it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

5 jobs found

Email me jobs like this
Refine Search
Current Search
vp digital release train engineer
SBU Product Line Management IV - (E4)
Applied Materials Santa Clara, California
Who We Are Applied Materials is a global leader in materials engineering solutions used to produce virtually every new chip and advanced display in the world. We design, build and service cutting-edge equipment that helps our customers manufacture display and semiconductor chips - the brains of devices we use every day. As the foundation of the global electronics industry, Applied enables the exciting technologies that literally connect our world - like AI and IoT. If you want to push the boundaries of materials science and engineering to create next generation technology, join us to deliver material innovation that changes the world. What We Offer Salary: $147,000.00 - $202,500.00 Location: Santa Clara,CA You'll benefit from a supportive work culture that encourages you to learn, develop, and grow your career as you take on challenges and drive innovative solutions for our customers. We empower our team to push the boundaries of what is possible-while learning every day in a supportive leading global company. Visit our Careers website to learn more. At Applied Materials, we care about the health and wellbeing of our employees. We're committed to providing programs and support that encourage personal and professional growth and care for you at work, at home, or wherever you may go. Learn more about our benefits . Job Description: The Applied Global Services (AGS) DDP Service Business Unit (SBU) is seeking an ambitious candidate that possesses strong technical knowledge, preferably with Dielectric Deposition / Atomic Layer Deposition semiconductor equipment in the areas of process engineering and optimization, customer fab operations, hardware design, as well as business acumen. This person will work closely with DDP Business Unit, AGS OCE and Operations, and AGS field service to ensure products have the documentation, spare part sourcing strategies, and maintenance capabilities required to be successful at customer sites. They will engage in early phases of the new product design cycle to ensure after-sale support planning is included from initial concept through final product release. They will also lead projects to develop service capabilities and service models to drive performance improvements on systems installed at customer sites worldwide. The ideal candidate should possess over five years of process and hardware experience on DCVD semiconductor equipment. They should have a passion for technical program management and possess strong communication skills; this is a strategic role and will suit someone who can drive growth in partnership with a cross-functional team. Key Responsibilities Technical Program Manage service product development from Initiation to Release Initiation (PG1): Lead HVP (High Value Problem) discovery through VOC (Voice of Customer) & FSO. Propose and select appropriate solutions based on ROI estimates. Lead team to assess Market Opportunity and select beta sites. Validation (PG3): Chair regular Core Team meetings to drive design & development of proposed solutions through internal SBU sensor development or cross-functional teams (OCE, DT/AIx, FV, BU). Be accountable for successful beta demonstration by working with FSO, FSO Focals, AGS Focals responsible for the beta site. Release (PG5): Drive creation of Marketing Collateral to train sales and BD on new Service Product; Field Training (AGU courses) and Procedures for CE's, PSE's that will support the Contract enabled by the Service Product. Report on actual Service revenue generated by the new Service Product vs. what was forecast. MPR (Monthly Product Reviews): provide status updates and help needed to AGS executives throughout the Phase Gate release cycle. Closely work with Equipment BU NPI PDP teams and Field Service teams to concurrently develop AGS service products in step with BU NPI product release. Work with Business Unit on their NPIs (New Product Introductions) to prepare and embed service product offerings. Spearhead AIx growth engine to develop new capability and enable service product offers. Define/approve Product application support plans for service product offers. Make sure Products meet all requirements; CoO, MTTR, MTBC, SDUT, etc Work with team on AGS DfI, DfS, etc Training: AGS-TS, FSO, SBU FSO Team, TSE, PSE, Digital Tool Team, FabVantage Team, etc. Perform analysis, summaries, as well as develop and transfer package of new applications / platforms to product division and customer support team. Spares, Training, AIx, etc Create & Lead new methodologies in order to optimized system performance for specific application. Digital Tool new development, adjust existing Digital Tools to current application / platform, etc. Leads the Core Teams on NPI evaluation and demos at customers site, through CIF (Common Interests Framework), high involvement in the SOW and commitment schedule. Interfaces with BU, FSO / PSE, and customer teams regarding technical requirements, analysis, schedule, deliverables, and closure. Lead customer Technical Review Meetings and deliverable measurables. Functional Knowledge Regarded as the technical expert in their field. Demonstrates in-depth and/or breadth of expertise in own discipline and broad knowledge of other disciplines within the function. 