Job Summary
About the team:
The Information Security organization advances the overall state of security at Rubrik through purposeful initiatives and coordination of large security projects. Information Security builds technologies, tools, and processes to better enable teams at Rubrik to develop secure software and protect data and systems with appropriate security controls. Information Security also develops systems to monitor and respond to attacks against our systems, provides awareness education to teams on security best practices for data protection, and ensures data sharing relationships with third parties in order to securely protect Rubrik information.
About the role:
Rubrik’s Security Operations Center (SOC) team is responsible for threat detection and incident response. This includes monitoring, triaging, and escalating security alerts from across the enterprise. The SOC is the first to respond to cyber security incidents, report on cyber threats, and drive changes needed to protect the organization.
As the Security Operations Incident Response Team Lead, FedRAMP you will be responsible for leading and mentoring a team of incident responders, overseeing the full lifecycle of security incidents from detection to resolution, and ensuring all activities adhere to stringent FedRAMP requirements. This role demands a deep understanding of incident response methodologies, security technologies, and the ability to operate effectively within a highly regulated environment.
What you'll do:
- Lead and act as the primary investigator during incident response (IR) activities, leveraging expertise in enterprise forensics. You'll ensure all IR investigations are prioritized, escalated properly, and are consistently thorough, accurate, and complete.
- Investigate escalated security alerts across Rubrik’s corporate network, endpoints, cloud, and SaaS environments.
- Collaborate with cross-functional teams to drive the timely resolution of IR investigations and response actions.
- Develop and execute regular exercises to continuously improve the team's incident response capabilities.
- Maintain accurate incident case attributes and detailed investigation documentation.
- Oversee the entire vulnerability management lifecycle, including scanning, assessment, prioritization, tracking, and remediation efforts across FedRAMP authorized systems.
- Analyze threats and vulnerabilities to accurately determine their criticality and risk.
- Collaborate with ta CTI team to identify, document, and report on information security (InfoSec) threats and emerging trends discovered during incident response activities.
- Lead after-action reviews and post-mortems to identify areas for improvement and implement lessons learned.
- Guide and train junior analysts, serving as an escalation point for complex investigations and process questions.
- Contribute to overall program maturity by providing feedback and ideas to refine and enhance detection capabilities and response processes.
Experience you'll need:
- 8+ years of progressive experience in cybersecurity, with at least 2+ years specifically in a security incident response leadership role.
- Strong technical expertise in security technologies such as SIEM (Sentinel, Splunk, QRadar, etc.), EDR (CrowdStrike, SentinelOne, etc.), network intrusion detection/prevention systems (IDS/IPS), firewalls, and cloud security tools.
- Deep understanding of incident response methodologies (e.g., NIST, SANS).
- Demonstrable experience working in environments subject to FedRAMP compliance (e.g., experience with NIST SP 800-53, FedRAMP controls, JAB/Agency ATO processes).
- Excellent analytical, problem-solving, and decision-making skills under pressure.
- Strong communication (written and verbal) and interpersonal skills, with the ability to effectively communicate complex technical information to both technical and non-technical audiences.
- Ability to work independently and as part of a team in a fast-paced, dynamic environment.
Preferred Qualifications:
- Relevant security certifications (e.g., CISSP, GCIH, GCFA, CCNP Security, GCP/AWS/Azure Security certifications).
- Certifications related to vulnerability management or penetration testing (e.g., CompTIA PenTest+, OSCP, CEH) are a plus.
- Experience with Security Orchestration, Automation, and Response (SOAR) platforms.
- Familiarity with various cloud service providers (AWS, Azure, GCP) and their security offerings.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis.
- Experience with digital forensic analysis artifacts, techniques and tools.
- Knowledge of compliance frameworks beyond FedRAMP (e.g., HIPAA, PCI-DSS, ISO 27001).
Security and Privacy Responsibilities:
This position carries special Security and Privacy Responsibilities for protecting the U.S. Federal Government’s interests:
- Know, acknowledge, and follow system-specific security policies and procedures;
- Protect data and individual privacy per requirements and regulations;
- Perform ongoing activities in compliance with service and contractual obligations;
- Participate in role-based training, completing assignments on a timely basis;
- Report security issues promptly, and aid investigation when needed;
- Support controlled changes and vulnerability remediation activities; and
- Work collaboratively with Information Security in designing, implementing, assessing or enhancing system-specific security and privacy controls.
Position Risk Designation:
This position carries duties and responsibilities involving the U.S. Federal Government’s interests. The selected incumbent may be subject to one or both of the additional background checks with periodic re-screening as noted below:
Position Risk Designation: Non-Sensitive, Low Risk, Tier 1
Incumbents without access to U.S. Government data may be required to complete Standard Form 85 and undergo a Tier 1 Investigation (T1) for non-sensitive positions of Low Risk. (Baseline screening; formerly National Agency Check and Inquiries (NACI)).
Position Risk Designation: Non-Sensitive, Moderate Risk, Tier 2 (Public Trust)
Incumbents with access to U.S. Government data may be required to complete Standard Form 85P and undergo Tier 2 (T2) Investigation for non-sensitive positions designated Moderate Risk.
Position Risk Designation:Moderate Risk Law Enforcement (CJIS)
When hired for a position where access to Moderate Risk criminal justice information is required, the employee must complete a fingerprint-based national criminal history background check within 30 days after the employee’s start date.
Join Us in Securing the World's Data
Rubrik (NYSE: RBRK) is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.
Linkedin | X (formerly Twitter) | Instagram | Rubrik.com
Inclusion @ Rubrik
At Rubrik, we are dedicated to fostering a culture where people from all backgrounds are valued, feel they belong, and believe they can succeed. Our commitment to inclusion is at the heart of our mission to secure the world’s data.
Our goal is to hire and promote the best talent, regardless of background. We continually review our hiring practices to ensure fairness and strive to create an environment where every employee has equal access to opportunities for growth and excellence. We believe in empowering everyone to bring their authentic selves to work and achieve their fullest potential.
Our inclusion strategy focuses on three core areas of our business and culture:
-
Our Company: We are committed to building a merit-based organization that offers equal access to growth and success for all employees globally. Your potential is limitless here.
-
Our Culture: We strive to create an inclusive atmosphere where individuals from all backgrounds feel a strong sense of belonging, can thrive, and do their best work. Your contributions help us innovate and break boundaries.
-
Our Communities: We are dedicated to expanding our engagement with the communities we operate in, creating opportunities for underrepresented talent and driving greater innovation for our clients. Your impact extends beyond Rubrik, contributing to safer and stronger communities.
Equal Opportunity Employer/Veterans/Disabled
Rubrik is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Rubrik provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Rubrik complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please contact us at hr@rubrik.com if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment.
Apply For This Job
* Required