Senior Manager, Cloudforce One Incident Response
Hybrid
Applications have closed
Cloudflare, Inc.
Make employees, applications and networks faster and more secure everywhere, while reducing complexity and cost.At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures list and ranked among the World’s Most Innovative Companies by Fast Company.
We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us!
Hiring Locations: US Remote
About the Team
Cloudforce One is Cloudflare’s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world’s largest global networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threat intelligence to better protect our customers.
About the Role
Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager Incident Response to join us in growing our Cloudforce One Organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and ever-evolving global threat actors. This position requires an innovative, self-starting, and detail-oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by sophisticated cyber threats.
As a Senior Manager Incident Response, you will respond to customer security incidents in both a on premises and Cloud environments. You will detect and disrupt cyber threat activity across the customers environment and various Cloud platforms. You will engage with customers at all levels including Executive, VP, Director, and Managerial level. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working along side forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate tracked threats. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing and ever-evolving cyber attacks to protect your customer and the greater Cloudflare global customer base.
Our ideal candidate will have 15+ years of previous experience in cyber security with at least 5+ years in Incident Response and 2+ years of that experience at a startup building a customer facing Incident Response practice. This is a one of a kind role where you will grow the practice from an army of one to a squad and possibly beyond. Candidates will have extensive experience with hands on with forensic analysis in a Windows, Mac, and Linux environment. Ideally this candidate will have at least triage malware experience in static and dynamic analysis of common file formats on Windows, macOS, or UNIX-based platforms. As the leader of this team you will be responsible for contributing to and deploying team processes and possibly codebases to coalesce traits of an attack. Outstanding candidates will also posses excellent verbal and written communication skills to facilitate dialogue with the Threat Research Team for reporting on malware and malware families. You will also work both as a self-driven individual contributor and alongside a team to achieve a common goal. A one of a kind candidate will be able to write incident response reports and also reliably write code in Python or Golang as well as interact with APIs.
Examples of desirable skills, knowledge and experience
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience
- Ability to travel up to 20% of the time
- 15+ years of previous experience in cyber security
- 5+ Years of Incident Response experience
- 2+ Years of customer facing startup Incident Response experience
-
Team leadership experience in a matrixed consulting environment
-
Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists
-
Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
-
Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs
-
Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis
-
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations
-
Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations
-
Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies
-
Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams
- Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups
- Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS
- Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)
- Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements
- In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems
- Prior Government experience in Computer Network Operations
Bonus Points
- Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system
- Proficient with Yara and writing rules to detect similar malware samples
- Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs
- Practical malware analysis experience with static, dynamic, and automated malware analysis techniques
- Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples
- Reverse engineering experience with APT malware with an understanding of common infection vectors
- Knowledgeable of current malware techniques to evade detection and obstruct analysis
- Experience writing malware reports on unique and interesting aspects of malware
- Experience with malware attribution
- Experience with tracking and identifying threats through Indicator of Compromising (IOCs) pivoting and infrastructure enumeration
- Familiarity with bash command line executables to conduct static analysis and investigate IOCs.
Compensation
Compensation may be adjusted depending on work location and level.
- For Colorado, Illinois, Maryland and Minnesota based hires: Estimated annual salary of $225,000 - $250,000.
- For New York City, Washington, Washington D.C. and California (excluding Bay Area) based hires: Estimated annual salary of $239,000 - $260,000.
- For Bay Area based hires: Estimated annual salary of $252,000 - $270,000.
Equity
This role is eligible to participate in Cloudflare’s equity plan.
Benefits
Cloudflare offers a complete package of benefits and programs to support you and your family. Our benefits programs can help you pay health care expenses, support caregiving, build capital for the future and make life a little easier and fun! The below is a description of our benefits for employees in the United States, and benefits may vary for employees based outside the U.S.
Health & Welfare Benefits
- Medical/Rx Insurance
- Dental Insurance
- Vision Insurance
- Health Saving Accounts
- Commuter Spending Accounts
- Fertility & Family Forming Benefits
- On-demand mental health support and Employee Assistance Program
- Global Travel Medical Insurance
Financial Benefits
- Short and Long Term Disability Insurance
- Life & Accident Insurance
- 401(k) Retirement Savings Plan
- Employee Stock Participation Plan
Time Off
- Flexible paid time off covering vacation and sick leave
- Leave programs, including parental, pregnancy health, medical, and bereavement leave
What Makes Cloudflare Special?
We’re not just a highly ambitious, large-scale technology company. We’re a highly ambitious, large-scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet.
Project Galileo: We equip politically and artistically important organizations and journalists with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare’s enterprise customers--at no cost.
Athenian Project: We created Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. This is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released. Here’s the deal - we don’t store client IP addresses never, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers.
Sound like something you’d like to be a part of? We’d love to hear from you!
This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license.
Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer.
Cloudflare provides reasonable accommodations to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job. Examples of reasonable accommodations include, but are not limited to, changing the application process, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you require a reasonable accommodation to apply for a job, please contact us via e-mail at hr@cloudflare.com or via mail at 101 Townsend St. San Francisco, CA 94107.
Tags: APIs APT AWS Azure Bash C Cloud Cloudflare Computer Science DNS GCP Golang Helm Incident response Linux MacOS Malware MITRE ATT&CK NetOps NIST Privacy Python Reverse engineering SSH TCP/IP Threat intelligence Threat Research Travel TTPs UNIX Windows
Perks/benefits: Career development Equity / stock options Fertility benefits Flex hours Flex vacation Health care Insurance Medical leave Parental leave Salary bonus Signing bonus Startup environment
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.