Principal Cybersecurity Incident Manager (usa)

GitLab GitLab · Enterprise · United States · Remote · Security Operations

This role is for a Principal Cybersecurity Incident Manager at GitLab, a DevSecOps platform company. The role involves leading and coordinating critical security incident responses, building and maturing the incident command function, and driving continuous improvement in incident response capabilities. The company emphasizes AI as a productivity multiplier and expects team members to use AI in their workflows.

What you'd actually do

  1. Serve as the primary Incident Commander for critical and complex security events across GitLab.com and corporate infrastructure, providing decisive leadership during high-stress situations
  2. Orchestrate response efforts across Security Operations, Infrastructure, Legal, Engineering, Product, and executive stakeholders, maintaining clear communication streams and unified action plans
  3. Lead technical calls and/or establish effective async collaboration during incidents, managing participant contributions, keeping discussions focused, and ensuring efficient progress toward resolution
  4. Conduct comprehensive post-incident reviews and retrospectives, driving the creation of action items, process improvements, and systemic enhancements
  5. Design, maintain, and continuously improve incident response playbooks, runbooks, and standard operating procedures for various incident scenarios in conjunction with SIRT engineers

Skills

Required

  • 10+ years of experience in information security, with at least 5 years focused on incident response, security operations, or related disciplines
  • Demonstrated experience serving as Incident Commander for critical security events in complex, distributed environments
  • Command Presence: Proven ability to lead and coordinate teams during high-stress, high-impact incidents with clarity, authority, and calm decisiveness
  • Strong knowledge of attacker tactics, techniques, and procedures (eg MITRE ATT&CK framework)
  • Technical proficiency with cloud infrastructure (GCP, AWS), container orchestration (Kubernetes), and modern application architectures
  • Experience with security information and event management (SIEM) platforms, log analysis, and security monitoring tools
  • Excellent written and verbal communication skills, including the ability to communicate technical concepts to non-technical stakeholders and executive leadership
  • Demonstrated ability to build relationships and coordinate effectively across security, engineering, legal, and business teams
  • Ability to identify systemic issues from incident patterns and drive organizational improvements

Nice to have

  • Experience working with / in Site Reliability Engineering (SRE), DevOps, or Infrastructure Engineering
  • Experience with GitLab the product and familiarity with DevSecOps practices
  • Experience working in an all-remote or distributed team environment

What the JD emphasized

  • founding Incident Commander
  • build upon and mature the incident command function