Lead Csirt Incident Responder

DocuSign DocuSign · Enterprise · Dublin, Ireland · Security

Lead CSIRT Incident Responder responsible for identifying, investigating, and responding to security incidents. This role involves triaging alerts, performing technical investigations, malware analysis, and supporting incident containment and recovery. The position also includes developing threat detection rules, proactive threat hunting, and automating incident response workflows.

What you'd actually do

  1. Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools
  2. Correlate events from various log sources to identify potential security incidents
  3. Determine the scope, severity, and potential impact of detected threats
  4. Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats
  5. Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods

Skills

Required

  • Cybersecurity principles
  • Incident response lifecycles
  • Security best practices
  • SIEM tools (Splunk, QRadar, Sentinel)
  • EDR solutions
  • Digital forensics principles and techniques
  • Enterprise forensic solutions
  • Scripting languages (Python, PowerShell, Bash)
  • MITRE ATT&CK framework
  • Cyber kill chain

Nice to have

  • Bachelor's degree in Computer Science, Information Security, or a related field
  • CompTIA Security+
  • CySA+
  • GCIH
  • GCFA
  • CEH
  • SOAR platforms
  • Cloud security concepts (AWS, Azure, GCP)
  • AI threats

What the JD emphasized

  • 12+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response
  • Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation
  • Experience with EDR solutions and their role in incident investigation
  • Experience with digital forensics principles and techniques and enterprise forensic solutions
  • Experience using scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis
  • Experience with the MITRE ATT&CK framework and cyber kill chain