Cisco Meraki Logo

Cisco Meraki

Senior Security Incident Commander - (Threat Management) / Commandant principal des incidents de sécurité

Posted 24 Days Ago
Be an Early Applicant
Easy Apply
Remote
Hiring Remotely in Canada
Senior level
Easy Apply
Remote
Hiring Remotely in Canada
Senior level
As a Senior Security Incident Commander, you'll lead the response to high-severity security incidents, working across teams to mobilize rapid incident management. The role includes monitoring security events, performing malware analysis, and improving incident response capabilities. You'll be on-call to respond to incidents as needed, ensuring the protection of customer data and systems.
The summary above was generated by AI

Applications are accepted until further notice

At Cisco Meraki, we know that technology can connect, empower, and drive us. Our mission is to simplify technology so our customers can focus on what's most meaningful to them: their students, patients, customers, and businesses. We’re making networking easier, faster, and intelligent with technology that simply works.

The modern world runs on the internet, and the internet cannot exist without its underlying infrastructure. Meraki makes setting up, leading, and maintaining that infrastructure easier than it has ever been before. Meraki enables connectivity everywhere from neighborhood cafes to education institutions to global hospitality groups operating thousands of sites!

The Threat Management Response team is responsible for 24x7x365 monitoring and rapid incident response for all Cisco Meraki environments. We are the last line of defense to protect the company and our customer's data from our threat actors and adversaries. You will have a significant impact on the security of millions of Cisco Meraki users all around the world!

Incidents can happen at any time, as such this position requires on-call work (including overnight and weekends) on an as-needed basis. The core hours for this position are 9:30 AM PST - 6:30 PM (in the time zone you are hired for), Monday through Friday.

Key responsibilities:

  • Serve on a rotation of security incident commanders, work with heads of every major product team to ensure a quick mobilization for high-severity incidents
  • Experience responding to high severity incidents and handling the remediation process. (e.g. Malware analysis, large scale phishing attacks, production intrusion, etc.)
  • Familiarity with the following tools:
  • File Integrity Monitoring (FIM)
  • Vulnerability Scanners
  • Network and Host Intrusion Detection (IDS) such as SNORT/Sourcefire, Palo Alto, etc.
  • Incident Response Case Management Tools
  • Network sniffers and packet tracing tools such as DSS, Ethereral, tcpdump, Wireshark, etc.
  • Investigate security events for the following platforms and technologies:
  • Cloud (AWS, Azure, GCP)
  • Windows/Mac/Linux OS
  • Cisco physical and virtual network devices and platforms
  • Perform basic forensics when security incidents occur
  • Develop, document, and lead initiatives to improve Incident Response strategies, runbooks, capabilities, and technologies

You are an ideal candidate if you:

  • Understand common threat actor tactics, techniques, and procedures (TTPs) and how they are chained together
  • Have experience leading threat hunts, using available logs and threat intelligence to proactively identify and investigate potential risks and suspicious behavior
  • Successful candidates typically have 6+ years in Cybersecurity Incident Response roles, primarily passionate about leading sophisticated incidents involving multi-functional teams.
  • Understand major security compliance frameworks such as PCI, SOC 2, and FedRAMP as they relate to incident monitoring and response

Bonus points for:

  • Relevant industry security certifications such as CISSP, SANS GIAC (e.g. GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc.
  • Familiarity with other security verticals such as: Digital Forensics, Threat Intelligence, Threat Detection, Application Security, Cloud Security, Offensive Security
  • Networking experience with LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP, and NSRP) routing protocols and technologies
  • Experience with IoT platforms, large-scale distributed systems, and/or client-server architectures

At Cisco .Meraki, we’re challenging the status quo with the power of diversity, inclusion, and collaboration. When we connect different perspectives, we can imagine new possibilities, encourage innovation, and release the full potential of our people. We’re building an employee experience that includes appreciation, belonging, growth, and purpose for everyone.

Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records. 


