{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/malware-attribution"},"x-facet":{"type":"skill","slug":"malware-attribution","display":"Malware Attribution","count":1},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_de3eafc7-e74"},"title":"Cloudforce One REACT Principal Consultant","description":"<p>About Us</p>\n<p>At Cloudflare, we are on a mission to help build a better Internet. We run one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>\n<p>Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>\n<p>About the Team</p>\n<p>Cloudforce One is Cloudflare&#39;s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs).</p>\n<p>About the Role</p>\n<p>We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors.</p>\n<p>Responsibilities</p>\n<p>As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.</p>\n<p>The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.</p>\n<p>Requirements</p>\n<p>Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms.</p>\n<p>You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang.</p>\n<p>Examples of desirable skills, knowledge and experience include:</p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience</li>\n<li>3+ years of previous experience in cyber security</li>\n<li>2+ years of Incident Response experience</li>\n<li>1+ years of customer-facing role</li>\n<li>Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists</li>\n<li>Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise</li>\n<li>Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs</li>\n<li>Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis</li>\n<li>Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations</li>\n<li>Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations</li>\n<li>Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies</li>\n<li>Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams</li>\n<li>Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups</li>\n<li>Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS</li>\n<li>Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)</li>\n<li>Understanding of MITRE ATT&amp;CK and NIST Cyber Security Frameworks standards and requirements</li>\n<li>In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems</li>\n</ul>\n<p>Bonus Points:</p>\n<ul>\n<li>Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system</li>\n<li>Proficient with Yara and writing rules to detect similar malware samples</li>\n<li>Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs</li>\n<li>Practical malware analysis experience with static, dynamic, and automated malware analysis techniques</li>\n<li>Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples</li>\n<li>Reverse engineering experience with APT malware with an understanding of common infection vectors</li>\n<li>Knowledgeable of current malware techniques to evade detection and obstruct analysis</li>\n<li>Experience writing malware reports on unique and interesting aspects of malware</li>\n<li>Experience with malware attribution</li>\n<li>Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration</li>\n<li>Familiarity with bash command line executables to conduct static analysis and investigate IOCs</li>\n</ul>\n<p>Travel requirements</p>\n<p>Ability to travel up to 20% of the time</p>\n<p>Position may require foreign and domestic travel, passport will be required</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_de3eafc7-e74","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Cloudflare","sameAs":"https://www.cloudflare.com/","logo":"https://logos.yubhub.co/cloudflare.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/cloudflare/jobs/7389902","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Digital Forensics","Incident Response","Cybersecurity","Network Forensic Analysis","Reverse Engineering","Malware Analysis","Cloud Incident Response","Communication","Network Protocols","Cloud Environments","MITRE ATT&CK","NIST Cyber Security Frameworks","Windows Operating Systems","Unix","Linux","Mac Operating Systems"],"x-skills-preferred":["Python","Golang","Yara","Source Code","Hex","Binary","Regular Expression","Data Correlation","Network Flow","System Logs","Static Analysis","Dynamic Analysis","Automated Malware Analysis","Malware Attribution","Indicator of Compromise","Infrastructure Enumeration","Bash Command Line Executables"],"datePosted":"2026-04-18T15:52:02.967Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Hybrid"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Digital Forensics, Incident Response, Cybersecurity, Network Forensic Analysis, Reverse Engineering, Malware Analysis, Cloud Incident Response, Communication, Network Protocols, Cloud Environments, MITRE ATT&CK, NIST Cyber Security Frameworks, Windows Operating Systems, Unix, Linux, Mac Operating Systems, Python, Golang, Yara, Source Code, Hex, Binary, Regular Expression, Data Correlation, Network Flow, System Logs, Static Analysis, Dynamic Analysis, Automated Malware Analysis, Malware Attribution, Indicator of Compromise, Infrastructure Enumeration, Bash Command Line Executables"}]}