LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Lead Incident Responder

at DocuSign

Back to all Cybersecurity jobs
D
Industry not specified

Lead Incident Responder

at DocuSign

Tech LeadNo visa sponsorshipCybersecurity

Posted 11 hours ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Not specified

Lead Incident Responder (CSIRT) in India, reporting to the CSIRT Manager. As the technical authority for enterprise-wide incident response and digital forensics, you will manage high-severity security incidents, oversee investigations, and drive improvements in playbooks and automation. You will triage alerts from the SOC, leverage SIEM/SOAR/EDR/XDR, correlate telemetry across endpoints, networks, SaaS, and cloud infrastructure, and mentor junior team members. You will contribute to threat hunting and collaborate with Security Engineering, IT, Legal, and Compliance teams as needed.

Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM). What you'll do We are looking for highly motivated and skilled CSIRT Incident Responder to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity. This position is an individual contributor role reporting to the Manager of CSIRT India. Responsibility Serve as the lead technical authority for enterprise-wide incident response and digital forensics, handling high-severity, complex, and multi-vector security incidents Lead end-to-end incident response, from initial detection and triage through containment, eradication, recovery, and post-incident analysis Perform and oversee advanced investigations leveraging SIEM, SOAR, EDR/XDR, NDR, and cloud-native security platforms Correlate telemetry across endpoints, networks, SaaS, and cloud infrastructure to identify attacker activity, lateral movement, persistence mechanisms, and data exfiltration Conduct deep forensic investigations across:Disk and file systems, Memory (RAM), Cloud environments (AWS, Azure, GCP) Perform initial triage and deep analysis of alerts from SIEM, SOAR, EDR/XDR, and cloud security tools Correlate events across endpoint, network, SaaS, and cloud log sources to identify and validate security incidents Determine incident scope, severity, root cause, and business impact and guide risk-based response decisions Conduct and oversee technical investigations, including malware, phishing, web application attacks, cloud account compromise, and insider threats. Own and continuously improve CSIRT processes, playbooks, and operating procedures in line with industry frameworks Drive SOAR automation by designing and optimizing response playbooks to reduce MTTD/MTTR and analyst effort Identify and implement automation opportunities across alert enrichment, evidence collection, containment, and reporting Support and mentor SOC and IR team members during investigations and active incidents Contribute to threat hunting activities and improve detection logic based on incident learnings and MITRE ATT&CK Ensure accurate incident documentation, timelines, and post-incident reports with actionable recommendations Provide clear and timely incident updates to the CSIRT Manager and senior stakeholders Collaborate with Security Engineering, IT, Legal, and Compliance teams during incident response Support coordination with external incident response partners and law enforcement when required Job Designation Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law. What you bring Basic 12+ years of progressive experience in cybersecurity, with deep specialization in Incident Response, Digital Forensics, and Security Operations Proven experience leading response to enterprise-scale, high-impact security incidents, including cloud and hybrid environments Expert-level understanding of incident response frameworks (NIST 800-61, SANS IR, MITRE ATT&CK) and forensic investigation methodologies Extensive hands-on experience with SIEM platforms (Splunk, QRadar, Sentinel) for advanced correlation and investigation Deep experience with EDR/XDR platforms and advanced endpoint investigations Hands-on experience with enterprise forensic and DFIR tools such as EnCase, FTK, Velociraptor, Volatility and cloud-native forensic tooling Advanced scripting and automation skills using Python, PowerShell, and/or Bash Strong knowledge of malware analysis techniques, persistence mech

Lead Incident Responder

at DocuSign

Back to all Cybersecurity jobs
D
Industry not specified

Lead Incident Responder

at DocuSign

Tech LeadNo visa sponsorshipCybersecurity

Posted 11 hours ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Not specified

Lead Incident Responder (CSIRT) in India, reporting to the CSIRT Manager. As the technical authority for enterprise-wide incident response and digital forensics, you will manage high-severity security incidents, oversee investigations, and drive improvements in playbooks and automation. You will triage alerts from the SOC, leverage SIEM/SOAR/EDR/XDR, correlate telemetry across endpoints, networks, SaaS, and cloud infrastructure, and mentor junior team members. You will contribute to threat hunting and collaborate with Security Engineering, IT, Legal, and Compliance teams as needed.

Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM). What you'll do We are looking for highly motivated and skilled CSIRT Incident Responder to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity. This position is an individual contributor role reporting to the Manager of CSIRT India. Responsibility Serve as the lead technical authority for enterprise-wide incident response and digital forensics, handling high-severity, complex, and multi-vector security incidents Lead end-to-end incident response, from initial detection and triage through containment, eradication, recovery, and post-incident analysis Perform and oversee advanced investigations leveraging SIEM, SOAR, EDR/XDR, NDR, and cloud-native security platforms Correlate telemetry across endpoints, networks, SaaS, and cloud infrastructure to identify attacker activity, lateral movement, persistence mechanisms, and data exfiltration Conduct deep forensic investigations across:Disk and file systems, Memory (RAM), Cloud environments (AWS, Azure, GCP) Perform initial triage and deep analysis of alerts from SIEM, SOAR, EDR/XDR, and cloud security tools Correlate events across endpoint, network, SaaS, and cloud log sources to identify and validate security incidents Determine incident scope, severity, root cause, and business impact and guide risk-based response decisions Conduct and oversee technical investigations, including malware, phishing, web application attacks, cloud account compromise, and insider threats. Own and continuously improve CSIRT processes, playbooks, and operating procedures in line with industry frameworks Drive SOAR automation by designing and optimizing response playbooks to reduce MTTD/MTTR and analyst effort Identify and implement automation opportunities across alert enrichment, evidence collection, containment, and reporting Support and mentor SOC and IR team members during investigations and active incidents Contribute to threat hunting activities and improve detection logic based on incident learnings and MITRE ATT&CK Ensure accurate incident documentation, timelines, and post-incident reports with actionable recommendations Provide clear and timely incident updates to the CSIRT Manager and senior stakeholders Collaborate with Security Engineering, IT, Legal, and Compliance teams during incident response Support coordination with external incident response partners and law enforcement when required Job Designation Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law. What you bring Basic 12+ years of progressive experience in cybersecurity, with deep specialization in Incident Response, Digital Forensics, and Security Operations Proven experience leading response to enterprise-scale, high-impact security incidents, including cloud and hybrid environments Expert-level understanding of incident response frameworks (NIST 800-61, SANS IR, MITRE ATT&CK) and forensic investigation methodologies Extensive hands-on experience with SIEM platforms (Splunk, QRadar, Sentinel) for advanced correlation and investigation Deep experience with EDR/XDR platforms and advanced endpoint investigations Hands-on experience with enterprise forensic and DFIR tools such as EnCase, FTK, Velociraptor, Volatility and cloud-native forensic tooling Advanced scripting and automation skills using Python, PowerShell, and/or Bash Strong knowledge of malware analysis techniques, persistence mech

SIMILAR OPPORTUNITIES

No similar jobs available at the moment.