:
Company Overview
Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people's lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign's Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
What you'll do
We are looking for highly motivated and skilled CSIRT Investigators and Security Analysts to join our dynamic security team in India. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our "Detect & Respond" function. You will be at the forefront of identifying and investigating security incidents, triaging alerts from our Security Operations Center (SOC), and contributing to the continuous improvement of our incident response capabilities. This role requires a strong technical background, the ability to be on-call, excellent analytical skills, and a proactive approach to cybersecurity.
This position is an individual contributor role reporting to the Manager of CSIRT.
Responsibility
Perform initial triage and in-depth analysis of security alerts generated from our SIEM and other security monitoring tools
Correlate events from various log sources to identify potential security incidents
Determine the scope, severity, and potential impact of detected threats
Conduct technical investigations into cybersecurity incidents, including malware analysis, phishing attacks, web application compromises, and insider threats
Utilize digital forensics techniques on data and endpoints to gather evidence and understand incident timelines and methods
Support incident containment, eradication, and recovery efforts under the guidance of the CSIRT Manager
Document incident findings, actions taken, and lessons learned
Assist in the development and refinement of threat detection rules to improve SOC visibility
Participate in proactive threat hunting activities to uncover hidden threats within the enterprise environment
Stay informed about the latest threat intelligence and emerging attack techniques
Work with SIEM and SOAR platforms to optimize alert processing and incident workflows
Contribute to the creation and refinement of automated solutions for efficient incident response and reporting
Identify opportunities for automation to streamline security operations
Collaborate effectively with other security teams, IT, and business units during incident response
Provide clear and concise updates on incident status to the CSIRT Manager
Contribute to post-incident reports and analysis
Maintain working relationships with law enforcement when required
Job Designation
Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation)
Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.
What you bring
Basic
8+ years of hands-on experience in cybersecurity, with a focus on Security Operations (SOC) and/or Incident Response
Solid understanding of cybersecurity principles, incident response lifecycles, and security best practices
Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation
Familiarity with EDR solutions and their role in incident investigation
Strong familiarity with digital forensics principles and techniques and enterprise forensic solutions
Knowledge of scripting languages (e.g., Python, PowerShell, Bash) for automation and data analysis
Deep understanding of the MITRE ATT&CK framework and cyber kill chain
Strong analytical and problem-solving skills, with a keen eye for detail
Excellent communication skills, both written and verbal, with the ability to explain technical concepts clearly
Ability to work effectively as part of a team and independently under pressure
Knowledge of how to protect against AI threats
Preferred
Bachelor's degree in Computer Science, Information Security, or a related field
Industry certifications such as CompTIA Security+, CySA+, GCIH, GCFA, or CEH
Hands-on experience with SOAR platforms
Exposure to cloud security concepts (AWS, Azure, GCP)
Life at Docusign
Working here
Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what's right, every day. At Docusign, everything is equal.
We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you'll be loved by us, our customers, and the world in which we live.
Accommodation
Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at .
If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at for assistance.
#LI-Hybrid #LI-SA4
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.