×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cybersecurity Incident Response Analyst

Job in San Diego, San Diego County, California, 92189, USA
Listing for: ServiceNow
Part Time position
Listed on 2026-03-09
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Company Description

It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today — Service Now stands as a global market leader, bringing innovative AI‑enhanced technology to over 8,100 customers, including 85% of the Fortune 500®. Our intelligent cloud‑based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work.

But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone.

Job Description

IMPORTANT, PLEASE READ BEFORE APPLYING

  • Due to Federal requirements, only US citizens, US naturalized citizens or US Permanent Residents, holding a green card, will be considered.
  • This role requires a minimum of 2 days per week in the San Diego, CA or Santa Clara, CA Service Now Offices. If you cannot meet this requirement, we ask that you please do not apply. Thank you.

The Service Now Security Organization (SSO)

The Service Now Security Organization (SSO) delivers world‑class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact.

What you get to do in this role:

Service Now has a large and highly skilled security team located at multiple sites globally. As part of a rapidly growing organization, Service Now is looking to expand its Global Incident Response team. This role is an opportunity to serve on the frontline of security operations, supporting both Service Now’s commercial customers and its federal environment. As a rapidly growing organization, Service Now offers strong opportunities for career growth while developing expertise across our commercial and federal environments and the Service Now platform itself.

As an Cybersecurity Incident Response Analyst, you will be a key member of the team monitoring tools and systems that defend Service Now’s production and corporate environments, defining relationships between seemingly unrelated events through deductive reasoning, and continuously finding ways to do things faster, better, and more effectively — while maintaining a laser focus on quality.

You will work on a geographically diverse team to respond to threats that may arise against our infrastructure and track cases to closure, working across functional teams.

You will be required to participate in an on‑call rotation including weekends to ensure that Security Operations can respond to priority incidents in a timely manner. This role requires to work weekend rotational shifts and hours (Pacific time zone) outside of standard business hours if necessary.

Qualifications

To be successful in this role you have:

  • Experience in leveraging or critically thinking about how to integrate AI into work processes, decision‑making, or problem‑solving. This may include using AI‑powered tools, automating workflows, analyzing AI‑driven insights, or exploring AI’s potential impact on the function or industry.
  • 2+ years of related experience or equivalent combination of education and experience.
  • Deep understanding of Security Operations Center and Security Incident Response Team protocols and procedures, including incident triage and escalation workflows.
  • A solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols.
  • Experience with SIEM platforms (e.g., Splunk,) for log analysis and detection tuning.
  • Familiarity with EDR tools for endpoint detection and response.
  • Exposure to SOAR platforms for workflow automation and incident orchestration.
  • Knowledge of cloud security concepts and experience working in cloud environments (AWS, Azure, or GCP).
  • The ability to analyze event and system logs, perform forensic analysis, analyze malware, and process other incident response‑related data as needed.
  • Familiarity with intrusion detection systems.
  • Understanding of Windows and Linux…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary