Information Security Administrator - CSIRT
Salesforce
Posted: April 8, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.
Required Skills
Job Description
To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.
Job Category
Enterprise Technology & Infrastructure
Job Details
About Salesforce
Salesforce is the #1 AI CRM, where humans with agents drive customer success together. Here, ambition meets action. Tech meets trust. And innovation isn’t a buzzword — it’s a way of life. The world of work as we know it is changing and we're looking for Trailblazers who are passionate about bettering business and the world through AI, driving innovation, and keeping Salesforce's core values at the heart of it all.
Ready to level-up your career at the company leading workforce transformation in the agentic era? You’re in the right place! Agentforce is the future of AI, and you are the future of Salesforce.
The Computer Security Incident Response Team (CSIRT) at Salesforce deals with the most challenging problems in information security. When you're first reading about a new issue in the news, our CSIRT is already working on it! The pace and variety of our work create a unique learning environment, whether you are starting out or have deep security experience. You will be given unique challenges and the tools to solve them, surrounded by exceptional colleagues, and supported by incredibly helpful partner teams.
The Computer Security Incident Response Team (CSIRT) is the frontline of defense for Salesforce and is responsible for 24x7x365 security monitoring, security operations, real-time analysis of security alert data, and rapid incident response across multiple Salesforce environments. This team protects the confidentiality, integrity, and availability of company and customer data.
As a key member of our growing team, the incident responder will work on the 'front lines' of the Salesforce environment, working with a team that protects our critical infrastructure and our customer's data from the latest information security threats.
Responsibilities:
The Associate Incident Responder, CSIRT will be part of the monitoring and triage arm of Salesforce CSIRT, responsible for analysing events across a large and complex environment in order to identify security incidents and protect our customers.
Incident Responders use their exceptional judgment and security expertise to distinguish real threats from "noise". In a typical hour, an Incident Responder might examine a malicious email, investigate an unusual login, and analyze a PC with a potential malware issue. Between these events, they will interact with Salesforce colleagues around the world, who contact Salesforce Security with issues ranging from missing laptops to suspicious devices found in our offices.
A successful Incident Responder will have acute attention to detail and a logical approach to analysis and problem-solving. This role also needs exceptional communication skills (verbal and written), and an ability to quickly understand complex information while recognizing familiar elements within complex situations. The ideal candidate should have an interest in developing automation and exploring AI for operations and response.
Required Skills:
• Strong interest in information security, including awareness of current threats and security best practices
• Understanding of Windows, Linux, Mac operating systems, and command line tools.
• Expertise in few core IR skills (Incident response, Network Security, Storage and access security, Sandboxing, Compute security etc)
• In depth understanding of network fundamentals and common Internet protocols, such as DNS, HTTP, HTTPS / TLS, and SMTP
• Knowledge of analyzing network traffic logs, to investigate either security issues or complex operational issues
• Knowledge of email security threats and security controls, including analyzing email headers
• Foundational understanding of cloud security principles and experience with leading platforms (GCP, AWS, Azure) and Kubernetes for security.
• A continuous improvement mindset that actively seeks opportunities to enhance security practices, tools, and methodologies, while incorporating automation and innovative solutions.
• Self-motivated, excellent communication, and collaboration skills to effectively work in a team and engage with stakeholders.
Desired Skills & Experience
The following items are not hard requirements but would be an advantage:
• Bachelor's/Master's degree in Computer Science, Cybersecurity, or a related field.
• Knowledge of XSOAR, EDR, and SIEM tools would be a plus.
• Scripting language (i.e. Bash, Python, Powershell, etc.) or any automation experience/prompt engineering.
• Familiarity with OWASP's Top 10 vulnerabilities and experience in mitigating them.
• Foundational understanding of GenAI/AgenticAI
• Prior experience in a fast-paced operational environment.
• Possessing a strong understanding of the MITRE ATT&CK framework and the ability to apply its tactics, techniques, and procedures (TTPs) is highly beneficial for conducting comprehensive case triage and investigation.
• Relevant certifications (CompTIA Security+, Security Blue Team, GIAC GCFA, GCIH, etc.) are beneficial.
Unleash Your Potential
When you join Salesforce, you’ll be limitless in all areas of your life. Our benefits and resources support you to find balance and be your best, and our AI agents accelerate your impact so you can do your best. Together, we’ll bring the power of Agentforce to organizations of all sizes and deliver amazing experiences that customers love. Apply today to not only shape the future — but to redefine what’s possible — for yourself, for AI, and the world.
Accommodations
If you need a reasonable accommodation during the application or the recruiting process, please submit a request via this Accommodations Request Form.
Please note that Salesforce uses artificial intelligence (AI) tools to help our recruiters assess and evaluate candidates’ resumes and qualifications throughout the recruiting process. Humans will always make any candidate selection and hiring decisions. Please see our Candidate Privacy Statement for more information about how we use your personal data and your rights, including with regard to use of AI tools and opt out options.
Posting Statement
Salesforce is an equal opportunity employer and maintains a policy of non-discrimination with all employees and applicants for employment. What does that mean exactly? It means that at Salesforce, we believe in equality for all. And we believe we can lead the path to equality in part by creating a workplace that’s inclusive, and free from discrimination. Know your rights: workplace discrimination is illegal. Any employee or potential employee will be assessed on the basis of merit, competence and qualifications – without regard to race, religion, color, national origin, sex, sexual orientation, gender expression or identity, transgender status, age, disability, veteran or marital status, political viewpoint, or other classifications protected by law. This policy applies to current and prospective employees, no matter where they are in their Salesforce employment journey. It also applies to recruiting, hiring, job assignment, compensation, promotion, benefits, training, assessment of job performance, discipline, termination, and everything in between. Recruiting, hiring, and promotion decisions at Salesforce are fair and based on merit. The same goes for compensation, benefits, promotions, transfers, reduction in workforce, recall, training, and education.