Engineering Manager, Red Team

DoorDash DoorDash · Consumer · San Francisco, CA · 315 Security Engineering

Engineering Manager for DoorDash's Red Team, focusing on offensive security, adversary simulation, and driving remediation outcomes. This is a player-coach role involving team leadership, strategic roadmap definition, and hands-on technical involvement in engagements and tooling.

What you'd actually do

  1. Define the red team's strategic roadmap — engagement cadence, target prioritization, and capability development — aligned to DoorDash's threat landscape.
  2. Lead, coach, and grow a team of offensive security engineers. Hire intentionally to fill capability gaps as the team scales.
  3. Stay technically involved in engagement scoping, methodology, and tooling architecture. Guide adversary simulation, not just manage it.
  4. Drive remediation outcomes cross-functionally — partner with detection/response, AppSec, infrastructure security, and product engineering to make sure findings get fixed, not just documented.
  5. Build purple team workflows with detection engineering to validate and improve defensive coverage.

Skills

Required

  • 7+ years of offensive security experience (red teaming, adversary simulation, penetration testing)
  • 3+ years managing offensive security practitioners
  • Deep, hands-on red team expertise
  • Player-coach balance between technical depth and management responsibilities
  • Shaping security strategy and influencing engineering/product/infrastructure organizations
  • Experience with cloud-native offensive operations (AWS/GCP, Kubernetes, containerized microservices, CI/CD pipelines)
  • Building or directing custom offensive tooling as engineered software
  • People-first leadership
  • Strong cross-functional influence

Nice to have

  • Experience operating red teams at a marketplace, fintech, or logistics company at scale
  • Background building or directing custom offensive tooling and C2 infrastructure
  • Purple team experience
  • Familiarity with threat intelligence-driven engagement scoping
  • Experience with global or distributed teams
  • OSCP, OSCE, GXPN, CRTO, CRTL, or similar certifications

What the JD emphasized

  • offensive security experience
  • managing offensive security practitioners
  • Deep, hands-on red team expertise
  • player-coach balance
  • Track record of shaping security strategy beyond your own team
  • Experience with cloud-native offensive operations
  • building or directing custom offensive tooling
  • Strong cross-functional influence