CrawlJobs Logo

Senior Security Incident Commander

uber.com Logo

Uber

Location Icon

Location:
United States , Seattle

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

180000.00 - 200000.00 USD / Year

Job Description:

As a Senior Security Technologist, Incident Command, you are accountable for leading Uber’s most critical, complex, and high-impact security incidents end-to-end - from escalation to containment, recovery, and systemic remediation. You operate at the intersection of Fire Captain, NTSB Investigator, and hands-on technical practitioner. In the moment, you take command - setting strategy, assigning resources, and making high-consequence decisions under pressure. After the smoke clears, you drive deep technical investigation and post-incident analysis to ensure we understand not just what happened, but why it happened, and that meaningful, durable fixes are made.

Job Responsibility:

  • Command the highest severity and most complex security incidents across Uber and its subsidiaries, serving as the single accountable leader during active response
  • Participate in an on-call rotation where you are expected to make real-time decisions with incomplete information, balancing speed, risk, and impact
  • Act as the incident authority, not just a facilitator - forming hypotheses, setting strategy, and directing investigative focus
  • Transition seamlessly between executive-level incident leadership and hands-on technical investigation, including log analysis, system interrogation, and root cause validation
  • Serve as the primary interface to senior leadership during critical incidents, translating evolving technical realities into clear risk, impact, and decision frameworks
  • Build and maintain strong working relationships with global engineering, infrastructure, legal, privacy, and operations teams to enable fast, coordinated response
  • Conduct rigorous post-incident analysis in the spirit of an NTSB investigation - focused on systemic causes, contributing factors, and concrete prevention
  • Mentor and develop other responders and incident leaders, raising the organization’s ability to handle complex, time-critical security events
  • Lead and materially contribute to initiatives that mature Uber’s incident response program, including: High-fidelity incident simulations and technical tabletop exercises
  • Threat-informed response planning and scenario development
  • ‘Left of boom’ threat modeling to prevent incidents before they occur
  • Improvements to detection, containment, and response automation
  • Adoption of new investigative techniques and tooling, including AI-assisted workflows

Requirements:

  • 5+ years in security operations, detection, or incident response roles at scale, with demonstrated ownership of ambiguous, large, complex, high-impact incidents
  • Deep familiarity with modern attacker TTPs and how they manifest across logs, systems, networks, endpoints, and applications
  • Strong technical investigation skills - comfortable working directly with logs, telemetry, and raw system data to validate hypotheses and determine root cause
  • Experience briefing executives during active incidents, with the ability to clearly explain tradeoffs, risks, and recommended actions
  • Experience designing or running technical incident simulations (tabletops, purple team exercises, or similar) that stress real-world response capabilities
  • Experience building or leveraging AI-driven tooling to improve incident response posture, applying frontier technology to workflows such as triage, investigation, correlation, or decision support

Nice to have:

  • Demonstrated experience leading other responders through direct command during incidents and longer-term technical mentorship
  • Strong bias for action and continuous improvement
  • Experience responding to incidents in highly distributed, cloud-scale environments where blast radius and coordination complexity are significant
  • Broad security domain knowledge (infrastructure, endpoint, product, identity, data) and the ability to reason across them during incidents
  • Ability to script or code (Python, Go, or similar) to automate response tasks, prototype tooling, or close operational gaps
What we offer:
  • Eligible to participate in Uber's bonus program
  • May be offered an equity award & other types of comp
  • All full-time employees are eligible to participate in a 401(k) plan
  • Eligible for various benefits (see link)

Additional Information:

Job Posted:
February 11, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Security Incident Commander

Principal Incident Commander

We're looking for an Information Security Incident Commander to join our team, p...
Location
Location
India , Bengaluru
Salary
Salary:
Not provided
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Previous incident management experience
  • 7+ years experience in information security
  • Strong written and verbal communication skills
  • Attention to detail
  • Investigative mindset
  • Ability to stay organized under pressure
  • Confidence to manage up to more senior leaders during incident response activities
  • Effective delegation of tasks across diverse workstreams
  • Experience leading functional groups/engagements
  • Awareness of Enterprise customers' expectations when communicating an incident or vulnerability
Job Responsibility
Job Responsibility
  • Identify which plans, playbooks, and processes apply to a particular Security Incident
  • Engage all required stakeholders for a particular response effort and ensure they are kept aware of all details and developments
  • Regularly update leadership on a regular cadence and when significant changes to previously known statuses arise
  • Lead incident bridge calls
  • Translate technical communications into non-technical communications
  • Assist in the development of an overall response strategy
  • Participate in preparedness activities such as tabletop exercises and red team events
  • Assist with internal and external incident related communication, both written and verbal
  • Document incident response efforts
  • Drive incident response efforts to meet SLOs and SLAs
What we offer
What we offer
  • Health coverage
  • Paid volunteer days
  • Wellness resources
  • Fulltime
Read More
Arrow Right

