Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
Senior Penetration Tester job at JPMorgan Chase & Co Brooklyn, NY. Job Description This role is also open to Wilmington DE Columbus OH Plano, TX Washington, DC. Join our dedicated team in a role where your expertise in risk assessments and cybersecurity exercises propels forward our mission of safeguarding our operations and enhancing resiliency. This position offers the unique opportunity to shape our security posture and contribute to our continuous improvement in an environment that values innovation and teamwork. As an Assessments & Exercises Senior Associate in the Cybersecurity & Technology Controls team, you will help enhance the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Collaborate with the team to design and execute risk-driven tests and simulations. Evaluate preventative controls, incident response processes, and detection. Your ability to make informed decisions and foster continuous improvement will allow you to contribute to the achievement of the team's operational goals and the mitigation of cyber and resiliency risks. As part of the penetration test team, your primary responsibility will be performing hands on penetration testing of some of the firms most critical web and mobile applications. You will work with application developers to not only understand root cause and mitigate vulnerabilities, but also to identify where vulnerabilities can be identified earlier in the Software Development Life Cycle (SDLC). As a successful candidate within our team, you are expected to demonstrate an eagerness to learn, the promote to excel, excellent technical knowledge of security concepts, and proven expertise in penetration testing. Job responsibilities Collaborate with other Assessments & Exercises team members to conduct testing and simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies to ensure alignment with industry standards and regulatory requirements Partner with subject matter experts to evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation Develop comprehensive assessment reports, including detailed findings, risk assessments, and remediation recommendations, and effectively communicate these insights to relevant stakeholders as you contribute to decisions that yield continuous improvement Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy Required qualifications, capabilities, and skills 3+ years of experience in cybersecurity or resiliency, with a focus on offensive security testing, assessments, or simulation exercises Experience conducting manual penetration tests against a wide variety of applications and technologies including web, API, and mobile (Android & iOS) applications Expertise in common cybersecurity threats and technology resiliency risks pertaining to the US financial services sector Proficiency in at least two security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework, offensive testing tools, or resiliency testing equivalents) Demonstrated collaboration, communication (written and verbal), and executive reporting skills, with the ability to work effectively with cross-functional teams and convey complex cybersecurity concepts and recommendations to diverse stakeholders Preferred qualifications, capabilities, and skills Proficiency in security concepts for both Windows and Unix-like Operating Systems Additional experience in testing thick clients, internal and external facing infrastructures, and cloud platforms (AWS/Azure/GCP) Experience in source code review and/or building software with multiple programming languages (i.e. Python, Java, Rust, etc.) Experience in reverse engineering thick clients and mobile applications Certifications like OSWE, CREST (CRT, CCT), OSCP, OSCE, GXPN, GWAPT, GPEN, GMOB, BSCP About Us JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management. We offer a competitive total rewards package including base salary determined based on the role, experience, skill set and location. Those in eligible roles may receive commission-based pay and/or discretionary incentive compensation, paid in the form of cash and/or forfeitable equity, awarded in recognition of individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process. We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation. JPMorgan Chase & Co. is an Equal Opportunity Employer, including Disability/Veterans About the Team Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we're setting our businesses, clients, customers and employees up for success.
04/02/2026
Full time
Senior Penetration Tester job at JPMorgan Chase & Co Brooklyn, NY. Job Description This role is also open to Wilmington DE Columbus OH Plano, TX Washington, DC. Join our dedicated team in a role where your expertise in risk assessments and cybersecurity exercises propels forward our mission of safeguarding our operations and enhancing resiliency. This position offers the unique opportunity to shape our security posture and contribute to our continuous improvement in an environment that values innovation and teamwork. As an Assessments & Exercises Senior Associate in the Cybersecurity & Technology Controls team, you will help enhance the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Collaborate with the team to design and execute risk-driven tests and simulations. Evaluate preventative controls, incident response processes, and detection. Your ability to make informed decisions and foster continuous improvement will allow you to contribute to the achievement of the team's operational goals and the mitigation of cyber and resiliency risks. As part of the penetration test team, your primary responsibility will be performing hands on penetration testing of some of the firms most critical web and mobile applications. You will work with application developers to not only understand root cause and mitigate vulnerabilities, but also to identify where vulnerabilities can be identified earlier in the Software Development Life Cycle (SDLC). As a successful candidate within our team, you are expected to demonstrate an eagerness to learn, the promote to excel, excellent technical knowledge of security concepts, and proven expertise in penetration testing. Job responsibilities Collaborate with other Assessments & Exercises team members to conduct testing and simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies to ensure alignment with industry standards and regulatory requirements Partner with subject matter experts to evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation Develop comprehensive assessment reports, including detailed findings, risk assessments, and remediation recommendations, and effectively communicate these insights to relevant stakeholders as you contribute to decisions that yield continuous improvement Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy Required qualifications, capabilities, and skills 3+ years of experience in cybersecurity or resiliency, with a focus on offensive security testing, assessments, or simulation exercises Experience conducting manual penetration tests against a wide variety of applications and technologies including web, API, and mobile (Android & iOS) applications Expertise in common cybersecurity threats and technology resiliency risks pertaining to the US financial services sector Proficiency in at least two security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework, offensive testing tools, or resiliency testing equivalents) Demonstrated collaboration, communication (written and verbal), and executive reporting skills, with the ability to work effectively with cross-functional teams and convey complex cybersecurity concepts and recommendations to diverse stakeholders Preferred qualifications, capabilities, and skills Proficiency in security concepts for both Windows and Unix-like Operating Systems Additional experience in testing thick clients, internal and external facing infrastructures, and cloud platforms (AWS/Azure/GCP) Experience in source code review and/or building software with multiple programming languages (i.e. Python, Java, Rust, etc.) Experience in reverse engineering thick clients and mobile applications Certifications like OSWE, CREST (CRT, CCT), OSCP, OSCE, GXPN, GWAPT, GPEN, GMOB, BSCP About Us JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management. We offer a competitive total rewards package including base salary determined based on the role, experience, skill set and location. Those in eligible roles may receive commission-based pay and/or discretionary incentive compensation, paid in the form of cash and/or forfeitable equity, awarded in recognition of individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process. We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation. JPMorgan Chase & Co. is an Equal Opportunity Employer, including Disability/Veterans About the Team Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we're setting our businesses, clients, customers and employees up for success.
