Incident Response Engineer

3 days ago


Remote India Turing Full time ₹ 15,00,000 - ₹ 20,00,000 per year
Job Description

Turing provides a platform that connects talents with our enterprise customers in a global marketplace. Our security engineers work on a broad set of efforts focusing on scaling and automating security infrastructure and processes. Our security engineers work on building the industry standard and implementing the best security practices in our platforms that connect enterprise environments. Our security engineers define and enforce the security protocols to operate services in a protected environment. Our security engineers also build and manage the framework for data access both internally and externally.

At Turing, we are continuously addressing the complex challenges of scaling our systems in a safe and secure manner. We're looking for passionate security engineers and leaders who are excited to solve intricate security problems in dynamic enterprise environments.

Overview

We are seeking an experienced Incident Response Engineer to join our global security operations team. Based in India as part of a shared technical escalation pool, this role is central to handling complex security incidents, engineering detection capabilities, and leading forensic investigations. You will drive improvements in detection content, response automation, and mentor junior analysts while supporting critical security infrastructure and processes.

Responsibilities:
  • Lead complex investigations into advanced threats, including root cause analysis, malware behaviour, persistence mechanisms, and forensic evidence collection across cloud and endpoint environments.
  • Build lightweight tools and scripts to support forensic analysis, incident enrichment, or threat hunting (e.g., log correlation, IOC extraction).
  • Act as the Incident Commander (IC) during high-severity incidents, leading technical response and coordinating with stakeholders across IT, Legal, and Engineering.
  • Provide feedback on SIEM detection logic (e.g., Chronicle rules, UDM mappings) based on real investigations and hunting findings, in collaboration with MDR and Detection Engineering.
  • Contribute to SOAR playbook development and refinement - including enrichment, escalation logic, and automated containment steps to accelerate incident handling and reduce response time.
  • Define escalation criteria, triage workflows, and decision trees to guide team to ensure clear handoffs for high-priority incidents.
  • Collaborate with platform owners to tune and validate security tools (e.g., EDR policies, SOAR workflows) for effective incident detection and response.
  • Provide input on detection and response tooling gaps based on incident experience and help evaluate solutions where needed.
  • Build or extend automation for investigation tasks, enrichment, or containment actions using APIs and lightweight scripts.
  • Conduct proactive threat hunts using IOC searches, TTP mapping (MITRE ATTACK), and internal behavioural data to detect hidden or emerging threats.
  • Develop threat hunting hypotheses based on current threat landscape or recent incidents, test them using available telemetry, and document outcomes and recommendations.
  • Mentor team through real-case reviews, knowledge sharing, and training sessions to strengthen their triage, investigation, and escalation skills.
  • Contribute to internal playbooks and IR documentation to ensure procedures, tools, and best practices are clearly documented and regularly updated.
Qualifications Needed:
  • Required Skills
    • Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related field (or equivalent practical experience).
    • 5 years of experience in Security Operations, Incident Response, or Detection Engineering roles.
    • Demonstrated experience with digital forensics, malware analysis, and network-based incident investigations.
    • Strong hands-on experience with SIEM platforms such as Splunk, Chronicle, Elastic, or QRadar.
    • Proficiency in scripting languages (e.g., Python, Bash, PowerShell), and familiarity with configuration formats like YAML for automation and tooling.
    • Deep understanding of EDR solutions (e.g., CrowdStrike, SentinelOne) and SOAR platforms.
    • Working knowledge of the MITRE ATT&CK framework and TTP-driven detection and response.
    • Familiarity with threat intelligence and applying it to hunt and detect advanced threats.
    • Excellent communication and collaboration skills, especially during incident handling.

