Incident Response Manager

Remote, US

Stripe

Stripe powers online and in-person payment processing and financial solutions for businesses of all sizes. Accept payments, send payouts, and automate financial processes with a suite of APIs and no-code tools.

View company page

Who we are

About Stripe

Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.

About the team

The Security Incident Response team works to analyze, investigate, and respond to threats before they impact Stripe’s business or users. From external attacks to insider threats, our goal is to respond with speed and precision, remediate, and support the incident postmortem process. The team is distributed, working primarily in Eastern and Pacific time zones, and will regularly coordinate with stakeholders in Europe and Asia.

What you’ll do

You will leverage your security engineering experience to improve incident response capabilities at Stripe. You will manage and coordinate the entire incident response process, developing and implementing incident response plans, conducting risk assessments, establishing procedures, leading workstreams, and ensuring timely and effective resolution. You will also act as incident commander, collaborating with various internal stakeholders, performing post-incident analysis and reporting, and making continuous improvements to Stripe’s security incident response function.

Responsibilities

  • Lead and coordinate security incident response activities and workstreams as the incident response manager (IRM) 
  • Analyze and investigate a broad range of threats or activities occurring on client devices, maintaining a high level of confidentiality and documenting incident details accordingly.
  • Make decisions and recommendations based on the results of incident analysis and communicate the appropriate context to stakeholders, including insights to help identify, prevent, detect, and respond to anomalous or potentially malicious activity
  • Develop, document, and implement strategies, runbooks, capabilities, and techniques for incident response.
  • Work cross-functionally with security engineering and data science teams to build solutions for analyzing security events data at scale and protecting Stripe networks, systems, and data from threats
  • Strengthen KPIs and metrics for measuring response effectiveness and provide clear and consistent reporting to internal stakeholders.
  • Continuously improve security processes and response capabilities by building relationships with key stakeholders and collaborating with engineers and analysts.
  • Mentor and develop other teammates, championing quality standards within the team. 

Who you are

We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.

Minimum requirements

  • 5+ years experience in leading Security Incident Response 
  • B.S. or M.S. Computer Science or related field, or equivalent experience
  • Expert knowledge of Python and SQL, and familiarity with other programming languages
  • Existing experience with log analysis (e.g. first or third party applications, system / data access, event logs), network security, digital forensics, and incident response investigations
  • Hands-on experience in analyzing and responding to security events, such as conducting log analysis, developing queries and analytics, troubleshooting security issues, and correlating complex data sets.
  • Proficiency with developing and using novel analytical methods to automate response processes
  • Excellent written and verbal communication skills, proactive in informing stakeholders, and ability to operate with little oversight.
  • Ability to identify trends, insights, and relationships between internal and external data and intelligence sources to make risk mitigation recommendations.

Preferred qualifications

  • Broad knowledge and experience across the information security domain, including familiarity with endpoint, email, network, identity management, cloud security, vulnerability management, incident response, and threat intelligence.
  • Experience with engineering, data processing and analysis tools (e.g. Databricks, Trino, etc.)
  • Familiarity with network observability, security software, or data engineering solutions (Chronicle, osquery, Splunk, etc.)
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Analytics Cloud Computer Science Databricks Forensics Incident response KPIs Log analysis Network security Python Risk assessment Splunk SQL Threat intelligence Vulnerability management

Perks/benefits: Career development Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  31  6  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.