Join Cloudflare’s Security Architecture Team with the following with the foll focus areas : Strategic Alignment: Translates the Organisations Cyber risk tolerance into specific technical blueprints and implements controls/prescriptive policies in mitigation/managing or remediating these risks Preventative Focus: Focuses on "shifting left" to fix architectural flaws before they become bigger risks or costs Technical Consulting: Acts as internal subject matter experts for Procurement (TPRM) and Engineering teams. About the role/ What You’ll Do Provide input on technical security requirements for new infrastructure and engineering initiatives. Assist with documentation and maintenance of the corporate security architecture blueprints. You will be on the Third-Party Risk Management (TPRM) program, assessing the security posture of vendors, suppliers, and external partners. This involves performing complex security due diligence, managing risk remediation plans, and ensuring contractual security clauses are enforced throughout the vendor lifecycle. Conduct in-depth technical security assessments of new software, hardware, and services by evaluating system architecture, data flows, and infrastructure controls. Review external vulnerability scans and security configuration evidence provided by vendors to identify potential exposure points prior to procurement. Audit SaaS-to-SaaS and API-based integrations to ensure they follow the principle of least privilege and do not utilize over-privileged scopes or insecure authentication methods. Advanced knowledge with hands-on in Cloud Architecture, Data Encryption,Application Security and IAM Architecture Establish and enforce baseline security requirements for new software installations, covering encryption standards, multi-factor authentication (MFA), automated user provisioning/deprovisioning (SCIM), and SSO integration. Perform periodic reviews of existing implementations to detect and remediate "configuration drift," such as unauthorized public data shares or legacy administrative accounts. Utilize automated discovery tools to identify unmanaged SaaS applications (Shadow IT) and evaluate their security posture against corporate standards. Partner with internal business owners and vendors to track identified security gaps and ensure technical remediation occurs within agreed-upon SLAs. Provide technical expertise during third-party security incidents, assessing the impact on internal systems and validating vendor recovery and forensic efforts. Evaluate vendor Business Continuity and Disaster Recovery (BCDR) plans, including the verification of recent failover test results and tabletop exercises. Review vendor-side network segmentation, firewall configurations, and DDoS protection strategies for all critical cloud-hosted service implementations. Perform rigorous technical security reviews of vendor integration configurations throughout the entire partnership lifecycle—including implementation and ongoing use—to ensure continuous compliance with security standards. Assess completion of vendor offboarding processes, focusing on revoking system access, auditing final data handling, and validating post-offboarding security requirements. Investigative skills to understand External Attack Surface Management (EASM) and Fourth-Party Risk Understands Right to Audit: Understanding how to interpret penetration test summaries and vulnerability scan results provided by the vendor.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed
Number of Employees
1,001-5,000 employees