Senior Incident Response Manager (Menlo Park, CA) #4262

Sorry, this job was removed at 08:20 p.m. (CST) on Tuesday, Jun 24, 2025
Be an Early Applicant
Menlo Park, CA
Hybrid
131K-164K Annually
Artificial Intelligence • Big Data • Healthtech • Machine Learning • Software • Biotech
GRAIL is a healthcare company whose mission is to detect cancer early, when it can be cured.
The Role
Our mission is to detect cancer early, when it can be cured. We are working to change the trajectory of cancer mortality and bring stakeholders together to adopt innovative, safe, and effective technologies that can transform cancer care.

We are a healthcare company, pioneering new technologies to advance early cancer detection. We have built a multi-disciplinary organization of scientists, engineers, and physicians and we are using the power of next-generation sequencing (NGS), population-scale clinical studies, and state-of-the-art computer science and data science to overcome one of medicine’s greatest challenges.

GRAIL is headquartered in Menlo Park, California, with locations in Washington, D.C., North Carolina, and the United Kingdom. It is supported by leading global investors and pharmaceutical, technology, and healthcare companies.

For more information, please visit grail.com.

We are seeking an experienced Senior Incident Response Manager to lead our Platform, security and incident response and recovery efforts, collaborating closely with Platform Engineering and Cybersecurity teams to ensure seamless incident detection, response, and resolution. The ideal candidate has deep expertise in incident handling, threat intelligence, automation, and cloud-native security within modern hybrid environments.

This is a hybrid role in our Menlo Park, CA location

Responsibilities

  • Incident Response Leadership:
  • Lead end-to-end incident response, from identification to containment, eradication, and recovery.
  • Develop, maintain, and execute IR playbooks and runbooks aligned with NIST 800-61, CIS, and ISO 27001 standards.
  • Oversee threat hunting activities to proactively identify vulnerabilities and threats.
  • Security Monitoring & Detection:
  • Manage SIEM platforms, intrusion detection systems, and anomaly detection tools for real-time analysis.
  • Implement monitoring for hybrid environments (AWS, GCP, Azure, on-prem).
  • Conduct regular threat analysis, vulnerability assessments, and risk evaluations.
  • Collaboration with Platform Engineering Teams:
  • Integrate security into CI/CD pipelines and DevSecOps processes.
  • Work closely with DevOps and SRE to enhance infrastructure resilience, automation, and fault tolerance.
  • Drive security improvements in container orchestration (Kubernetes, Docker) and infrastructure as code (Terraform, Ansible).
  • Forensic Analysis & Reporting:
  • Conduct forensic investigations on affected systems, collecting and preserving evidence.
  • Produce executive-level incident reports and technical root-cause analyses.
  • Present findings to senior leadership and stakeholders, highlighting risk mitigation strategies.
  • Root Cause Analysis (RCA):
  • Internal RCA: Lead comprehensive root cause analysis for all major incidents within internal systems and infrastructure, ensuring complete documentation and follow-up action items.
  • Third-Party RCA: Collaborate with third-party vendors to perform joint RCAs, ensuring transparency, accountability, and timely resolution of incidents affecting shared infrastructure or services.
  • Maintain RCA reports, track corrective actions, and enforce SLAs with third-party partners for incident resolution.
  • Policy Development & Compliance:
  • Design and enforce security policies and incident response procedures.
  • Ensure alignment with compliance frameworks (NIST, HIPAA, CIS, SOC2, GDPR).
  • Lead tabletop exercises and red team/blue team drills.
  • Continuous Improvement & Automation:
  • Identify opportunities for automation to improve incident detection and response time.
  • Implement SOAR (Security Orchestration, Automation, and Response) platforms to optimize workflows.
  • Stay current with evolving cybersecurity threats, technologies, and best practices.

