CrawlJobs Logo

Business Incident Response Specialist

meta.com Logo

Meta

Location Icon

Location:
Singapore , Singapore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Business Incident Response (BIR) team is a specialized group that provides rapid and holistic resolution of critical escalations that threaten businesses' and partners' brands, relationships, and revenue streams. The team offers dedicated support to advertisers globally who experience friction on our platforms. By leveraging cross-functional partnerships, the BIR team delivers an immediate and personalized experience for constituents and stakeholders during times of crisis. The team operates off-process and overrides barriers to ensure swift issue resolution, prioritizing resources dynamically to assume ownership over mission-critical incidents. The escalations handled by the BIR team are complex and require experience in areas such as operations, policy, process, and project management. The team comprises best-in-class specialists who leverage their skills to deliver outsized impact.

Job Responsibility:

  • Review, investigate and coordinate the end-to-end resolution of executive-level incidents in adherence with the respective process and policy frameworks
  • Communicate effectively with multiple stakeholders, including external clients, internal partners and the leadership group
  • Serve as the primary communication channel on critical escalations
  • Cooperate with a wide group of cross-functional partners across the business, including those outside of your domain expertise, to coordinate the work and develop long-lasting relationships
  • Successfully execute assigned tasks and/or project work, ensuring that goals are met within scope and timelines
  • Join and/or organize group meetings to effectively discuss, and occasionally present, on many business matters including core work, projects, and strategy
  • Perform root-cause analysis and/or draft post-mortem reports to identify areas of opportunity and issue recommendations to the appropriate audience
  • Drive innovation by contributing towards resolving problem statements and proposing improvements to existing processes
  • Attend mandatory training and seek knowledge in areas of interest to the business
  • Be an expert on interpreting and enforcing Meta's policies and use sound judgment, specific knowledge, signals and insights to drive scalable solutions to support Meta and our users
  • Adopt best practices in order to achieve individual and collective goals

Requirements:

  • 5+ years of experience working in large-scale operations, domains such as online operations, escalations, informational systems, compliance, risk management, policy, legal operations, management consulting or related fields
  • Demonstrated understanding of how the broader social media landscape operates in the industry
  • Demonstrated experience thinking strategically about complex issues leading to thoughtful recommendations, and making quality decisions when dealing with ambiguous situations
  • Demonstrated experience navigating ambiguous situations
  • Experienced working within fast-paced environments, handling multiple workstreams and maintaining effective communication with all stakeholders, both internal and external

Nice to have:

  • Experience with analytical tools (i.e. Excel, SQL, Tableau) and influencing others leveraging data and analysis
  • Familiarity with Meta's suite of products
  • Proficiency in another language spoken in Asia Pacific (business fluent)
  • Experience working directly with global, cross-functional teams to solve issues and develop solutions
  • Understanding of the power of social media for businesses and the issues that are inherent to it
  • Degree in Science, Technology, Engineering, and Mathematics (S.T.E.M)

Additional Information:

Job Posted:
February 19, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Business Incident Response Specialist

Security Specialist

The Security Specialist is a technical position within the organization. This po...
Location
Location
United States , Columbia
Salary
Salary:
Not provided
dpsolutions.com Logo
Data Processing Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, cybersecurity, or related field
  • Skills to diagnose and effectively troubleshoot technical issues
  • Must be available 24/7/365 to respond to security incidents without prior notice, and remain engaged until full remediation is achieved
  • In-depth knowledge of security concepts, protocols, policies, and best practices.
  • REQUIRED: CompTIA Network+ certification, or equivalent (six-month grace period)
  • REQUIRED: CompTIA Security+ certification, or equivalent (six-month grace period)
  • Understanding of Microsoft 365 platform and experience with security configurations in Microsoft 365
  • Continued commitment to technology growth and development
  • Self-motivated with the ability to multi-task and adapt quickly to change
  • Ability to work in a team and communicate effectively
Job Responsibility
Job Responsibility
  • Provide advance level troubleshooting and escalation support for services requests
  • Participate in pre-sales engagements as subject-matter expert to identify and plan for security-related solutions
  • Initiate Security Incident Response for client and internal security compromises
  • Monitor security solutions and remediate issues for clients. Tools include, but are not limited to Arctic Wolf, SentinelOne, Liongard, Auvik, KnowBe4, etc.
  • Participate in implementation of security offerings to clients
  • Document internal processes and procedures related to duties and responsibilities
  • System documentation and consulting services to include system reviews and recommendations
  • Provide escalation on off business hours, or may be requested to assist with weekend coverage
  • Enhance security in current systems by implementing and maintaining security controls
  • Assist with management and implementation of phishing and security awareness training
What we offer
What we offer
  • Competitive salary based on experience and qualifications.
  • Excellent benefits.
  • Fun working environment and culture.
  • Opportunity for advancement.
Read More
Arrow Right

