Senior Crisis Response Manager

TLDR

Oversee high-severity incident responses while developing enterprise-wide crisis management frameworks to enhance stability and brand reliability.

Our Purpose

At SentinelOne, we are driven by a clear purpose: to give the advantage to those who secure our future. As AI reshapes how organizations build, operate, and innovate, the responsibility to protect them becomes more critical than ever. When you join SentinelOne, your work helps protect global enterprises, critical infrastructure, and the technologies shaping tomorrow. If you are motivated by meaningful challenges and want your impact to be real, measurable, and global, you will find purpose here.

About Us

SentinelOne is a company at the intersection of AI and security, pioneering a new operating model for cybersecurity. Our AI-native platform unifies protection across endpoint, cloud, identity, data, and AI systems to deliver autonomous detection and response with clarity and speed. By combining real-time analytics, intelligent automation, and a unified data foundation, we reduce noise, simplify complexity, and empower security teams to focus on what truly matters.

Our teams are builders, problem-solvers, and innovators committed to shaping the future of security. If you are excited to solve hard problems alongside talented, mission-driven people, we invite you to help us build a safer future for humanity.

As a Senior Crisis Response Manager, you will orchestrate the end-to-end execution of high-severity incident responses, managing "war room" logistics, decision logs, and real-time status updates for all customer-impacting events. You will be responsible for drafting precise executive communications and translating technical root-cause investigations into clear, customer-ready reports that protect SentinelOne’s brand and reputation for reliability. Beyond immediate response, you will drive long-term platform stability by tracking corrective actions to completion and developing the standardized templates and metrics needed to mature our enterprise-wide crisis management framework.

What will you do?

  • Maintain awareness of all customer-impacting and brand-impacting incidents across the enterprise.
  • Coordinate response execution for high-severity incidents, including war room logistics, action tracking, decision logs, and status cadence.
  • Draft clear, accurate written communications for internal stakeholders and senior leadership, ensuring content aligns to current facts and validated inputs.
  • Track root cause investigations end-to-end to ensure they’re completed correctly and on time; help produce customer-ready root cause reports.
  • Own tracking and follow-through on corrective actions to reduce repeat incidents, ensuring actions are defined, assigned, and closed.
  • Build and improve enterprise response mechanisms, including templates, workflows, reporting, and coordination models across teams.
  • Maintain and report incident metrics to drive action and improvements to process.

What skills and knowledge should you bring?

  • 8-12 years of experience in incident/crisis response operations, technical program management, security operations coordination, or similar high-tempo roles.
  • Proven ability to coordinate cross-functional teams during high-pressure events and drive disciplined execution.
  • Experience communicating across technical and non-technical audiences.
  • Familiarity with legal and communications considerations during customer-facing security events, including stakeholder briefings, and public/media alignment.
  • Excellent written communication skills (executive-ready briefs and customer-facing incident/RCA reporting).
  • Strong operational rigor, including documentation, action tracking, escalation judgment, and follow-through.
  • Demonstrated ability to manage ambiguity, manage multiple concurrent priorities, and resolve conflict under pressure.
  • Ability to support crisis response for U.S. Federal and Public Sector customers and partners.
  • Must be a U.S. Citizen and based in the United States.
  • Experience working with incident management tools and workflows (PagerDuty, Jira, Slack, Salesforce, Statuspage, and others).
  • English fluency required (written and verbal). 
  • Experience supporting security incidents and partnering with SOC/IR/AppSec teams.
  • Familiarity with regulated/compliance-informed environments.
  • Experience in Customer Success, Technical Support, DFIR, or Saas infrastructure roles.
  • Experience building incident metrics and driving corrective action programs.

Why us? 

You will work on real-world problems and make an impact by protecting our customers from cyber threats. You will join a cutting-edge business and will be able to influence the architecture, design, and structure of our core platform. You will tackle extraordinary challenges and work with the very BEST in the industry.

  • Medical, Vision, Dental, 401(k), Commuter, and Dependent FSA
  • Unlimited PTO
  • Paid Company Assigned Holidays
  • Paid Sick Time
  • Gym membership reimbursement
  • Cell phone reimbursement
  • Numerous company-sponsored events including regular happy hours and team building events

This U.S. role has a base pay range plus commissions that will vary based on the location of the candidate. The range posted here is the on-target earnings (OTE) for this position, inclusive of base salary and commissions. For some locations, a different pay range may apply.  If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.

On Target Earnings
$108,000$149,000 USD

SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

SentinelOne participates in the E-Verify Program for all U.S. based roles. 

SentinelOne provides autonomous security solutions built on AI to protect organizations across endpoint, cloud, and identity environments. Our platform unifies threat prevention, detection, response, and forensics in a single, user-friendly system, enabling businesses to safeguard their assets against evolving cyber threats. Recognized as a leader in the industry, we cater to enterprises in various sectors, ensuring fast, effective defense against advanced attacks.

View all jobs
Salary
$108,000 – $149,000 per year
Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Manager Q&A's
Report this job
Apply for this job