- Posted 16 January 2024
- Job type Permanent
Leadership Development Program
Paid Parental Leave
Return to Work Policy
Flexible Working Arrangements
Internal Women's Networking Group
At Cloudflare, we have our eyes set on an ambitious goal: to help build a better Internet. Today the company runs one of the world’s largest networks that powers approximately 25 million Internet properties, for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures list and ranked among the World’s Most Innovative Companies by Fast Company.
We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us!
The Security Response Team’s mission is to systematically respond to security threats safeguarding Cloudflare. We operate 24/7 across the globe to respond to security incidents, continuously improve our response capabilities, lead digital investigations and enhance our overall security posture. Our “Cloudflare on Cloudflare”, data and automation first philosophy makes us a cohesive team with high impact.
As an Incident Response Manager, you'll refine security processes, focusing on operations and response. Responsibilities span proactive threat management across edge, product, cloud, workloads, and containers. You'll lead a Security Response Hub assessing critical security events through triage, cyber-attack analysis, scoping, containment, and forensics. You will help create scalable analysis processes and methods, build response frameworks, and collaborate with IT, Engineering, Product, and Legal teams. This role demands diverse technical skills, such as tooling development, automation, custom log analysis, a solid understanding of OS internals, and deep technical expertise in threat detection, incident analysis, forensics and SIEM systems.
Vital leader of the Security Response team overseeing all operations within a region.
Incident Response Oversight:
Manage regional security response hub , providing oversight to security incidents from detection to resolution, employing CI/CD principles for rapid response.
Team Optimization and Agile Learning: Ensure optimal staffing, focusing on continuous skill development and career progression within an agile security environment.
Resource and Vendor Management: Administer budget and manage vendor relationships, aligning with the strategic objectives of security operations.
Guide team performance, ensuring adherence to established SOPs and best practices in security integration.
Strategic Communication Protocols: Manage sophisticated communication protocols during incidents, ensuring clarity and timeliness.
Root Cause Analysis: Lead root cause analysis, utilizing CI/CD methodologies for quick identification and implementation of preventive strategies.
Cross-Functional Collaboration: Facilitate collaboration across Product, Infrastructure, SREs, GRC, ensuring cohesive incident response strategy.
Continuous Process Improvement: Regularly refine incident response processes, incorporating the latest advancements for enhanced agility.
Strategic Leadership for Scalability: Provide visionary leadership, ensuring operational scalability and efficiency in line with business needs.
Team Development in a Security-Focused Culture:
Cultivate a high-performance team, enhancing capabilities through training and development.
Incident Documentation and Process Automation: Oversee incident documentation, refining response playbooks and guidelines with a focus on automation in security processes.
Security Technology Management:Govern the development and maintenance of security tools, emphasizing integration in existing security pipelines.
KPI-Driven Performance Assessment: Implement and monitor Key Performance Indicators to evaluate and improve incident response effectiveness.
On-Demand Operational Readiness:
Maintain readiness for critical incident management outside standard hours, integrating on-call responsibilities.
Senior Information Security Experience:
Possess over 7 years in Information Security roles, with at least 5 years in leading incident response and/or security operations teams.
DevSecOps and CI/CD Implementation: Experienced in establishing and enhancing security operations in product or cloud-native environments, with a focus on integrating security practices within CI/CD pipelines.
Security as Code Expertise: Proficient in implementing Security as Code methodologies, automating security processes in alignment with agile development practices.
Proactive Goal Management: Skilled in independently defining and driving both immediate and strategic technical goals within a fast-paced security landscape.
Team Mentorship and Development: Demonstrated capability in coaching and guiding junior team members, fostering a culture of continuous learning within a DevSecOps context.
Technical Environment Mastery: In-depth understanding and hands-on experience with Linux/UNIX, MACOS, AWS, GCP, and Azure ecosystems, emphasizing security configurations and best practices.
Advanced Security Operations Insight:
Extensive background in security operations, particularly in incident detection, response, investigation, and mitigation, within a continuous integration and deployment environment.
Security Tool Proficiency: Adept with advanced tools like SIEM, SOAR, and EDR, utilizing them for effective anomaly detection and incident response in a DevSecOps setting.
Programming and Scripting Skills: Strong proficiency in programming languages such as Python, Go, Ruby, complemented by expertise in SQL and other database query languages.
Effective Communication and Analytical Abilities: Excellent verbal and written communication skills, combined with robust problem-solving and independent judgment capabilities, vital for leading in a collaborative team environment.
Incident Response Communication: Seasoned in articulating investigative findings and strategies to diverse audiences including technical staff, legal teams, and internal stakeholders.
Leadership in Technical Team Growth: Track record of successfully managing, expanding, and steering technical teams, particularly in DevSecOps-oriented environments.
Incident Response Function Building: Passion for creating and nurturing a dedicated Incident Response function from scratch, aligning it with modern security and development practices.
Complex Attack Chain Knowledge: Comprehensive understanding of complex attack chains, especially in relation to intricate build and deployment pipelines.
Advanced Cloud Computing Deployment: Proficient in deploying diverse cloud solutions including IaaS, PaaS, SaaS, within a security-focused framework.
Regulatory Framework Acumen: Familiarity with key regulations and standards such as SOX, FEDRAMP, NIST, ISO, GLBA, PCI-DSS, GDPR, CISA, applying them effectively in a DevSecOps environment.
Comprehensive knowledge of digital forensics investigations, encompassing chain of custody, evidence procedures, investigative interviewing techniques, information management, and legal processes.
Experience with designing incident response and security operations programs.
Experience with software engineering, and designing custom security response tools.
Experience with maturity and gap assessmentsGCFA, GCFR, GNFA , and/or Public Cloud Certifications