About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realise people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyse these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organisation, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analysing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible for correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis on associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customised tactical and strategic remediation plans for compromised organisations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyse complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organisations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it does not store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! Export Control Notice This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorisation to receive software or technology controlled under these U.S. export laws without sponsorship for an export licence. Equal Opportunity Statement Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and value diversity and inclusiveness . click apply for full job details
04/02/2026
Full time
About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realise people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyse these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organisation, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analysing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible for correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis on associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customised tactical and strategic remediation plans for compromised organisations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyse complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organisations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it does not store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! Export Control Notice This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorisation to receive software or technology controlled under these U.S. export laws without sponsorship for an export licence. Equal Opportunity Statement Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and value diversity and inclusiveness . click apply for full job details
Perform security architecture design review and threat analysis of firmware and hardware , to ensure security properties and robustness of our complex software products Identify vulnerabilities in our firmware, build proof of concepts, and drive remediation via secure code reviews, fuzz and penetration testing Recommend security controls, evangelize and drive adoption of new or improved tools, practices, and plans to increase product robustness and reliability. Collaborate with engineers, customers, and/or partners to perform internal or external security audits on our products to ensure the security quality. Respond to product security incidents, coordinate engineering teams and partners to solve security related issues Work with other parts of our company on a broad range of technologies and initiatives to enhance security. Research and exploit side-channel, fault, and advanced physical attacks Requirement BS+ in Computer Engineering, Computer Science, or Electrical Engineering. 7+ years of relevant work experience Programming background in ARM/RISCV assembly, Python, C, C++, and/or RUST Knowledge of embedded system architecture and security (e.g. Android/Linux, ARM trust zone, hypervisor/virtualization etc.). Knowledge of hardware/software vulnerabilities and their exploit techniques Experience with security design review or threat modeling throughout hardware to software. Experience with secure code review, analysis, vulnerability assessment, hacking/attack analysis. Motivated by pursuing difficult and novel problems in a highly complex environment Excellent at multitasking, organizing, and prioritizing complex projects to meet deadlines Listens for nuances and digs into details to understand systems deeply Preferred Requirement experience on any automotive grade platform such as AUTOSAR, QNX, Android Automotive, etc. JTAG, debugging, binary instrumentation frameworks, Reverse-engineering (IDA Pro, Ghidra) ISO21434 or ISO 26262 compliance experience TARA or HARA methodology and execution experience CACSE (Certified Automotive Cyber-Security Expert) certificate CACSP (Automotive Cyber-Security Professional) certificate Salary range: $180,000- $260,000 Employee may be eligible for performance bonus, short and long term incentive programs. Actual total compensation will be dependent upon the individual's skills, experience and qualifications. In addition, MediaTek provides a variety of benefits including comprehensive health insurance coverage, life and disability insurance, savings plan, Company paid holidays, Paid time off (PTO), Parental leave, 401K and more. MediaTek is an Equal Opportunity Employer that is committed to inclusion and diversity to all, regardless of age, ancestry, color, disability (mental and physical), exercising the right to family care and medical leave, gender, gender expression, gender identity, genetic information, marital status, medical condition, military or veteran status, national origin, political affiliation, race, religious creed, sex (includes pregnancy, childbirth, breastfeeding and related medical conditions), and sexual orientation. Seniority level Seniority levelMid-Senior level Employment type Employment typeFull-time Job function IndustriesSemiconductor Manufacturing Referrals increase your chances of interviewing at MediaTek by 2x Sign in to set job alerts for "Security Engineer" roles. Mountain View, CA $180,000.00-$210,000.00 1 month ago Santa Clara, CA $135,000.00-$250,000.00 5 months ago Software Engineer II (Full Time) United States San Jose, CA $123,600.00-$174,000.00 5 days ago Mountain View, CA $125,000.00-$188,000.00 1 month ago Palo Alto, CA $175,000.00-$200,000.00 2 weeks ago San Francisco Bay Area $115,000.00-$160,000.00 1 month ago Fremont, CA $100,000.00-$160,000.00 2 weeks ago Menlo Park, CA $147,000.00-$208,000.00 2 weeks ago Security Engineer - Security Risk Management Redwood City, CA $100,000.00-$150,000.00 6 days ago San Jose, CA $166,400.00-$222,100.00 2 hours ago Sunnyvale, CA $141,000.00-$202,000.00 1 week ago Information Security Engineer - GeneralistSenior Infrastructure and Security EngineerSecurity Engineer, Detection & Incident ResponseSenior Security Engineer - Northwest region (San Jose, CA) Palo Alto, CA $175,000.00-$225,000.00 1 hour ago Software Engineer, Credit Cards & Banking PlatformSecurity Engineer Investigator, Insider Trust Mountain View, CA $204,000.00-$259,000.00 1 week ago Security Engineer, Google Distributed Cloud Air-Gapped Compliance Sunnyvale, CA $197,000.00-$291,000.00 1 week ago Senior Security Engineer, Endpoint SecuritySoftware Engineer - Mapping & Localization San Jose, CA $130,000.00-$182,000.00 1 month ago We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
04/02/2026
Full time
Perform security architecture design review and threat analysis of firmware and hardware , to ensure security properties and robustness of our complex software products Identify vulnerabilities in our firmware, build proof of concepts, and drive remediation via secure code reviews, fuzz and penetration testing Recommend security controls, evangelize and drive adoption of new or improved tools, practices, and plans to increase product robustness and reliability. Collaborate with engineers, customers, and/or partners to perform internal or external security audits on our products to ensure the security quality. Respond to product security incidents, coordinate engineering teams and partners to solve security related issues Work with other parts of our company on a broad range of technologies and initiatives to enhance security. Research and exploit side-channel, fault, and advanced physical attacks Requirement BS+ in Computer Engineering, Computer Science, or Electrical Engineering. 