Related skills
aws kubernetes gcp incident response siem๐ Description
- Founding Incident Commander; maturing the incident command function.
- Primary Incident Commander for high-impact security events; may require availability outside core hours.
- Coordinate cross-functional response across Security Ops, Infra, Legal, Eng, Product, and execs.
- Lead technical calls and async collaboration during incidents.
- Conduct blameless post-incident reviews; drive action items and improvements.
- Design and maintain incident playbooks and SOPs with SIRT.
๐ฏ Requirements
- 10+ years in information security; 5+ years in incident response or security operations.
- Experience as Incident Commander for critical security events in distributed environments.
- Command presence; ability to lead under pressure with clarity and calm.
- Strong knowledge of attacker techniques (MITRE ATT&CK).
- Technical proficiency: cloud (GCP, AWS), Kubernetes, and modern app architectures.
- Experience with SIEM, log analysis, and security monitoring tools.
๐ Benefits
- Benefits to support health, finances, and well-being
- Flexible Paid Time Off
- Equity Compensation & Employee Stock Purchase Plan
- Growth and Development Fund
- Parental leave
- Home office support
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!