Enable job alerts via email!

Senior Security Incident Commander - (Threat Management) (Remote)

Meraki, LLC

Canada

Remote

CAD 100,000 - 125,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking company as a Cybersecurity Incident Response leader. This role involves 24/7 monitoring and rapid incident response to protect millions of users worldwide. You will collaborate with diverse teams to tackle high-severity incidents and enhance security strategies. If you are passionate about cybersecurity and eager to make a significant impact, this is your chance to thrive in a dynamic environment that values innovation and collaboration.

Qualifications

  • 6+ years in Cybersecurity Incident Response with a focus on leading incidents.
  • Familiarity with security compliance frameworks like PCI and SOC 2.

Responsibilities

  • Monitor and respond to security incidents 24/7 for Cisco Meraki environments.
  • Lead initiatives to improve Incident Response strategies and capabilities.

Skills

Cybersecurity Incident Response
Malware Analysis
Threat Intelligence
File Integrity Monitoring (FIM)
Network Intrusion Detection
Forensics
Incident Command
Networking (LAN/WAN)

Education

Relevant Industry Security Certifications
Bachelor's Degree in Cybersecurity or Related Field

Tools

Wireshark
tcpdump
Palo Alto
SNORT/Sourcefire

Job description

Cisco will observe our annual year-end shutdown from December 24 to January 5. During this period, we will not conduct candidate interviews or respond to job applications. Normal interview processes and application responses will resume after January 6.

Applications are accepted until further notice.

At Cisco Meraki, we know that technology can connect, empower, and drive us. Our mission is to simplify technology so our customers can focus on what's most meaningful to them: their students, patients, customers, and businesses. We’re making networking easier, faster, and intelligent with technology that simply works.

The Threat Management Response team is responsible for 24x7x365 monitoring and rapid incident response for all Cisco Meraki environments. We are the last line of defense to protect the company and our customer's data from threat actors and adversaries. You will have a significant impact on the security of millions of Cisco Meraki users all around the world!

Incidents can happen at any time; thus, this position requires on-call work (including overnight and weekends) on an as-needed basis. The core hours for this position are 9:30 AM PST - 6:30 PM (in the time zone you are hired for), Monday through Friday.

Key responsibilities:
  • Serve on a rotation of security incident commanders, working with heads of every major product team to ensure a quick mobilization for high-severity incidents.
  • Experience responding to high severity incidents and handling the remediation process (e.g., Malware analysis, large scale phishing attacks, production intrusion, etc.).
  • Familiarity with the following tools:
  • File Integrity Monitoring (FIM)
  • Vulnerability Scanners
  • Network and Host Intrusion Detection (IDS) such as SNORT/Sourcefire, Palo Alto, etc.
  • Network sniffers and packet tracing tools such as DSS, Etherereal, tcpdump, Wireshark, etc.
  • Investigate security events for Cisco physical and virtual network devices and platforms.
  • Perform basic forensics when security incidents occur.
  • Develop, document, and lead initiatives to improve Incident Response strategies, runbooks, capabilities, and technologies.
You are an ideal candidate if you:
  • Understand common threat actor tactics, techniques, and procedures (TTPs) and how they are chained together.
  • Have experience leading threat hunts, using available logs and threat intelligence to proactively identify and investigate potential risks and suspicious behavior.
  • Have 6+ years in Cybersecurity Incident Response roles, primarily passionate about leading sophisticated incidents involving multi-functional teams.
  • Understand major security compliance frameworks such as PCI, SOC 2, and FedRAMP as they relate to incident monitoring and response.
  • Hold relevant industry security certifications such as CISSP, SANS GIAC (e.g., GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc.
  • Familiarity with other security verticals such as Digital Forensics, Threat Intelligence, Threat Detection, Application Security, Cloud Security, Offensive Security.
  • Have networking experience with LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP, and NSRP) routing protocols and technologies.
  • Possess experience with IoT platforms, large-scale distributed systems, and/or client-server architectures.

At Cisco Meraki, we’re challenging the status quo with the power of diversity, inclusion, and collaboration. When we connect different perspectives, we can imagine new possibilities, encourage innovation, and release the full potential of our people.

Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis.

Apply for this job

First Name *

Last Name *

Email *

Phone *

Resume/CV *

LinkedIn Profile

Race/Ethnicity *

Disability Status *

Are you now legally authorized to work in the posted primary location for this requisition? *

Will you require sponsorship in the future for this location (for example, if you are on a temporary visa)? *

How did you hear about Meraki? *

Voluntary Demographic Information for EEO Purposes. Why do we ask these questions? Learn More

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.