CrawlJobs Logo

Incident Responder

wiz.io Logo

Wiz

Location Icon

Location:
Israel , Tel Aviv

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Wiz is looking for an experienced Incident Responder to join our newly established team and spread the power of Wiz! Come join the company that is reinventing cloud security and empowering businesses to thrive in the cloud. As the fastest-growing startup ever, Wiz is on a mission to help organizations secure cloud environments that will accelerate their businesses.

Job Responsibility:

  • Investigate real-world cyber-attacks on customers’ cloud environments and cloud workloads, understanding their root causes and the full scope of compromise, leveraging the Wiz platform
  • Perform proactive threat hunting to identify undetected cyber-attacks and cloud threats within customer environments
  • Collaborate with customer teams during engagements to effectively respond to threats
  • Develop and deliver professional engagement reports, including high-level summaries and deep dives into technical findings
  • Develop and document incident response methodologies, best practices, and standard operating procedures tailored to cloud environments and cloud workloads
  • Collaborate with the threat research and engineering groups to refine and enhance incident response detections, tools, and features, based on real-world investigation experiences

Requirements:

  • 5+ years of experience in cyber-security, cyber-incident response, and threat hunting
  • Solid foundation in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure)
  • In-depth knowledge of OS internals for both Windows and Linux
  • Strong analytical skills with a keen attention to detail
  • Experience with scripting languages and querying languages
  • Excellent communication skills, both verbal and written, in Hebrew and English
  • Passion to solve any problem and to thrive as an independent and innovative Incident Responder
  • Applicants must have the legal right to work in the country where the position is based, without the need for visa sponsorship

Additional Information:

Job Posted:
December 13, 2025

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Incident Responder

Security Incident Responder

Snowbit is looking for an experienced Security Incident Responder to join our Ma...
Location
Location
India , Gurugram
Salary
Salary:
Not provided
coralogix.com Logo
Coralogix
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3-5 years in incident response, threat hunting with strong experience in cloud security (AWS, Azure, GCP) and Kubernetes environments
  • Proven Incident response experience in complex environments
  • Demonstrates strong expertise in understanding adversary tactics and techniques, translating them into actionable investigation tasks, conducting in-depth analysis, and accurately assessing the impact
  • Familiarity with attack vectors, malware families, and campaigns
  • Deep understanding of network architecture, protocols, and operating system internals (Windows, Linux, Unix)
  • Expertise in Kubernetes security, including container orchestration, workload isolation, and cluster hardening
  • Experience securing Kubernetes infrastructure, runtime security, and security monitoring
  • Ability to work independently and collaboratively in dynamic, fast-paced environments
  • Excellent written and verbal communication skills to interact with technical and non-technical stakeholders
Job Responsibility
Job Responsibility
  • Leverage Snowbit’s advanced MDR platform to lead large-scale incident response investigations and proactive threat-hunting initiatives
  • Conduct log analysis, and cloud artifact reviews using EDR and similar tools depending on availability, to support incident resolution and root-cause investigations
  • Investigate and respond to security incidents in containerized environments, with a specific focus on Kubernetes security and architecture
  • Research evolving cyberattack tactics, techniques, and procedures (TTPs) to strengthen customer defenses and codify insights for our services
  • Provide technical and executive briefings to customers, including recommendations to mitigate risk and enhance cybersecurity posture
  • Collaborate with internal teams, including engineering and research, to enhance Snowbit’s MDR and incident response capabilities
  • Partner with customer teams (IT, DevOps, and Security) to ensure seamless integration and adoption of Snowbit’s MDR services
  • Share expertise through presentations, research publications, and participation in the global cybersecurity community
  • Fulltime
Read More
Arrow Right