Senior Security Operations Engineer II

As a Senior Security Operations Engineer, you’ll play a key role in ensuring the...
Location
Location
United States , Scottsdale
Salary
Salary:
Not provided
axon.com Logo
Axon
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7+ years of experience in operations, site reliability, or infrastructure engineering roles
  • Strong experience securing and managing cloud environments (e.g., AWS, Azure) and containerized workloads
  • Deep understanding of Linux systems, networking, distributed systems, and their associated security controls
  • Proficiency in automation, scripting, and security tooling integration to streamline operations and enforcement
  • Experience with security monitoring, alerting, SIEM platforms, and observability tools
  • Solid grasp of CI/CD practices with integrated security testing and compliance checks
  • Experience managing Kubernetes clusters and running containerized workloads in production
  • Experience with deploying and administrating any of the following: scalable cloud native secrets solutions such as AWS KMS, Azure KeyVault
  • PKI solutions such as EJBCA, Smallstep, Venafi
  • or vaulting solutions such as Hashicorp Vault
Job Responsibility
Job Responsibility
  • Implementing and improving automated security checks in CI/CD pipelines to prevent vulnerabilities from reaching production
  • Writing, reviewing, and maintaining security-focused infrastructure-as-code for scalable and compliant deployments
  • Investigating security incidents, performing root cause analysis, and implementing long-term mitigation strategies
  • Collaborating with developers to develop new features, services, and infrastructure requirements
  • Enhancing security observability through improved log collection, metrics, and alerting configurations
  • Maintaining and improving security runbooks, incident response playbooks, and internal security tooling for operational efficiency
  • Resolve security/infrastructure incidents by participating in high impact/high visibility incidents as a participant and ideally as an incident commander
  • Maintain and secure critical infrastructure components such as PKI (Public Key Infrastructure) and IAM ( Identity & Access Management) systems, ensuring reliability, scalability, and compliance with organizational and industry security standards
  • Build and maintain secure, reliable, and scalable infrastructure that protects core services and sensitive data
  • Troubleshoot and resolve complex operational and system-level issues across environments
What we offer
What we offer
  • Competitive salary and 401k with employer match
  • Discretionary paid time off
  • Paid parental leave for all
  • Medical, Dental, Vision plans
  • Fitness Programs
  • Emotional & Mental Wellness support
  • Learning & Development programs
  • Snacks in our offices
  • Fulltime
Read More
Arrow Right

Senior Security Operations Engineer II

As a Senior Security Operations Engineer, you’ll play a key role in ensuring the...
Location
Location
United States , Scottsdale
Salary
Salary:
Not provided
axon.com Logo
Axon
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7+ years of experience in operations, site reliability, or infrastructure engineering roles
  • Strong experience securing and managing cloud environments (e.g., AWS, Azure) and containerized workloads
  • Deep understanding of Linux systems, networking, distributed systems, and their associated security controls
  • Proficiency in automation, scripting, and security tooling integration to streamline operations and enforcement
  • Experience with security monitoring, alerting, SIEM platforms, and observability tools
  • Solid grasp of CI/CD practices with integrated security testing and compliance checks
  • Experience managing Kubernetes clusters and running containerized workloads in production
  • Experience with deploying and administrating any of the following: scalable cloud native secrets solutions such as AWS KMS, Azure KeyVault
  • PKI solutions such as EJBCA, Smallstep, Venafi
  • or vaulting solutions such as Hashicorp Vault
Job Responsibility
Job Responsibility
  • Implementing and improving automated security checks in CI/CD pipelines to prevent vulnerabilities from reaching production
  • Writing, reviewing, and maintaining security-focused infrastructure-as-code for scalable and compliant deployments
  • Investigating security incidents, performing root cause analysis, and implementing long-term mitigation strategies
  • Collaborating with developers to develop new features, services, and infrastructure requirements
  • Enhancing security observability through improved log collection, metrics, and alerting configurations
  • Maintaining and improving security runbooks, incident response playbooks, and internal security tooling for operational efficiency
  • Resolve security/infrastructure incidents by participating in high impact/high visibility incidents as a participant and ideally as an incident commander
  • Maintain and secure critical infrastructure components such as PKI (Public Key Infrastructure) and IAM ( Identity & Access Management) systems, ensuring reliability, scalability, and compliance with organizational and industry security standards
  • Build and maintain secure, reliable, and scalable infrastructure that protects core services and sensitive data
  • Troubleshoot and resolve complex operational and system-level issues across environments
What we offer
What we offer
  • Competitive salary and 401k with employer match
  • Discretionary paid time off
  • Paid parental leave for all
  • Medical, Dental, Vision plans
  • Fitness Programs
  • Emotional & Mental Wellness support
  • Learning & Development programs
  • Snacks in our offices
  • Fulltime
Read More
Arrow Right

