Description
Salesforce, the leader in enterprise cloud computing and one of the top 10 places to work according to Fortune magazine, is seeking a Lead Incident Responder for our Computer Security Incident Response Team (CSIRT).
About the team:
The CSIRT is responsible for 24x7x365 security monitoring and rapid incident response across all Salesforce environments. We are the ‘tip of the spear’ and the last line of defense protecting company and customer data from our adversaries.
The Lead Incident Responder will handle the response to high severity incidents, act as a technical escalation point for the team of Incident Responders, and develop process improvement and automation.
This individual will also lead significant strategic projects, with a focus on enhancements to detection and incident response capabilities. This position is a part of the Salesforce's Global CSIRT. As a result, on-call work (including overnight and weekends) is required on an as-needed basis. The core hours for this position are 10:00AM EST - 6:00PM EST, Monday through Friday.
What you should have:
8+ years experience in the Information Security field, including operational security monitoring and incident response experience.
System forensics/investigation skills across Windows, Mac OS X, Linux, including analyzing system artifacts (file system, memory, running processes, network connections) for indicators of infection/compromise.
Familiarity responding to security incidents in various cloud environments (AWS, Azure, Google Cloud) with knowledge of relevant architectures, CI/CD, and logging.
Can lead and handle the response to high-priority, high-visibility operational security issues including insider investigations, sophisticated adversaries, and web application attacks.
The ability to build positive relationships with peers, both internal and external to your functional group, and with peers/professional organizations outside the company.
Deep technical understanding of the information security threat landscape (attack vectors and tools, best practices for securing systems and networks, etc.).
Must have strong verbal and written communication skills; ability to communicate effectively and clearly to executive leadership.
U.S. citizen (U.S. born or naturalized) who does not hold dual citizenship. Agree to complete a Minimum Background Investigation (MBI) for a Moderate Public Trust position with the U.S. federal government.
Nice to have:
Authority in a related domain (e.g. malware analysis, detection writing, forensics, cloud security, offensive security, artificial intelligence).
Prior experience in a 24x7x365 operations environment.
Proven history of automation and capability uplift through tool development, SOAR, etc.
Relevant information security certifications, such as SANS GCIH, SANS GPEN, SANS GFCA, Offensive Security OSCP, etc.
AI and LLM Integration for SOC Operations. Experience with AI-powered security tools, Large Language Models (LLMs) for threat analysis and incident response automation, and familiarity with AI-driven detection systems to enhance SOC operational efficiency and reduce response times.
For roles in San Francisco and Los Angeles: Pursuant to the San Francisco Fair Chance Ordinance and the Los Angeles Fair Chance Initiative for Hiring, Salesforce will consider for employment qualified applicants with arrest and conviction records.