Security Incident Commander, Threat Management Response - Meraki
-
Location:Minato, Japan
-
Alternate LocationAnywhere in Japan
-
Area of InterestEngineer - Software
-
Job TypeProfessional
-
Technology InterestCloud and Data Center
-
Job Id1430816
At Cisco Meraki, you'll be part of a close-knit, collaborative engineering team, working with passionate and talented individuals. In this role, you’ll have a significant influence on the tools we use to monitor and audit our systems, as well as on how and where we deploy them. You’ll play a key role in coordinating security incident responses and driving improvements across our entire technology stack, from the user interface to backend systems and device firmware. By collaborating with security teams, you'll help develop business-friendly security processes and improvements.
Your work will make an immediate, positive impact on our customers and the millions of people who rely on Meraki’s access points, switches, security appliances, and cameras daily. As we continue to grow, you'll help us strengthen our capabilities in threat detection and response.
Why Meraki?
At Meraki, we believe in creating products that our customers love, and we strive to build a culture that is inclusive, supportive, and empowering for all. We foster continuous learning, professional development, and collaboration. Cisco Meraki provides the resources and stability of a larger company, while maintaining the innovative spirit and culture of a startup.
About the Role:
The Threat Management Response team is responsible for 24x7x365 monitoring and rapid incident response for all Cisco Meraki environments. We are the last line of defense protecting our company and customers’ data from malicious threats. In this role, you’ll make a significant impact on the security of millions of users worldwide.
We are looking for individuals who are passionate about incident response, strategy development, and improving our incident response procedures and playbooks. You’ll be involved in revising processes and leading proactive efforts to drive how we respond to security incidents.
Work Schedule:
This position may require on-call work (including nights and weekends) as needed. Core hours are 9:30 AM PST – 6:30 PM (in your hired time zone), Monday through Friday.
Key Responsibilities:
- Serve on a rotation of security incident commanders, coordinating with major product teams to ensure quick mobilization for high-severity incidents.
- Lead and coordinate security incident response activities and investigations.
- Respond to escalations from junior incident responders during your on-call shifts.
- Write custom queries for Security Incident and Event Monitoring (SIEM) tools and SQL for data warehouse searches.
- Lead post-incident reviews and develop initiatives to improve our response strategies.
- Mentor and support other team members, promoting security best practices across Meraki.
Who You Are:
- You have broad knowledge and experience across multiple information security domains.
- You are skilled in cybersecurity incident response and have a calm, methodical approach under pressure.
- You have a strong understanding of threat actor tactics, techniques, and procedures (TTPs).
- You thrive in complex environments and can lead cross-functional teams during high-severity incidents.
- You are experienced in using threat intelligence to proactively identify risks and suspicious behavior.
- You have familiarity with incident response frameworks like NIST IR or similar.
- You can clearly communicate technical details to non-technical stakeholders.
- You are passionate about mentoring others and contributing to a positive team culture.
Qualifications:
- 6+ years of experience in cybersecurity incident response, with a focus on leading complex incidents.
- Experience with SIEM, EDR, vulnerability scanners, and other security tools.
- Familiarity with major cloud platforms (AWS, Azure, GCP) and operating systems (Windows/Mac/Linux).
- Strong understanding of core cybersecurity concepts, such as encryption, vulnerability management, and access control technologies (Active Directory, Okta, etc.).
- Knowledge of security compliance frameworks (PCI, SOC 2, FedRAMP).
Bonus Points for:
- Security certifications (CISSP, SANS GIAC, AWS).
- Experience in digital forensics, threat intelligence, or cloud security.
- Familiarity with frameworks like MITRE ATT&CK or D3FEND.
What We Offer:
- Competitive salary and benefits, including health insurance, retirement plans, and paid time off.
- Learning and development opportunities, including mentorship and industry certifications.
- A diverse, inclusive work environment that values everyone’s contributions.
- The opportunity to make a meaningful impact on millions of users worldwide.
When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. and/or Canada locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidate's hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. or Canada hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings. Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday, plus a day off for their birthday. Employees accrue up to 20 days of Paid Time Off (PTO) each year and have access to paid time away to deal with critical or emergency issues without tapping into their PTO. We offer additional paid time to volunteer and give back to the community. Employees are also able to purchase company stock through our Employee Stock Purchase Program.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco typically pays as follows:
.75% of incentive target for each 1% of revenue attainment up to 50% of quota;
1.5% of incentive target for each 1% of attainment between 50% and 75%;
1% of incentive target for each 1% of attainment between 75% and 100%; and once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.