Senior Security Engineer - Incident Response

Mozilla is looking for an Incident Responder to monitor and mitigate attacks acr...
Location
Location
Germany
Salary
Salary:
Not provided
mozilla.org Logo
Mozilla
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of demonstrated ability managing security incidents at a global scale and/or experience working in Security Operations Centers (SOC), Product Security Incident Response Teams (PSIRT), and Computer Security Incident Response Teams (CSIRT)
  • Expertise with security information and event management (SIEM) systems (eg. ELK, Google BigQuery, Splunk, etc.). Splunk proficiency is preferred
  • Expertise with endpoint detection and investigation. Hands-on experience with leading EDR tools and demonstrated ability to leverage endpoint telemetry to find root cause
  • Expertise with security orchestration and automation (SOAR) platforms such as Tines or Splunk SOAR
  • Superb communication and leadership capacity
  • ability to partner effectively with diverse company stakeholders
  • Real-world experience in software development and/or engineering operations for consumer products and services
  • B.S. in a technology-focused field is helpful
  • Practical experience working with cloud technologies (eg. Google Cloud Platform, Amazon Web Services, Heroku, Microsoft Azure, etc.)
  • Ownership and Accountability
Job Responsibility
Job Responsibility
  • Identify and respond to security incidents on a global scale
  • Act as an incident commander to drive incidents through the entire response lifecycle
  • Design and maintain a portfolio of security alerts, automated actions, playbooks and escalation workflows in support of a high-performing 24/7 incident response capability
  • Conduct threat hunting activities, anticipate future threats, and maintain forward-thinking strategies for tools/technology/processes that combat sophisticated threat actors
  • Research threat intelligence reports, triage and manage resulting workflows
  • Partner with key stakeholders and communicate effectively to maintain a continuously improving feedback loop of preparation, identification, analysis, containment, and post mortem activities
  • Participate in on-call rotation
What we offer
What we offer
  • Generous performance-based bonus plans
  • Rich medical, dental, and vision coverage
  • Generous retirement contributions with 100% immediate vesting
  • Quarterly all-company wellness days
  • Country specific holidays plus a day off for your birthday
  • One-time home office stipend
  • Annual professional development budget
  • Quarterly well-being stipend
  • Considerable paid parental leave
  • Employee referral bonus program
  • Fulltime
Read More
Arrow Right

