Skip to content

Incident Response Lead

Whoop
Boston, MAonsiteMar 12, 2026·Posted 1 month ago
View Application Page

Domain

Tech Stack

SIEMEDRMITRE ATT&CK

Must-Have Requirements

  • 7+ years incident response, digital forensics, threat detection, or SOC operations experience
  • Experience leading incident investigations in complex, cloud-native environments
  • Host, cloud, and log-based investigation experience
  • SIEM platforms and EDR tools expertise
  • Cloud security monitoring experience
  • MITRE ATT&CK framework knowledge
  • Experience with external SOC or MDR providers
  • GDPR, HIPAA, PCI or similar regulatory framework experience
  • Excellent cross-functional communication skills
  • Bachelor's degree or relevant certifications (GCIH, GCFA, CISSP)

Nice to Have

  • -Forensic investigation certifications
  • -Experience with specific SIEM or EDR vendors

Description

At WHOOP, we’re on a mission to unlock human performance and healthspan. Our wearable technology provides personalized insights that help millions of members better understand their bodies and make smarter decisions about training, recovery, and lifestyle. We are seeking a Incident Response Lead to drive security incident response across the enterprise. In this role, you will serve as the primary internal escalation point and hands-on responder for security incidents, partnering closely with WHOOP’s 24x7 SOC provider and cross-functional stakeholders to investigate, contain, and remediate threats. This is a highly technical individual contributor role with significant ownership and visibility across Security, IT, GRC, and Legal.

RESPONSIBILITIES

Lead hands-on incident response activities, serving as the primary internal escalation point for security events Serve as the central incident commander across Security, IT, GRC, and Legal during active incidents Partner with the SOC to validate alerts, guide investigations, and drive containment and eradication efforts Conduct host, cloud, and log-based investigations, and coordinate with external forensic firms when needed Maintain and continuously improve incident response playbooks, escalation procedures, and communication workflows Lead post-incident reviews and root cause analysis, ensuring remediation actions are clearly defined and tracked Develop and execute tabletop exercises and incident simulations to test and strengthen response readiness Partner with GRC and Legal to support breach impact assessments and regulatory notification processes Drive continuous improvement of detection and response capabilities across SIEM, EDR, cloud monitoring, and identity systems Own incident metrics and reporting, including response times, trends, and systemic risk reduction initiatives Participate in an on-call escalation rotation to provide after-hours incident leadership when required

QUALIFICATIONS

7+ years of experience in incident response, digital forensics, threat detection, or SOC operations Proven experience leading incident investigations in complex, cloud-native environments Strong experience conducting host, cloud, and log-based investigations Hands-on expertise with SIEM platforms, EDR tools, and cloud security monitoring Experience working with external SOC or MDR providers Strong understanding of attack frameworks (MITRE ATT&CK) and their application to detection and response Experience supporting breach response obligations under GDPR, HIPAA, PCI, or similar regulatory frameworks Excellent communication skills with the ability to coordinate cross-functional stakeholders under pressure Bachelor’s degree or relevant certifications (GCIH, GCFA, CISSP, or equivalent)

Location Context