Sr Specialist IT Security

The Senior Specialist, SOC conducts essential cyber security incident handling a...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
kennametal.com Logo
Kennametal
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • B.S in information assurance (or related field) with minimum of 3 years’ experience
  • Minimum 1 years’ experience on a computer security incident response team or in an incident response role
  • Practical experience with identifying, analyzing, and communicating cyber threat and vulnerability information
  • Exemplary verbal and written communication skills (English business fluent spoken and written)
  • Demonstrated ability to think strategically and perform detailed, complex analysis and data interpretation
  • Effective interpersonal skills, out-of-the-box thinking and ability to interface with all levels of staff
  • Ability to work under pressure and deal with ambiguous situations.
Job Responsibility
Job Responsibility
  • Serve as a technical resource for cyber security incident handling
  • Provide qualified guidance on and coordinate execution of identification, analysis, response and monitoring of cyber threat and vulnerabilities
  • Monitor and consult on technical vulnerability remediation
  • Manage Security incidents. Assist in developing concepts for efficient and effective security response activities.
  • Be a trusted point of contact and expertise for incidents and manage all the incident response activities including escalation to upper management.
  • Analyze and interpret results of vulnerability management activities using standard frameworks (CVSS)
  • Research and investigate new and emerging vulnerabilities, to include 0Day events
  • Identify and resolve false positive findings in assessment results
  • Assess compensating controls and validate their effectiveness
  • Integrate information from disparate sources and create tactical intelligence that is relevant to protecting the business.
Read More
Arrow Right

Director of Physical Security & Compliance

Crusoe is expanding our hyper-scale AI and high-performance computing (HPC) data...
Location
Location
United States , San Francisco
Salary
Salary:
225000.00 - 280000.00 USD / Year
crusoe.ai Logo
Crusoe
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years in physical security or mission-critical infrastructure
  • Deep knowledge of operating physical security technologies and system design
  • Experience with in a high-availability environment
  • Experience implementing controls for SOC 2, ISO, NIST, and similar frameworks
  • Proven ability to manage multi-site security operations and compliance programs
  • Strong incident management and risk assessment background
  • Experience designing or scaling enterprise security systems across multi-site environments
  • Strong understanding of SOC 2, ISO 27001, NIST, and related frameworks
  • Background managing guard operations, access control, and incident response
  • Ability to lead programs from zero-to-one and influence senior stakeholders
Job Responsibility
Job Responsibility
  • Operationalize the global physical security strategy, and ensure data center alignment with enterprise security standards, and policies
  • Implement the security risk framework within Data Center Facility Operations
  • Translate enterprise security requirements into site-specific designs for new campuses
  • Conduct site-level security risk and threat assessments
  • Establish a scalable security operations model for 50–400 MW hyper-scale facilities
  • Own the operational lifecycle of dedicated physical security systems (ACS, VSS, IDS)
  • Execute site-level operational controls to ensure adherence to compliance programs for SOC 2, ISO 27001/27002, NIST 800-53, and other regulations
  • Maintain operational documentation, logs, and evidence of adherence to established internal controls
  • Maintain year-round audit readiness for physical access to cages, racks, and on-site office rooms
  • Ensure operational availability, resiliency, and scalability of security infrastructure
What we offer
What we offer
  • Restricted Stock Units in a fast growing, well-funded technology company
  • Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
  • Employer contributions to HSA accounts
  • Paid Parental Leave
  • Paid life insurance, short-term and long-term disability
  • Teladoc
  • 401(k) with a 100% match up to 4% of salary
  • Generous paid time off and holiday schedule
  • Cell phone reimbursement
  • Tuition reimbursement
  • Fulltime
Read More
Arrow Right

