Minato, Undisclosed, Japan
29 days ago
Security Incident Commander, Threat Management Response - Meraki

At Cisco Meraki, you'll be part of a close-knit, collaborative engineering team, working with passionate and talented individuals. In this role, you’ll have a significant influence on the tools we use to monitor and audit our systems, as well as on how and where we deploy them. You’ll play a key role in coordinating security incident responses and driving improvements across our entire technology stack, from the user interface to backend systems and device firmware. By collaborating with security teams, you'll help develop business-friendly security processes and improvements.

Your work will make an immediate, positive impact on our customers and the millions of people who rely on Meraki’s access points, switches, security appliances, and cameras daily. As we continue to grow, you'll help us strengthen our capabilities in threat detection and response.

Why Meraki?

At Meraki, we believe in creating products that our customers love, and we strive to build a culture that is inclusive, supportive, and empowering for all. We foster continuous learning, professional development, and collaboration. Cisco Meraki provides the resources and stability of a larger company, while maintaining the innovative spirit and culture of a startup.

About the Role:

The Threat Management Response team is responsible for 24x7x365 monitoring and rapid incident response for all Cisco Meraki environments. We are the last line of defense protecting our company and customers’ data from malicious threats. In this role, you’ll make a significant impact on the security of millions of users worldwide.

We are looking for individuals who are passionate about incident response, strategy development, and improving our incident response procedures and playbooks. You’ll be involved in revising processes and leading proactive efforts to drive how we respond to security incidents.

Work Schedule:

This position may require on-call work (including nights and weekends) as needed. Core hours are 9:30 AM PST – 6:30 PM (in your hired time zone), Monday through Friday.

Key Responsibilities:

Serve on a rotation of security incident commanders, coordinating with major product teams to ensure quick mobilization for high-severity incidents.Lead and coordinate security incident response activities and investigations.Respond to escalations from junior incident responders during your on-call shifts.Write custom queries for Security Incident and Event Monitoring (SIEM) tools and SQL for data warehouse searches.Lead post-incident reviews and develop initiatives to improve our response strategies.Mentor and support other team members, promoting security best practices across Meraki.

Who You Are:

You have broad knowledge and experience across multiple information security domains.You are skilled in cybersecurity incident response and have a calm, methodical approach under pressure.You have a strong understanding of threat actor tactics, techniques, and procedures (TTPs).You thrive in complex environments and can lead cross-functional teams during high-severity incidents.You are experienced in using threat intelligence to proactively identify risks and suspicious behavior.You have familiarity with incident response frameworks like NIST IR or similar.You can clearly communicate technical details to non-technical stakeholders.You are passionate about mentoring others and contributing to a positive team culture.

Qualifications:

6+ years of experience in cybersecurity incident response, with a focus on leading complex incidents.Experience with SIEM, EDR, vulnerability scanners, and other security tools.Familiarity with major cloud platforms (AWS, Azure, GCP) and operating systems (Windows/Mac/Linux).Strong understanding of core cybersecurity concepts, such as encryption, vulnerability management, and access control technologies (Active Directory, Okta, etc.).Knowledge of security compliance frameworks (PCI, SOC 2, FedRAMP).

Bonus Points for:

Security certifications (CISSP, SANS GIAC, AWS).Experience in digital forensics, threat intelligence, or cloud security.Familiarity with frameworks like MITRE ATT&CK or D3FEND.

What We Offer:

Competitive salary and benefits, including health insurance, retirement plans, and paid time off.Learning and development opportunities, including mentorship and industry certifications.A diverse, inclusive work environment that values everyone’s contributions.The opportunity to make a meaningful impact on millions of users worldwide.
Confirm your E-mail: Send Email