CrawlJobs Logo

Principal Incident Response Analyst

https://www.atlassian.com Logo

Atlassian

Location Icon

Location:
United States , San Francisco

Category Icon

Job Type Icon

Contract Type:
Employment contract

Salary Icon

Salary:

183800.00 - 295200.00 USD / Year

Job Description:

At Atlassian, the Principal Incident Response Analyst plays a vital role in maintaining the security and integrity of our data and networks. This role involves developing and implementing incident response tools, systems, and playbooks, managing information security incidents, and delivering projects that advance the company's information security posture. The ideal candidate has an expansive background in information security, strong problem-solving abilities, and excellent communication skills.

Job Responsibility:

  • Lead the region's incident response team to ensure timely and effective response to security incidents
  • Coordinate across various teams within Atlassian during a security incident to facilitate effective communication and response
  • Coach and mentor team members in day-to-day activities
  • Build tools, systems, and programs of work to uplift Atlassian's security posture
  • Create regular training and drills for the incident response team to ensure readiness in the event of a security incident
  • Conduct post-incident analysis to identify areas for improvement in the incident response process
  • Communicate effectively with management and other stakeholders about the status of security incidents and the steps being taken to resolve them
  • Work with other security teams within Atlassian to develop strategies and plans to prevent future security incidents
  • Produce threat intelligence that is specific to Atlassian products and infrastructure
  • Own and manage the delivery of projects that advance the team's incident response capabilities
  • Stay up-to-date with the latest security trends, threats and technologies to ensure Atlassian is prepared to respond to any type of security incident

Requirements:

  • Bachelor's degree in Computer Science, Information Security, or a related field
  • At least 5 years of experience in a security incident response role
  • Strong understanding of various security technologies and systems, including firewalls, intrusion detection systems, anti-virus software, and authentication systems
  • Experience building and maintaining tools to assist with incident response and other security tasks
  • Ability to write basic programs in a scripting or programming language
  • Demonstrated ability to coordinate incident response among multiple teams and departments
  • Excellent written and oral communication skills
  • Ability to work under high pressure and fast-paced conditions
  • Experience with cloud technologies including GCP and network protocols
  • Expertise in creating and maintaining incident response playbooks
  • Strong analytical skills and the ability to effectively identify and resolve problems
What we offer:
  • health coverage
  • paid volunteer days
  • wellness resources

Additional Information:

Job Posted:
March 19, 2025

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Principal Incident Response Analyst

Principal Cybersecurity Incident Response Analyst

Principal Cybersecurity Incident Response Analyst role at HPE's Cyber Defense Ce...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 8+ years of relevant experience
  • SOC team/Incident response/Advanced threat analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Extensive understanding of adversary tactics, techniques, and procedures (TTPs)
  • Extensive Cyber and IT security knowledge
  • Extensive understanding of Cyber and IT security risks, best practices, threats and prevention measures
  • Extensive understanding of SQL and relevant scripting languages
  • Extensive data security system analysis skills
  • Extensive risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most severe and complex cybersecurity incidents
  • Guide cross-functional teams through containment, eradication, and recovery
  • Provide executive-level oversight and decision-making during critical incidents
  • Effectively analyze associated logs and respond to high severity incidents
  • Contribute to the company's security response methods
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies
  • Foster a culture of continuous improvement and innovation
  • Provide insight and guidance through after action reviews
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