7+ years of relevant work experience Programming background in ARM/RISCV assembly, Python, C, C++, and/or RUST Knowledge of embedded system architecture and security (e.g. Android/Linux, ARM trust zone, hypervisor/virtualization etc.). Knowledge of hardware/software vulnerabilities and their exploit techniques Experience with security design review or threat modeling throughout hardware to software. Experience with secure code review, analysis, vulnerability assessment, hacking/attack analysis. Motivated by pursuing difficult and novel problems in a highly complex environment Excellent at multitasking, organizing, and prioritizing complex projects to meet deadlines Listens for nuances and digs into details to understand systems deeply Preferred Requirement experience on any automotive grade platform such as AUTOSAR, QNX, Android Automotive, etc. JTAG, debugging, binary instrumentation frameworks, Reverse-engineering (IDA Pro, Ghidra) ISO21434 or ISO 26262 compliance experience TARA or HARA methodology and execution experience CACSE (Certified Automotive Cyber-Security Expert) certificate CACSP (Automotive Cyber-Security Professional) certificate Salary range: $180,000- $260,000 Employee may be eligible for performance bonus, short and long term incentive programs. Actual total compensation will be dependent upon the individual's skills, experience and qualifications. In addition, MediaTek provides a variety of benefits including comprehensive health insurance coverage, life and disability insurance, savings plan, Company paid holidays, Paid time off (PTO), Parental leave, 401K and more. MediaTek is an Equal Opportunity Employer that is committed to inclusion and diversity to all, regardless of age, ancestry, color, disability (mental and physical), exercising the right to family care and medical leave, gender, gender expression, gender identity, genetic information, marital status, medical condition, military or veteran status, national origin, political affiliation, race, religious creed, sex (includes pregnancy, childbirth, breastfeeding and related medical conditions), and sexual orientation. Seniority level Seniority levelMid-Senior level Employment type Employment typeFull-time Job function IndustriesSemiconductor Manufacturing Referrals increase your chances of interviewing at MediaTek by 2x Sign in to set job alerts for "Security Engineer" roles. Mountain View, CA $180,000.00-$210,000.00 1 month ago Santa Clara, CA $135,000.00-$250,000.00 5 months ago Software Engineer II (Full Time) United States San Jose, CA $123,600.00-$174,000.00 5 days ago Mountain View, CA $125,000.00-$188,000.00 1 month ago Palo Alto, CA $175,000.00-$200,000.00 2 weeks ago San Francisco Bay Area $115,000.00-$160,000.00 1 month ago Fremont, CA $100,000.00-$160,000.00 2 weeks ago Menlo Park, CA $147,000.00-$208,000.00 2 weeks ago Security Engineer - Security Risk Management Redwood City, CA $100,000.00-$150,000.00 6 days ago San Jose, CA $166,400.00-$222,100.00 2 hours ago Sunnyvale, CA $141,000.00-$202,000.00 1 week ago Information Security Engineer - GeneralistSenior Infrastructure and Security EngineerSecurity Engineer, Detection & Incident ResponseSenior Security Engineer - Northwest region (San Jose, CA) Palo Alto, CA $175,000.00-$225,000.00 1 hour ago Software Engineer, Credit Cards & Banking PlatformSecurity Engineer Investigator, Insider Trust Mountain View, CA $204,000.00-$259,000.00 1 week ago Security Engineer, Google Distributed Cloud Air-Gapped Compliance Sunnyvale, CA $197,000.00-$291,000.00 1 week ago Senior Security Engineer, Endpoint SecuritySoftware Engineer - Mapping & Localization San Jose, CA $130,000.00-$182,000.00 1 month ago We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Join to apply for the Software Reverse Engineer, Mid-Level role at Jobright.ai 1 day ago Be among the first 25 applicants Join to apply for the Software Reverse Engineer, Mid-Level role at Jobright.ai Get AI-powered advice on this job and more exclusive features. Jobright is an AI-powered career platform that helps job seekers discover the top opportunities in the US. We are NOT a staffing agency. Jobright does not hire directly for these positions. We connect you with verified openings from employers you can trust. Job Summary: STR is a technology company focused on cybersecurity and advanced research for defense and national security. They are seeking a Software Reverse Engineer to analyze vulnerabilities in cyber physical systems and develop innovative cybersecurity solutions. Responsibilities: • Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems • Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems • Developing innovative cybersecurity solutions • Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions • Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets • Documenting, demonstrating, and presenting research • Solving real world problems that have an impact on national security Qualifications: Required: • Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government • BS, MS or PhD in Computer Science, Computer Engineering, Cybersecurity or related field (or equivalent work experience) • Experience with binary analysis of software/firmware • Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra • Proficiency in one or more programming languages: C/C++, Python, etc. • Proficiency in one or more Assembly Languages: x86, ARM, etc. • General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc. Preferred: • Vulnerability research and analysis • Knowledge of weaponizing discovered vulnerabilities into exploits • Implant or software patch development • Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL • Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices. • Knowledge of operating system internals including memory/process/thread management • Embedded systems or firmware analysis • Experience development custom emulation tools to enable dynamic analysis • Experience analyzing and reconstructing code/data flow • Automated reverse engineering or software analysis tool development • Experience debugging software without source code • Knowledge of binary file structures and formats • Experience analyzing protocols or message structures • Knowledge of anti-reverse engineering techniques • Knowledge of intrusion detection and anti-malware systems and techniques Company: STR is built on people & technology platforms tackling tough problems in cybersecurity, distributed sensing & artificial. Founded in 2010, the company is headquartered in Woburn, Massachusetts, USA, with a team of employees. The company is currently Late Stage. Seniority level Seniority levelMid-Senior level Employment type Employment typeFull-time Job function IndustriesSoftware Development Referrals increase your chances of interviewing at Jobright.ai by 2x Inferred from the description for this job Medical insurance Vision insurance 401(k) Get notified about new Software Engineer jobs in Boston, MA . Boston, MA $130,000.00-$180,000.00 6 months ago Boston, MA $125,000.00-$178,000.00 1 month ago Boston, MA $150,000.00-$175,000.00 3 months ago Cambridge, MA $100,000.00-$130,000.00 4 days ago Boston, MA $100,000.00-$110,000.00 2 weeks ago Boston, MA $125,000.00-$178,000.00 4 months ago Graduate Software Engineer - Up to $110k + Bonus Boston, MA $108,760.00-$173,800.00 2 weeks ago Software Engineer: Full-Stack Web Developer Boston, MA $125,000.00-$178,000.00 3 weeks ago Boston, MA $140,000.00-$215,000.00 2 weeks ago Frontend Software Developer- React/Redux Boston, MA $125,000.00-$178,000.00 2 weeks ago Waltham, MA $109,800.00-$119,800.00 1 week ago Software Developer - Full stack/back-end Boston, MA $190,000.00-$210,000.00 3 weeks ago We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
04/02/2026
Full time
Join to apply for the Software Reverse Engineer, Mid-Level role at Jobright.ai 1 day ago Be among the first 25 applicants Join to apply for the Software Reverse Engineer, Mid-Level role at Jobright.ai Get AI-powered advice on this job and more exclusive features. Jobright is an AI-powered career platform that helps job seekers discover the top opportunities in the US. We are NOT a staffing agency. Jobright does not hire directly for these positions. We connect you with verified openings from employers you can trust. Job Summary: STR is a technology company focused on cybersecurity and advanced research for defense and national security. They are seeking a Software Reverse Engineer to analyze vulnerabilities in cyber physical systems and develop innovative cybersecurity solutions. Responsibilities: • Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems • Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems • Developing innovative cybersecurity solutions • Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions • Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets • Documenting, demonstrating, and presenting research • Solving real world problems that have an impact on national security Qualifications: Required: • Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government • BS, MS or PhD in Computer Science, Computer Engineering, Cybersecurity or related field (or equivalent work experience) • Experience with binary analysis of software/firmware • Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra • Proficiency in one or more programming languages: C/C++, Python, etc. • Proficiency in one or more Assembly Languages: x86, ARM, etc. • General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc. Preferred: • Vulnerability research and analysis • Knowledge of weaponizing discovered vulnerabilities into exploits • Implant or software patch development • Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL • Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices. • Knowledge of operating system internals including memory/process/thread management • Embedded systems or firmware analysis • Experience development custom emulation tools to enable dynamic analysis • Experience analyzing and reconstructing code/data flow • Automated reverse engineering or software analysis tool development • Experience debugging software without source code • Knowledge of binary file structures and formats • Experience analyzing protocols or message structures • Knowledge of anti-reverse engineering techniques • Knowledge of intrusion detection and anti-malware