
Senior Crisis Response Manager
SentinelOne
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Salary
💰 $108,000 - $149,000 per year
Job Level
About the role
- Maintain awareness of all customer-impacting and brand-impacting incidents across the enterprise.
- Coordinate response execution for high-severity incidents, including war room logistics, action tracking, decision logs, and status cadence.
- Draft clear, accurate written communications for internal stakeholders and senior leadership, ensuring content aligns to current facts and validated inputs.
- Track root cause investigations end-to-end to ensure they’re completed correctly and on time; help produce customer-ready root cause reports.
- Own tracking and follow-through on corrective actions to reduce repeat incidents, ensuring actions are defined, assigned, and closed.
- Build and improve enterprise response mechanisms, including templates, workflows, reporting, and coordination models across teams.
- Maintain and report incident metrics to drive action and improvements to process.
Requirements
- 8-12 years of experience in incident/crisis response operations, technical program management, security operations coordination, or similar high-tempo roles.
- Proven ability to coordinate cross-functional teams during high-pressure events and drive disciplined execution.
- Experience communicating across technical and non-technical audiences.
- Familiarity with legal and communications considerations during customer-facing security events, including stakeholder briefings, and public/media alignment.
- Excellent written communication skills (executive-ready briefs and customer-facing incident/RCA reporting).
- Strong operational rigor, including documentation, action tracking, escalation judgment, and follow-through.
- Demonstrated ability to manage ambiguity, manage multiple concurrent priorities, and resolve conflict under pressure.
- Ability to support crisis response for U.S. Federal and Public Sector customers and partners.
- Must be a U.S. Citizen and based in the United States.
- Experience working with incident management tools and workflows (PagerDuty, Jira, Slack, Salesforce, Statuspage, and others).
- English fluency required (written and verbal).
- Experience supporting security incidents and partnering with SOC/IR/AppSec teams.
- Familiarity with regulated/compliance-informed environments.
- Experience in Customer Success, Technical Support, DFIR, or Saas infrastructure roles.
- Experience building incident metrics and driving corrective action programs.
Benefits
- Medical, Vision, Dental, 401(k), Commuter, and Dependent FSA
- Unlimited PTO
- Paid Company Assigned Holidays
- Paid Sick Time
- Gym membership reimbursement
- Cell phone reimbursement
- Numerous company-sponsored events including regular happy hours and team building events
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
incident responsecrisis response operationstechnical program managementsecurity operations coordinationroot cause analysisaction trackingdocumentationincident metricscorrective action programs
Soft Skills
written communicationcross-functional coordinationoperational rigorconflict resolutionmanaging ambiguitymulti-taskingexecutive communicationstakeholder management