Security Operation Engineer

The Security Operation Engineer is responsible for ensuring the security and int...
Location
Location
Malaysia , Kuala Lumpur
Salary
Salary:
Not provided
https://www.allianz.com Logo
Allianz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, information technology, cybersecurity, or a related field
  • Proven experience in information security, network security, or a related role
  • Strong understanding of security principles, practices, and technologies
  • Experience with security monitoring and incident response tools and technologies
  • Proficiency in scripting or programming languages (e.g., Python, PowerShell) for automation tasks
  • Familiarity with cloud security and security frameworks (e.g., NIST, ISO 27001)
  • Strong analytical and problem-solving skills
  • Excellent communication and interpersonal skills
  • Ability to work independently and as part of a team
  • Certifications in security or related areas (e.g., Certified Information Systems Security Professional - CISSP, Certified Ethical Hacker - CEH) are a plus
Job Responsibility
Job Responsibility
  • Monitor security systems and alerts to detect and respond to potential security incidents and threats
  • Investigate and respond to security incidents, conducting root cause analysis and implementing corrective actions
  • Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses
  • Deploy, configure, and maintain security tools and technologies, such as firewalls, intrusion detection/prevention systems, endpoint security, and SIEM solutions
  • Assist in the development and enforcement of security policies, procedures, and standards to ensure compliance with industry regulations and best practices
  • Maintain accurate documentation of security incidents, processes, and configurations
  • Work closely with IT, network, and application teams to ensure security is integrated into all aspects of the organization's technology environment
  • Stay up-to-date with emerging security threats and trends, and recommend enhancements to improve the organization's security posture
  • Completing projects on various issues when needed.
What we offer
What we offer
  • Diverse and inclusive workforce
  • Equal opportunity employer
  • Support for employees and their ambitions.
  • Fulltime
Read More
Arrow Right

Security Operation Engineer

The Security Operation Engineer is responsible for ensuring the security and int...
Location
Location
Malaysia , Kuala Lumpur
Salary
Salary:
Not provided
https://www.allianz.com Logo
Allianz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, information technology, cybersecurity, or a related field
  • Proven experience in information security, network security, or a related role
  • Strong understanding of security principles, practices, and technologies
  • Experience with security monitoring and incident response tools and technologies
  • Proficiency in scripting or programming languages (e.g., Python, PowerShell) for automation tasks
  • Familiarity with cloud security and security frameworks (e.g., NIST, ISO 27001)
  • Strong analytical and problem-solving skills
  • Excellent communication and interpersonal skills
  • Ability to work independently and as part of a team
  • Certifications in security or related areas (e.g., Certified Information Systems Security Professional - CISSP, Certified Ethical Hacker - CEH) are a plus
Job Responsibility
Job Responsibility
  • Monitor security systems and alerts to detect and respond to potential security incidents and threats
  • Investigate and respond to security incidents, conducting root cause analysis and implementing corrective actions
  • Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses
  • Deploy, configure, and maintain security tools and technologies, such as firewalls, intrusion detection/prevention systems, endpoint security and SIEM solutions
  • Assist in the development and enforcement of security policies, procedures, and standards to ensure compliance with industry regulations and best practices
  • Maintain accurate documentation of security incidents, processes, and configurations
  • Work closely with IT, network, and application teams to ensure security is integrated into all aspects of the organization's technology environment
  • Stay up-to-date with emerging security threats and trends, and recommend enhancements to improve the organization's security posture
  • Any other duties when deemed necessary
  • Completing projects on various issues when needed
  • Fulltime
Read More
Arrow Right

Security Operation Engineer

The Security Operation Engineer is responsible for ensuring the security and int...
Location
Location
Malaysia , Kuala Lumpur
Salary
Salary:
Not provided
https://www.allianz.com Logo
Allianz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, information technology, cybersecurity, or a related field
  • Proven experience in information security, network security, or a related role
  • Strong understanding of security principles, practices, and technologies
  • Experience with security monitoring and incident response tools and technologies
  • Proficiency in scripting or programming languages (e.g., Python, PowerShell) for automation tasks
  • Familiarity with cloud security and security frameworks (e.g., NIST, ISO 27001)
  • Strong analytical and problem-solving skills
  • Excellent communication and interpersonal skills
  • Ability to work independently and as part of a team
  • Certifications in security or related areas (e.g., Certified Information Systems Security Professional - CISSP, Certified Ethical Hacker - CEH) are a plus
Job Responsibility
Job Responsibility
  • Monitor security systems and alerts to detect and respond to potential security incidents and threats
  • Investigate and respond to security incidents, conducting root cause analysis and implementing corrective actions
  • Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses
  • Deploy, configure, and maintain security tools and technologies, such as firewalls, intrusion detection/prevention systems, endpoint security and SIEM solutions
  • Assist in the development and enforcement of security policies, procedures, and standards to ensure compliance with industry regulations and best practices
  • Maintain accurate documentation of security incidents, processes, and configurations
  • Work closely with IT, network, and application teams to ensure security is integrated into all aspects of the organization's technology environment
  • Stay up-to-date with emerging security threats and trends, and recommend enhancements to improve the organization's security posture
  • Any other duties when deemed necessary
  • Completing projects on various issues when needed
  • Fulltime
Read More
Arrow Right

