datadog

Product Manager II - Cloud Detection & Response

Apply Now

At a Glance

Location
New York, United States
Experience
3+ years
Posted
2026-02-23T11:38:44-05:00

Key Requirements

Domain Knowledge

  • Engineering

Requirements

Minimum 3+ years in enterprise software, with a preference for security background.

Committed to high-quality products and customer satisfaction.

Prior engineering experience or deep understanding of SOC analyst and incident responder workflows, including triage, investigation, and containment.

Regularly uses LLM-based tools like Claude Code and Cursor to accelerate your work, from drafting PRDs and analyzing data to researching markets and prototyping ideas.

Driven to build and scale new products in a high-growth environment.

Datadog values people from all walks of life.

Compensation & Benefits

New hire stock equity (RSUs) and employee stock purchase plan (ESPP)

Continuous professional development, product training, and career pathing

Intradepartmental mentor and buddy program for in-house networking

An inclusive company culture, ability to join our Community Guilds (Datadog employee resource groups)

Access to Inclusion Talks, our Internal panel discussions

Free, global mental health benefits for employees and dependents age 6+

Responsibilities

Define and build the roadmap for the core experience of cloud threat detection, investigation, and response within Cloud Security Management.

Work closely with executives, marketing, sales, PR, design, and support teams to successfully bring new products and features to market.

Develop a deep understanding of the market landscape and identify key areas of competitive differentiation and market disruption.

Maintain and report to product leadership on key metrics regarding revenue growth and customer adoption.

Work with engineers to build CDR capabilities that unify and extend Datadog's existing security products, including Cloud SIEM, Workload Protection, and Cloud Security, into a cohesive detection and response experience.

Partner with security researchers and detection engineers to translate attacker techniques and threat intelligence into product requirements.