LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

CSIRT Incident Responder

at DocuSign

Back to all Cybersecurity jobs
D
Industry not specified

CSIRT Incident Responder

at DocuSign

Mid LevelNo visa sponsorshipCybersecurity

Posted 9 hours ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Ireland

CSIRT Investigator and Security Analyst to join Docusign's CSIRT team in Ireland, supporting the Detect and Respond function. You will triage alerts from SIEM, correlate events across log sources, and investigate security incidents, including malware, phishing, and insider threats. The role includes digital forensics, incident containment and recovery, documentation, threat hunting, and improving detection rules, with on-call duties for global incident response in a hybrid in-office setting.

Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM). What you'll do We are looking for motivated and technically capable CSIRT Investigators and Security Analysts to join our dynamic security team in Ireland. Reporting directly to the CSIRT Manager, this individual contributor role supports our Detect and Respond function. You will assist in identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC) and supporting the ongoing improvement of our incident response capabilities. This role requires a solid technical foundation, willingness to participate in on-call rotations, strong analytical skills and a desire to grow within cybersecurity incident response. This position is an individual contributor role reporting to the Senior Director, Detect and Respond. Responsibility Perform initial triage and analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from multiple log sources to help identify potential security incidents Assist in determining the scope, severity and potential impact of detected threats Participate in technical investigations into cybersecurity incidents, including malware, phishing, web application compromises and insider threats Support digital forensics activities on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication and recovery efforts under the guidance of senior CSIRT staff and the CSIRT Manager Document incident findings, actions taken and lessons learned in a clear and consistent manner Assist in the refinement of threat detection rules and alert logic to improve SOC visibility and signal quality Support proactive threat hunting activities to help identify potential threats within the enterprise environment Stay informed on emerging threats, attacker techniques and relevant threat intelligence Use SIEM and SOAR platforms to support alert processing, investigations and incident workflows Leverage existing automation and tooling to improve investigation efficiency and consistency Identify opportunities for operational improvements and raise them to senior team members Collaborate with other security teams, IT and business units during incident response activities Provide timely and clear updates on incident status to assigned Incident Leads or the CSIRT Manager Contribute supporting information and analysis to post-incident reports Be on-call for global incident response as required Job Designation Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law. What you bring Basic 5+ years of hands-on experience in cybersecurity, with a focus on incident response and computer forensics analysis Experience with cybersecurity principles, incident response lifecycles, and security best practices Experience with forensic tool suites such as Sumuri, Magnet Forensics Axiom, Velociraptor, and X-ways Experience in digital evidence handling and forensic analysis across various operating systems (Windows, Unix/Linux) and environments (endpoint, server, cloud) Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation Experience with EDR and SIEM technologies (i.e., Splunk) for threat hunting and incident identification Experience in programming languages such as Python for scripting, automating forensic tasks, and potentially building data pipelines for security data Preferred Experience with big data frameworks like Apache Spark and Kafka for processing and streaming large volumes of security-related data Programming skills in PowerShell and/or C/C++ Bachelor's degree in Computer Science, Information Security, or a related field Training and/or certifications from industry organizations or vendors (i.e., GCFE, GCFA, GREM, GCIH, EnCE, CISSP) Hands-on experience with SOAR platforms Strong analytical an

CSIRT Incident Responder

at DocuSign

Back to all Cybersecurity jobs
D
Industry not specified

CSIRT Incident Responder

at DocuSign

Mid LevelNo visa sponsorshipCybersecurity

Posted 9 hours ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Ireland

CSIRT Investigator and Security Analyst to join Docusign's CSIRT team in Ireland, supporting the Detect and Respond function. You will triage alerts from SIEM, correlate events across log sources, and investigate security incidents, including malware, phishing, and insider threats. The role includes digital forensics, incident containment and recovery, documentation, threat hunting, and improving detection rules, with on-call duties for global incident response in a hybrid in-office setting.

Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM). What you'll do We are looking for motivated and technically capable CSIRT Investigators and Security Analysts to join our dynamic security team in Ireland. Reporting directly to the CSIRT Manager, this individual contributor role supports our Detect and Respond function. You will assist in identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC) and supporting the ongoing improvement of our incident response capabilities. This role requires a solid technical foundation, willingness to participate in on-call rotations, strong analytical skills and a desire to grow within cybersecurity incident response. This position is an individual contributor role reporting to the Senior Director, Detect and Respond. Responsibility Perform initial triage and analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from multiple log sources to help identify potential security incidents Assist in determining the scope, severity and potential impact of detected threats Participate in technical investigations into cybersecurity incidents, including malware, phishing, web application compromises and insider threats Support digital forensics activities on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication and recovery efforts under the guidance of senior CSIRT staff and the CSIRT Manager Document incident findings, actions taken and lessons learned in a clear and consistent manner Assist in the refinement of threat detection rules and alert logic to improve SOC visibility and signal quality Support proactive threat hunting activities to help identify potential threats within the enterprise environment Stay informed on emerging threats, attacker techniques and relevant threat intelligence Use SIEM and SOAR platforms to support alert processing, investigations and incident workflows Leverage existing automation and tooling to improve investigation efficiency and consistency Identify opportunities for operational improvements and raise them to senior team members Collaborate with other security teams, IT and business units during incident response activities Provide timely and clear updates on incident status to assigned Incident Leads or the CSIRT Manager Contribute supporting information and analysis to post-incident reports Be on-call for global incident response as required Job Designation Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law. What you bring Basic 5+ years of hands-on experience in cybersecurity, with a focus on incident response and computer forensics analysis Experience with cybersecurity principles, incident response lifecycles, and security best practices Experience with forensic tool suites such as Sumuri, Magnet Forensics Axiom, Velociraptor, and X-ways Experience in digital evidence handling and forensic analysis across various operating systems (Windows, Unix/Linux) and environments (endpoint, server, cloud) Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation Experience with EDR and SIEM technologies (i.e., Splunk) for threat hunting and incident identification Experience in programming languages such as Python for scripting, automating forensic tasks, and potentially building data pipelines for security data Preferred Experience with big data frameworks like Apache Spark and Kafka for processing and streaming large volumes of security-related data Programming skills in PowerShell and/or C/C++ Bachelor's degree in Computer Science, Information Security, or a related field Training and/or certifications from industry organizations or vendors (i.e., GCFE, GCFA, GREM, GCIH, EnCE, CISSP) Hands-on experience with SOAR platforms Strong analytical an

SIMILAR OPPORTUNITIES

No similar jobs available at the moment.