- Posted 16 January 2024
- Job type Permanent
Leadership Development Program
Paid Parental Leave
Return to Work Policy
Flexible Working Arrangements
Internal Women's Networking Group
At Cloudflare, we have our eyes set on an ambitious goal: to help build a better Internet. Today the company runs one of the world’s largest networks that powers approximately 25 million Internet properties, for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures list and ranked among the World’s Most Innovative Companies by Fast Company.
We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us!
The Security Response Team’s mission is to systematically respond to security threats safeguarding Cloudflare. We operate 24/7 across the globe to respond to security incidents, continuously improve our response capabilities, lead digital investigations and enhance our overall security posture. Our “Cloudflare on Cloudflare”, data and automation first philosophy makes us a cohesive team with high impact.
As an Incident Response Engineer, you'll refine security processes, focusing on operations and response. Responsibilities span proactive threat management across edge, product, cloud, workloads, and containers. You'll handle and lead critical security events through triage, cyber-attack analysis, scoping, containment, and forensics. You will help create scalable analysis processes and methods, build response frameworks, and collaborate with IT, Engineering, Product, and Legal teams. This role demands diverse technical skills, such as tooling development, automation, custom log analysis, a solid understanding of OS internals, and deep technical expertise in threat detection, incident analysis, forensics and SIEM systems.
Monitor, analyze, and resolve attacks, serving as Incident Commander throughout the entire incident lifecycle.
Participate in On-Call rotations with roles in IR Lead, Triage, and Project functions.
Act as a liaison between security leadership and experts, facilitating clear communication to both technical and non-technical stakeholders.
Perform detailed log analysis to identify indicators of compromise and anomalous behavior.
Design, develop, and maintain security tools to enhance the organization's overall cybersecurity posture.
Enhance Incident Response by ensuring compliance, creating documentation, and automating processes.
Collaborate with teams to identify and automate manual efforts in incident response.
Conduct code reviews, testing, and debugging of automation solutions.
Develop scalable solutions to minimize investigation time and integrate forensic capabilities into incident response workflows.
Assist in establishing KPIs and metrics for measuring incident response effectiveness and provide regular reporting to stakeholders.
Facilitate collaboration across Product, Infrastructure, SREs, GRC, ensuring cohesive incident response strategy.
Minimum 5 years of experience within an Information Security team, primarily focused on incident response, security engineering, threat research, pentest or product security team.
Able to self-scope, define, and manage short and long term technical goals.
Able to support and coach junior team members.
Extensive experience in security operations, including incident detection, response, investigation, and mitigation. Proven track record of handling complex security incidents and managing incident response teams.
Experience with SIEM, SOAR, and EDR that are used to detect anomalous behavior and respond.
In-depth understanding and hands-on experience with Linux/UNIX, MACOS, AWS, GCP, and Azure ecosystems, emphasizing security configurations and best practices
Experienced in establishing and enhancing security operations in product or cloud-native environments, with a focus on integrating security practices within CI/CD pipelines.
Lead root cause analysis, utilizing CI/CD methodologies for quick identification and implementation of preventive strategies.
Proficient in implementing Security as Code methodologies, automating security processes in alignment with agile development practices.
Strong proficiency in programming languages such as Python, Go, Ruby, complemented by expertise in SQL and other database query languages..
Excellent verbal/written communication, problem solving, analytical and independent judgment skills to support an environment driven by teamwork; must be able to positively influence, mentor and be a credible source of knowledge to less experienced team members..
Comprehensive knowledge of digital forensics investigations, encompassing chain of custody, evidence procedures, investigative interviewing techniques, information management, and legal processes.
Working knowledge of Information Security standards and policies like ISO 27001/27002, NIST, and others.
Experience with designing incident response and security operations programs.
Experience with software engineering, and designing custom security response tools.
Experience with maturity and gap assessments GCFA, GCFR, GNFA, and/or Public Cloud Certifications