\/\/aclanthology.org\/2025.emnlp-main.1771\/\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/aclanthology.org\/2025.emnlp-main.1771\/<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Securing AI Agents with Information-Flow Control <\/span><a href=\"https:\/\/arxiv.org\/abs\/2505.23643\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/arxiv.org\/abs\/2505.23643<\/span><\/a><\/li>\n<li><span data-contrast=\"auto\">The Hawthorne Effect in Reasoning Models <\/span><a href=\"https:\/\/arxiv.org\/abs\/2505.14617\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/arxiv.org\/abs\/2505.14617<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">VerifiableFL: Verifiable Claims for Federated Learning using Exclaves <\/span><a href=\"https:\/\/arxiv.org\/abs\/2412.10537\" rel=\"noreferrer noopener\"><span data-ccp-charstyle=\"Hyperlink\">https:\/\/arxiv.org\/abs\/2412.10537<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><br \/>\n<span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<p><b>Responsibilities<\/b><\/p>\n<div>\n<ul>\n<li><span data-contrast=\"auto\">Conduct\u00a0cutting-edge\u00a0research<\/span><span data-contrast=\"auto\">\u202fin AI security and privacy by proposing, exploring, and evaluating\u00a0new ideas.<\/span><\/li>\n<li><span data-contrast=\"auto\">Develop and implement prototypes<\/span><span data-contrast=\"auto\">\u202fto validate concepts and demonstrate real-world applicability.<\/span><\/li>\n<li><span data-contrast=\"auto\">Collaborate with cross-functional teams<\/span><span data-contrast=\"auto\">\u202fto integrate security and privacy solutions into products and services.<\/span><\/li>\n<li><span data-contrast=\"auto\">Publish findings and present insights<\/span><span data-contrast=\"auto\">\u202fto internal stakeholders and external conferences to advance industry knowledge.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<p><b>Qualifications<\/b><\/p>\n<div>\n<p><strong><span data-ccp-charstyle=\"normaltextrun\" data-ccp-charstyle-defn=\"{\">Required\/Minimum Qualifications:<\/span><span data-contrast=\"none\">\u202f\u202f<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/strong><\/p>\n<\/div>\n<div>\n<ul>\n<li><span data-contrast=\"auto\">Students enrolled in a PhD program or outstanding undergraduate\/master\u2019s\u00a0students with research experience.<\/span> <span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<div><\/div>\n<div>\n<p><strong><span data-ccp-charstyle=\"normaltextrun\">Preferred\/Additional Qualifications:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/strong><\/p>\n<\/div>\n<div>\n<ul>\n<li><span data-contrast=\"auto\">One or more papers at top security conferences (e.g., USENIX, CCS, S&amp;P, NDSS) or papers focusing on security, safety, or privacy and appearing at top machine\u00a0learning conferences (e.g.,\u00a0NeurIPS, ICML, ICLR) are strongly desired.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li><span data-ccp-props=\"{\">We\u2019d love to see your work \u2014 please share any personal projects, GitHub repositories, portfolios, or examples of work you\u2019re proud of in your application.\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<p>This position will be open for a minimum of 5 days, with applications accepted on an ongoing basis until the position is filled.<\/p>\n","protected":false},"author":1,"featured_media":0,"template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_promoted":"","_job_location":"UK","_application":"https:\/\/apply.careers.microsoft.com\/careers\/job\/1970393556654526","_company_name":"Microsoft","_company_website":"","_company_tagline":"","_company_twitter":"","_company_video":"","_filled":0,"_featured":0,"_remote_position":0,"_job_salary":"","_job_salary_currency":"","_job_salary_unit":""},"job-types":[42],"class_list":{"0":"post-554","1":"job_listing","2":"type-job_listing","3":"status-publish","6":"job-type-internship"},"acf":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/coderseditor.com\/itjobs\/wp-json\/wp\/v2\/job-listings\/554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coderseditor.com\/itjobs\/wp-json\/wp\/v2\/job-listings"}],"about":[{"href":"https:\/\/coderseditor.com\/itjobs\/wp-json\/wp\/v2\/types\/job_listing"}],"author":[{"embeddable":true,"href":"https:\/\/coderseditor.com\/itjobs\/wp-json\/wp\/v2\/users\/1"}],"wp:attachment":[{"href":"https:\/\/coderseditor.com\/itjobs\/wp-json\/wp\/v2\/media?parent=554"}],"wp:term":[{"taxonomy":"job_listing_type","embeddable":true,"href":"https:\/\/coderseditor.com\/itjobs\/wp-json\/wp\/v2\/job-types?post=554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}