systems and techniques Company: STR is built on people & technology platforms tackling tough problems in cybersecurity, distributed sensing & artificial. Founded in 2010, the company is headquartered in Woburn, Massachusetts, USA, with a team of employees. The company is currently Late Stage. Seniority level Seniority levelMid-Senior level Employment type Employment typeFull-time Job function IndustriesSoftware Development Referrals increase your chances of interviewing at Jobright.ai by 2x Inferred from the description for this job Medical insurance Vision insurance 401(k) Get notified about new Software Engineer jobs in Boston, MA . Boston, MA $130,000.00-$180,000.00 6 months ago Boston, MA $125,000.00-$178,000.00 1 month ago Boston, MA $150,000.00-$175,000.00 3 months ago Cambridge, MA $100,000.00-$130,000.00 4 days ago Boston, MA $100,000.00-$110,000.00 2 weeks ago Boston, MA $125,000.00-$178,000.00 4 months ago Graduate Software Engineer - Up to $110k + Bonus Boston, MA $108,760.00-$173,800.00 2 weeks ago Software Engineer: Full-Stack Web Developer Boston, MA $125,000.00-$178,000.00 3 weeks ago Boston, MA $140,000.00-$215,000.00 2 weeks ago Frontend Software Developer- React/Redux Boston, MA $125,000.00-$178,000.00 2 weeks ago Waltham, MA $109,800.00-$119,800.00 1 week ago Software Developer - Full stack/back-end Boston, MA $190,000.00-$210,000.00 3 weeks ago We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. 3 days ago Be among the first 25 applicants. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the Internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ year in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills and have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ year of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; a passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal: we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. 3 days ago Be among the first 25 applicants. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the Internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ year in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills and have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ year of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; a passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal: we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. . click apply for full job details
A technology company in San Diego is seeking a Senior Software Reverse Engineer with a passion for analyzing vulnerabilities in cyber-physical systems. The role requires a bachelor's degree in a related field and a minimum of 5 years of experience. Responsibilities include reverse engineering software and firmware, developing automated tools, and collaborating with teams. An Active Top Secret security clearance is mandatory. This full-time position offers a salary range of $134,000 - $184,000, based on qualifications and market factors.
04/02/2026
Full time
A technology company in San Diego is seeking a Senior Software Reverse Engineer with a passion for analyzing vulnerabilities in cyber-physical systems. The role requires a bachelor's degree in a related field and a minimum of 5 years of experience. Responsibilities include reverse engineering software and firmware, developing automated tools, and collaborating with teams. An Active Top Secret security clearance is mandatory. This full-time position offers a salary range of $134,000 - $184,000, based on qualifications and market factors.
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). The team works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments, detect and disrupt cyber threat activity across customer networks and cloud environments, and engage with customers at all levels including Executive, VP, Director, and managerial levels. You will help discover and analyze cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1 year in Digital Forensics or Incident Response. Experience with hands on forensic analysis in Windows, Mac, and Linux environments, triaging malware using static or dynamic analysis, correlating threat actor activity across a customer's environment, and excellent written and verbal communication skills is required. Experience with incident response reports and the ability to write simple scripts in Python or Golang are also essential. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ years of customer facing role Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Background using a variety of forensic analysis tools to determine the extent and scope of compromise Strong knowledge of network protocols and analysis tools such as Bro/Zeek or Suricata Ability to understand the capabilities of static and dynamic malware analysis Strong understanding of targeted attacks and the ability to create customized tactical and strategic remediation plans for compromised organizations Strong background in secure network architecture and network operations Knowledge of AWS, Azure, and GCP incident response methodologies Strong communication skills to convey executive and detailed findings to clients and internal teams Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with AWS, Azure, O365, Google, and Cloudflare environments Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated techniques Mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Experience with APT malware reverse engineering and understanding of common infection vectors Knowledge of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique aspects of malware Experience with malware attribution and tracking IOCs, pivoting, and infrastructure enumeration Familiarity with bash command line executables for static analysis and IOCs investigation Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work. The technology is already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. It's available publicly for everyone to use-no client IP addresses are ever stored or sold. Sound like something you'd like to be a part of? We'd love to hear from you! Equal Opportunity Employer Statement: Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer. Cloudflare provides reasonable accommodations to qualified individuals with disabilities. If you require a reasonable accommodation to apply for a job, please contact us at or 101 Townsend St., San Francisco, CA 94107.
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). The team works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments, detect and disrupt cyber threat activity across customer networks and cloud environments, and engage with customers at all levels including Executive, VP, Director, and managerial levels. You will help discover and analyze cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1 year in Digital Forensics or Incident Response. Experience with hands on forensic analysis in Windows, Mac, and Linux environments, triaging malware using static or dynamic analysis, correlating threat actor activity across a customer's environment, and excellent written and verbal communication skills is required. Experience with incident response reports and the ability to write simple scripts in Python or Golang are also essential. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ years of customer facing role Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Background using a variety of forensic analysis tools to determine the extent and scope of compromise Strong knowledge of network protocols and analysis tools such as Bro/Zeek or Suricata Ability to understand the capabilities of static and dynamic malware analysis Strong understanding of targeted attacks and the ability to create customized tactical and strategic remediation plans for compromised organizations Strong background in secure network architecture and network operations Knowledge of AWS, Azure, and GCP incident response methodologies Strong communication skills to convey executive and detailed findings to clients and internal teams Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with AWS, Azure, O365, Google, and Cloudflare environments Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated techniques Mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Experience with APT malware reverse engineering and understanding of common infection vectors Knowledge of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique aspects of malware Experience with malware attribution and tracking IOCs, pivoting, and infrastructure enumeration Familiarity with bash command line executables for static analysis and IOCs investigation Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work. The technology is already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. It's available publicly for everyone to use-no client IP addresses are ever stored or sold. Sound like something you'd like to be a part of? We'd love to hear from you! Equal Opportunity Employer Statement: Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer. Cloudflare provides reasonable accommodations to qualified individuals with disabilities. If you require a reasonable accommodation to apply for a job, please contact us at or 101 Townsend St., San Francisco, CA 94107.
