As a Cloudforce One REACT Analyst, you will respond to cybersecurity incidents, analyze threats, and collaborate with teams to protect customer networks.
Available Locations: San Francisco, CA
About the Team
Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers.
About the Role
Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Incident Response Analyst to join us in growing our Cloudforce One REACT organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self-starting, and detail-oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors.
As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.
Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms. You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will posses excellent verbal and written communication skills. You will also has experience with incident response reports and reliably be able to write simple scripts in Python or Golang.
Examples of desirable skills, knowledge and experience
Bonus Points
Travel requirements
Compensation
Compensation may be adjusted depending on work location.
Equity
This role is eligible to participate in Cloudflare's equity plan.
Benefits
Cloudflare offers a complete package of benefits and programs to support you and your family. Our benefits programs can help you pay health care expenses, support caregiving, build capital for the future and make life a little easier and fun! The below is a description of our benefits for employees in the United States, and benefits may vary for employees based outside the U.S.
Health & Welfare Benefits
Financial Benefits
Time Off
About the Team
Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers.
About the Role
Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Incident Response Analyst to join us in growing our Cloudforce One REACT organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self-starting, and detail-oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors.
As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.
Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms. You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will posses excellent verbal and written communication skills. You will also has experience with incident response reports and reliably be able to write simple scripts in Python or Golang.
Examples of desirable skills, knowledge and experience
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience
- 3+ years of previous experience in cyber security
- 2+ years of Incident Response experience
- 1+ years of customer-facing role
- Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
- Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs
- Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations
- Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations
- Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies
- Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams
- Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups
- Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS
- Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)
- Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements
- In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems
Bonus Points
- Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system
- Proficient with Yara and writing rules to detect similar malware samples
- Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs
- Practical malware analysis experience with static, dynamic, and automated malware analysis techniques
- Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples
- Reverse engineering experience with APT malware with an understanding of common infection vectors
- Knowledgeable of current malware techniques to evade detection and obstruct analysis
- Experience writing malware reports on unique and interesting aspects of malware
- Experience with malware attribution
- Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration
- Familiarity with bash command line executables to conduct static analysis and investigate IOCs
Travel requirements
- Ability to travel up to 20% of the time
- Position may require foreign and domestic travel, passport will be required
Compensation
Compensation may be adjusted depending on work location.
- For Bay Area based hires: Estimated annual salary of $126,000 -$154,000
Equity
This role is eligible to participate in Cloudflare's equity plan.
Benefits
Cloudflare offers a complete package of benefits and programs to support you and your family. Our benefits programs can help you pay health care expenses, support caregiving, build capital for the future and make life a little easier and fun! The below is a description of our benefits for employees in the United States, and benefits may vary for employees based outside the U.S.
Health & Welfare Benefits
- Medical/Rx Insurance
- Dental Insurance
- Vision Insurance
- Flexible Spending Accounts
- Commuter Spending Accounts
- Fertility & Family Forming Benefits
- On-demand mental health support and Employee Assistance Program
- Global Travel Medical Insurance
Financial Benefits
- Short and Long Term Disability Insurance
- Life & Accident Insurance
- 401(k) Retirement Savings Plan
- Employee Stock Participation Plan
Time Off
- Flexible paid time off covering vacation and sick leave
- Leave programs, including parental, pregnancy health, medical, and bereavement leave
Top Skills
AWS
Azure
Bro/Zeek
GCP
Go
Network Protocols
Python
Suricata
Cloudflare Boston, Massachusetts, USA Office
Boston, MA, United States
Similar Jobs at Cloudflare
Cloud • Information Technology • Security • Software • Cybersecurity
As a Network Reliability Engineer at Cloudflare, you will enhance network resilience by managing the technical operations of the core data center network, automating operational tasks, and contributing to system design. You'll collaborate with a team to develop and improve software solutions that streamline deployment and support a high-performance network.
Cloud • Information Technology • Security • Software • Cybersecurity
As a Senior Threat Intelligence Analyst, you'll monitor and analyze Middle Eastern cyber threats, lead reporting efforts, and collaborate with teams to improve intelligence workflows.
Top Skills:
Metadata AnalysisOsintPacket AnalysisSQL
Cloud • Information Technology • Security • Software • Cybersecurity
As a Solutions Engineer, you will guide customers through the sales cycle, offering technical expertise, onboarding, and support to ensure success with Cloudflare's services.
Top Skills:
BashDnsFirewallsHTTPJavaScriptPythonSslTcpTlsUdp
What you need to know about the Boston Tech Scene
Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.
Key Facts About Boston Tech
- Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
- Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
- Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
- Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
- Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories