
Electronic agreement platform
Senior CSIRT Incident Responser
Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM). What you'll do We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our Detect & Respond function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity. This position is an individual contributor role reporting to the Senior Director, Detect and Respond. Responsibility Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from various log sources to identify potential security incidents Determine the scope, severity, and potential impact of detected threats Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager Document incident findings, actions taken, and lessons learned Assist in the development and refinement of threat detection rules to improve SOC visibility Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment Stay informed about the latest threat intelligence and emerging attack techniques Work with SIEM and SOAR platforms to optimize alert processing and incident workflows Contribute to the creation and refinement of automated solutions for efficient incident response and reporting Identify opportunities for automation to streamline security operations Collaborate effectively with other security teams, IT, and business units during incident response Provide clear and concise updates on incident status to the CSIRT Manager Contribute to post-incident reports and analysis Maintain working relationships with law enforcement when required Job Designation Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law. What you bring Basic 12+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response Experience with cybersecurity principles, incident response lifecycles, and security best practices Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation Experience with EDR solutions and their role in incident investigation Experience with digital forensics principles and techniques and enterprise forensic solutions Experience using scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis Experience with the MITRE ATT&CK framework and cyber kill chain Preferred Bachelor's degree in Computer Science, Information Security, or a related field Industry certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH Hands-on experience with SOAR platforms Exposure to cloud security concepts (AWS, Azure, GCP) Strong analytical and problem-solving skills, with a keen eye for detail Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly Ability to work effectively as part of a team and independently under pressure Knowledge of how to protect against AI threats Life at Docusign Working here Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal. We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live. Accommodation Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com. If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.
Applicant and Candidate Privacy Notice:
We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our Detect & Respond function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity. This position is an individual contributor role reporting to the Senior Director, Detect and Respond. Responsibility Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from various log sources to identify potential security incidents Determine the scope, severity, and potential impact of detected threats Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager Document incident findings, actions taken, and lessons learned Assist in the development and refinement of threat detection rules to improve SOC visibility Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment Stay informed about the latest threat intelligence and emerging attack techniques Work with SIEM and SOAR platforms to optimize alert processing and incident workflows Contribute to the creation and refinement of automated solutions for efficient incident response and reporting Identify opportunities for automation to streamline security operations Collaborate effectively with other security teams, IT, and business units during incident response Provide clear and concise updates on incident status to the CSIRT Manager Contribute to post-incident reports and analysis Maintain working relationships with law enforcement when required
Basic 12+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response Experience with cybersecurity principles, incident response lifecycles, and security best practices Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation Experience with EDR solutions and their role in incident investigation Experience with digital forensics principles and techniques and enterprise forensic solutions Experience using scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis Experience with the MITRE ATT&CK framework and cyber kill chain Preferred Bachelor's degree in Computer Science, Information Security, or a related field Industry certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH Hands-on experience with SOAR platforms Exposure to cloud security concepts (AWS, Azure, GCP) Strong analytical and problem-solving skills, with a keen eye for detail Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly Ability to work effectively as part of a team and independently under pressure Knowledge of how to protect against AI threats
閲覧数
0
応募クリック
0
Mock Apply
0
スクラップ
0
類似の求人
DocuSignについて

DocuSign
PublicDocusign, Inc. is an American software company headquartered in San Francisco, California that provides products for organizations to manage electronic agreements with electronic signatures on different devices. As of 2025, Docusign has about 1.7 million clients in 180 countries.
5,001-10,000
従業員数
San Francisco
本社所在地
$13.0B
企業価値
レビュー
10件のレビュー
3.8
10件のレビュー
ワークライフバランス
3.8
報酬
2.5
企業文化
4.2
キャリア
3.0
経営陣
3.2
72%
知人への推奨率
良い点
Supportive management and team atmosphere
Good work-life balance and flexible hours
Interesting and innovative projects
改善点
Management disorganization and lack of clear direction
Heavy workload and long hours during peak times
Below industry standard salary
給与レンジ
42件のデータ
Mid/L4
Senior/L5
Mid/L4 · Lead Incident Response Analyst
2件のレポート
$200,664
年収総額
基本給
$154,357
ストック
-
ボーナス
-
$200,664
$200,664
面接レビュー
レビュー3件
難易度
2.7
/ 5
期間
14-28週間
面接プロセス
1
Application Review
2
Recruiter Screen
3
Technical Phone Screen
4
Onsite/Virtual Interviews
5
Team Matching
6
Offer
よくある質問
Coding/Algorithm
System Design
Behavioral/STAR
Technical Knowledge
Culture Fit
最新情報
What’s driving DOCU stock up after hours? - MSN
MSN
News
·
1w ago
The Bull Case For DocuSign (DOCU) Could Change Following New Earnings Projections And Estimate-Beat Streak - Yahoo Finance
Yahoo Finance
News
·
1w ago
Docusign Announces 2026 Global Customer Award Winners - PR Newswire
PR Newswire
News
·
1w ago
DocuSign (DOCU) Outpaces Stock Market Gains: What You Should Know - Yahoo Finance
Yahoo Finance
News
·
1w ago