3-5 years of DDP BU / Application / Platform experience. Program Management proficiency. Skilled at Microsoft Office suite; esp. PowerPoint, Excel. Create material and present it executives / large groups. Business Expertise Has Semi-space awareness; Regions, customer, segments. Has knowledge of best practices, integrate AGS and BU best practices into common spaces; aware of the competition (AGS and BU) and the factors that differentiate them in the market. Leadership Drives cross-functional teams; leads projects with notable risk and complexity; develops the strategy for project execution. Coaches and Mentors colleagues with less experience Problem Solving Solves unique and complex problems with broad impact on the business; requires conceptual and innovative thinking to develop solutions. Self-driving; able to negotiate progress around roadblocks; willing to ask for help and find support for developing solutions. Impact Impacts the direction and resource allocation for program, project or services; works within general functional policies and industry. Interpersonal Skills Communicates difficult concepts and negotiates with others to adopt a different point of view Additional Information Time Type: Full time Employee Type: Assignee / Regular Travel: Yes, 10% of the Time Relocation Eligible: Yes The salary offered to a selected candidate will be based on multiple factors including location, hire grade, job-related knowledge, skills, experience, and with consideration of internal equity of our current team members. In addition to a comprehensive benefits package, candidates may be eligible for other forms of compensation such as participation in a bonus and a stock award program, as applicable. For all sales roles, the posted salary range is the Target Total Cash (TTC) range for the role, which is the sum of base salary and target bonus amount at 100% goal achievement. Applied Materials is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, national origin, citizenship, ancestry, religion, creed, sex, sexual orientation, gender identity, age, disability, veteran or military status, or any other basis prohibited by law. In addition, Applied endeavors to make our careers site accessible to all users. If you would like to contact us regarding accessibility of our website or need assistance completing the application process, please contact us via e-mail at , or by calling our HR Direct Help Line at , option 1, and following the prompts to speak to an HR Advisor. This contact is for accommodation requests only and cannot be used to inquire about the status of applications.
04/06/2026
Full time
Who We Are Applied Materials is a global leader in materials engineering solutions used to produce virtually every new chip and advanced display in the world. We design, build and service cutting-edge equipment that helps our customers manufacture display and semiconductor chips - the brains of devices we use every day. As the foundation of the global electronics industry, Applied enables the exciting technologies that literally connect our world - like AI and IoT. If you want to push the boundaries of materials science and engineering to create next generation technology, join us to deliver material innovation that changes the world. What We Offer Salary: $147,000.00 - $202,500.00 Location: Santa Clara,CA You'll benefit from a supportive work culture that encourages you to learn, develop, and grow your career as you take on challenges and drive innovative solutions for our customers. We empower our team to push the boundaries of what is possible-while learning every day in a supportive leading global company. Visit our Careers website to learn more. At Applied Materials, we care about the health and wellbeing of our employees. We're committed to providing programs and support that encourage personal and professional growth and care for you at work, at home, or wherever you may go. Learn more about our benefits . Job Description: The Applied Global Services (AGS) DDP Service Business Unit (SBU) is seeking an ambitious candidate that possesses strong technical knowledge, preferably with Dielectric Deposition / Atomic Layer Deposition semiconductor equipment in the areas of process engineering and optimization, customer fab operations, hardware design, as well as business acumen. This person will work closely with DDP Business Unit, AGS OCE and Operations, and AGS field service to ensure products have the documentation, spare part sourcing strategies, and maintenance capabilities required to be successful at customer sites. They will engage in early phases of the new product design cycle to ensure after-sale support planning is included from initial concept through final product release. They will also lead projects to develop service capabilities and service models to drive performance improvements on systems installed at customer sites worldwide. The ideal candidate should possess over five years of process and hardware experience on DCVD semiconductor equipment. They should have a passion for technical program management and possess strong communication skills; this is a strategic role and will