refresh

Trending Companies

Trending

Jobs

JobsDocuSign

Senior CSIRT Incident Responser

DocuSign

Senior CSIRT Incident Responser

DocuSign

Dublin, Ireland

·

On-site

·

Full-time

·

6d ago

Company Overview Docusign brings agreements to life.

Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives.

With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents.

Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity.

Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).

What you'll do We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India.

Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our Detect & Respond function.

You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities.

This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity.

This position is an individual contributor role reporting to the Senior Director, Detect and Respond.

Responsibility Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from various log sources to identify potential security incidents Determine the scope, severity, and potential impact of detected threats Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager Document incident findings, actions taken, and lessons learned Assist in the development and refinement of threat detection rules to improve SOC visibility Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment Stay informed about the latest threat intelligence and emerging attack techniques Work with SIEM and SOAR platforms to optimize alert processing and incident workflows Contribute to the creation and refinement of automated solutions for efficient incident response and reporting Identify opportunities for automation to streamline security operations Collaborate effectively with other security teams, IT, and business units during incident response Provide clear and concise updates on incident status to the CSIRT Manager Contribute to post-incident reports and analysis Maintain working relationships with law enforcement when required Job Designation Hybrid: Employee divides their time between in-office and remote work.

Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job.

Preferred job designations are not guaranteed when changing positions within Docusign.

Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.

What you bring Basic 12+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response

Experience: with cybersecurity principles, incident response lifecycles, and security best practices

Experience: with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation

Experience: with EDR solutions and their role in incident investigation

Experience: with digital forensics principles and techniques and enterprise forensic solutions

Experience: using scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis

Experience: with the MITRE ATT&CK framework and cyber kill chain Preferred Bachelor's degree in Computer Science, Information Security, or a related field

Industry: certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH Hands-on experience with SOAR platforms Exposure to cloud security concepts (AWS, Azure, GCP) Strong analytical and problem-solving skills, with a keen eye for detail Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly Ability to work effectively as part of a team and independently under pressure Knowledge of how to protect against AI threats Life at Docusign Working here Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work.

You can count on us to listen, be honest, and try our best to do what’s right, every day.

At Docusign, everything is equal.

We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life.

Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it.

And for that, you’ll be loved by us, our customers, and the world in which we live.

Accommodation Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures.

If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com.

If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.

Applicant and Candidate Privacy Notice:

We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India.

Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our Detect & Respond function.

You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities.

This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity.

This position is an individual contributor role reporting to the Senior Director, Detect and Respond.

Responsibility Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from various log sources to identify potential security incidents Determine the scope, severity, and potential impact of detected threats Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager Document incident findings, actions taken, and lessons learned Assist in the development and refinement of threat detection rules to improve SOC visibility Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment Stay informed about the latest threat intelligence and emerging attack techniques Work with SIEM and SOAR platforms to optimize alert processing and incident workflows Contribute to the creation and refinement of automated solutions for efficient incident response and reporting Identify opportunities for automation to streamline security operations Collaborate effectively with other security teams, IT, and business units during incident response Provide clear and concise updates on incident status to the CSIRT Manager Contribute to post-incident reports and analysis Maintain working relationships with law enforcement when required
Basic 12+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response

Experience: with cybersecurity principles, incident response lifecycles, and security best practices

Experience: with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation

Experience: with EDR solutions and their role in incident investigation

Experience: with digital forensics principles and techniques and enterprise forensic solutions

Experience: using scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis

Experience: with the MITRE ATT&CK framework and cyber kill chain Preferred Bachelor's degree in Computer Science, Information Security, or a related field

Industry: certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH Hands-on experience with SOAR platforms Exposure to cloud security concepts (AWS, Azure, GCP) Strong analytical and problem-solving skills, with a keen eye for detail Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly Ability to work effectively as part of a team and independently under pressure Knowledge of how to protect against AI threats

Total Views

0

Apply Clicks

0

Mock Applicants

0

Scraps

0

About DocuSign

DocuSign

DocuSign helps small- and medium-sized businesses collect information, automate data workflows, and sign on various devices.

5,001-10,000

Employees

San Francisco

Headquarters

$13.0B

Valuation

Reviews

3.8

42 reviews

Work Life Balance

3.6

Compensation

3.9

Culture

4.0

Career

3.9

Management

3.4

77%

Recommend to a Friend

Pros

Opportunity for career growth

Interesting projects and challenges

Competitive compensation and benefits

Cons

Some organizational bureaucracy

Career progression could be clearer

Room for improvement in processes

Salary Ranges

21 data points

Mid/L4

Senior/L5

Mid/L4 · Lead Incident Response Analyst

2 reports

$200,664

total / year

Base

$154,357

Stock

-

Bonus

-

$200,664

$200,664

Interview Experience

4 interviews

Difficulty

3.0

/ 5

Duration

14-28 weeks

Offer Rate

50%

Experience

Positive 50%

Neutral 25%

Negative 25%

Interview Process

1

Application Review

2

Recruiter Screen

3

Technical Assessment

4

Technical Interview Rounds

5

Onsite/Virtual Interviews

6

Background Check

Common Questions

Coding/Algorithm

Technical Knowledge

Behavioral/STAR

Past Experience