About The Team
Join Cloudflare's Security Architecture Team with the following with the foll focus areas :
- Strategic Alignment: Translates the Organisations Cyber risk tolerance into specific technical blueprints and implements controls/prescriptive policies in mitigation/managing or remediating these risks
- Preventative Focus: Focuses on "shifting left" to fix architectural flaws before they become bigger risks or costs
- Technical Consulting: Acts as internal subject matter experts for Procurement (TPRM) and Engineering teams.
About the role/What You'll Do
- Provide input on technical security requirements for new infrastructure and engineering initiatives.
- Assist with documentation and maintenance of the corporate security architecture blueprints.
- You will be on the Third-Party Risk Management (TPRM) program, assessing the security posture of vendors, suppliers, and external partners. This involves performing complex security due diligence, managing risk remediation plans, and ensuring contractual security clauses are enforced throughout the vendor lifecycle.
- Conduct in-depth technical security assessments of new software, hardware, and services by evaluating system architecture, data flows, and infrastructure controls.
- Review external vulnerability scans and security configuration evidence provided by vendors to identify potential exposure points prior to procurement.
- Audit SaaS-to-SaaS and API-based integrations to ensure they follow the principle of least privilege and do not utilize over-privileged scopes or insecure authentication methods.
- Advanced knowledge with hands-on in Cloud Architecture, Data Encryption,Application Security and IAM Architecture
- Establish and enforce baseline security requirements for new software installations, covering encryption standards, multi-factor authentication (MFA), automated user provisioning/deprovisioning (SCIM), and SSO integration.
- Perform periodic reviews of existing implementations to detect and remediate "configuration drift," such as unauthorized public data shares or legacy administrative accounts.
- Utilize automated discovery tools to identify unmanaged SaaS applications (Shadow IT) and evaluate their security posture against corporate standards.
- Partner with internal business owners and vendors to track identified security gaps and ensure technical remediation occurs within agreed-upon SLAs.
- Provide technical expertise during third-party security incidents, assessing the impact on internal systems and validating vendor recovery and forensic efforts.
- Evaluate vendor Business Continuity and Disaster Recovery (BCDR) plans, including the verification of recent failover test results and tabletop exercises.
- Review vendor-side network segmentation, firewall configurations, and DDoS protection strategies for all critical cloud-hosted service implementations.
- Perform rigorous technical security reviews of vendor integration configurations throughout the entire partnership lifecycle-including implementation and ongoing use-to ensure continuous compliance with security standards.
- Assess completion of vendor offboarding processes, focusing on revoking system access, auditing final data handling, and validating post-offboarding security requirements.
- Investigative skills to understand External Attack Surface Management (EASM) and Fourth-Party Risk
- Understands Right to Audit: Understanding how to interpret penetration test summaries and vulnerability scan results provided by the vendor.
Requirements
- Either advanced studies in Cybersecurity, Computer Science, Information Systems, or similar
- Excellent written and verbal communication skills, including the ability to effectively collaborate with technical and senior business staff and management.
- 5+ years of experience in GRC (Governance, Risk, and Compliance) or Information Security, with 3+ years leading a TPRM/Vendor Risk program.
- Deep practical knowledge of industry assessment standards (e.g., SOC 2, ISO 27001, SIG, CSA STAR).
- Excellent analytical and communication skills to translate technical risk into business impact for stakeholders and Cloudflare end-to-end
- Experience with GRC platforms (e.g., ServiceNow GRC, Archer) for workflow automation.
Preferred
- Certifications: CRISC, CTPRP (Certified Third-Party Risk Professional), or CISA.
- Legal/Contractual experience relating to security clauses and Service Level Agreements (SLAs).
- Experience working in a global vendor landscape.
Top Skills
What We Do
Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company on a mission to help build a better Internet. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.
Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.
Why Work With Us
Cloudflare employees come from all walks of life. We are mission-driven, and our team is energized by a collaborative, creative environment that celebrates our differences and fosters new ways to grow together.
Gallery
Cloudflare Offices
Hybrid Workspace
Employees engage in a combination of remote and on-site work.
We are committed to developing a global team that is distributed with a flexible working approach. Doing this equitably and inclusively is essential to our success. Visit our careers site for more on 'How & Where We Work.'