suit someone who can drive growth in partnership with a cross-functional team. Key Responsibilities Technical Program Manage service product development from Initiation to Release Initiation (PG1): Lead HVP (High Value Problem) discovery through VOC (Voice of Customer) & FSO. Propose and select appropriate solutions based on ROI estimates. Lead team to assess Market Opportunity and select beta sites. Validation (PG3): Chair regular Core Team meetings to drive design & development of proposed solutions through internal SBU sensor development or cross-functional teams (OCE, DT/AIx, FV, BU). Be accountable for successful beta demonstration by working with FSO, FSO Focals, AGS Focals responsible for the beta site. Release (PG5): Drive creation of Marketing Collateral to train sales and BD on new Service Product; Field Training (AGU courses) and Procedures for CE's, PSE's that will support the Contract enabled by the Service Product. Report on actual Service revenue generated by the new Service Product vs. what was forecast. MPR (Monthly Product Reviews): provide status updates and help needed to AGS executives throughout the Phase Gate release cycle. Closely work with Equipment BU NPI PDP teams and Field Service teams to concurrently develop AGS service products in step with BU NPI product release. Work with Business Unit on their NPIs (New Product Introductions) to prepare and embed service product offerings. Spearhead AIx growth engine to develop new capability and enable service product offers. Define/approve Product application support plans for service product offers. Make sure Products meet all requirements; CoO, MTTR, MTBC, SDUT, etc Work with team on AGS DfI, DfS, etc Training: AGS-TS, FSO, SBU FSO Team, TSE, PSE, Digital Tool Team, FabVantage Team, etc. Perform analysis, summaries, as well as develop and transfer package of new applications / platforms to product division and customer support team. Spares, Training, AIx, etc Create & Lead new methodologies in order to optimized system performance for specific application. Digital Tool new development, adjust existing Digital Tools to current application / platform, etc. Leads the Core Teams on NPI evaluation and demos at customers site, through CIF (Common Interests Framework), high involvement in the SOW and commitment schedule. Interfaces with BU, FSO / PSE, and customer teams regarding technical requirements, analysis, schedule, deliverables, and closure. Lead customer Technical Review Meetings and deliverable measurables. Functional Knowledge Regarded as the technical expert in their field. Demonstrates in-depth and/or breadth of expertise in own discipline and broad knowledge of other disciplines within the function. 3-5 years of DDP BU / Application / Platform experience. Program Management proficiency. Skilled at Microsoft Office suite; esp. PowerPoint, Excel. Create material and present it executives / large groups. Business Expertise Has Semi-space awareness; Regions, customer, segments. Has knowledge of best practices, integrate AGS and BU best practices into common spaces; aware of the competition (AGS and BU) and the factors that differentiate them in the market. Leadership Drives cross-functional teams; leads projects with notable risk and complexity; develops the strategy for project execution. Coaches and Mentors colleagues with less experience Problem Solving Solves unique and complex problems with broad impact on the business; requires conceptual and innovative thinking to develop solutions. Self-driving; able to negotiate progress around roadblocks; willing to ask for help and find support for developing solutions. Impact Impacts the direction and resource allocation for program, project or services; works within general functional policies and industry. Interpersonal Skills Communicates difficult concepts and negotiates with others to adopt a different point of view Additional Information Time Type: Full time Employee Type: Assignee / Regular Travel: Yes, 10% of the Time Relocation Eligible: Yes The salary offered to a selected candidate will be based on multiple factors including location, hire grade, job-related knowledge, skills, experience, and with consideration of internal equity of our current team members. In addition to a comprehensive benefits package, candidates may be eligible for other forms of compensation such as participation in a bonus and a stock award program, as applicable. For all sales roles, the posted salary range is the Target Total Cash (TTC) range for the role, which is the sum of base salary and target bonus amount at 100% goal achievement. Applied Materials is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, national origin, citizenship, ancestry, religion, creed, sex, sexual orientation, gender identity, age, disability, veteran or military status, or any other basis prohibited by law. In addition, Applied endeavors to make our careers site accessible to all users. If you would like to contact us regarding accessibility of our website or need assistance completing the application process, please contact us via e-mail at , or by calling our HR Direct Help Line at , option 1, and following the prompts to speak to an HR Advisor. This contact is for accommodation requests only and cannot be used to inquire about the status of applications.
