Incident Response Manager
Stripe
This job is no longer accepting applications
See open jobs at Stripe.See open jobs similar to "Incident Response Manager" General Catalyst.Who we are
About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the team
The Security Incident Response team works to analyze, investigate, and respond to threats before they impact Stripe’s business or users. From external attacks to insider threats, our goal is to respond with speed and precision, remediate, and support the incident postmortem process. The team is distributed, working primarily in Eastern and Pacific time zones, and will regularly coordinate with stakeholders in Europe and Asia.
What you’ll do
You will leverage your security engineering experience to improve incident response capabilities at Stripe. You will manage and coordinate the entire incident response process, developing and implementing incident response plans, conducting risk assessments, establishing procedures, leading workstreams, and ensuring timely and effective resolution. You will also act as incident commander, collaborating with various internal stakeholders, performing post-incident analysis and reporting, and making continuous improvements to Stripe’s security incident response function.
Responsibilities
- Lead and coordinate security incident response activities and workstreams as the incident response manager (IRM)
- Analyze and investigate a broad range of threats or activities occurring on client devices, maintaining a high level of confidentiality and documenting incident details accordingly.
- Make decisions and recommendations based on the results of incident analysis and communicate the appropriate context to stakeholders, including insights to help identify, prevent, detect, and respond to anomalous or potentially malicious activity
- Develop, document, and implement strategies, runbooks, capabilities, and techniques for incident response.
- Work cross-functionally with security engineering and data science teams to build solutions for analyzing security events data at scale and protecting Stripe networks, systems, and data from threats
- Strengthen KPIs and metrics for measuring response effectiveness and provide clear and consistent reporting to internal stakeholders.
- Continuously improve security processes and response capabilities by building relationships with key stakeholders and collaborating with engineers and analysts.
- Mentor and develop other teammates, championing quality standards within the team.
Who you are
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements
- 5+ years experience in leading Security Incident Response
- B.S. or M.S. Computer Science or related field, or equivalent experience
- Expert knowledge of Python and SQL, and familiarity with other programming languages
- Existing experience with log analysis (e.g. first or third party applications, system / data access, event logs), network security, digital forensics, and incident response investigations
- Hands-on experience in analyzing and responding to security events, such as conducting log analysis, developing queries and analytics, troubleshooting security issues, and correlating complex data sets.
- Proficiency with developing and using novel analytical methods to automate response processes
- Excellent written and verbal communication skills, proactive in informing stakeholders, and ability to operate with little oversight.
- Ability to identify trends, insights, and relationships between internal and external data and intelligence sources to make risk mitigation recommendations.
Preferred qualifications
- Broad knowledge and experience across the information security domain, including familiarity with endpoint, email, network, identity management, cloud security, vulnerability management, incident response, and threat intelligence.
- Experience with engineering, data processing and analysis tools (e.g. Databricks, Trino, etc.)
- Familiarity with network observability, security software, or data engineering solutions (Chronicle, osquery, Splunk, etc.)
The annual US base salary range for this role is $163,100 - $244,700. For sales roles, the range provided is the role’s On Target Earnings ("OTE") range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. This salary range may be inclusive of several career levels at Stripe and will be narrowed during the interview process based on a number of factors, including the candidate’s experience, qualifications, and location. Applicants interested in this role and who are not located in the US may request the annual salary range for their location during the interview process.
Additional benefits for this role may include: equity, company bonus or sales commissions/bonuses; 401(k) plan; medical, dental, and vision benefits; and wellness stipends.
This job is no longer accepting applications
See open jobs at Stripe.See open jobs similar to "Incident Response Manager" General Catalyst.