Security Incident Commander, Threat Management Response - Meraki
-
Location:Minato, Japan
-
Alternate LocationAnywhere in Japan
-
Area of InterestEngineer - Software
-
Job TypeProfessional
-
Technology InterestCloud and Data Center
-
Job Id1430823
At Cisco Meraki, you'll be part of a close-knit, collaborative engineering team, working with passionate and talented individuals. In this role, you’ll have a significant influence on the tools we use to monitor and audit our systems, as well as on how and where we deploy them. You’ll play a key role in coordinating security incident responses and driving improvements across our entire technology stack, from the user interface to backend systems and device firmware. By collaborating with security teams, you'll help develop business-friendly security processes and improvements.
Your work will make an immediate, positive impact on our customers and the millions of people who rely on Meraki’s access points, switches, security appliances, and cameras daily. As we continue to grow, you'll help us strengthen our capabilities in threat detection and response.
Why Meraki?
At Meraki, we believe in creating products that our customers love, and we strive to build a culture that is inclusive, supportive, and empowering for all. We foster continuous learning, professional development, and collaboration. Cisco Meraki provides the resources and stability of a larger company, while maintaining the innovative spirit and culture of a startup.
About the Role:
The Threat Management Response team is responsible for 24x7x365 monitoring and rapid incident response for all Cisco Meraki environments. We are the last line of defense protecting our company and customers’ data from malicious threats. In this role, you’ll make a significant impact on the security of millions of users worldwide.
We are looking for individuals who are passionate about incident response, strategy development, and improving our incident response procedures and playbooks. You’ll be involved in revising processes and leading proactive efforts to drive how we respond to security incidents.
Work Schedule:
This position may require on-call work (including nights and weekends) as needed. Core hours are 9:30 AM PST – 6:30 PM (in your hired time zone), Monday through Friday.
Key Responsibilities:
- Serve on a rotation of security incident commanders, coordinating with major product teams to ensure quick mobilization for high-severity incidents.
- Lead and coordinate security incident response activities and investigations.
- Respond to escalations from junior incident responders during your on-call shifts.
- Write custom queries for Security Incident and Event Monitoring (SIEM) tools and SQL for data warehouse searches.
- Lead post-incident reviews and develop initiatives to improve our response strategies.
- Mentor and support other team members, promoting security best practices across Meraki.
Who You Are:
- You have broad knowledge and experience across multiple information security domains.
- You are skilled in cybersecurity incident response and have a calm, methodical approach under pressure.
- You have a strong understanding of threat actor tactics, techniques, and procedures (TTPs).
- You thrive in complex environments and can lead cross-functional teams during high-severity incidents.
- You are experienced in using threat intelligence to proactively identify risks and suspicious behavior.
- You have familiarity with incident response frameworks like NIST IR or similar.
- You can clearly communicate technical details to non-technical stakeholders.
- You are passionate about mentoring others and contributing to a positive team culture.
Qualifications:
- 6+ years of experience in cybersecurity incident response, with a focus on leading complex incidents.
- Experience with SIEM, EDR, vulnerability scanners, and other security tools.
- Familiarity with major cloud platforms (AWS, Azure, GCP) and operating systems (Windows/Mac/Linux).
- Strong understanding of core cybersecurity concepts, such as encryption, vulnerability management, and access control technologies (Active Directory, Okta, etc.).
- Knowledge of security compliance frameworks (PCI, SOC 2, FedRAMP).
Bonus Points for:
- Security certifications (CISSP, SANS GIAC, AWS).
- Experience in digital forensics, threat intelligence, or cloud security.
- Familiarity with frameworks like MITRE ATT&CK or D3FEND.
What We Offer:
- Competitive salary and benefits, including health insurance, retirement plans, and paid time off.
- Learning and development opportunities, including mentorship and industry certifications.
- A diverse, inclusive work environment that values everyone’s contributions.
- The opportunity to make a meaningful impact on millions of users worldwide.
When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. and/or Canada locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidate's hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. or Canada hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings.
Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday (for non-exempt employees), plus a day off for their birthday. Non-Exempt new hires accrue up to 16 days of vacation time off each year, at a rate of 4.92 hours per pay period. Exempt new hires participate in Cisco’s flexible Vacation Time Off policy, which does not place a defined limit on how much vacation time eligible employees may use, but is subject to availability and some business limitations. All new hires are eligible for Sick Time Off subject to Cisco’s Sick Time Off Policy and will have eighty (80) hours of sick time off provided on their hire date and on January 1st of each year thereafter. Up to 80 hours of unused sick time will be carried forward from one calendar year to the next such that the maximum number of sick time hours an employee may have available is 160 hours. Employees in Illinois have a unique time off program designed specifically with local requirements in mind. All employees also have access to paid time away to deal with critical or emergency issues. We offer additional paid time to volunteer and give back to the community.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco typically pays as follows:
.75% of incentive target for each 1% of revenue attainment up to 50% of quota;
1.5% of incentive target for each 1% of attainment between 50% and 75%;
1% of incentive target for each 1% of attainment between 75% and 100%; and once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.