Cloudforce One React Principal Consultant

Cloudflare Cloudflare · Enterprise · United States · Remote · Security

Cloudforce One is Cloudflare’s threat operations and research team, responsible for identifying and disrupting cyber threats. This role involves responding to customer security incidents, detecting and disrupting cyber threat activity, and analyzing threat actor activity. The ideal candidate will have experience in cybersecurity, digital forensics, or incident response, with skills in malware analysis, network forensics, and scripting.

What you'd actually do

  1. respond to customer security incidents in on-premises and cloud environments.
  2. detect and disrupt cyber threat activity across customer networks and cloud environments.
  3. engage with customers at all levels including Executive, VP, Director, and managerial levels.
  4. serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.
  5. correlating threat actor activity across the customers environment.

Skills

Required

  • 1-2 years of previous experience in cybersecurity
  • 1+ years in Digital Forensics or Incident Response
  • hands-on forensic analysis in a Windows, Mac, and Linux environment
  • triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms
  • correlating threat actor activity across the customers environment
  • excellent verbal and written communication skills
  • write simple scripts in Python or Golang

Nice to have

  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience
  • Incident Response experience for targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists
  • Computer Forensic Analysis using a variety of forensic analysis tools
  • Network Forensic Analysis with strong knowledge of network protocols and tools like Bro/Zeek or Suricata
  • Reverse Engineering ability to understand static and dynamic malware analysis
  • Incident Remediation and creating customized tactical and strategic remediation plans
  • Network Operations and Architecture/Engineering
  • Cloud Incident Response in AWS, Azure, GCP
  • strong ability to communicate exec

What the JD emphasized

  • 3+ years of previous experience in cyber security
  • 2+ years of Incident Response experience
  • 1+ years of customer-facing role