Principal Cybersecurity Incident Analyst

The Principal Analyst Cybersecurity Incident is a key role responsible for manag...
Location
Location
Australia , Melbourne
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Information Technology or Computer Science preferred
  • Relevant certifications such as SANS GIAC Security Essentials (GSEC)
  • At least 5 years of experience in the technology information security industry
  • Hands-on experience in administering & managing SIEM platforms Palo Alto XSIAM, Splunk, Microsoft Sentinel etc.
  • Hands-on experience to Analyse logs/events from SIEM solution, wireshark and other infrastructure
  • Deep knowledge of cybersecurity concepts, technologies, and best practices
  • Experience in working in Security Operation Centre and Network Security operations
  • Hands-on experience in administering & managing Vulnerability Management solutions like Qualys, Tenable etc.
  • Hands-on experience in administering & managing SOAR Palo Alto Cortex XSOAR or other SOAR solutions
  • Expertise in writing new and interpreting query language SPL, KQL, XQL
Job Responsibility
Job Responsibility
  • Act like a SIEM consultant who provides expertise and guidance to organizations in setting up, managing, and improving their SOC capabilities
  • Look over dashboards, and reports from the previous day or shift, including checking for any new threats and identifying malware
  • Prepare for and respond to system breaches or attacks
  • Respond to hacks or network insecurities and working to prevent new ones
  • Participate in a shift roster which may comprise of shifts business hours and after hours
  • Assessing SIEM maturity: Evaluating the existing SIEM setup and capabilities of an organization
  • Developing or refining the SIEM infrastructure, the architecture, tools, processes, and workflows of a SOC
  • Implementing security technologies when necessary: Assessing, selecting, and implementing various security technologies such as SIEM, SOAR systems, intrusion detection systems, threat intelligence platforms, and incident response tools
  • Support the Security Management Lifecycle including: monitoring, investigation, research, correlation, trend analysis, remediation and siem configuration
  • Developing security policies and procedures: Assisting in developing, documenting, maintaining SOC standard operating procedures (SOPs), incident response plans, playbooks, and other security policies
  • Fulltime
Read More
Arrow Right

Enterprise Security Architect

The leading technical authority of design, implementation, and validation of Cyb...
Location
Location
United States , Broomfield
Salary
Salary:
140000.00 - 190000.00 USD / Year
hunterdouglas.com Logo
Hunter Douglas
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expert knowledge of security best practices (encryption, data protection, design, privilege access, etc.)
  • Expert knowledge and experience with managing and implementing standard security technologies (DLP, MDM, SIEM, AV, IDS)
  • Solid knowledge in compliance management and certification (PCI, GDPR, CCPA)
  • Solid knowledge of network technologies (protocols, design concepts, access control)
  • Solid knowledge of identity technologies (protocols, design concepts, access control)
  • Solid knowledge of application technologies (protocols, design concepts, access control)
  • Expert knowledge to demonstrate excellent written and verbal communication
  • Expert knowledge and proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Bachelor’s degree or equivalent in related field
  • Minimum of 5 years’ experience in a principal Security Engineer or Architect role
Job Responsibility
Job Responsibility
  • Threat intelligence and threat landscape: Continuously obtain updated, accurate threat intelligence to update the company’s threat landscape
  • Control design: Ideate, suggest, and design solutions to identified risks, including process modifications, improved configurations, and technology selection
  • Process improvements: Build, align, and update Cybersecurity standards, operating procedures, and other documentation to ensure effective Cybersecurity adherence across the company
  • Procurement: Develop requirements for InfoSec vendor selection for new and replacement technologies and services
  • Implementation: Lead the onboarding of technology-related projects to ensure alignment with the company’s security policies, guidelines, and processes. The candidate will also need to lead other Security Engineers and analysts in project deployment, driving the execution and completion of initiatives
  • Technical authority: Assist Security Engineers and Analysts with the management and operation of Cybersecurity tools as needed, including EDR, firewall, email security, vulnerability management, application security, and identity systems
  • Bake security into the business: Interfaces with management and the user community to understand business needs, implement security best practices, and identify opportunities for improving security and compliance
  • Improve security awareness: Partners with the training and professional development staff to promote security awareness among the user community with lessons from the field. Champions the continuous improvement of Cybersecurity across all entities
  • Planning: Review and develop the company’s overall security program and manage multiple security projects in each period
  • Incident response: Support incident response processes to ensure thoroughness and effectiveness
What we offer
What we offer
  • Bonus target range: 35-40%
  • Generous benefits package including medical, dental, vision, life, disability
  • A company culture that prioritizes internal development and professional growth
  • Time off with pay
  • 401(k) plan with a degree of employer matching
  • Paid parental leave
  • Wellness programs and product discounts
  • Fulltime
Read More
Arrow Right