A technology company specializing in cybersecurity is seeking a Senior Software Reverse Engineer in San Diego. This role involves reverse engineering software and firmware, developing cybersecurity solutions, and requires an Active Top Secret (TS) security clearance. Candidates should have a Bachelor's in relevant fields and at least 5 years of experience. The salary range for this full-time position is between $134,000 - $184,000, based on various factors, including experience and skills.
04/02/2026
Full time
A technology company specializing in cybersecurity is seeking a Senior Software Reverse Engineer in San Diego. This role involves reverse engineering software and firmware, developing cybersecurity solutions, and requires an Active Top Secret (TS) security clearance. Candidates should have a Bachelor's in relevant fields and at least 5 years of experience. The salary range for this full-time position is between $134,000 - $184,000, based on various factors, including experience and skills.
About AIM About AIM - AIM is a well-funded, mission-oriented startup focused on radically scaling our civilization's capabilities to build planetary-scale infrastructure and reverse negative effects of climate change. The URL is . We are growing the team with motivated individuals with a passion for landing great products built with a strong engineering culture. If you find massive robots making a positive impact in the real world tantalizing, get in touch! AIM has been built by a team of engineers who landed cutting-edge systems at Google, Waymo, SpaceX, Tesla, Apple, Dropbox, Stripe, Google x and Microsoft, and are backed by General Catalyst, Khosla Ventures, Elad Gil, Human Capital, Ironspring Ventures, Mantis, DCVC, among other great allies. AIM builds autonomy for the real world - robots that move mountains. Our systems fuse software, hardware, robotics, and mission-critical infrastructure into ruggedized, safety-critical machinery operating on jobsites across the world. We replace decades of manual, error-prone, high-risk work with intelligent machines that reshape how earthmoving is done. Software is at the core of everything we build. Our autonomy stack spans edge compute, distributed systems, cloud orchestration, perception pipelines, real-time control, safety systems, and on-machine diagnostics. We develop software that must perform flawlessly in unpredictable, high-entropy environments - and we do it at global scale. We're growing fast, scaling globally, and building the engineering foundation that will define the next century of construction. About you You're a builder who thrives in the intersection of software, robotics, and the physical world. You write clean, simple, reliable code - and you're motivated by solving hard technical problems that have direct, real-world impact. You love architecting systems that work reliably in production, you dive deep into debugging and performance, and you have strong judgment about technical trade-offs. You're equally comfortable writing production code, designing distributed systems, improving developer workflows, or debugging complex interactions across services, edge compute, and sensor interfaces. You take ownership - not just of your code, but of the business and customer outcomes that code enables. You push for rigor, testability, operational excellence, and high engineering standards. You want to work on problems where correctness, safety, reliability, and performance matter. And you want to do it with a world-class team that values clarity, customer obsession, and engineering excellence. About us together We're going to change how the world builds. Along the way, we'll face hard engineering challenges: real-time constraints on edge compute perception, control, and autonomy pipeline interactions distributed configuration and update systems safety-critical code paths with zero-tolerance for failure field variability and environmental unpredictability data quality, observability, and serviceability across global deployments We will debate solutions, iterate quickly, confront the truth when things don't work, and build mechanisms that scale with quality. We'll write software that works not only in simulation or staging - but in sand, mud, cold, heat, vibration, shock loads, and the real operations our customers depend on. If that excites you - you're the kind of Senior SWE who will thrive here. What you will own As a Senior Software Engineer, you will design and build the core systems that power AIM's autonomous machines and global fleet operations. Architect & Build Systems (Distributed, Edge, Cloud) Architect and implement critical components of AIM's autonomy software stack, spanning edge compute, cloud services, and on-premise systems. Design systems that meet real-time constraints and operate reliably in unpredictable physical environments. Build frameworks, APIs, and services that simplify integration across autonomy, controls, perception, and robotics infrastructure. Write clean, testable, maintainable code using modern software engineering principles. Drive improvements in code quality, reliability, observability, and debuggability. Lead code reviews, design reviews, and architectural discussions. Improve System Performance & Reliability Optimize compute, memory, networking, and inter-process performance across diverse environments. Identify systemic issues, root causes, and long-term architectural improvements. Own End-to-End Execution Work with TPMs, Systems, Autonomy, Hardware, and Field Ops to ensure your software works reliably on real machines. Partner with FDEs to understand field realities and incorporate operational truth back into the codebase. Drive root-cause analysis and elimination of recurring defects. Raise the Engineering Bar Mentor junior and mid-level engineers. Improve developer experience, CI/CD, test frameworks, and local development tooling. Help define SWE excellence and engineering mechanisms across the org. Basic Qualifications Bachelor's degree in Computer Science, Computer Engineering, Robotics, or equivalent hands-on experience. 5+ years of professional software engineering experience delivering production systems. Strong coding ability in one or more languages: Python, C++, Go, Rust, TypeScript. Experience architecting or developing distributed systems, real-time systems, or large-scale production software. Experience with cloud technologies, databases, and service-oriented architectures. Ability to design systems for reliability, modularity, safety, testability, and maintainability. Strong debugging skills using logs, telemetry, metrics, and tracing tools. Ability to work across hardware/software interfaces and reason about real-world system behavior. Proven track record of delivering high-quality software independently and as part of cross-functional teams. Preferred Qualifications Experience with robotics, autonomy, or real-world deployed systems (perception, controls, mapping, localization). Experience with distributed compute on edge devices or ruggedized hardware. Comfort with Linux systems programming, IPC, networking, or real-time constraints. Experience with numerical or ML libraries (NumPy, CuPy, PyTorch). Experience with CI/CD, config management, or DevOps tooling. Experience working with embedded devices, sensors, or firmware. Experience with serviceability, observability, or building systems that operate in high-entropy environments. Ability to simplify complex systems and drive architectural clarity. How you'll stand out You write remarkably clean code and design systems that are simple, maintainable, and scalable. You connect software decisions to real-world customer outcomes and machine behavior. You bring a strong safety and reliability mindset to your work. You turn ambiguity into well-structured, well-architected solutions. You elevate engineering rigor through mentorship, documentation, and clear communication. You operate confidently across autonomy, distributed systems, hardware interfaces, and field constraints. What we offer Opportunity to build software that directly shapes the future of autonomy and heavy equipment robotics. High-impact ownership across AIM's autonomy stack and global deployments. Collaboration with world-class engineers across software, autonomy, hardware, and robotics. Competitive compensation, equity, medical/dental/vision, 401(k), life insurance. Travel opportunities to customer jobsites across the U.S., Australia, Europe, Africa, South America, and more.