Information Security Manager

The Information Security Manager will lead a team to develop and implement secur...
Location
Location
Romania , Cluj
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Information Security, Cybersecurity, Computer Science, or related field
  • Minimum 5-10 years of experience in a similar role
  • Proven experience managing cybersecurity teams, with strong people leadership, coaching, and performance management skills
  • Deep understanding of security technologies including SIEM, firewalls, IDPS, antivirus, encryption, and vulnerability management tools
  • Ability to align security initiatives with business goals and translate complex technical risks into actionable business decisions
  • Excellent ability to communicate security concepts to technical and non-technical audiences, including senior leadership
  • Strong analytical and decision-making skills to address complex security challenges and incidents
  • Familiarity with security frameworks and regulations such as ISO 27001, GDPR, NIST, and CIS
  • Experience in managing security projects and initiatives across cross-functional teams
  • Demonstrated experience in information security leadership roles within global IT environments
Job Responsibility
Job Responsibility
  • Leadership & Team Management: Manage, mentor, and develop a team of Information Security Analysts, ensuring high performance, continuous learning, and alignment with organizational goals
  • Security Strategy & Governance: Define and implement the information security strategy, policies, and standards in alignment with business objectives and regulatory requirements
  • Risk Management: Oversee risk assessments, vulnerability management, and threat analysis to proactively identify and mitigate security risks
  • Incident Response Oversight: Lead the incident response process, ensuring timely investigation, containment, and remediation of security incidents
  • Compliance & Audit: Ensure adherence to relevant frameworks and regulations (e.g., ISO 27001, GDPR, NIST), and support internal and external audits
  • Security Architecture & Operations: Collaborate with IT and other departments to integrate security controls into systems, networks, and applications
  • Reporting & Metrics: Develop and present security metrics, risk dashboards, and incident reports to senior leadership and stakeholders
  • Continuous Improvement: Stay current with emerging threats, technologies, and best practices, and drive continuous improvement in security posture
  • Stakeholder Engagement: Act as a key point of contact for internal and external stakeholders on security matters, providing guidance and expertise
What we offer
What we offer
  • Smooth integration and a supportive mentor
  • Pick your working style: choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or accredited Coaching School
  • Epic parties or themed events
Read More
Arrow Right

Enterprise Resilience Senior Specialist

As our Enterprise Resilience Senior Analyst, you'll be a seasoned expert leading...
Location
Location
United States , Englewood
Salary
Salary:
41.14 - 61.20 USD / Hour
americannursingcare.com Logo
American Nursing Care
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree, 4 to 6 years of applicable work related experience may be considered
  • Minimum five (5) years’ experience in Business Continuity, Cyber Resilience, and Disaster Recovery
  • Minimum three (3-5) years leading large-scale crisis and resilience programs and initiatives
Job Responsibility
Job Responsibility
  • Design, manage, and execute a comprehensive training and exercise program (tabletops, drills, functional and full-scale exercises) and lead after-action reviews to validate capabilities, identify gaps, drive remediation, and build system-wide response proficiency
  • Lead the enterprise business continuity program by planning, developing, and managing global risk, intelligence, and business continuity initiatives to ensure system‑level preparedness, response, and recovery capabilities are designed, implemented, and continuously improved
  • Serve as the senior subject matter expert and trusted advisor to executive leadership, clinical and operational leaders, cybersecurity, legal, and communications teams
  • provide guidance before, during, and after incidents and, when needed, act as incident commander, incident manager, or senior advisor to enable timely, coordinated decision-making and recovery
  • Coordinate cross-functional preparedness and resilience efforts across clinical, IT/cybersecurity, facilities, logistics, communications and other stakeholders, and advise on risk mitigation strategies, policies, processes, and technology improvements to reduce disruption impact
  • Establish metrics, reporting, and governance for resilience and business continuity planning
  • prepare briefings for senior leadership and governance committees and track corrective actions to closure to ensure continuous improvement and accountability
  • Maintain external partnerships and regulatory and industry awareness—public health, emergency management, regional healthcare coalitions, law enforcement, and vendors—and ensure all business continuity activities comply with organizational, legal, privacy, and security requirements
What we offer
What we offer
  • medical, prescription drug, dental, vision plans, life insurance, paid time off (full-time benefit eligible team members may receive a minimum of 14 paid time off days, including holidays annually), tuition reimbursement, retirement plan benefit(s) including, but not limited to, 401(k), 403(b), and other defined benefits offerings
  • Fulltime
Read More
Arrow Right