Enterprise Security Architect

The leading technical authority of design, implementation, and validation of Cyb...
Location
Location
United States , Broomfield
Salary
Salary:
140000.00 - 190000.00 USD / Year
hunterdouglas.com Logo
Hunter Douglas
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expert knowledge of security best practices (encryption, data protection, design, privilege access, etc.)
  • Expert knowledge and experience with managing and implementing standard security technologies (DLP, MDM, SIEM, AV, IDS)
  • Solid knowledge in compliance management and certification (PCI, GDPR, CCPA)
  • Solid knowledge of network technologies (protocols, design concepts, access control)
  • Solid knowledge of identity technologies (protocols, design concepts, access control)
  • Solid knowledge of application technologies (protocols, design concepts, access control)
  • Expert knowledge to demonstrate excellent written and verbal communication
  • Expert knowledge and proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Bachelor’s degree or equivalent in related field
  • Minimum of 5 years’ experience in a principal Security Engineer or Architect role
Job Responsibility
Job Responsibility
  • Threat intelligence and threat landscape: Continuously obtain updated, accurate threat intelligence to update the company’s threat landscape
  • Control design: Ideate, suggest, and design solutions to identified risks, including process modifications, improved configurations, and technology selection
  • Process improvements: Build, align, and update Cybersecurity standards, operating procedures, and other documentation to ensure effective Cybersecurity adherence across the company
  • Procurement: Develop requirements for InfoSec vendor selection for new and replacement technologies and services
  • Implementation: Lead the onboarding of technology-related projects to ensure alignment with the company’s security policies, guidelines, and processes. The candidate will also need to lead other Security Engineers and analysts in project deployment, driving the execution and completion of initiatives
  • Technical authority: Assist Security Engineers and Analysts with the management and operation of Cybersecurity tools as needed, including EDR, firewall, email security, vulnerability management, application security, and identity systems
  • Bake security into the business: Interfaces with management and the user community to understand business needs, implement security best practices, and identify opportunities for improving security and compliance
  • Improve security awareness: Partners with the training and professional development staff to promote security awareness among the user community with lessons from the field. Champions the continuous improvement of Cybersecurity across all entities
  • Planning: Review and develop the company’s overall security program and manage multiple security projects in each period
  • Incident response: Support incident response processes to ensure thoroughness and effectiveness
What we offer
What we offer
  • Bonus target range: 35-40%
  • Generous benefits package including medical, dental, vision, life, disability
  • A company culture that prioritizes internal development and professional growth
  • Time off with pay
  • 401(k) plan with a degree of employer matching
  • Paid parental leave
  • Wellness programs and product discounts
  • Fulltime
Read More
Arrow Right

Principal Product Manager- AI Integrity

The AI Integrity & Provenance team builds post‑deployment safety, abuse monitori...
Location
Location
United States , Redmond
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree AND 8+ years experience in product/program management OR equivalent experience
  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter
Job Responsibility
Job Responsibility
  • Lead product strategy for AI Integrity Foundations across provenance, abuse monitoring, incident response, and social listening, enabling safe, accountable, and resilient deployment of AI systems and agents at scale
  • Define the long-term vision, strategy, and roadmap for foundational integrity capabilities within Azure AI Foundry, ensuring consistent post-deployment safeguards across models, applications, and agentic workflows
  • Improve abuse monitoring and detection systems that identify and mitigate real-world AI threats and misuse, including prompt injection, jailbreaks, data exfiltration, malicious tool calls, coordinated abuse, model exploitation and other novel vectors
  • Own incident response product capabilities, enabling rapid detection, triage, investigation, and remediation of AI-related safety and security incidents, with clear metrics for MTTR, coverage, and enforcement effectiveness
  • Evolve provenance and content authenticity capabilities, supporting traceability, attribution, auditability, and regulatory requirements for trustworthy AI outputs
  • Partner closely with security engineers, red teams, AI researchers, and integrity analysts to translate emerging attack patterns, abuse signals, and novel harm vectors into durable, productized protections
  • Integrate AI integrity and security capabilities with Microsoft’s broader ecosystem, including Defender (threat detection and response), Entra (identity and access control), and Purview (data protection, governance, and compliance)
  • Drive 0‑to‑1 product development, taking new integrity and safety concepts from early experimentation through production launch, customer adoption, and operational maturity
  • Establish and own metrics and dashboards for AI integrity posture and product success, including detection coverage, signal quality, response effectiveness, customer impact, and regulatory readiness
  • Fulltime
Read More
Arrow Right

