Staff Security Engineer, Vulnerability Management

Weights & Biases Weights & Biases · Data AI · Bellevue, WA +4 · Technology

Staff Security Engineer focused on leading vulnerability management initiatives, designing and implementing scalable triage, prioritization, and remediation tracking systems. The role involves technical leadership on hardware-adjacent vulnerabilities and mentoring engineers.

What you'd actually do

  1. Lead high-complexity VM technical initiatives and deliver architecture decisions for assigned program areas
  2. Design and build scalable triage automation, including integrations, decision logic, and production hardening
  3. Implement end-to-end workflow components from assessment and detection to ticket routing and remediation tracking
  4. Provide deep technical leadership on hardware-adjacent vulnerabilities (GPU firmware, DPU firmware/BlueField, and BMC surfaces)
  5. Act as senior technical responder for embargoed disclosures and zero-day events, coordinating with owner teams that deploy fixes

Skills

Required

  • 9+ years of relevant experience with demonstrated strategic impact in vulnerability management, application security, platform security, or cloud security engineering
  • Proven track record building and scaling security automation (SOAR workflows, AI/ML systems, detection pipelines) in production environments
  • Deep subject matter expertise with vulnerability management best practices: CVSS, EPSS, CISA KEV, threat intelligence integration, and risk-based prioritization frameworks
  • Excellent development background with strong coding skills in Python, Go, or similar languages for building scalable, production-grade security systems
  • Significant experience with modern vulnerability management tooling (for example Wiz, Semgrep, Rapid7, Tenable, or equivalent)
  • Experience with specialized infrastructure: GPU/DPU environments, firmware security, hardware vulnerabilities, or high-performance computing
  • Demonstrated track record mentoring engineers across levels and driving cross-functional technical initiatives at organizational scale
  • Strong business acumen and understanding of how security decisions impact engineering velocity, customer trust, and business outcomes

Nice to have

  • Practical experience building AI/ML-powered security systems (LLM integration, automated decision-making, human-in-the-loop validation) in production
  • Experience managing hardware vendor security partnerships (embargoed disclosures and pre-release collaboration)
  • Production experience with security automation platforms such as TINES and serverless frameworks (AWS Lambda, GCP Cloud Functions)
  • Strong DevOps, DevSecOps, or SRE background with deep experience in AWS/GCP/Azure cloud services and Infrastructure as Code (Terraform, CloudFormation)
  • Deep understanding of Kubernetes security (container scanning, admission controllers, supply chain security, runtime protection)
  • Experience leading security programs through rapid hypergrowth (10x+ infrastructure scaling) in startup or cloud-native environments
  • Practical experience managing vulnerabilities within a FedRAMP-certified environment or similar regulatory frameworks

What the JD emphasized

  • hardware-adjacent vulnerabilities
  • GPU firmware
  • DPU firmware
  • BMC surfaces
  • embargoed disclosures
  • zero-day events
  • vulnerability management best practices
  • CVSS
  • EPSS
  • CISA KEV
  • threat intelligence integration
  • risk-based prioritization frameworks