-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Les candidatures sont acceptées jusqu'à nouvel ordre


Chez Cisco Meraki, nous savons que la technologie peut nous unir, nous donner les moyens d’agir et nous stimuler. Notre mission est de simplifier la technologie afin que nos clients puissent se concentrer sur ce qui compte le plus pour eux : leurs étudiants, leurs patients, leurs clients et leurs entreprises. Nous rendons la mise en réseau plus facile, plus rapide et plus intelligente grâce à une technologie qui fonctionne tout simplement.

Le monde moderne fonctionne sur Internet, et Internet ne peut pas exister sans son infrastructure sous-jacente. Meraki facilite plus que jamais la configuration, la gestion et la maintenance de cette infrastructure. Meraki permet la connectivité partout, des cafés de quartier aux établissements d’enseignement en passant par les groupes hôteliers mondiaux exploitant des milliers de sites!

L'équipe de gestion des menaces est responsable de la supervision 24 h sur 24, ainsi que de la réponse rapide aux incidents pour tous les environnements Cisco Meraki. Nous sommes la dernière ligne de défense pour protéger l'entreprise et les données de nos clients contre les auteurs de menaces et les adversaires. Vous aurez un impact significatif sur la sécurité de millions d'utilisateurs de Cisco Meraki à travers le monde!

Les incidents peuvent survenir à tout moment, ce qui signifie que ce poste nécessite du travail sur appel (incluant la nuit et les fins de semaine) selon les besoins. Les heures principales pour ce poste sont de 9 h 30 à 18 h 30 HNP (heures du fuseau horaire dans lequel vous êtes embauché), du lundi au vendredi.

Principales responsabilités :

  • Faire partie d’une rotation de chefs des incidents et collaborer avec les responsables de chaque équipe de produits majeurs pour assurer une mobilisation rapide pour les incidents de gravité élevée.
  • Expérience de la gestion des incidents de gravité élevée et de la gestion du processus de correction. (p. ex., analyse des programmes malveillants, attaques par hameçonnage à grande échelle, intrusion dans la production, etc.)
  • Connaissance des outils suivants :
  • Surveillance de l’intégrité des fichiers (FIM)
  • Détecteur de vulnérabilité
  • Détection d’intrusion au niveau du réseau et de l’hôte (SDI) comme SNORT/Sourcefire, Palo Alto, etc.
  • Outils de gestion des cas de réponse aux incidents
  • Outils d'analyse réseau et de traçage de paquets comme DSS, Ethereral, tcpdump, Wireshark, etc.
  • Enquêter sur les événements de sécurité pour les plateformes et les technologies suivantes :
  • Nuage (AWS, Azure, GCP)
  • Systèmes d’exploitation Windows/Mac/Linux
  • Périphériques et plateformes réseau physiques et virtuels de Cisco
  • Effectuer des criminalistiques de base lorsque des incidents se produisent
  • Élaborer, documenter et diriger des initiatives pour améliorer les stratégies, les guides, les capacités et les technologies de gestion des incidents

Vous êtes un candidat idéal si :

  • Comprendre les tactiques, techniques et procédures (TTP) des auteurs des menaces les plus courantes et la façon dont elles sont liées
  • Avoir de l'expérience dans la conduite de recherches de menaces en utilisant les journaux disponibles et les informations sur les menaces pour identifier de manière proactive et enquêter les risques et les comportements suspects
  • Les candidats retenus ont généralement plus de six ans d’expérience dans des postes d’intervention en cas d’incident de cybersécurité et sont principalement passionnés par la gestion d’incidents sophistiqués impliquant des équipes multifonctionnelles.
  • Comprendre les principaux cadres de conformité en matière de sécurité tels que PCI, SOC 2 et FedRAMP dans le contexte de la supervision et de la réponse aux incidents

Des atouts supplémentaires si :

  • Certifications de sécurité pertinentes du secteur, comme CISSP, SANS GIAC (p. ex., GCIH, GNFA, GCFE, GCFA, GREM), certifications AWS (SAA, protocole SAP (Session Announcement Protocol) ou SCS), etc.
  • Connaissance d’autres domaines de la sécurité comme la criminalistique numérique, les informations sur les menaces, la détection des menaces, la sécurité des applications, la sécurité cloud et la sécurité offensive
  • Expérience en réseautique avec le routage réseau local et étendu LAN)/WAN et les protocoles et technologies de routage à haute disponibilité (OSPF, BGP4/iBGP, EIGRP et NSRP)
  • Expérience avec les plateformes d’IDO, les systèmes distribués à grande échelle ou les architectures client-serveur