Splunk Administrator

Sopra Steria seeks a Splunk Administrator to monitor infrastructure, respond to ...
Location
Location
India , Bengaluru
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Monitor Splunk infrastructure, logs & dashboards for anomalies
  • Respond to alerts & incidents as part of business support
  • Perform initial triage, escalate to L3 when required
  • Work on incident resolution within defined SLA’s
  • Document the RCA for major incidents
  • Ensure high availability & reliability of Splunk environments (indexers, SHs, forwarders, etc.)
  • Perform routine health checks & system audits
  • Handle Splunk configuration changes (inputs.conf, outputs.conf, props.conf, etc.)
  • Manage users' access & roles
  • Identifying & resolving performance bottlenecks in indexing & searching
Job Responsibility
Job Responsibility
  • Monitor Splunk infrastructure
  • Respond to alerts & incidents
  • Perform initial triage
  • Work on incident resolution within SLA’s
  • Document RCA for major incidents
  • Ensure high availability of environments
  • Perform health checks & audits
  • Handle configuration changes
  • Manage user access & roles
  • Resolve performance bottlenecks
What we offer
What we offer
  • Inclusive and respectful work environment
  • Open to people with disabilities
  • Fulltime
Read More
Arrow Right

Security Intelligence Analyst

Atlassian is hiring a Security Intelligence Analyst to join its team. The role i...
Location
Location
United States , Austin
Salary
Salary:
128300.00 - 172500.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • 3 years relevant experience working in security using at least one scripting language (i.e. Python, Pearl, Ruby, Bash), writing code to complete security tasks
  • Must pass technical interview.
Job Responsibility
Job Responsibility
  • Build and run new monitoring/analytics systems
  • Watch over corporate environment and Atlassian cloud services, hunting for signs of compromise and implementing high-fidelity alerts
  • Build a new system, develop automation, and solve security problems
  • Respond to incidents, writing code in Python
  • Research attacker tools and tactics
  • Conduct in-depth research on attacker tools and tactics to provide valuable insights to enhance overall security measures
  • Safeguard digital infrastructure by responding to major incidents
  • Ensure confidentiality, integrity, and availability of sensitive information
  • Configure and monitor security controls for JIRA, Confluence, and Bitbucket
  • Analyze security alerts, network traffic, and logs to understand and respond to incidents
What we offer
What we offer
  • Health and wellbeing resources
  • Paid volunteer days
  • Other perks as outlined on go.atlassian.com/perksandbenefits.
  • Fulltime
Read More
Arrow Right