Senior Security Engineering Manager

Fullscript is looking for a visionary Senior Security Engineering Manager to be ...
Location
Location
Canada , Ottawa
Salary
Salary:
Not provided
fullscript.com Logo
Fullscript
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years in Security Engineering, Product Security, or Cloud Security
  • 3+ years managing engineers
  • Demonstrated success owning and securing large-scale production systems in major cloud environments
  • Deep expertise in cloud security, secure network design, monitoring/observability tools, and application security
  • A solid grasp of secure software supply chains, zero-trust networking, data privacy, and compliance frameworks (SOC 2, ISO 27001, HIPAA, PCI-DSS, HITRUST)
  • Excellent ability to take complex security concepts and translate them into clear, actionable business outcomes for any audience
Job Responsibility
Job Responsibility
  • Set the Standard: You'll define and execute the long-term security roadmaps for product security, cloud architecture, and AI risk ensuring everything aligns with our company goals
  • Be a Key Partner: Work closely with the Director of Internal AI, product engineering, and other stakeholders to integrate security seamlessly into the business
  • Inspire and Grow: Lead, mentor, and develop a high-performing security team. That means regular 1-on-1s, smart OKRs, actionable feedback, and personalized growth plans
  • Champion Security: Drive a security-first mindset across the entire organization through continuous learning and promoting best practices
  • Incident Commander: Take the lead during high-severity security incidents, coordinating containment, and remediation across teams as well as communicating with key stakeholders
  • Level Up: Drive non-stop improvement with red/blue team exercises, security 'game days,' and automated security baked right into our CI/CD pipelines
  • Security by Design: Define secure coding standards, conduct necessary design reviews, and develop frameworks to manage risks tied to Generative AI and ML model deployment
  • Cloud Architecture: Design and secure our cloud environments (AWS, Azure). Focus on smart network segmentation, Infrastructure as Code (IaC) security, posture management, and efficient, cost-effective monitoring
  • Shift-Left Advocate: Champion security principles throughout the entire Software Development Lifecycle
  • Gatekeeper: Manage secrets, identity access, and ensure we stay compliant with vital standards like HIPAA, PCI-DSS, and SOC 2
What we offer
What we offer
  • Generous PTO and competitive pay
  • Fullscript’s RRSP match program for financial health
  • Flexible benefits package and workplace wellness program
  • Training budget and company-wide learning initiatives
  • Discount on Fullscript catalog of products
  • Ability to work Wherever You Work Well
  • Fulltime
Read More
Arrow Right

SecOps Engineer

The SecOps Engineer manages and leads the resolution of high or critical severit...
Location
Location
United States , Milwaukee; Boston; Paramus
Salary
Salary:
135000.00 - 150000.00 USD / Year
veolianorthamerica.com Logo
Veolia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s or Master’s Degree in Computer Science, Engineering, Information Security or extensive professional experience considered in place of a Bachelor’s degree
  • Min of 5 years of professional experience in SOC operations and/or incident response
  • Understanding of technologies and solutions utilized in cybersecurity and networks (SIEM, SOAR, Firewalls, IAM, IDS/IPS, End Point Protection, Threat Management/Intelligence)
  • Expertise in Cloud security such as AWS, GuardDuty, CloudTrail, Lambda, GCP, GCP Cloud Audit, Cloud Security Command Center, Log Explorer, GKE Logs, Kubernetes
  • Understanding of API security: REST, SOAP, OAuth, API Keys/Tokens, API Gateway
  • SaaS: SSPM, CASB
  • Familiarity with security frameworks, standards, and guidelines
  • Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
  • Ability to work with complex problems where analysis of situations or data requires an in-depth evaluation of variable factors
  • Excellent troubleshooting and problem-solving skills
Job Responsibility
Job Responsibility
  • Work closely with and advise on security best practices for Cloud, Infrastructure, Developers and Data Analysts to ensure security is implemented by design
  • Design and implement technical security controls
  • Conduct security review/audit of Cloud, SaaS, Network, AI environments to identify and mitigate potential security risks
  • Develop and implement security automation workflows using scripting languages and/or automation tooling such as Torq, Tines, etc
  • Provide seniority and oversight for a SOC shift as needed
  • Conduct complex investigations and providing advice to other Security Analysts
  • Manage and lead High or Critical severity incident resolution
  • Develop customized scripts or procedures to automate the repetitive tasks and improve the efficiency of incident response activities
  • Provide expert advice on remediation and recovery efforts and develop threat remediation strategies
  • Perform proactive analysis of the attack surface and advising on potential threats and attack vectors
What we offer
What we offer
  • Paid time off policies
  • health, dental, vision, life insurance
  • savings accounts
  • tuition reimbursement
  • paid volunteering
  • employer sponsored 401(k) plan
  • Sick leave – 56 hours
  • Observed Holidays – 11 days
  • Vacation – Flexible Time Off
  • Eligible for up to 10% Annual Performance Bonus
  • Fulltime
Read More
Arrow Right