04/02/2026
Full time
About AIM About AIM - AIM is a well-funded, mission-oriented startup focused on radically scaling our civilization's capabilities to build planetary-scale infrastructure and reverse negative effects of climate change. The URL is . We are growing the team with motivated individuals with a passion for landing great products built with a strong engineering culture. If you find massive robots making a positive impact in the real world tantalizing, get in touch! AIM has been built by a team of engineers who landed cutting-edge systems at Google, Waymo, SpaceX, Tesla, Apple, Dropbox, Stripe, Google x and Microsoft, and are backed by General Catalyst, Khosla Ventures, Elad Gil, Human Capital, Ironspring Ventures, Mantis, DCVC, among other great allies. AIM builds autonomy for the real world - robots that move mountains. Our systems fuse software, hardware, robotics, and mission-critical infrastructure into ruggedized, safety-critical machinery operating on jobsites across the world. We replace decades of manual, error-prone, high-risk work with intelligent machines that reshape how earthmoving is done. Software is at the core of everything we build. Our autonomy stack spans edge compute, distributed systems, cloud orchestration, perception pipelines, real-time control, safety systems, and on-machine diagnostics. We develop software that must perform flawlessly in unpredictable, high-entropy environments - and we do it at global scale. We're growing fast, scaling globally, and building the engineering foundation that will define the next century of construction. About you You're a builder who thrives in the intersection of software, robotics, and the physical world. You write clean, simple, reliable code - and you're motivated by solving hard technical problems that have direct, real-world impact. You love architecting systems that work reliably in production, you dive deep into debugging and performance, and you have strong judgment about technical trade-offs. You're equally comfortable writing production code, designing distributed systems, improving developer workflows, or debugging complex interactions across services, edge compute, and sensor interfaces. You take ownership - not just of your code, but of the business and customer outcomes that code enables. You push for rigor, testability, operational excellence, and high engineering standards. You want to work on problems where correctness, safety, reliability, and performance matter. And you want to do it with a world-class team that values clarity, customer obsession, and engineering excellence. About us together We're going to change how the world builds. Along the way, we'll face hard engineering challenges: real-time constraints on edge compute perception, control, and autonomy pipeline interactions distributed configuration and update systems safety-critical code paths with zero-tolerance for failure field variability and environmental unpredictability data quality, observability, and serviceability across global deployments We will debate solutions, iterate quickly, confront the truth when things don't work, and build mechanisms that scale with quality. We'll write software that works not only in simulation or staging - but in sand, mud, cold, heat, vibration, shock loads, and the real operations our customers depend on. If that excites you - you're the kind of Senior SWE who will thrive here. What you will own As a Senior Software Engineer, you will design and build the core systems that power AIM's autonomous machines and global fleet operations. Architect & Build Systems (Distributed, Edge, Cloud) Architect and implement critical components of AIM's autonomy software stack, spanning edge compute, cloud services, and on-premise systems. Design systems that meet real-time constraints and operate reliably in unpredictable physical environments. Build frameworks, APIs, and services that simplify integration across autonomy, controls, perception, and robotics infrastructure. Write clean, testable, maintainable code using modern software engineering principles. Drive improvements in code quality, reliability, observability, and debuggability. Lead code reviews, design reviews, and architectural discussions. Improve System Performance & Reliability Optimize compute, memory, networking, and inter-process performance across diverse environments. Identify systemic issues, root causes, and long-term architectural improvements. Own End-to-End Execution Work with TPMs, Systems, Autonomy, Hardware, and Field Ops to ensure your software works reliably on real machines. Partner with FDEs to understand field realities and incorporate operational truth back into the codebase. Drive root-cause analysis and elimination of recurring defects. Raise the Engineering Bar Mentor junior and mid-level engineers. Improve developer experience, CI/CD, test frameworks, and local development tooling. Help define SWE excellence and engineering mechanisms across the org. Basic Qualifications Bachelor's degree in Computer Science, Computer Engineering, Robotics, or equivalent hands-on experience. 5+ years of professional software engineering experience delivering production systems. Strong coding ability in one or more languages: Python, C++, Go, Rust, TypeScript. Experience architecting or developing distributed systems, real-time systems, or large-scale production software. Experience with cloud technologies, databases, and service-oriented architectures. Ability to design systems for reliability, modularity, safety, testability, and maintainability. Strong debugging skills using logs, telemetry, metrics, and tracing tools. Ability to work across hardware/software interfaces and reason about real-world system behavior. Proven track record of delivering high-quality software independently and as part of cross-functional teams. Preferred Qualifications Experience with robotics, autonomy, or real-world deployed systems (perception, controls, mapping, localization). Experience with distributed compute on edge devices or ruggedized hardware. Comfort with Linux systems programming, IPC, networking, or real-time constraints. Experience with numerical or ML libraries (NumPy, CuPy, PyTorch). Experience with CI/CD, config management, or DevOps tooling. Experience working with embedded devices, sensors, or firmware. Experience with serviceability, observability, or building systems that operate in high-entropy environments. Ability to simplify complex systems and drive architectural clarity. How you'll stand out You write remarkably clean code and design systems that are simple, maintainable, and scalable. You connect software decisions to real-world customer outcomes and machine behavior. You bring a strong safety and reliability mindset to your work. You turn ambiguity into well-structured, well-architected solutions. You elevate engineering rigor through mentorship, documentation, and clear communication. You operate confidently across autonomy, distributed systems, hardware interfaces, and field constraints. What we offer Opportunity to build software that directly shapes the future of autonomy and heavy equipment robotics. High-impact ownership across AIM's autonomy stack and global deployments. Collaboration with world-class engineers across software, autonomy, hardware, and robotics. Competitive compensation, equity, medical/dental/vision, 401(k), life insurance. Travel opportunities to customer jobsites across the U.S., Australia, Europe, Africa, South America, and more.
