Cloudforce One REACT Principal Consultant
Listed on 2025-11-17
-
IT/Tech
Cybersecurity, IT Consultant, Data Security
Cloudforce One REACT Principal Consultant
Available Locations:
Remote
Cloudforce One is Cloudflare’s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation‑state advanced persistent threats (APTs). The team works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever‑growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One analyze unique data points at scale, synthesizing findings into actionable threat intelligence to protect our customers.
AboutThe Role
Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful every day. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence‑driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors.
This position requires an innovative, self‑starting, and detail‑oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors.
As a REACT Consultant, you will respond to customer security incidents in on‑premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels, including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.
The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.
Our ideal candidate will have 1–2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands‑on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX‑based platforms. You will be responsible for correlating threat actor activity across the customers environment.
Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang.
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience
- 3+ years of previous experience in cybersecurity
- 2+ years of Incident Response experience
- 1+ years of customer‑facing role
- Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
- Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs
- Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations
- Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations
- Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).