Lead Security Engineer

DocuSign DocuSign · Enterprise · Seattle, WA +2 · Security

Lead Security Engineer at DocuSign responsible for defining strategy, leading programs, and delivering automation for cloud and infrastructure security, with a focus on vulnerability management. This role involves hands-on technical contributions like operating discovery tools, analyzing findings, prioritizing remediation, and scripting automations.

What you'd actually do

  1. Provide strategic and technical leadership for the Cloud Security and Infrastructure vulnerability program(s), partnering with stakeholders across the company
  2. Own the vision, develop the strategy, and execute on the plan to operate the program at scale, ensuring continuous improvement and alignment with organizational goals
  3. Analyze public and private vulnerability disclosures and exploit code, deeply understanding and assessing the technical details and potential impact across Docusign’s infrastructure, services, and applications
  4. Investigate, triage, and prioritize vulnerabilities, identifying severity and scope of potential impact, and supporting response and remediation efforts with engineering teams
  5. Establish technical security baselines and best practices for cloud and infrastructure components, leveraging industry standards (e.g., Azure Security Benchmarks, CIS Benchmarks) to measure compliance and drive remediation for non-compliant drift

Skills

Required

  • Cloud and Infrastructure Security
  • Vulnerability Management
  • Scripting and programming (Python, Go, or TypeScript)
  • SQL
  • Infrastructure deployment and management (network, systems)
  • DNS providers, CDNs, and WAFs
  • Asset inventory and vulnerability management tools
  • Data aggregation and visualization platforms and techniques
  • Internet protocols (DNS, HTTP, TLS), IP/ports
  • Cloud security concepts

Nice to have

  • Cloud Environment Security
  • Security tooling automation
  • CISSP or CISM certifications
  • Data pipelines and reporting tools

What the JD emphasized

  • deep focus on Vulnerability Management (VM)
  • Experience securing cloud platforms (Azure, AWS, GCP)
  • Experience in scripting and programming (Python, Go, or TypeScript) and SQL
  • Experience with asset inventory and vulnerability management tools (e.g., ServiceNow, Qualys, Tenable)
  • Experience with data aggregation and visualization platforms and techniques (e.g. PowerBI)
  • Proven deep expertise and a track record in either Cloud Environment Security or Security tooling automation