Security Operations Specialist

We're seeking a Security Operations Specialist (SaaS & Identity Focus) to join o...
Location
Location
United States , New York
Salary
Salary:
100000.00 - 130000.00 USD / Year
fluentco.com Logo
Fluent, Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in security operations, incident response, or related security role
  • Hands-on experience with Crowdstrike, Okta, Entra ID (Azure AD), and Wiz
  • Demonstrated experience supporting SOC2 audits and compliance programs
  • Familiarity with additional security and compliance frameworks (ISO 27001, NIST, PCI-DSS, HIPAA, etc.)
  • Strong understanding of security incident detection, analysis, and response methodologies
  • Experience working with SIEM platforms and security monitoring tools
  • Experience with scripting or automation tools (Python, PowerShell, n8n, Git, Jenkins, etc.)
  • Proven ability to communicate effectively with both technical teams and end users
  • Customer service mindset with the ability to balance security requirements with user needs
Job Responsibility
Job Responsibility
  • Monitor, investigate, and respond to security incidents and alerts in real-time
  • Manage and optimize security tools including Crowdstrike and Wiz
  • Conduct threat hunting and proactive security analysis to identify potential vulnerabilities
  • Develop and maintain security incident response playbooks and documentation
  • Perform log analysis and correlation to identify security events and anomalies
  • Support SOC2 audit preparation and maintain ongoing compliance requirements
  • Assist with other security and compliance certification standards and frameworks
  • Implement and enforce security policies, procedures, and controls
  • Conduct security assessments and risk evaluations
  • Maintain evidence collection and documentation for audit purposes
What we offer
What we offer
  • Competitive compensation
  • Ample career and professional growth opportunities
  • New Headquarters with an open floor plan to drive collaboration
  • Health, dental, and vision insurance
  • Pre-tax savings plans and transit/parking programs
  • 401K with competitive employer match
  • Volunteer and philanthropic activities throughout the year
  • Educational and social events
  • Fully stocked kitchen
  • Catered lunch
  • Fulltime
Read More
Arrow Right

Senior Specialist, Security Operations and OT Cybersecurity

This position will lead regional security operations and help expand and mature ...
Location
Location
United States , Princeton
Salary
Salary:
120000.00 - 140000.00 USD / Year
rennerbrown.com Logo
Renner Brown
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection
  • Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors
  • Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments
  • Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings
  • Strong analytical and communication skills, with the ability to work effectively across technical and business teams
  • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains
  • Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms
  • Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF
  • Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows
  • Experience collaborating on vulnerability management and remediation across IT and OT environments
Job Responsibility
Job Responsibility
  • Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments
  • Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness
  • Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments
  • Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes
  • Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration
  • Support remediation and post-incident activities to strengthen resilience across technology domains
  • Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices
  • Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards
What we offer
What we offer
  • annual performance bonus and comprehensive benefits package
  • Fulltime
Read More
Arrow Right

Senior Specialist, Security Operations and OT Cybersecurity

This position will lead regional security operations and help expand and mature ...
Location
Location
United States , Princeton
Salary
Salary:
120000.00 - 140000.00 USD / Year
rennerbrown.com Logo
Renner Brown
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection
  • Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors
  • Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments
  • Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings
  • Strong analytical and communication skills, with the ability to work effectively across technical and business teams
  • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains
  • Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms
  • Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF
  • Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows
  • Experience collaborating on vulnerability management and remediation across IT and OT environments
Job Responsibility
Job Responsibility
  • Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments
  • Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness
  • Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments
  • Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes
  • Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration
  • Support remediation and post-incident activities to strengthen resilience across technology domains
  • Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices
  • Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards
What we offer
What we offer
  • annual performance bonus
  • comprehensive benefits package
  • Fulltime
Read More
Arrow Right