Cloudforce One REACT Principal Consultant
CloudFlare Seattle, Washington
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
Cloudforce One REACT Principal Consultant
CloudFlare Washington, Washington DC
About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realise people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyse these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organisation, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analysing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible for correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis on associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customised tactical and strategic remediation plans for compromised organisations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyse complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organisations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it does not store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! Export Control Notice This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorisation to receive software or technology controlled under these U.S. export laws without sponsorship for an export licence. Equal Opportunity Statement Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and value diversity and inclusiveness . click apply for full job details
04/02/2026
Full time
About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realise people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyse these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organisation, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analysing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible for correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis on associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customised tactical and strategic remediation plans for compromised organisations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyse complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organisations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it does not store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! Export Control Notice This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorisation to receive software or technology controlled under these U.S. export laws without sponsorship for an export licence. Equal Opportunity Statement Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and value diversity and inclusiveness . click apply for full job details
Cloudforce One REACT Principal Consultant
CloudFlare Denver, Colorado
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. 3 days ago Be among the first 25 applicants. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the Internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ year in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills and have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ year of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; a passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal: we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. 3 days ago Be among the first 25 applicants. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the Internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ year in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills and have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ year of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; a passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal: we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. . click apply for full job details
Cloudforce One REACT Principal Consultant
CloudFlare
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). The team works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments, detect and disrupt cyber threat activity across customer networks and cloud environments, and engage with customers at all levels including Executive, VP, Director, and managerial levels. You will help discover and analyze cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1 year in Digital Forensics or Incident Response. Experience with hands on forensic analysis in Windows, Mac, and Linux environments, triaging malware using static or dynamic analysis, correlating threat actor activity across a customer's environment, and excellent written and verbal communication skills is required. Experience with incident response reports and the ability to write simple scripts in Python or Golang are also essential. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ years of customer facing role Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Background using a variety of forensic analysis tools to determine the extent and scope of compromise Strong knowledge of network protocols and analysis tools such as Bro/Zeek or Suricata Ability to understand the capabilities of static and dynamic malware analysis Strong understanding of targeted attacks and the ability to create customized tactical and strategic remediation plans for compromised organizations Strong background in secure network architecture and network operations Knowledge of AWS, Azure, and GCP incident response methodologies Strong communication skills to convey executive and detailed findings to clients and internal teams Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with AWS, Azure, O365, Google, and Cloudflare environments Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated techniques Mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Experience with APT malware reverse engineering and understanding of common infection vectors Knowledge of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique aspects of malware Experience with malware attribution and tracking IOCs, pivoting, and infrastructure enumeration Familiarity with bash command line executables for static analysis and IOCs investigation Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work. The technology is already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. It's available publicly for everyone to use-no client IP addresses are ever stored or sold. Sound like something you'd like to be a part of? We'd love to hear from you! Equal Opportunity Employer Statement: Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer. Cloudflare provides reasonable accommodations to qualified individuals with disabilities. If you require a reasonable accommodation to apply for a job, please contact us at or 101 Townsend St., San Francisco, CA 94107.
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). The team works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments, detect and disrupt cyber threat activity across customer networks and cloud environments, and engage with customers at all levels including Executive, VP, Director, and managerial levels. You will help discover and analyze cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1 year in Digital Forensics or Incident Response. Experience with hands on forensic analysis in Windows, Mac, and Linux environments, triaging malware using static or dynamic analysis, correlating threat actor activity across a customer's environment, and excellent written and verbal communication skills is required. Experience with incident response reports and the ability to write simple scripts in Python or Golang are also essential. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ years of customer facing role Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Background using a variety of forensic analysis tools to determine the extent and scope of compromise Strong knowledge of network protocols and analysis tools such as Bro/Zeek or Suricata Ability to understand the capabilities of static and dynamic malware analysis Strong understanding of targeted attacks and the ability to create customized tactical and strategic remediation plans for compromised organizations Strong background in secure network architecture and network operations Knowledge of AWS, Azure, and GCP incident response methodologies Strong communication skills to convey executive and detailed findings to clients and internal teams Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with AWS, Azure, O365, Google, and Cloudflare environments Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated techniques Mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Experience with APT malware reverse engineering and understanding of common infection vectors Knowledge of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique aspects of malware Experience with malware attribution and tracking IOCs, pivoting, and infrastructure enumeration Familiarity with bash command line executables for static analysis and IOCs investigation Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work. The technology is already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. It's available publicly for everyone to use-no client IP addresses are ever stored or sold. Sound like something you'd like to be a part of? We'd love to hear from you! Equal Opportunity Employer Statement: Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer. Cloudflare provides reasonable accommodations to qualified individuals with disabilities. If you require a reasonable accommodation to apply for a job, please contact us at or 101 Townsend St., San Francisco, CA 94107.

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board