We help the world run better
At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from.
Summary
An SAP Global Cyber Incident Response and Recovery Investigator plays a critical role in safeguarding SAP’s digital enterprise. As a front-line defender, the Investigator is responsible for triaging security events identified by monitoring tools, analyzing data to assess severity and urgency, and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified, the Investigator works closely with Global Security Operations to scope the impact, coordinate containment efforts, and support forensic investigations to uncover the nature and details of the attack.
What you'll do
Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a IR Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions.
In this role, you will:
Conduct initial assessments and help drive root cause analysis. Contribute to the development of attack remediation and response strategies. Coordinate escalation handling and communication across teams. Triage operational security processes, including phishing response. Assist in maintaining and improving incident handling documentation—such as playbooks, runbooks, and standard operating procedures. Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy. Support forensic investigations with technical insights and evidence collection. Analysing cloud logs and telemetry for signs of compromise (e.g., CloudTrail, VPC Flow Logs, Azure Activity Logs). Leverage your offensive knowledge to identify gaps, simulate attacks, and drive improvements in detection, response, and hardening strategies. We value hands-on practitioners—our environment includes sandboxing, red vs. blue testing, or adversary emulation frameworks (e.g., MITRE ATT&CK, CALDERA, Atomic Red Team) and opportunities to build tooling or simulate attack chains.
What you bring
We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances.
Preferred Technical Skills and Experience:
Experience:7–10+ years in a cyber incident investigation role or equivalent combination of education, certifications, and relevant training. Certifications - Industry-recognized certifications such as Security+, GCIA, GCIH, CISSP (or equivalent). Strong understanding of Advanced Persistent Threat (APT) actors, their tools, techniques, and procedures (TTPs), as well as threat modelling frameworks. Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS, HTTP, and SMB. Operating Systems & Forensics:
In-depth knowledge of forensic artifacts across one or more platforms: Windows/Active Directory (file systems, registry, memory artifacts) Unix/Linux (file systems, memory artifacts) macOS (file systems, memory artifacts) Specialized Domains (any of the following): Cyber incident response in cloud, mobile, web application, or database environments Cybersecurity automation and orchestration Web servers and web applications Cloud Platforms: Deep familiarity with AWS, Azure, and/or GCP — with an emphasis on security posture, logging, and IR tooling. Experience conducting incident response and post-incident forensics in cloud environments. Understanding of cloud-native service abuse and misconfigurations (IAM, serverless, container runtime attacks). Security Infrastructure Tools: (SIEM, IDS, EDR, DNS, other Deception technologies) Proficiency in scripting languages such as PowerShell, Python, or Bash.
Bring out your best
SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best.
We win with inclusion
SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world.
SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com
For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training.
EOE AA M/F/Vet/Disability:
Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability.
Successful candidates might be required to undergo a background verification with an external vendor.
Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.