This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Wrike is seeking an experienced Senior Incident Response Analyst to help safeguard our organization’s most valuable assets and data from emerging cyber threats, operating within a fast-paced 24/7 environment.
Job Responsibility:
Lead the monitoring, analysis, and triage of complex security alerts and events, providing expert guidance to junior team members
Assess risk and impact of potential incidents, recommending and overseeing appropriate remediation actions
Employ a broad range of advanced security tools and technologies to proactively detect and investigate sophisticated cyber threats
Collaborate with and mentor other teams, including incident responders, to ensure timely and accurate escalation and resolution of high-priority cases
Oversee documentation and reporting of security incidents, ensuring accuracy, clarity, and timely delivery to relevant stakeholders
Drive the ongoing development and enhancement of security monitoring and detection capabilities, introducing best practices and automation where appropriate
Stay ahead of the latest security trends, emerging vulnerabilities, and best practices, sharing knowledge and recommendations within the team and across the organization
Demonstrated experience functioning at an L3 level, serving as the final escalation point for resolving complex security incidents and issues
Mentorship of junior/mid senior analysts, ability to share knowledge
Requirements:
Over 5 years of experience in a Senior Incident Response Analyst/SOC/Cybersecurity or similar security-focused role in a software product company
Deep understanding of network fundamentals and a wide range of security threats
Exceptional analytical and problem-solving skills, with the ability to think critically under pressure
Outstanding communication skills, both written and verbal, with the ability to convey complex concepts to technical and non-technical audiences
Hands-on experience with leading security information event management (SIEM) and extended detection and response (XDR) platforms (e.g., Rapid7, Splunk, Wazuh, Microsoft Defender for Endpoint, Crowdstrike)
Strong experience in log analysis, event correlation, and incident response
Nice to have:
Relevant industry certifications (e.g., CISSP, GCIA, GCIH, CEH) or demonstrable advanced expertise
What we offer:
18 calendar days of paid vacation (12 days of National & Festival holidays (10 fixed, 2 flexible))