Preferred Qualifications

  • Education: 
  • Bachelor’s degree in Cybersecurity, Information Technology, or related field (Master's preferred) or equivalent
  • Experience:
  • 7+ years of experience in Incident Response, Cybersecurity Operations, or DevSecOps.
  • Strong background in DevOps, SRE, and cloud security best practices.
  • Proven expertise in SIEM tools (Splunk, Sentinel, Elastic), EDR (CrowdStrike), and IDS/IPS systems.
  • Familiarity with Terraform, Ansible, VMWare, Kubernetes, and Docker in high-availability environments.
  • Experience with threat intelligence platforms and SOC operations.
  • Demonstrated experience in conducting and managing Root Cause Analysis (RCA) both internally and with third-party vendors.
  • Certifications (highly preferred):
  • CISSP, CISM, GCIA, GCIH, OSCP, or equivalent.
  • AWS Certified Security Specialist, GCP Professional Cloud Security Engineer, or Azure Security Engineer.
  • Technical Skills:
  • Advanced scripting (Python, Bash, PowerShell).
  • Familiarity with Zero Trust architecture and network segmentation.
  • Experience with vulnerability scanners (Qualys, Nessus, OpenVAS).
  • Soft Skills:
  • Exceptional analytical and problem-solving abilities.
  • Strong leadership and team collaboration skills.
  • Effective communication with technical and non-technical stakeholders.

Expected full time annual base pay scale for this position is $131K-$164K. Actual base pay will consider skills, experience and location.

Based on the role, colleagues may be eligible to participate in an annual bonus plan tied to company and individual performance, or an incentive plan. We also offer a long-term incentive plan to align company and colleague success over time.

In addition, GRAIL offers a progressive benefit package, including flexible time-off, a 401k with a company match, and alongside our medical, dental, vision plans, carefully selected mindfulness offerings.

GRAIL is an Equal Employment Employer and does not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability or any other legally protected status. We will reasonably accommodate all individuals with disabilities so that they can participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. GRAIL maintains a drug-free workplace.

What the Team is Saying

Neda Ronaghi
Ruth Mauntz
Tristan Matthews
David Jenions
Satnam Alag

Similar Jobs

GRAIL Logo GRAIL

Staff Software Engineer

Artificial Intelligence • Big Data • Healthtech • Machine Learning • Software • Biotech
Hybrid
Menlo Park, CA, USA
163K-216K

GRAIL Logo GRAIL

Staff Statistical Analyst #4305

Artificial Intelligence • Big Data • Healthtech • Machine Learning • Software • Biotech
Hybrid
Menlo Park, CA, USA
163K-204K

GRAIL Logo GRAIL

Accounting Manager

Artificial Intelligence • Big Data • Healthtech • Machine Learning • Software • Biotech
Hybrid
Menlo Park, CA, USA
130K-163K

GRAIL Logo GRAIL

Senior Clinical Data Manager #4239

Artificial Intelligence • Big Data • Healthtech • Machine Learning • Software • Biotech
Hybrid
Menlo Park, CA, USA
105K-131K
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Menlo Park, CA
1,000 Employees
Year Founded: 2016

What We Do

GRAIL is a healthcare company whose mission is to detect cancer early, when it can be cured. GRAIL is using the power of high-intensity sequencing, population-scale clinical studies, and state-of-the-art computer science and data science to enhance the scientific understanding of cancer biology, and to develop and commercialize pioneering products

Why Work With Us

Everything we do is guided by our mission to detect cancer early, when it can be cured. It’s the reason we’re here, and it’s no small task.

The right people make all the difference. That’s why we’re looking for those who strive to share their knowledge, contribute their skills, inspire each other and commit to something bigger than themselves.

Gallery

Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery

GRAIL Offices

Hybrid Workspace

Employees engage in a combination of remote and on-site work.

GRAIL has a variety of work types depending on the roles. Some are onsite like a lab role, others are hybrid and still others are remote. Hybrid is typically Tuesday and Thursday but leaders may be flexible depending on the role.

Typical time on-site: 2 days a week
HQMenlo Park, CA
London, GB
Raleigh, NC
Washington, DC
Learn more

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account