Jobs
Benefits & Perks
•Paid Time Off
•Parental Leave
•Healthcare
•401(k)
•Learning Budget
•Parental Leave
•Healthcare
•401k
•Learning
Required Skills
Incident Response
Digital Forensics
Security Operations
SIEM
EDR/XDR
Python
PowerShell
Bash
Malware analysis
MITRE ATT&CK
Company Overview Docusign brings agreements to life.
Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives.
With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents.
Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity.
Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
What you'll do We are looking for highly motivated and skilled CSIRT Incident Responder to join our dynamic security team in India.
Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function.
You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities.
This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity.
This position is an individual contributor role reporting to the Manager of CSIRT India.
Responsibility Serve as the lead technical authority for enterprise-wide incident response and digital forensics, handling high-severity, complex, and multi-vector security incidents Lead end-to-end incident response, from initial detection and triage through containment, eradication, recovery, and post-incident analysis Perform and oversee advanced investigations leveraging SIEM, SOAR, EDR/XDR, NDR, and cloud-native security platforms Correlate telemetry across endpoints, networks, SaaS, and cloud infrastructure to identify attacker activity, lateral movement, persistence mechanisms, and data exfiltration Conduct deep forensic investigations across:Disk and file systems, Memory (RAM), Cloud environments (AWS, Azure, GCP) Perform initial triage and deep analysis of alerts from SIEM, SOAR, EDR/XDR, and cloud security tools Correlate events across endpoint, network, SaaS, and cloud log sources to identify and validate security incidents Determine incident scope, severity, root cause, and business impact and guide risk-based response decisions Conduct and oversee technical investigations, including malware, phishing, web application attacks, cloud account compromise, and insider threats.
Own and continuously improve CSIRT processes, playbooks, and operating procedures in line with industry frameworks Drive SOAR automation by designing and optimizing response playbooks to reduce MTTD/MTTR and analyst effort Identify and implement automation opportunities across alert enrichment, evidence collection, containment, and reporting Support and mentor SOC and IR team members during investigations and active incidents Contribute to threat hunting activities and improve detection logic based on incident learnings and MITRE ATT&CK Ensure accurate incident documentation, timelines, and post-incident reports with actionable recommendations Provide clear and timely incident updates to the CSIRT Manager and senior stakeholders Collaborate with Security Engineering, IT, Legal, and Compliance teams during incident response Support coordination with external incident response partners and law enforcement when required Job Designation Hybrid: Employee divides their time between in-office and remote work.
Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job.
Preferred job designations are not guaranteed when changing positions within Docusign.
Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.
What you bring Basic 12+ years of progressive experience in cybersecurity, with deep specialization in Incident Response, Digital Forensics, and Security Operations Proven experience leading response to enterprise-scale, high-impact security incidents, including cloud and hybrid environments Expert-level understanding of incident response frameworks (NIST 800-61, SANS IR, MITRE ATT&CK) and forensic investigation methodologies Extensive hands-on experience with SIEM platforms (Splunk, QRadar, Sentinel) for advanced correlation and investigation Deep experience with EDR/XDR platforms and advanced endpoint investigations Hands-on experience with enterprise forensic and DFIR tools such as En Case, FTK, Velociraptor, Volatility and cloud-native forensic tooling Advanced scripting and automation skills using Python, PowerShell, and/or Bash Strong knowledge of malware analysis techniques, persistence mechanisms, and attacker tradecraft Deep understanding of MITRE ATT&CK, threat actor behaviors, and kill chain mapping
Experience: addressing AI-enabled threats, automation abuse, and emerging attack surfaces Preferred Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field Advanced industry certifications such as GCFA, GCED, GCIH, GCIA, CISSP, or CISM
Experience: designing or maturing enterprise IR and DFIR programs Hands-on experience with SOAR platforms and large-scale automation initiatives Strong cloud security background, including IAM, container security, and SaaS platforms
Experience: working with legal, privacy, and compliance teams on breach notification and regulatory response Exceptional communication skills with experience presenting to executive leadership Demonstrated ability to mentor senior and junior security staff and influence across teams Ability to make risk-based decisions under pressure and guide stakeholders during active incidents Life at Docusign Working here Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work.
You can count on us to listen, be honest, and try our best to do what’s right, every day.
At Docusign, everything is equal.
We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life.
Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it.
And for that, you’ll be loved by us, our customers, and the world in which we live.
Accommodation Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures.
If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com.
If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.
Applicant and Candidate Privacy Notice:
We are looking for highly motivated and skilled CSIRT Incident Responder to join our dynamic security team in India.
Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function.
You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities.
This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity.
This position is an individual contributor role reporting to the Manager of CSIRT India.
Responsibility Serve as the lead technical authority for enterprise-wide incident response and digital forensics, handling high-severity, complex, and multi-vector security incidents Lead end-to-end incident response, from initial detection and triage through containment, eradication, recovery, and post-incident analysis Perform and oversee advanced investigations leveraging SIEM, SOAR, EDR/XDR, NDR, and cloud-native security platforms Correlate telemetry across endpoints, networks, SaaS, and cloud infrastructure to identify attacker activity, lateral movement, persistence mechanisms, and data exfiltration Conduct deep forensic investigations across:Disk and file systems, Memory (RAM), Cloud environments (AWS, Azure, GCP) Perform initial triage and deep analysis of alerts from SIEM, SOAR, EDR/XDR, and cloud security tools Correlate events across endpoint, network, SaaS, and cloud log sources to identify and validate security incidents Determine incident scope, severity, root cause, and business impact and guide risk-based response decisions Conduct and oversee technical investigations, including malware, phishing, web application attacks, cloud account compromise, and insider threats.
Own and continuously improve CSIRT processes, playbooks, and operating procedures in line with industry frameworks Drive SOAR automation by designing and optimizing response playbooks to reduce MTTD/MTTR and analyst effort Identify and implement automation opportunities across alert enrichment, evidence collection, containment, and reporting Support and mentor SOC and IR team members during investigations and active incidents Contribute to threat hunting activities and improve detection logic based on incident learnings and MITRE ATT&CK Ensure accurate incident documentation, timelines, and post-incident reports with actionable recommendations Provide clear and timely incident updates to the CSIRT Manager and senior stakeholders Collaborate with Security Engineering, IT, Legal, and Compliance teams during incident response Support coordination with external incident response partners and law enforcement when required
Basic 12+ years of progressive experience in cybersecurity, with deep specialization in Incident Response, Digital Forensics, and Security Operations Proven experience leading response to enterprise-scale, high-impact security incidents, including cloud and hybrid environments Expert-level understanding of incident response frameworks (NIST 800-61, SANS IR, MITRE ATT&CK) and forensic investigation methodologies Extensive hands-on experience with SIEM platforms (Splunk, QRadar, Sentinel) for advanced correlation and investigation Deep experience with EDR/XDR platforms and advanced endpoint investigations Hands-on experience with enterprise forensic and DFIR tools such as En Case, FTK, Velociraptor, Volatility and cloud-native forensic tooling Advanced scripting and automation skills using Python, PowerShell, and/or Bash Strong knowledge of malware analysis techniques, persistence mechanisms, and attacker tradecraft Deep understanding of MITRE ATT&CK, threat actor behaviors, and kill chain mapping
Experience: addressing AI-enabled threats, automation abuse, and emerging attack surfaces Preferred Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field Advanced industry certifications such as GCFA, GCED, GCIH, GCIA, CISSP, or CISM
Experience: designing or maturing enterprise IR and DFIR programs Hands-on experience with SOAR platforms and large-scale automation initiatives Strong cloud security background, including IAM, container security, and SaaS platforms
Experience: working with legal, privacy, and compliance teams on breach notification and regulatory response Exceptional communication skills with experience presenting to executive leadership Demonstrated ability to mentor senior and junior security staff and influence across teams Ability to make risk-based decisions under pressure and guide stakeholders during active incidents
Total Views
0
Apply Clicks
0
Mock Applicants
0
Scraps
0
Similar Jobs