Our Mission Our mission is to restore cell health and resilience through cell rejuvenation to reverse disease, injury, and the disabilities that can occur throughout life. For more information, see our website at Our Value Our Single Altos Value: Everyone Owns Achieving Our Inspiring Mission. Diversity at Altos We believe that diverse perspectives are foundational to scientific innovation and inquiry. At Altos, exceptional scientists and industry leaders from around the world work together to advance a shared mission. Our intentional focus is on Belonging, so that all employees know that they are valued for their unique perspectives. We are all accountable for sustaining a diverse and inclusive environment. What You Will Contribute To Altos As a Machine Learning Engineer, you will play a prominent role in developing generative AI/ML models for multi-modal, multi scale biology. We are looking for a hands on, senior level creative and collaborative person to join our multidisciplinary team of scientists and engineers focused on transforming how we treat aging and disease. The successful candidate will thrive in a fast paced environment that emphasizes teamwork, transparency, scientific excellence, originality, rigor, and integrity. Responsibilities Partner with world class scientists across Altos to help generate biological insights with the goal of developing novel therapies; Design and implement large scale machine learning algorithms and systems applied to biological datasets; Train, evaluate, and optimize machine learning models at scale; Communicate effectively with internal and external collaborators to meet ambitious research and development goals. Who You Are Proven track record leveraging machine learning to solve real world problems; Expertise in one or more of the following: generative models, language models, computer vision, bayesian inference, causal reasoning & inference, transfer & multi task learning, diffusion models, graph neural networks, active learning; Experience writing production quality code with modern machine learning frameworks such as PyTorch, TensorFlow, JAX, or similar; Experience with multi GPU and distributed training at scale; A team player who thrives in collaborative environments and is committed to enabling colleagues to reach their full potential; Growth mindset - the desire to constantly expand your skillset and knowledge. Keen to learn more about biology, computational science, and medicine; Excitement about the Altos mission of restoring cell health and resilience to reverse disease, injury, and age related disabilities. Minimum Qualifications Masters or Ph.D. degree in a quantitative/computational field such as computer science, artificial intelligence, mathematics, statistics, physics, or computational biology, or equivalent experience; 8+ years experience in developing machine learning models; Very strong programming skills, including experience with Python and deep learning libraries such as PyTorch or JAX; Experience in large scale distributed optimization of machine learning models across multiple GPUs and nodes. Preferred Qualifications Familiarity with biological data formats, concepts, and computational models; Experience in cell health and rejuvenation related research area; Experience with identification and assessment of drug targets and/or therapeutic compounds; Experience in the application of machine learning methods to biological data, including genomics, transcriptomics, epigenetics, proteomics, and imaging; Track record in open source software development, e.g., demonstrated by high impact GitHub repository; Track record of high caliber scientific work, e.g., demonstrated through publications in peer reviewed scientific journals or major ML conferences; Experience with one lower level language (e.g., C++, Rust); Experience with large scale data processing and database tools such as MapReduce, Dask, SQL, Hugging Face Datasets, TileDB, Ray. The salary range Senior Machine Learning Engineer: $200,600 - $271,400 (Redwood City, CA) Staff Machine Learning Engineer: $232,900 - $315,100 (Redwood City, CA) Senior Machine Learning Engineer: $186,150 - $251,850 (San Diego, CA) Staff Machine Learning Engineer: $221,000 - $299,000 (San Diego, CA) Exact compensation may vary based on skills, experience, and location. Important Information for UK Applicants Please click here to read the Altos Labs EU and UK Applicant Privacy Notice (bit.ly/eu_uk_privacy_notice). The Privacy Notice is not a contract and does not set terms or conditions of employment. We Want You To Know We are a culture of collaboration and scientific excellence, and we believe in the values of inclusion and belonging to inspire innovation. Equal Employment Opportunity Altos Labs provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. Vaccination Policy Altos currently requires all employees to be fully vaccinated against COVID-19, subject to legally required exemptions (e.g., due to a medical condition or sincerely held religious belief). EEO Statement Altos Labs complies with the law and is not required to provide statements except as required by statute. All positions at Altos are open to qualified individuals with a high level of academic prowess and candidness. Altos Labs welcomes diverse backgrounds.
04/02/2026
Full time
Our Mission Our mission is to restore cell health and resilience through cell rejuvenation to reverse disease, injury, and the disabilities that can occur throughout life. For more information, see our website at Our Value Our Single Altos Value: Everyone Owns Achieving Our Inspiring Mission. Diversity at Altos We believe that diverse perspectives are foundational to scientific innovation and inquiry. At Altos, exceptional scientists and industry leaders from around the world work together to advance a shared mission. Our intentional focus is on Belonging, so that all employees know that they are valued for their unique perspectives. We are all accountable for sustaining a diverse and inclusive environment. What You Will Contribute To Altos As a Machine Learning Engineer, you will play a prominent role in developing generative AI/ML models for multi-modal, multi scale biology. We are looking for a hands on, senior level creative and collaborative person to join our multidisciplinary team of scientists and engineers focused on transforming how we treat aging and disease. The successful candidate will thrive in a fast paced environment that emphasizes teamwork, transparency, scientific excellence, originality, rigor, and integrity. Responsibilities Partner with world class scientists across Altos to help generate biological insights with the goal of developing novel therapies; Design and implement large scale machine learning algorithms and systems applied to biological datasets; Train, evaluate, and optimize machine learning models at scale; Communicate effectively with internal and external collaborators to meet ambitious research and development goals. Who You Are Proven track record leveraging machine learning to solve real world problems; Expertise in one or more of the following: generative models, language models, computer vision, bayesian inference, causal reasoning & inference, transfer & multi task learning, diffusion models, graph neural networks, active learning; Experience writing production quality code with modern machine learning frameworks such as PyTorch, TensorFlow, JAX, or similar; Experience with multi GPU and distributed training at scale; A team player who thrives in collaborative environments and is committed to enabling colleagues to reach their full potential; Growth mindset - the desire to constantly expand your skillset and knowledge. Keen to learn more about biology, computational science, and medicine; Excitement about the Altos mission of restoring cell health and resilience to reverse disease, injury, and age related disabilities. Minimum Qualifications Masters or Ph.D. degree in a quantitative/computational field such as computer science, artificial intelligence, mathematics, statistics, physics, or computational biology, or equivalent experience; 8+ years experience in developing machine learning models; Very strong programming skills, including experience with Python and deep learning libraries such as PyTorch or JAX; Experience in large scale distributed optimization of machine learning models across multiple GPUs and nodes. Preferred Qualifications Familiarity with biological data formats, concepts, and computational models; Experience in cell health and rejuvenation related research area; Experience with identification and assessment of drug targets and/or therapeutic compounds; Experience in the application of machine learning methods to biological data, including genomics, transcriptomics, epigenetics, proteomics, and imaging; Track record in open source software development, e.g., demonstrated by high impact GitHub repository; Track record of high caliber scientific work, e.g., demonstrated through publications in peer reviewed scientific journals or major ML conferences; Experience with one lower level language (e.g., C++, Rust); Experience with large scale data processing and database tools such as MapReduce, Dask, SQL, Hugging Face Datasets, TileDB, Ray. The salary range Senior Machine Learning Engineer: $200,600 - $271,400 (Redwood City, CA) Staff Machine Learning Engineer: $232,900 - $315,100 (Redwood City, CA) Senior Machine Learning Engineer: $186,150 - $251,850 (San Diego, CA) Staff Machine Learning Engineer: $221,000 - $299,000 (San Diego, CA) Exact compensation may vary based on skills, experience, and location. Important Information for UK Applicants Please click here to read the Altos Labs EU and UK Applicant Privacy Notice (bit.ly/eu_uk_privacy_notice). The Privacy Notice is not a contract and does not set terms or conditions of employment. We Want You To Know We are a culture of collaboration and scientific excellence, and we believe in the values of inclusion and belonging to inspire innovation. Equal Employment Opportunity Altos Labs provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. Vaccination Policy Altos currently requires all employees to be fully vaccinated against COVID-19, subject to legally required exemptions (e.g., due to a medical condition or sincerely held religious belief). EEO Statement Altos Labs complies with the law and is not required to provide statements except as required by statute. All positions at Altos are open to qualified individuals with a high level of academic prowess and candidness. Altos Labs welcomes diverse backgrounds.
