SentinelOne

Senior Crisis Response Manager

SentinelOne

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $108,000 - $149,000 per year

Job Level

About the role

  • Maintain awareness of all customer-impacting and brand-impacting incidents across the enterprise.
  • Coordinate response execution for high-severity incidents, including war room logistics, action tracking, decision logs, and status cadence.
  • Draft clear, accurate written communications for internal stakeholders and senior leadership, ensuring content aligns to current facts and validated inputs.
  • Track root cause investigations end-to-end to ensure they’re completed correctly and on time; help produce customer-ready root cause reports.
  • Own tracking and follow-through on corrective actions to reduce repeat incidents, ensuring actions are defined, assigned, and closed.
  • Build and improve enterprise response mechanisms, including templates, workflows, reporting, and coordination models across teams.
  • Maintain and report incident metrics to drive action and improvements to process.

Requirements

  • 8-12 years of experience in incident/crisis response operations, technical program management, security operations coordination, or similar high-tempo roles.
  • Proven ability to coordinate cross-functional teams during high-pressure events and drive disciplined execution.
  • Experience communicating across technical and non-technical audiences.
  • Familiarity with legal and communications considerations during customer-facing security events, including stakeholder briefings, and public/media alignment.
  • Excellent written communication skills (executive-ready briefs and customer-facing incident/RCA reporting).
  • Strong operational rigor, including documentation, action tracking, escalation judgment, and follow-through.
  • Demonstrated ability to manage ambiguity, manage multiple concurrent priorities, and resolve conflict under pressure.
  • Ability to support crisis response for U.S. Federal and Public Sector customers and partners.
  • Must be a U.S. Citizen and based in the United States.
  • Experience working with incident management tools and workflows (PagerDuty, Jira, Slack, Salesforce, Statuspage, and others).
  • English fluency required (written and verbal).
  • Experience supporting security incidents and partnering with SOC/IR/AppSec teams.
  • Familiarity with regulated/compliance-informed environments.
  • Experience in Customer Success, Technical Support, DFIR, or Saas infrastructure roles.
  • Experience building incident metrics and driving corrective action programs.
Benefits
  • Medical, Vision, Dental, 401(k), Commuter, and Dependent FSA
  • Unlimited PTO
  • Paid Company Assigned Holidays
  • Paid Sick Time
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team building events
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
incident responsecrisis response operationstechnical program managementsecurity operations coordinationroot cause analysisaction trackingdocumentationincident metricscorrective action programs
Soft Skills
written communicationcross-functional coordinationoperational rigorconflict resolutionmanaging ambiguitymulti-taskingexecutive communicationstakeholder management