# Security Assurance Analyst

**Company**: Cloudflare
**Location**: Hybrid; In-Office
**Work arrangement**: hybrid
**Experience**: senior
**Job type**: full-time
**Category**: Engineering
**Industry**: Technology

**Apply**: https://job-boards.greenhouse.io/cloudflare/jobs/7487259?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply
**Canonical**: https://yubhub.co/jobs/job_166660eb-ef4

## Description

About Us

At Cloudflare, we're on a mission to help build a better Internet. We're not looking for people who wait for a polished roadmap; we're looking for the builders who see the cracks in the Internet that everyone else has simply learned to live with.

Join Cloudflare's Security Architecture Team with the following focus areas:

- Strategic Alignment: Translates the Organisation's Cyber risk tolerance into specific technical blueprints and implements controls/prescriptive policies in mitigation/managing or remediating these risks

- Preventative Focus: Focuses on 'shifting left' to fix architectural flaws before they become bigger risks or costs

- Technical Consulting: Acts as internal subject matter experts for Procurement (TPRM) and Engineering teams

About the role/What You'll Do

- Provide input on technical security requirements for new infrastructure and engineering initiatives

- Assist with documentation and maintenance of the corporate security architecture blueprints

- You will be on the Third-Party Risk Management (TPRM) program, assessing the security posture of vendors, suppliers, and external partners

- Conduct in-depth technical security assessments of new software, hardware, and services by evaluating system architecture, data flows, and infrastructure controls

- Review external vulnerability scans and security configuration evidence provided by vendors to identify potential exposure points prior to procurement

- Audit SaaS-to-SaaS and API-based integrations to ensure they follow the principle of least privilege and do not utilize over-privileged scopes or insecure authentication methods

- Establish and enforce baseline security requirements for new software installations, covering encryption standards, multi-factor authentication (MFA), automated user provisioning/deprovisioning (SCIM), and SSO integration

- Perform periodic reviews of existing implementations to detect and remediate 'configuration drift,' such as unauthorized public data shares or legacy administrative accounts

- Utilize automated discovery tools to identify unmanaged SaaS applications (Shadow IT) and evaluate their security posture against corporate standards

- Partner with internal business owners and vendors to track identified security gaps and ensure technical remediation occurs within agreed-upon SLAs

- Provide technical expertise during third-party security incidents, assessing the impact on internal systems and validating vendor recovery and forensic efforts

- Evaluate vendor Business Continuity and Disaster Recovery (BCDR) plans, including the verification of recent failover test results and tabletop exercises

- Review vendor-side network segmentation, firewall configurations, and DDoS protection strategies for all critical cloud-hosted service implementations

- Perform rigorous technical security reviews of vendor integration configurations throughout the entire partnership lifecycle,including implementation and ongoing use,to ensure continuous compliance with security standards

- Assess completion of vendor offboarding processes, focusing on revoking system access, auditing final data handling, and validating post-offboarding security requirements

- Investigative skills to understand External Attack Surface Management (EASM) and Fourth-Party Risk

- Understands Right to Audit: Understanding how to interpret penetration test summaries and vulnerability scan results provided by the vendor

Requirements

- Either advanced studies in Cybersecurity, Computer Science, Information Systems, or similar

- Excellent written and verbal communication skills, including the ability to effectively collaborate with technical and senior business staff and management

- 5+ years of experience in GRC (Governance, Risk, and Compliance) or Information Security, with 3+ years leading a TPRM/Vendor Risk program

- Deep practical knowledge of industry assessment standards (e.g., SOC 2, ISO 27001, SIG, CSA STAR)

- Excellent analytical and communication skills to translate technical risk into business impact for stakeholders and Cloudflare end-to-end

- Experience with GRC platforms (e.g., ServiceNow GRC, Archer) for workflow automation

Preferred

- Certifications: CRISC, CTPRP (Certified Third-Party Risk Professional), or CISA

- Legal/Contractual experience relating to security clauses and Service Level Agreements (SLAs)

- Experience working in a global vendor landscape

What Makes Cloudflare Special?

We're not just a highly ambitious, large-scale technology company. We're a highly ambitious, large-scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet.

Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers--at no cost.

Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states.

1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. This is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released. Here’s the deal - we don’t store client IP addresses never, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers.

Sound like something you’d like to be a part of? We’d love to hear from you!

This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license.

## Skills

### Required
- Cloud Architecture
- Data Encryption
- Application Security
- IAM Architecture
- GRC
- Information Security
- Third-Party Risk Management
- Vendor Risk Management
- SOC 2
- ISO 27001
- SIG
- CSA STAR
- GRC platforms
- workflow automation

---

Source: [Apply at job-boards.greenhouse.io](https://job-boards.greenhouse.io/cloudflare/jobs/7487259?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply)
