
Senior Manager, Security Incident Response Team
GitLab
full-time
Posted on:
Location Type: Remote
Location: California • United States
Visit company websiteExplore more
Salary
💰 $168,000 - $280,000 per year
Job Level
About the role
- Serve as trusted advisor as part of the security division’s leadership team, actively shaping the program direction.
- Build and mature incident response runbooks, procedures, and capabilities.
- Provide leadership to multiple security operations team shifts that will sometimes require you to work on nights or weekends.
- Develop a culture of incident response excellence through a focus on investigation depth and accuracy.
- Lead cross-functional collaboration between peer SecOps teams, security departments, and extended support teams such as Legal, Customer Support, and Infrastructure.
- Foster a defense first mindset through actionable incident retrospective mitigations to close defense gaps, making GitLab a hard target for attackers.
- Lead a team of expert security engineers with experience in security automation, deep dive forensics and incident response, AI detection and response capabilities, and GitLab the product.
- Support response readiness and expertise about new GitLab corporate and product capabilities and features.
- Drive insights from the alerts, investigations, and incidents handled by SIRT to improve the security posture of GitLab.
Requirements
- Experience assisting customers during high visibility and urgency security incidents and being comfortable representing GitLab Security during customer cybersecurity questions and escalations.
- Proven ability to deliver results across a global incident response team of 10+ engineers, and matrixed teams such as the Security division, and supporting R&D teams (Product, Engineering, Infrastructure, etc).
- Proven experience in incident response leadership and large scale incident coordination.
- Experience conducting investigations and log analysis using SIEM tools, such as Splunk or Elastic.
- Working knowledge of Google Cloud Platform (GCP) and/or AWS as well as cloud forensics
- Proficiency in proactive hunting based on threat intelligence
- Experience using GitLab (or a related DevSecOps platform like GitHub) for project tracking - Bonus points if you have experience responding to threats against a SaaS platform.
- A passion for investigation quality and depth of analysis - prioritizing quality over speed.
- Experience using AI/LLMs to automate and improve incident response processes and capabilities.
- An understanding of supply chain threats and how to defend a SaaS platform against such threats.
Benefits
- Benefits to support your health, finances, and well-being
- Flexible Paid Time Off
- Team Member Resource Groups
- Equity Compensation & Employee Stock Purchase Plan
- Growth and Development Fund
- Parental leave
- Home office support
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
incident responseforensicssecurity automationlog analysisthreat intelligencecloud forensicsAI detection and responseGitLabSIEM toolsproactive hunting
Soft Skills
leadershipcross-functional collaborationcommunicationinvestigation qualitycustomer supportteam managementproblem-solvingadaptabilitystrategic thinkingmentorship