  • Good to have:
    • Industry-recognized certifications such as GIAC GCFA, GCIH, GREM, GCIA, or OSCP.
    • Experience with memory analysis tools (e.g., Volatility, Rekall).
    • Experience handling security incidents in cloud-native environments (e.g., GCP, Azure, SaaS platforms).
    • Experience writing detection logic using YARA, Sigma rules, or Sysmon.
    • Familiarity with automation platforms (e.g., Phantom, XSOAR, StackStorm).
    • Contributions to open-source IR tools or threat research communities.
    • Experience integrating security tooling with workflow platforms (e.g., Slack, Jira) to support response automation and incident coordination.
    • Knowledge of compliance-driven incident response requirements (e.g., SOC 2, ISO 27001, breach notifications).


  • India AiiR Response Full time

    Company Description AiiR is the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery, reducing incident costs and response times. At the core of AiiR is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts...


  • Remote, India turing Full time US$ 1,00,000 - US$ 1,50,000 per year

    Location: Remote - IndiaAbout TuringBased in Palo Alto, California, Turing is one of the world's fastest-growing AI companies accelerating the advancement and deployment of powerful AI systems. Turing helps customers in two ways: working with the world's leading AI labs to advance frontier model capabilities in thinking, reasoning, coding, agentic behavior,...


  • India beBeeCybersecurity Full time ₹ 1,80,00,000 - ₹ 2,50,00,000

    Incident Response Specialist JobThis is a highly critical role that involves leading and coordinating the response to information security incidents. The ideal candidate will have a strong understanding of various attack vectors, threat intelligence, and incident response methodologies.The selected individual will drive the full incident lifecycle from...


  • India beBeeIncident Full time US$ 7,50,000 - US$ 15,00,000

    Job Summary:The Incident Coordination team is a part of the Infrastructure Engineering Operations group, responsible for quickly mitigating incidents and ensuring necessary steps are taken to reduce their recurrence. We aim to provide timely incident updates and foster a collaborative environment where team members can work together efficiently.About Us:As...


  • India beBeeincidentresponse Full time ₹ 1,50,00,000 - ₹ 2,51,00,000

    Incident Response Specialist Position OverviewWe are seeking a seasoned professional to join our product innovation team in India.Main Responsibilities:Expertise in the end-to-end incident response lifecycle, particularly across ransomware, business email compromise, insider threat, and regulatory breach scenarios.Translate real-world IR experiences into...


  • India Optel Group Full time

    OPTEL Responsible Agile Innovative OPTEL is a global company that develops transformative software middleware and hardware solutions to secure and ensure supply chain compliance in major industry sectors such as pharmaceuticals and food with the goal of reducing the effects of climate change and enabling sustainable living If you are driven by the...


  • India beBeeCybersecurity Full time ₹ 80,00,000 - ₹ 1,20,00,000

    Cybersecurity Threat HunterJob Summary:The ideal candidate will lead and coordinate the response to information security incidents, safeguarding our organization by driving the full incident lifecycle from detection and analysis through containment, eradication, and recovery.This individual will collaborate closely with various internal teams and external...

  • Incident Responder

    8 hours ago


    Remote, India Sei Full time

    Provide analysis and trending methods of security log data of heterogeneous security devicesProvide incident response (“IR”) support when analysis identifies actionable incidentProvide threat and vulnerability analysis as well as security advisory servicesInvestigate, document and report on information security issues and trends that are observed through...

  • Incident Manager

    1 week ago


    India Akamai Full time

    Do you like working on high impact incidents and problem solvingWould you like the opportunity to solve critical technical challengesAct as a trusted AdvisorThe Incident Coordination team is part of the Infrastructure Engineering Operations group We re a team whose goals are ensuring that incidents are quickly mitigated incident status is well...

  • Incident Commander

    1 day ago


    India Smarsh Full time

    **Who are we?** Smarsh empowers its customers to manage risk and unleash intelligence in their digital communications. Our growing community of over 6500 organizations in regulated industries counts on Smarsh every day to help them spot compliance, legal or reputational risks in 80+ communication channels before those risks become regulatory fines or...