About The Position

Your work days are brighter here. We’re obsessed with making hard work pay off, for our people, our customers, and the world around us. As a Fortune 500 company and a leading AI platform for managing people, money, and agents, we’re shaping the future of work so teams can reach their potential and focus on what matters most. The minute you join, you’ll feel it. Not just in the products we build, but in how we show up for each other. Our culture is rooted in integrity, empathy, and shared enthusiasm. We’re in this together, tackling big challenges with bold ideas and genuine care. We look for curious minds and courageous collaborators who bring sun-drenched optimism and drive. Whether you're building smarter solutions, supporting customers, or creating a space where everyone belongs, you’ll do meaningful work with Workmates who’ve got your back. In return, we’ll give you the trust to take risks, the tools to grow, the skills to develop and the support of a company invested in you for the long haul. So, if you want to inspire a brighter work day for everyone, including yourself, you’ve found a match in Workday, and we hope to be a match for you too. About the Team The Workday’s National Security Group (NSG) is responsible for all aspects of cybersecurity and compliance for Workday’s US Department of Defense and Intelligence Community customer regions. The NSG Governance, Risk, Compliance (GRC) Team enables business agility while maintaining a strong security posture via intelligent risk-taking, optimized controls management, and iterative security governance. The NSG GRC team’s mission is to enable and maintain Workday’s National Security offerings through certification, continuous monitoring, consultation and deep stakeholder alignment. We act as a trusted advisor across Workday to help maintain and enhance our customer's trust. About the Role This role will support one or more direct or indirect contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday personnel working on the contracts be United States citizens (naturalized or native). This critical role serves as the central point of command for all major cybersecurity incidents, outages, and customer-impacting events within Workday's highly regulated FedRAMP Moderate and IL4 environments. The Commander will lead the full incident lifecycle, from initial triage and containment through eradication and recovery. This involves making rapid, risk-based decisions under pressure, directing cross-functional responders (SOC, Engineering, SRE, Cloud teams), and driving resolution.

Requirements

  • Experience: 5–10 years in incident response, SOC, cybersecurity operations, or SRE/DevOps, including demonstrated experience leading complex incidents in cloud/SaaS environments.
  • Compliance Knowledge: Strong understanding of FedRAMP, DISA SRG, NIST 800-53 and IR best practices.
  • Technical Skills: Experience with EDR, SIEM, cloud forensics, and architectures (AWS/Azure/GCP, SaaS).
  • Core Competencies: Exceptional communication, crisis leadership, rapid triage, and the ability to remain calm and decisive under pressure.
  • Strong emotional intelligence and cross-cultural communication skills to manage diverse, high-stress teams.

Nice To Haves

  • Prior Incident Commander or CSIRT leadership experience.
  • Relevant certifications such as GCIH, GCIA, CISSP, or CCSP.
  • Experience supporting federal audits, 3PAOs, or highly regulated customer environments.
  • Proven ability to mentor junior team members and build long-term capabilities within the broader Security and Engineering organizations.

Responsibilities

  • Own all executive and customer communications.
  • Ensure incident handling strictly adheres to compliance frameworks including FedRAMP, DoD IL4/IL5, and NIST 800-53.
  • Support CISA/JAB/DISA/Customer notifications and customer evidence requests.
  • Maintain IR playbooks, escalation paths, and communication templates.
  • Direct cross-functional teams through triage, containment, eradication, and recovery.
  • Validate evidence collection and maintain chain-of-custody as required.
  • Provide accurate, timely status updates during ongoing or high-severity incidents.
  • Communicate effectively with executives, legal, GRC, customer success, and partner teams.
  • Act as primary Incident Commander, owning the incident bridge, assigning tasks, and ensuring rapid progression toward resolution.
  • Produce official Incident Reports e.g. RCA, maintain IR playbooks, and lead post-incident reviews and readiness exercises to ensure continuous improvement.
  • Systematically track incident metrics (MTTD, MTTR) and drive organizational adoption of best practices learned from incident reviews.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service