Security Engineer

As a SOC Engineer at NTT DATA, you will play a crucial role in defending clients...
Location
Location
United Kingdom , Birmingham
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven hands-on experience with SIEM platforms such as Splunk, QRadar, Sentinel, Microsoft Defender, or Chronicle
  • Expertise with SIEM query languages (e.g., KQL, SPL, AQL) and strong knowledge of log normalization and parsing
  • Proficiency in scripting (e.g., Python, PowerShell) to automate tasks and build SOC efficiencies
  • Deep familiarity with cyber threat detection techniques related to frameworks like MITRE ATT&CK and vulnerability management
  • Experience managing ITIL processes, including Incident, Problem, and Change Management
  • CISSP, GIAC, SC-200, Splunk Power User/Admin, QRadar Specialist, or Chronicle Security Engineer certifications preferred
  • Candidates must be eligible to obtain UK SC clearance
  • Strong analytical and communication skills to present complex information to technical and non-technical stakeholders
  • Experienced in collaborative team dynamics and independent problem-solving
  • Proven ability to transfer knowledge and mentor junior SOC team members effectively
Job Responsibility
Job Responsibility
  • Deploy, configure, and maintain SIEM platforms such as Splunk, QRadar, Sentinel, and Chronicle to enable robust threat detection
  • Normalize and onboard diverse log sources from cloud and on-premises environments for seamless monitoring
  • Develop and continually refine SIEM rules and queries for use cases involving advanced threat behaviors and anomaly detection
  • Design and implement incident response playbooks for threats such as phishing, lateral movement, malware infections, and more
  • Integrate response automation into SOAR platforms (e.g., XSOAR, Azure Logic Apps), reducing response times and manual overhead
  • Use feedback from simulated incidents and threat intelligence to refine existing playbooks and workflows
  • Monitor security alerts for potential threats, investigate incidents, and coordinate cross-team response activities
  • Collaborate with threat intelligence teams to enhance detection logic and fine-tune resolution processes
  • Perform root-cause analysis (RCA) of recurring incidents and help define corrective actions to reduce future risks
  • Perform threat modeling using industry frameworks such as MITRE ATT&CK, STRIDE, or the Cyber Kill Chain
What we offer
What we offer
  • We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing
  • Our Learning and Development team ensure that there are continuous growth and development opportunities for our people
  • We also offer the opportunity to have flexible work options
Read More
Arrow Right

SOC Analyst L3

The primary function of the Tier 3 Analyst is to enhance our security operations...
Location
Location
Belgium , Diegem
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment
  • Hands-on experience with at least two of the following: Splunk, IBM QRadar, Microsoft Defender for Endpoint, Microsoft Sentinel, Google Chronicle
  • Strong knowledge of log formats, parsing, and normalization
  • Experience with KQL, SPL, AQL, or other SIEM query languages
  • Familiarity with scripting (Python, PowerShell) for automation and enrichment
  • Deep understanding of threat detection, incident response, and cyber kill chain
  • Familiarity with MITRE ATT&CK, NIST, and CIS frameworks
  • Strong verbal and written English communication
  • Strong interpersonal and presentation skills
  • Strong analytical skills
Job Responsibility
Job Responsibility
  • Deploy, configure, and maintain SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle)
  • Onboard and normalize log sources across cloud and on-prem environments
  • Develop and optimize analytical rules for threat detection, anomaly detection, and behavioural analysis
  • Design and implement incident response playbooks for various threat scenarios (e.g., phishing, lateral movement, data exfiltration)
  • Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to automate triage and response
  • Continuously refine playbooks based on threat intelligence and incident feedback
  • Monitor and analyse security alerts and events to identify potential threats
  • Perform in-depth investigations and coordinate incident response activities
  • Collaborate with threat intelligence teams to enrich detection logic
  • Conduct threat modelling exercises using frameworks like MITRE ATT&CK, STRIDE, or Kill Chain
  • Fulltime
Read More
Arrow Right