Principal Data Architect

As a Principal Data Architect at a digital transformation agency, you’ll define ...
Location
Location
Salary
Salary:
Not provided
valtech.com Logo
Valtech
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years in data architecture / data engineering, including leading architecture for complex programs
  • Proven design of cloud data platforms (AWS/Azure/GCP) and modern analytics stacks
  • Strong command of data modeling, distributed systems concepts, and integration patterns
  • Experience with governance, metadata/lineage, data quality, and privacy/security controls
  • Ability to communicate clearly with both engineers and senior business stakeholders
  • Consulting experience: multi-client delivery, ambiguity management, workshop facilitation, and influencing without authority
  • Strong written skills: concise architecture documentation and decision-making artifacts
Job Responsibility
Job Responsibility
  • Architecture leadership: Define target-state data architecture and roadmaps across cloud and hybrid environments
  • align to business outcomes and transformation goals
  • Platform design: Architect modern data platforms (lakehouse/warehouse, streaming, batch, semantic layers) with clear patterns for ingestion, modeling, governance, and consumption
  • Data modeling: Lead conceptual/logical/physical modeling, domain-oriented design, and analytical modeling (dimensional, Data Vault, wide-table patterns where appropriate)
  • Integration & interoperability: Design APIs, event-driven/streaming architectures, data sharing patterns, and integration with enterprise apps and SaaS products
  • Governance & trust: Establish data governance, metadata management, lineage, MDM/reference data approaches, data quality frameworks, and stewardship operating models
  • Security & compliance: Embed security-by-design (IAM, encryption, secrets, network controls), privacy-by-design, and regulatory requirements (e.g., GDPR) into architectures
  • Delivery assurance: Provide technical oversight across projects—review designs, ensure best practices, manage architectural risks, and unblock teams
  • Client advisory: Lead architecture workshops, produce decision papers and architecture artifacts, present to C-level stakeholders, and influence investment decisions
  • Engineering collaboration: Partner with data engineers, analysts, ML engineers, and product teams to ensure designs are buildable, operable, and meet SLAs
What we offer
What we offer
  • Flexibility, with remote and hybrid work options (country-dependent)
  • Career advancement, with international mobility and professional development programs
  • Learning and development, with access to cutting-edge tools, training and industry experts
Read More
Arrow Right