Description: Job Summary: The Senior Sheet Metal Manufacturing Estimator prepares accurate, competitive, and strategically structured cost estimates for complex fabricated sheet metal components and assemblies. This role evaluates manufacturability, determines optimal production methods, and drives profitability through disciplined cost analysis and technical expertise. In addition to estimating responsibilities, this position provides technical leadership during the quoting process, supports engineering review, and assists with initial project integration into production to ensure customer requirements are achieved. The Senior Estimator serves as a key liaison between customers, vendors, engineering, and operations. Essential Duties and Responsibilities: Reviews and interprets complex manufacturing drawings, blueprints, and 3D models to determine scope, risk, and manufacturability. Analyzes GD&T and tolerance stack-ups to assess production feasibility and cost impact. Develops detailed cost models including material, labor, machine time, tooling, outside services, finishing, hardware, machining, welding, and assembly operations. Evaluates and determines the most cost-effective manufacturing strategy, including make-versus-buy decisions. Leads technical discussions with customers, vendors, engineering, and production teams to clarify specifications and resolve issues. Manages RFQs from receipt through submission, ensuring accuracy, competitiveness, and margin objectives are met within required timelines. Identifies design risks and recommends cost-saving or manufacturability improvements. Supports project transition from quote to production, assisting with engineering clarification and initial shop integration when required. Performs reverse engineering of customer-supplied components when necessary and produces drawings for internal or subcontractor use. Tracks quote performance, including win/loss trends, and drives continuous improvement in estimating accuracy and quoting strategy. Maintains thorough documentation of assumptions, calculations, and supporting data within ERP/MRP systems. Requirements: Knowledge, Skills, and Abilities: Advanced ability to read and interpret complex manufacturing drawings and technical documentation. Strong working knowledge of GD&T, tolerance stack-ups, and risk assessment in precision metal manufacturing. Comprehensive understanding of sheet metal fabrication processes including laser cutting, turret punching, forming/bending, welding, hardware insertion, machining, and finishing/coating operations. Strong understanding of material properties, production efficiencies, and cost drivers in metal manufacturing environments. Proficiency in ERP/MRP systems, Excel, and estimating software. Demonstrated ability to manage multiple high-value RFQs in a deadline-driven environment while maintaining margin accountability. Strong analytical and problem-solving skills with accountability for estimate accuracy and profitability. Professional communication skills with significant customer- and vendor-facing interaction. Ability to manage challenging customer situations with composure and professionalism. Strong cross-functional collaboration skills with engineering, production, and quality teams. Experience and Education: 10+ years of estimating experience in sheet metal manufacturing or a related fabrication environment required. Extensive background in fabrication, engineering, or manufacturing operations strongly preferred. Associate's or Bachelor's degree in Engineering, Manufacturing, or a related field preferred (or equivalent industry experience). Experience working directly with customers in a B2B manufacturing environment required. Special Requirements: Manufacturing environment; exposure to shop floor conditions including noise, machinery, and metal fabrication processes. Regular interaction with production teams to validate processes, costing assumptions, and manufacturability assessments. Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. Compensation details: 00 Yearly Salary PIe5bcd66926ab-2108
04/01/2026
Full time
Description: Job Summary: The Senior Sheet Metal Manufacturing Estimator prepares accurate, competitive, and strategically structured cost estimates for complex fabricated sheet metal components and assemblies. This role evaluates manufacturability, determines optimal production methods, and drives profitability through disciplined cost analysis and technical expertise. In addition to estimating responsibilities, this position provides technical leadership during the quoting process, supports engineering review, and assists with initial project integration into production to ensure customer requirements are achieved. The Senior Estimator serves as a key liaison between customers, vendors, engineering, and operations. Essential Duties and Responsibilities: Reviews and interprets complex manufacturing drawings, blueprints, and 3D models to determine scope, risk, and manufacturability. Analyzes GD&T and tolerance stack-ups to assess production feasibility and cost impact. Develops detailed cost models including material, labor, machine time, tooling, outside services, finishing, hardware, machining, welding, and assembly operations. Evaluates and determines the most cost-effective manufacturing strategy, including make-versus-buy decisions. Leads technical discussions with customers, vendors, engineering, and production teams to clarify specifications and resolve issues. Manages RFQs from receipt through submission, ensuring accuracy, competitiveness, and margin objectives are met within required timelines. Identifies design risks and recommends cost-saving or manufacturability improvements. Supports project transition from quote to production, assisting with engineering clarification and initial shop integration when required. Performs reverse engineering of customer-supplied components when necessary and produces drawings for internal or subcontractor use. Tracks quote performance, including win/loss trends, and drives continuous improvement in estimating accuracy and quoting strategy. Maintains thorough documentation of assumptions, calculations, and supporting data within ERP/MRP systems. Requirements: Knowledge, Skills, and Abilities: Advanced ability to read and interpret complex manufacturing drawings and technical documentation. Strong working knowledge of GD&T, tolerance stack-ups, and risk assessment in precision metal manufacturing. Comprehensive understanding of sheet metal fabrication processes including laser cutting, turret punching, forming/bending, welding, hardware insertion, machining, and finishing/coating operations. Strong understanding of material properties, production efficiencies, and cost drivers in metal manufacturing environments. Proficiency in ERP/MRP systems, Excel, and estimating software. Demonstrated ability to manage multiple high-value RFQs in a deadline-driven environment while maintaining margin accountability. Strong analytical and problem-solving skills with accountability for estimate accuracy and profitability. Professional communication skills with significant customer- and vendor-facing interaction. Ability to manage challenging customer situations with composure and professionalism. Strong cross-functional collaboration skills with engineering, production, and quality teams. Experience and Education: 10+ years of estimating experience in sheet metal manufacturing or a related fabrication environment required. Extensive background in fabrication, engineering, or manufacturing operations strongly preferred. Associate's or Bachelor's degree in Engineering, Manufacturing, or a related field preferred (or equivalent industry experience). Experience working directly with customers in a B2B manufacturing environment required. Special Requirements: Manufacturing environment; exposure to shop floor conditions including noise, machinery, and metal fabrication processes. Regular interaction with production teams to validate processes, costing assumptions, and manufacturability assessments. Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. Compensation details: 00 Yearly Salary PIe5bcd66926ab-2108