Sr. Incident Responder

1 week ago


Bengaluru, India DocuSign Full time

Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM). What you'll do We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity. This position is an individual contributor role reporting to the Manager of CSIRT. Responsibility Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from various log sources to identify potential security incidents Determine the scope, severity, and potential impact of detected threats Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager Document incident findings, actions taken, and lessons learned Assist in the development and refinement of threat detection rules to improve SOC visibility Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment Stay informed about the latest threat intelligence and emerging attack techniques Work with SIEM and SOAR platforms to optimize alert processing and incident workflows Contribute to the creation and refinement of automated solutions for efficient incident response and reporting Identify opportunities for automation to streamline security operations Collaborate effectively with other security teams, IT, and business units during incident response Provide clear and concise updates on incident status to the CSIRT Manager Contribute to post-incident reports and analysis Maintain working relationships with law enforcement when required Job Designation Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law. What you bring Basic 8+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response Solid understanding of cybersecurity principles, incident response lifecycles, and security best practices Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation Familiarity with EDR solutions and their role in incident investigation Strong familiarity with digital forensics principles and techniques and enterprise forensic solutions Knowledge of scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis Deep understanding of the MITRE ATT&CK framework and cyber kill chain Strong analytical and problem-solving skills, with a keen eye for detail Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly Ability to work effectively as part of a team and independently under pressure Knowledge of how to protect against AI threats Preferred Bachelor's degree in Computer Science, Information Security, or a related field Industry certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH Hands-on experience with SOAR platforms Exposure to cloud security concepts (AWS, Azure, GCP) Life at Docusign Working here Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal. We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live. Accommodation Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at for assistance. Applicant and Candidate Privacy Notice #LI-Hybrid #LI-SA4Basic 8+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response Solid understanding of cybersecurity principles, incident response lifecycles, and security best practices Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation Familiarity with EDR solutions and their role in incident investigation Strong familiarity with digital forensics principles and techniques and enterprise forensic solutions Knowledge of scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis Deep understanding of the MITRE ATT&CK framework and cyber kill chain Strong analytical and problem-solving skills, with a keen eye for detail Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly Ability to work effectively as part of a team and independently under pressure Knowledge of how to protect against AI threats Preferred Bachelor's degree in Computer Science, Information Security, or a related field Industry certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH Hands-on experience with SOAR platforms Exposure to cloud security concepts (AWS, Azure, GCP)We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity. This position is an individual contributor role reporting to the Manager of CSIRT. Responsibility Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools Correlate events from various log sources to identify potential security incidents Determine the scope, severity, and potential impact of detected threats Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager Document incident findings, actions taken, and lessons learned Assist in the development and refinement of threat detection rules to improve SOC visibility Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment Stay informed about the latest threat intelligence and emerging attack techniques Work with SIEM and SOAR platforms to optimize alert processing and incident workflows Contribute to the creation and refinement of automated solutions for efficient incident response and reporting Identify opportunities for automation to streamline security operations Collaborate effectively with other security teams, IT, and business units during incident response Provide clear and concise updates on incident status to the CSIRT Manager Contribute to post-incident reports and analysis Maintain working relationships with law enforcement when required



  • Bengaluru, India Docusign Full time

    Job Description Company Overview Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people's lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of...


  • Bengaluru, Karnataka, India Docusign Full time ₹ 12,00,000 - ₹ 24,00,000 per year

    Company OverviewDocusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people's lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now,...

  • Incident Responder

    2 weeks ago


    Bengaluru, India AGCTS Full time

    In addition to real-time threats, you must be able to research, document, and report on emerging cybersecurity trends facing retail industries worldwide. - You must be able to demonstrate strong leadership abilities in a large corporate environment, as well as able to understand and convey technical risk aspects to different audiences. - Perform daily...

  • Incident Engineer

    2 days ago


    Bengaluru, Karnataka, India Augmented Database Pvt Ltd || Project Implementation || Staff Augmentation Full time ₹ 6,00,000 - ₹ 18,00,000 per year

    Senior Incident Manager positionExp-4 to 7 YrsRelevant- 3+ years of experience as Incident Manager/Sr. Incident EngineerLocation- BangaloreResponsibilities:Responsible for monitoring all major metrics via various monitoring tools and following the major incident management process in restoring the major impacting incidents.Responding to a reported service...


  • Bengaluru, Karnataka, India Temenos Full time

    **ABOUT TEMENOS** Temenos powers a world of banking that creates opportunities for billions of people and businesses everywhere. We do this through the pioneering spirit of 7500+ Temenosians who are passionate about making banking better, together. We serve 3000 banks from the largest to challengers and community banks in 150+ countries. We collaborate...

  • Incident Manager

    2 weeks ago


    Bengaluru, India The Nielsen Company Full time

    At Nielsen, we believe that career growth is a partnership. You ultimately own, fuel and set the journey. By joining our team of nearly 14,000 associates, you will become part of a community that will help you to succeed. We champion you because when you succeed, we do too. Embark on a new initiative, explore a fresh approach, and take license to think big,...


  • Bengaluru, India Autodesk Full time

    Job Requisition ID # 25WD93163About the Role As a Sr. Security Incident Response Engineer, you will be an essential contributor in our incident response team. In this role, you will harness your strong Splunk expertise to monitor, analyze, and investigate security incidents across multiple data sources. Your role is pivotal in maintaining our security...

  • Sr Incident Manager

    4 days ago


    Bengaluru, India Databricks Full time

    P-1485 At Databricks, we are passionate about empowering data teams to tackle the world’s most challenging problems — from bringing the next mode of transportation to reality to accelerating the development of medical breakthroughs. We achieve this by building and operating the world’s best data and AI infrastructure platform, enabling our customers to...

  • Incident Response

    2 weeks ago


    Bengaluru, Karnataka, India fc1f2c4c-eb43-414c-a20c-6d14fd88a83e Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Role & responsibilities5+ years in Detect, Analyze, Investigate, and report qualified security incidents to the Client as per the defined SLAProvide recommendations to the security incidents reported as per SLAInvestigates incidents using various security event sources (FW, IDS, PROXY, AD, EDR, DLP etc.).Investigations into non-standard incidents and...


  • Bengaluru, Karnataka, India Tata Consultancy Services Full time ₹ 4,00,000 - ₹ 12,00,000 per year

    TCS is hiring for Major Incident Manager Professionals for Bangalore Location Job Role:Major Incident ManagerJob Experience:4 to 6 YearsJob Location:BangaloreInterview Mode:VirtualInterview Date:1st November, 2025What we are looking for:Must Have:Good communication Skills, Analytical and Time Management.Good to Have:ITIL CertificationExpectation from...