At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures list and ranked among the World’s Most Innovative Companies by Fast Company.
Want more jobs like this?
Get Data and Analytics jobs delivered to your inbox every week.
We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us!
Available Locations: Austin, Texas, San Francisco, USA, DC, USA, London, UK, Lisbon, Portugal
About the role
As an Enterprise Security Architect you will play a key role in effectively designing defensible network architectures, defensible builds & configurations, security platforms and automation, assisting in secure tool and product development, and will help establish security standards and guidelines across the enterprise. This role will lead security project work with technology peers for successful delivery and coach technology staff on appropriate security standards, processes, protocols and needs as they implement new technology into the organization.
What You’ll Do
- Works out and designs complex security solutions.
- Leads projects to implement secure enterprise systems and identifies issues that could compromise data integrity or security.
- Develops security policies, procedures, and guidelines and recommends necessary changes to a given project team to ensure the company’s systems are fully compliant with all applicable regulatory requirements and privacy laws.
- Creating and implementing enterprise security architecture models
- Utilizes open communication and managerial courage to ensure the standards, expectations and goals of the organization are respected and upheld.
- Serving as an advisor to engineering and development teams in security best practices and design.
- Leads security-related projects from inception to successful completion and is capable of effectively coaching technology staff on appropriate security protocols and needs as they implement new technology into the organization.
- Works on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors.
- Determines methods and procedures on new assignments and may coordinate activities of other personnel.
- Having wide-ranging experience, uses professional concepts and company objectives to resolve complex issues in creative and effective ways
- Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results.
- Ensures an organization's security strategy is aligned with companies business goals.
Examples of desirable skills, knowledge and experience
- 15+ years of experience in an IT/Security related field, 5 years of which as a security architect (Required).
- In-depth understanding of security concepts.
- Understand how business, engineering, IT, and security processes align, and how to research, test, and implement solutions to complex objectives.
- Able to anticipate challenges and steer the company towards growth.
- In depth knowledge of the following:
- Network Elements: Network nodes (computers, routers, etc.), communications protocols (TCP/IP, HTTP, DNS, etc.), connection media (wired, wireless), and topologies (bus, star, mesh, etc.)
- Security Elements: Cybersecurity devices and software, secure communications protocols (e.g. IPsec VPN and TLS), and data privacy technologies (classification, encryption, key management, etc.).
- Zero Trust
- NIST Cybersecurity Framework (CSF)
- Etc.
- Using a secure software development lifecycle at all stages of development
- Identify threats, facilitate appropriate risk responses, plan for countermeasures, and guide security testing for each sprint planning or design change with threat modeling
- Ensure all user stories and features include functional security constraints
- Verify justification and documentation of all application components, trust boundaries, and significant data flows
- Define application’s high-level architecture and each remote service connected and verify security analysis
- Verify implementation of centralized, reusable, secure, simply designed, and vetted security controls to avoid duplicate, ineffective, missing, or insecure controls.
- Verify security requirements, guidelines, coding checklist, or policy is available to all developers and testers
- Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private and hybrid environments.
- Extensive knowledge of security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
- Experience with one or more of the following: ISO 27001, NIST, Payment Card Industry Data Security Standard (PCI DSS), Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2, FedRamp Moderate - High.
- Works effectively with a variety of personalities and can adapt his/her approach to effectively reach and develop his/her team. Uses this skill as well as their functional knowledge to both earn and maintain a high level of credibility with the team.
- Experience in modeling and graphic representations.
- Network and security technologies and protocols and how they relate to security by design and implementation.
- Network security principles and best practices.
- Designing and managing secure network architectures.
- Secure configuration management processes
- Security reviews, identify gaps in security architecture, and develop a security risk management plan.
- Container-based architectures and implementations such as Kubernetes, Docker, etc.
- Security controls and countermeasures including practical experience with identity management, cyber-security, and IT processes and solutions
- Analyzing network data and systems to select the most appropriate control mechanism for the security required.
- Network and security concepts and protocols
- Network Security Frameworks
- Analyzing and fixing errors in software and applications, designing new programs, and providing support to existing software applications.
- Making application security part of the overall design and architecture of an application rather than introducing security later in testing
- Secure Software Development Lifecycle Requirements
- Access Control Architectural Requirements
- Input and Output Architectural Requirements
- Cryptographic Architecture Standards
- Errors, Logging, and Auditing Architecture
- Communications Architecture
- Business Logic Architecture
- Malicious Software Architecture
- Database security concepts and practices
- Securing data in transit, at rest and access
- Cyber attacks (i.e. SQL/NoSQL injections, buffer overflow, etc.),
- Data types and what and how they need to be protected
- Defining data flows
- Applicable regulatory compliance requirements
- Discovering and classifying data and databases
- Designing, creating, and maintaining data storage systems
- Developing application programming interfaces (APIs)
- Structured query language (SQL) and the like
- Data structures, modeling, integration, security, optimization, etc
- Data warehouse / lakes
- NIST Frameworks
Compensation
Compensation may be adjusted depending on work location.
- For Colorado, Illinois, Maryland and Minnesota based hires: Estimated annual salary of $168,000 - $206,000.
- For Washington D.C. based hires: Estimated annual salary of $187,000 - $229,000.
- For Bay Area based hires: Estimated annual salary of $196,000 - $240,000.
Equity
This role is eligible to participate in Cloudflare’s equity plan.
Benefits
Cloudflare offers a complete package of benefits and programs to support you and your family. Our benefits programs can help you pay health care expenses, support caregiving, build capital for the future and make life a little easier and fun! The below is a description of our benefits for employees in the United States, and benefits may vary for employees based outside the U.S.
Health & Welfare Benefits
- Medical/Rx Insurance
- Dental Insurance
- Vision Insurance
- Flexible Spending Accounts
- Commuter Spending Accounts
- Fertility & Family Forming Benefits
- On-demand mental health support and Employee Assistance Program
- Global Travel Medical Insurance
Financial Benefits
- Short and Long Term Disability Insurance
- Life & Accident Insurance
- 401(k) Retirement Savings Plan
- Employee Stock Participation Plan
Time Off
- Flexible paid time off covering vacation and sick leave
- Leave programs, including parental, pregnancy health, medical, and bereavement leave
What Makes Cloudflare Special?
We’re not just a highly ambitious, large-scale technology company. We’re a highly ambitious, large-scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet.
Project Galileo: We equip politically and artistically important organizations and journalists with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare’s enterprise customers--at no cost.
Athenian Project: We created Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. This is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released. Here’s the deal - we don’t store client IP addresses never, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers.
Sound like something you’d like to be a part of? We’d love to hear from you!
This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license.
Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer.
Cloudflare provides reasonable accommodations to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job. Examples of reasonable accommodations include, but are not limited to, changing the application process, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you require a reasonable accommodation to apply for a job, please contact us via e-mail at hr@cloudflare.com or via mail at 101 Townsend St. San Francisco, CA 94107.