Principal Data Architect

As a Principal Data Architect at a digital transformation agency, you’ll define ...
Location
Location
Portugal
Salary
Salary:
Not provided
valtech.com Logo
Valtech
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years in data architecture / data engineering, including leading architecture for complex programs
  • Proven design of cloud data platforms (AWS/Azure/GCP) and modern analytics stacks
  • Strong command of data modeling, distributed systems concepts, and integration patterns
  • Experience with governance, metadata/lineage, data quality, and privacy/security controls
  • Ability to communicate clearly with both engineers and senior business stakeholders
  • Consulting experience: multi-client delivery, ambiguity management, workshop facilitation, and influencing without authority
  • Strong written skills: concise architecture documentation and decision-making artifacts
Job Responsibility
Job Responsibility
  • Architecture leadership: Define target-state data architecture and roadmaps across cloud and hybrid environments
  • align to business outcomes and transformation goals
  • Platform design: Architect modern data platforms (lakehouse/warehouse, streaming, batch, semantic layers) with clear patterns for ingestion, modeling, governance, and consumption
  • Data modeling: Lead conceptual/logical/physical modeling, domain-oriented design, and analytical modeling (dimensional, Data Vault, wide-table patterns where appropriate)
  • Integration & interoperability: Design APIs, event-driven/streaming architectures, data sharing patterns, and integration with enterprise apps and SaaS products
  • Governance & trust: Establish data governance, metadata management, lineage, MDM/reference data approaches, data quality frameworks, and stewardship operating models
  • Security & compliance: Embed security-by-design (IAM, encryption, secrets, network controls), privacy-by-design, and regulatory requirements (e.g., GDPR) into architectures
  • Delivery assurance: Provide technical oversight across projects—review designs, ensure best practices, manage architectural risks, and unblock teams
  • Client advisory: Lead architecture workshops, produce decision papers and architecture artifacts, present to C-level stakeholders, and influence investment decisions
  • Engineering collaboration: Partner with data engineers, analysts, ML engineers, and product teams to ensure designs are buildable, operable, and meet SLAs
What we offer
What we offer
  • Flexibility, with remote and hybrid work options (country-dependent)
  • Career advancement, with international mobility and professional development programs
  • Learning and development, with access to cutting-edge tools, training and industry experts
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for supporting the executive ...
Location
Location
United States , Austin
Salary
Salary:
95000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of 3 years of recent protective intelligence experience supporting executive protection teams and principals, or 5+ years of equivalent military, law enforcement, or intelligence experience.
  • Bachelor’s degree in Intelligence Studies, International Relations, Homeland Security, or related field (or equivalent operational experience).
  • Formal Intelligence Training certification (Military, Government, Association, or Private Sector) required.
  • Advanced training in threat assessment, travel risk management, or protective intelligence preferred.
  • Skilled in open-source (OSINT) and social media research, threat monitoring, and incident verification.
  • Experience producing protective intelligence products—threat assessments, travel risk reports, route/residence assessments, and pre-travel advisories.
  • Ability to collect, vet, and analyze information using the intelligence cycle to create accurate, actionable, bias-mitigated reporting.
  • Strong understanding of global security, geopolitical risks, terrorism, crime, and crisis response as they relate to executive travel and operations.
  • Proven ability to support EP operations in real time, providing clear, concise, and timely threat updates to decision-makers.
  • Proficiency in Microsoft Office Suite and familiarity with protective intelligence platforms (e.g., Factal, Dataminr, Babel Street, LifeRaft, Echosec).
Job Responsibility
Job Responsibility
  • Threat Monitoring & Early Warning: Continuously monitor open sources, social media platforms, dark web, and client-specific intelligence tools for threats or hostile surveillance activity directed at principals, their families, residences, travel plans, or affiliated events.
  • Protective Research & Threat Analysis: Conduct in-depth research and analysis on persons of interest (POIs), hostile actors, and groups with the intent or capability to target principals. Assess motivations, capability, opportunity, and intent to identify potential attack indicators.
  • Travel Risk Intelligence: Provide proactive intelligence support to executive protection teams during domestic and international travel, including country risk assessments, route reconnaissance, hotel and venue security reviews, and incident monitoring during trips. Deliver timely updates to traveling principals and EP teams.
  • Protective Operations Support: Deliver actionable, real-time intelligence to EP teams in support of principal movements, protective advances, route planning, and residence/event security. Maintain constant threat environment awareness and communicate relevant changes.
  • Geopolitical & Environmental Risk Tracking: Monitor global and regional security issues, including terrorism, political unrest, crime trends, natural disasters, and health risks—that could affect principals’ safety during travel or at residences/events.
  • Actionable Reporting & Products: Produce timely, clear, and actionable intelligence products including: Threat assessments (strategic and tactical), Travel risk assessments (pre-trip and in-trip updates), Situation reports (SITREPs) and incident summaries, Route and location assessments (residences, hotels, venues, offices)
  • Threat Mitigation Recommendations: Provide practical, proportionate recommendations to EP teams on how to mitigate identified threats, risks, and vulnerabilities. Offer clear triggers and indicators for escalation or operational adjustments.
  • Database & Knowledge Management: Maintain a structured, cross-referenced database of threats, POIs, incidents, and lessons learned to support future operations and ensure continuity of protective intelligence programs.
  • Confidentiality & Security: Safeguard sensitive client information, personal identifiers, and operational details at all times, adhering to strict confidentiality and need-to-know principles.
  • Operational Integration: Serve as the intelligence liaison to executive protection, event security, and corporate security teams, ensuring protective intelligence is integrated into all protective operations.
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right