Transformation Lead, Employee Experience
F5 Networks · Field-TX

ASIC Lead - Proto
Block (Square) · Bay Area, CA, United States of America

Post-Silicon Lead - Remote
Block (Square) · Bay Area, CA, United States of America

Market Access Lead
Biogen · Tokyo, Japan

Behavioral Insights Lead - Bitcoin
Block (Square) · Bay Area, CA, United States of America
About DocuSign
Reviews
3.8
42 reviews
Work Life Balance
3.6
Compensation
3.9
Culture
4.0
Career
3.9
Management
3.4
77%
Recommend to a Friend
Pros
Opportunity for career growth
Interesting projects and challenges
Competitive compensation and benefits
Cons
Some organizational bureaucracy
Career progression could be clearer
Room for improvement in processes
Salary Ranges
21 data points
Senior/L5
Senior/L5 · Lead Data Analyst
3 reports
$249,180
total / year
Base
$216,600
Stock
-
Bonus
-
$249,180
$249,180
Interview Experience
4 interviews
Difficulty
3.0
/ 5
Duration
14-28 weeks
Offer Rate
50%
Experience
Positive 50%
Neutral 25%
Negative 25%
Interview Process
1
Application Review
2
Recruiter Screen
3
Technical Assessment
4
Technical Interview Rounds
5
Onsite/Virtual Interviews
6
Background Check
Common Questions
Coding/Algorithm
Technical Knowledge
Behavioral/STAR
Past Experience
News & Buzz
Docusign stock hits 52-week low at 54.15 USD By Investing.com - Investing.com Australia
Source: Investing.com Australia
News
·
5w ago
Here is Why DocuSign (DOCU) Appears Attractive - Finviz
Source: Finviz
News
·
5w ago
Here is Why DocuSign (DOCU) Appears Attractive - Insider Monkey
Source: Insider Monkey
News
·
5w ago
Docusign (NASDAQ:DOCU) Hits New 52-Week Low - What's Next? - MarketBeat
Source: MarketBeat
News
·
5w ago
