Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Cisco Security Incident Commander Threat Management Response 
Japan, Minato 
725599406

18.11.2024

At Cisco Meraki, you'll be part of a close-knit, collaborative engineering team, working with passionate and talented individuals. In this role, you’ll have a significant influence on the tools we use to monitor and audit our systems, as well as on how and where we deploy them. You’ll play a key role in coordinating security incident responses and driving improvements across our entire technology stack, from the user interface to backend systems and device firmware. By collaborating with security teams, you'll help develop business-friendly security processes and improvements.

About the Role:

We are looking for individuals who are passionate about incident response, strategy development, and improving our incident response procedures and playbooks. You’ll be involved in revising processes and leading proactive efforts to drive how we respond to security incidents.

Work Schedule:

This position may require on-call work (including nights and weekends) as needed. Core hours are 9:30 AM PST – 6:30 PM (in your hired time zone), Monday through Friday.

Key Responsibilities:

  • Serve on a rotation of security incident commanders, coordinating with major product teams to ensure quick mobilization for high-severity incidents.
  • Lead and coordinate security incident response activities and investigations.
  • Respond to escalations from junior incident responders during your on-call shifts.
  • Write custom queries for Security Incident and Event Monitoring (SIEM) tools and SQL for data warehouse searches.
  • Lead post-incident reviews and develop initiatives to improve our response strategies.
  • Mentor and support other team members, promoting security best practices across Meraki.

Who You Are:

  • You have broad knowledge and experience across multiple information security domains.
  • You are skilled in cybersecurity incident response and have a calm, methodical approach under pressure.
  • You have a strong understanding of threat actor tactics, techniques, and procedures (TTPs).
  • You thrive in complex environments and can lead cross-functional teams during high-severity incidents.
  • You are experienced in using threat intelligence to proactively identify risks and suspicious behavior.
  • You have familiarity with incident response frameworks like NIST IR or similar.
  • You can clearly communicate technical details to non-technical stakeholders.
  • You are passionate about mentoring others and contributing to a positive team culture.

Qualifications:

  • 6+ years of experience in cybersecurity incident response, with a focus on leading complex incidents.
  • Experience with SIEM, EDR, vulnerability scanners, and other security tools.
  • Familiarity with major cloud platforms (AWS, Azure, GCP) and operating systems (Windows/Mac/Linux).
  • Strong understanding of core cybersecurity concepts, such as encryption, vulnerability management, and access control technologies (Active Directory, Okta, etc.).
  • Knowledge of security compliance frameworks (PCI, SOC 2, FedRAMP).

Bonus Points for:

  • Security certifications (CISSP, SANS GIAC, AWS).
  • Experience in digital forensics, threat intelligence, or cloud security.
  • Familiarity with frameworks like MITRE ATT&CK or D3FEND.

What We Offer:

  • Competitive salary and benefits, including health insurance, retirement plans, and paid time off.
  • Learning and development opportunities, including mentorship and industry certifications.
  • A diverse, inclusive work environment that values everyone’s contributions.
  • The opportunity to make a meaningful impact on millions of users worldwide.