Chez Cisco Meraki, nous défions le statu quo grâce à la puissance de la diversité, de l’inclusion et de la collaboration. Lorsque nous mettons en relation différentes perspectives, nous pouvons imaginer de nouvelles possibilités, encourager l’innovation et libérer le plein potentiel de nos employés. Nous créons une expérience pour les employés qui inclut l’acceptation, l’appartenance, la croissance et des objectifs pour tous.

Cisco est un employeur d’action affirmative et d’égalité des chances, et tous les candidats qualifiés seront pris en considération pour un emploi sans égard à la race, à la couleur, à la religion, au sexe, à l’orientation sexuelle, à l’origine nationale, aux caractéristiques génétiques, à l’âge, à l’invalidité, au statut d’ancien combattant ou à tout autre motif protégé par la loi. Cisco envisagera pour l’emploi, au cas par cas, des candidats qualifiés avec des dossiers d’arrestation et de condamnation.



 

 

 

 

 

 

#LI-Remote

Compensation Range:

$115,900$160,400 CAD

Message to applicants applying to work in the U.S. and/or Canada: 
When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. and/or Canada locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidate's hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. or Canada hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process.

U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings.

Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday (for non-exempt employees), plus a day off for their birthday. Non-Exempt new hires accrue up to 16 days of vacation time off each year, at a rate of 4.92 hours per pay period. Exempt new hires participate in Cisco’s flexible Vacation Time Off policy, which does not place a defined limit on how much vacation time eligible employees may use, but is subject to availability and some business limitations. All new hires are eligible for Sick Time Off subject to Cisco’s Sick Time Off Policy and will have eighty (80) hours of sick time off provided on their hire date and on January 1st of each year thereafter.  Up to 80 hours of unused sick time will be carried forward from one calendar year to the next such that the maximum number of sick time hours an employee may have available is 160 hours. Employees in Illinois have a unique time off program designed specifically with local requirements in mind. All employees also have access to paid time away to deal with critical or emergency issues. We offer additional paid time to volunteer and give back to the community.

Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco typically pays as follows:

.75% of incentive target for each 1% of revenue attainment up to 50% of quota;

1.5% of incentive target for each 1% of attainment between 50% and 75%;

1% of incentive target for each 1% of attainment between 75% and 100%; and once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.

For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.  

Top Skills

Cloud
Cybersecurity
Incident Response
Linux
macOS
Windows

Similar Jobs at Cisco Meraki

Be an Early Applicant
3 Days Ago
Canada
Remote
3,000 Employees
Senior level
3,000 Employees
Senior level
Hardware • Information Technology • Security • Software • Cybersecurity • Conversational AI
As a Senior Privacy Architect, you will enhance privacy engineering standards and advance privacy goals in products and services. Responsibilities include analyzing software designs for privacy vulnerabilities, developing technical solutions, and collaborating with product management and engineering teams to ensure compliance with privacy regulations.
Be an Early Applicant
5 Days Ago
Canada
Remote
3,000 Employees
Senior level
3,000 Employees
Senior level
Hardware • Information Technology • Security • Software • Cybersecurity • Conversational AI
As a Senior Security Engineer at Cisco Meraki, you will engineer and operate the SIEM environment using Splunk, collaborate with engineering and IT teams, and advance the security engineering strategy. You will also work on security controls and enhance the security maturity of the organization.

What you need to know about the Vancouver Tech Scene

Raincouver, Vancity, The Big Smoke — Vancouver is known by many names, and in recent years, it has gained a reputation as a growing hub for both tech and sustainability. Renowned for its natural beauty, the city has become a magnet for professionals eager to create environmental solutions, and with an emphasis on clean technology, renewable energy and environmental innovation, it's attracted companies across various industries, all working toward a shared goal: advancing clean technology.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account