Incident Coordinator/Cyber Incident Commander - US Federal jobs in United States
cer-icon
Apply on Employer Site
company-logo

Workday · 1 day ago

Incident Coordinator/Cyber Incident Commander - US Federal

Workday is a leading AI platform for managing people, money, and agents, committed to shaping the future of work. The Incident Coordinator/Cyber Incident Commander will serve as the central point of command for major cybersecurity incidents, leading the full incident lifecycle and ensuring compliance with federal government security requirements.

Artificial Intelligence (AI)Cloud ComputingEnterprise SoftwareHuman ResourcesSaaSSoftware
check
Comp. & Benefits
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Own all executive and customer communications
Ensure incident handling strictly adheres to compliance frameworks including FedRAMP, DoD IL4/IL5, and NIST 800-53
Support CISA/JAB/DISA/Customer notifications and customer evidence requests
Maintain IR playbooks, escalation paths, and communication templates
Direct cross-functional teams through triage, containment, eradication, and recovery
Validate evidence collection and maintain chain-of-custody as required
Provide accurate, timely status updates during ongoing or high-severity incidents
Communicate effectively with executives, legal, GRC, customer success, and partner teams
Act as primary Incident Commander, owning the incident bridge, assigning tasks, and ensuring rapid progression toward resolution
Produce official Incident Reports e.g. RCA, maintain IR playbooks, and lead post-incident reviews and readiness exercises to ensure continuous improvement
Systematically track incident metrics (MTTD, MTTR) and drive organizational adoption of best practices learned from incident reviews

Qualification

Incident responseCybersecurity operationsFedRAMP complianceNIST 800-53EDR experienceSIEM experienceCloud forensicsAWS/Azure/GCPCrisis leadershipRapid triageCross-cultural communicationIncident Commander experienceRelevant certificationsEmotional intelligenceMentoring

Required

5–10 years in incident response, SOC, cybersecurity operations, or SRE/DevOps, including demonstrated experience leading complex incidents in cloud/SaaS environments
Strong understanding of FedRAMP, DISA SRG, NIST 800-53 and IR best practices
Experience with EDR, SIEM, cloud forensics, and architectures (AWS/Azure/GCP, SaaS)
Exceptional communication, crisis leadership, rapid triage, and the ability to remain calm and decisive under pressure
Strong emotional intelligence and cross-cultural communication skills to manage diverse, high-stress teams

Preferred

Prior Incident Commander or CSIRT leadership experience
Relevant certifications such as GCIH, GCIA, CISSP, or CCSP
Experience supporting federal audits, 3PAOs, or highly regulated customer environments
Proven ability to mentor junior team members and build long-term capabilities within the broader Security and Engineering organizations

Benefits

Workday Bonus Plan
Annual refresh stock grants

Company

Workday provides SaaS-based enterprise solutions for a company's human resources and financial management activities.

Funding

Current Stage
Public Company
Total Funding
$2.23B
Key Investors
Elliott Management Corp.New Enterprise AssociatesGreylock
2025-09-16Post Ipo Equity· $2B
2012-10-12IPO
2011-10-24Series F· $85M

Leadership Team

leader-logo
Aneel Bhusri
CEO and Co-Founder
linkedin
leader-logo
Peter Bailis
Chief Technology Officer
linkedin
Company data provided by crunchbase