Senior Site Reliability Engineer

Onebrief is collaboration and AI-powered workflow software designed specifically...
Location
Location
United States , Tacoma
Salary
Salary:
180000.00 - 220000.00 USD / Year
onebrief.com Logo
Onebrief
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • An active Secret clearance
  • 5+ years in Platform, DevOps, or Site Reliability Engineering with an infrastructure and operations focus
  • Proven partner to DevOps/Platform and application teams
  • collaborates well across functions and shares context openly
  • A deep understanding of incident response processes, with experience conducting thorough root cause analyses and driving continuous improvement
  • Technical expertise: Infrastructure as Code: Terraform (or CloudFormation), Ansible
  • Containers and orchestration: Kubernetes design, deployment, and operations
  • CI/CD: experience building and maintaining pipelines (GitLab CI/CD, Jenkins, GitHub Actions)
  • Scripting: proficiency with at least one of Python, Go, or Bash
  • Cloud: Familiarity with AWS or AWS GovCloud
Job Responsibility
Job Responsibility
  • Implementing a World-Class Observability Platform: Design, implement, and manage our monitoring, logging, and alerting stack (e.g., Prometheus, Loki, Alloy, and Grafana)
  • Defining and Upholding Reliability: Define, measure, and own alerting that feeds into our Service Level Indicators (SLIs) and Service Level Objectives (SLOs), increasing trust internally and externally
  • Leading Incident Response: Act as the incident responder and potentially incident commander during critical incidents who will lead blameless post-mortems / After Action Reviews (AARs) that identify true root causes and drive automated, long-term solutions to prevent recurrence
  • Automating for Scale and Security: Partner with platform engineers to design, build, and manage secure, resilient Kubernetes clusters and cloud/on-prem environments using Infrastructure-as-Code (Terraform, Ansible)
  • Eliminating Toil and Scaling the Team: Proactively identify and eliminate operational toil by building automation
What we offer
What we offer
  • Equity: Share in the company's success
  • Flexible Work Environment: Remote-first organization* with flexible work hours and unlimited PTO
  • Comprehensive Health Coverage: Health, dental, vision, and life insurance
  • Retirement Plan: 401(k) plan with company match to secure your future
  • Parental Leave: 8 weeks at 100% regardless of state
  • Company Retreats: Annual company summit trips
  • Home Office Budget: $1,000 per year for home office improvements
  • Relocation assistance
  • Fulltime
Read More
Arrow Right

Senior Site Reliability Engineer

Onebrief is collaboration and AI-powered workflow software designed specifically...
Location
Location
United States , Honolulu, Oahu
Salary
Salary:
180000.00 - 220000.00 USD / Year
onebrief.com Logo
Onebrief
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active Top Secret clearance
  • 5+ years in Platform, DevOps, or Site Reliability Engineering with an infrastructure and operations focus
  • Proven partner to DevOps/Platform and application teams
  • collaborates well across functions and shares context openly
  • A deep understanding of incident response processes, with experience conducting thorough root cause analyses and driving continuous improvement
  • Infrastructure as Code: Terraform (or CloudFormation), Ansible
  • Containers and orchestration: Kubernetes design, deployment, and operations
  • CI/CD: experience building and maintaining pipelines (GitLab CI/CD, Jenkins, GitHub Actions)
  • Scripting: proficiency with at least one of Python, Go, or Bash
  • Cloud: Familiarity with AWS or AWS GovCloud
Job Responsibility
Job Responsibility
  • Implementing a World-Class Observability Platform: Design, implement, and manage our monitoring, logging, and alerting stack (e.g., Prometheus, Loki, Alloy, and Grafana)
  • Defining and Upholding Reliability: Define, measure, and own alerting that feeds into our Service Level Indicators (SLIs) and Service Level Objectives (SLOs), increasing trust internally and externally
  • Leading Incident Response: Act as the incident responder and potentially incident commander during critical incidents who will lead blameless post-mortems / After Action Reviews (AARs)
  • Automating for Scale and Security: Partner with platform engineers to design, build, and manage secure, resilient Kubernetes clusters and cloud/on-prem environments using Infrastructure-as-Code (Terraform, Ansible)
  • Eliminating Toil and Scaling the Team: Proactively identify and eliminate operational toil by building automation
What we offer
What we offer
  • Equity: Share in the company's success
  • Flexible Work Environment: Remote-first organization* with flexible work hours and unlimited PTO
  • Comprehensive Health Coverage: Health, dental, vision, and life insurance
  • Retirement Plan: 401(k) plan with company match to secure your future
  • Parental Leave: 8 weeks at 100% regardless of state
  • Company Retreats: Annual company summit trips
  • Home Office Budget: $1,000 per year for home office improvements
  • Relocation assistance
  • Fulltime
Read More
Arrow Right