87 remote roles added today376 active tech employersπŸ‡ΊπŸ‡Έ πŸ‡¨πŸ‡¦ πŸ‡²πŸ‡½ Tri-border network749 metros covered12 database updates this hourTN visa filter live87 remote roles added today376 active tech employersπŸ‡ΊπŸ‡Έ πŸ‡¨πŸ‡¦ πŸ‡²πŸ‡½ Tri-border network749 metros covered12 database updates this hourTN visa filter live
Jobs/Remote (United States)/Principal Cybersecurity Incident Manager (USA)
Remote (United States), US

Principal Cybersecurity Incident Manager (USA)

GitLab is the intelligent orchestration platform for DevSecOps. GitLab enables organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation.

Company
Gitlab
Compensation
Not listed
Schedule
Full-Time
Role overview

What this role actually needs.

GitLab is the intelligent orchestration platform for DevSecOps. GitLab enables organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation. Responsibilities: - Incident Command & Crisis Leadership: Serve as the primary Incident Commander for critical and complex security events across GitLab.com and corporate infrastructure, providing decisive leadership during high-stress situations - Cross-Functional Coordination: Orchestrate response efforts across Security Operations, Infrastructure, Legal, Engineering, Product, and executive stakeholders, maintaining clear communication streams and unified action plans - Technical Collaboration Leadership: Lead technical calls and/or establish effective async collaboration during incidents, managing participant contributions, keeping discussions focused, and ensuring efficient progress toward resolution - Blameless Post-Incident Reviews: Conduct comprehensive post-incident reviews and retrospectives, driving the creation of action items, process improvements, and systemic enhancements - Playbook Development: Design, maintain, and continuously improve incident response playbooks, runbooks, and standard operating procedures for various incident scenarios in conjunction with SIRT engineers - Process Engineering: Build and refine incident command frameworks, communication protocols, and escalation procedures that scale across a global, all-remote organization Company context: GitLab is the all-remote DevSecOps platform spanning source code, CI/CD, security, and AI-assisted development.

Responsibilities

Day-to-day expectations

Gitlab lists these responsibilities for the Principal Cybersecurity Incident Manager (USA) role.

  • Incident Command & Crisis Leadership: Serve as the primary Incident Commander for critical and complex security events across GitLab.com and corporate infrastructure, providing decisive leadership during high-stress situations
  • Cross-Functional Coordination: Orchestrate response efforts across Security Operations, Infrastructure, Legal, Engineering, Product, and executive stakeholders, maintaining clear communication streams and unified action plans
  • Technical Collaboration Leadership: Lead technical calls and/or establish effective async collaboration during incidents, managing participant contributions, keeping discussions focused, and ensuring efficient progress toward resolution
  • Blameless Post-Incident Reviews: Conduct comprehensive post-incident reviews and retrospectives, driving the creation of action items, process improvements, and systemic enhancements
  • Playbook Development: Design, maintain, and continuously improve incident response playbooks, runbooks, and standard operating procedures for various incident scenarios in conjunction with SIRT engineers
  • Process Engineering: Build and refine incident command frameworks, communication protocols, and escalation procedures that scale across a global, all-remote organization
UpJobz market context

Why this listing is more than a copied job post.

Principal Cybersecurity Incident Manager (USA) is framed against UpJobz source checks, country scope, compensation visibility, and work-authorization signals so candidates can make a faster go/no-go decision.

United States tech market

United States roles on UpJobz are filtered for high-tech relevance, source freshness, and actionable employer detail before they are allowed into SEO surfaces.

Compensation read

The employer source does not expose a reliable salary range, so candidates should ask for compensation early instead of waiting until late-stage interviews.

Work authorization read

Current extracted signal: Open to TN, H-1B, and OPT candidates already in the United States. UpJobz treats this as a search signal, not legal advice, and links visa-sensitive roles back to the relevant visa hub where possible.

Location read

Because this is remote, country scope and time-zone expectations matter as much as the title. Confirm the employer's allowed work locations on job-boards.greenhouse.io.

Browse similar jobs

Subscriber playbook

Turn this listing into an application plan.

This is the first pass at the premium UpJobz layer: a fast brief that helps serious applicants move with more clarity.

Next moves

  • Tailor your resume around ai and kubernetes instead of sending a generic application.
  • Use the first two bullets of your application to connect your background directly to principal cybersecurity incident manager (usa) is a high-signal remote role in remote (united states), and it is most realistic for open to tn, h-1b, and opt candidates already in the united states.
  • Open the role quickly if it fits and bookmark three similar jobs before you leave the page.

Interview themes

CybersecurityRemoteaikubernetesawsgcp

Watchouts

  • Compensation is hidden, so get range clarity in the first recruiter conversation.
  • Use open to tn, h-1b, and opt candidates already in the united states as part of your positioning so the recruiter does not have to infer it.
  • Lead with distributed collaboration, async delivery, and timezone discipline.
Role signals

Keywords to match against your background

Use these terms to decide whether your resume, portfolio, and recent projects line up with the role.

aikubernetesawsgcpsecurityplatformapidevopsgitrubyci-cd
Next step

Apply through the employer source

Open the source listing from job-boards.greenhouse.io, confirm the role is still active, then apply on the employer or ATS page.

Open employer application

Source: job-boards.greenhouse.io Β· Source ID: 8440164002 Β· Confidence: 90/100 Β· Last checked: May 7, 2026

How UpJobz verifies job sourcesContinue browsing tech jobs