Note: The job is a remote job and is open to candidates in USA. Cloudflare is a mission-driven company focused on building a better Internet. They are seeking a talented Senior Manager, Incident Response to join their Cloudforce One organization, which is responsible for identifying and disrupting cyber threats. This role involves responding to security incidents and engaging with customers to mitigate malicious activity.
Responsibilities
• Respond to customer security incidents in on-premises and cloud environments
• Detect and disrupt cyber threat activity across customer networks and cloud environments
• Engage with customers at all levels including Executive, VP, Director, and managerial levels
• Serve an integral role in the discovery and analysis of cyber threat intrusions
• Work alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity
• Correlate threat actor activity across the customers environment
Skills
• 1-2 years of previous experience in cybersecurity
• At least 1+ years in Digital Forensics or Incident Response
• Experience with hands-on forensic analysis in a Windows, Mac, and Linux environment
• Experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms
• Correlating threat actor activity across the customers environment
• Excellent verbal and written communication skills
• Experience with incident response reports
• Reliably able to write simple scripts in Python or Golang
• Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience
• 3+ years of previous experience in cyber security
• 2+ years of Incident Response experience
• 1+ years of customer-facing role
• Experience conducting or managing incident response investigations for organizations
• Background using a variety of forensic analysis tools in incident response investigations
• Strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata
• Ability to perform analysis of associated network logs
• Ability to understand the capabilities of static and dynamic malware analysis
• Strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations
• Strong understanding of secure network architecture and strong background in performing network operations
• Knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies
• Strong ability to communicate executive and/or detailed level findings to clients
• Ability to effectively communicate tasks, guidance, and methodology with internal teams
• Strong written and verbal communication skills
• Ability to establish and maintain strong working relationships with business groups
• Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS
• Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)
• Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements
• In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems
• Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system
• Proficient with Yara and writing rules to detect similar malware samples
• Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs
• Practical malware analysis experience with static, dynamic, and automated malware analysis techniques
• Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples
• Reverse engineering experience with APT malware with an understanding of common infection vectors
• Knowledgeable of current malware techniques to evade detection and obstruct analysis
• Experience writing malware reports on unique and interesting aspects of malware
• Experience with malware attribution
• Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration
• Familiarity with bash command line executables to conduct static analysis and investigate IOCs
Company Overview
• Cloudflare is a web performance and security company that provides online services to protect and accelerate websites online. It was founded in 2009, and is headquartered in San Francisco, California, USA, with a workforce of 1001-5000 employees. Its website is http://www.cloudflare.com.
Company H1B Sponsorship
• Cloudflare has a track record of offering H1B sponsorships, with 117 in 2025, 115 in 2024, 66 in 2023, 98 in 2022, 83 in 2021, 37 in 2020. Please note that this does not guarantee sponsorship for this specific role.
Apply Now
Apply Now