Vulnerability Management Engineer

Cloudflare Cloudflare · Enterprise · Austin, TX · Security

Cloudflare is seeking a Vulnerability Management Engineer to identify, analyze, and support the remediation of vulnerabilities across their infrastructure and cloud environments. This role will work closely with engineering, infrastructure, cloud, and compliance teams to triage and drive timely remediation, with a key focus on supporting DOD IL4 and Fedramp preparation. The engineer will conduct vulnerability scanning, analyze findings, prioritize vulnerabilities using risk-based approaches, and develop technical remediation guidance. They will also embed vulnerability management into delivery pipelines and continuous improvement efforts, ensuring alignment with regulatory requirements.

What you'd actually do

  1. Conduct vulnerability scanning, and perform in-depth analysis of findings from scanning tools (e.g., Qualys, Nessus, Rapid7), to verify accuracy, identify systemic patterns, and filter out false positives.
  2. Triage, validate and prioritise vulnerabilities using risk based approaches to determine real business impact, and working with engineering and compliance teams to agree remediation actions and timelines.
  3. Develop, document, and deliver technical remediation guidance and solutions to enable application and infrastructure teams to remediate efficiently and consistently.
  4. Support DOD IL4 and Fedramp preparation, by ensuring vulnerability management processes, evidence, reporting, and controls meet regulatory and assurance expectations.
  5. Work closely with engineering and service teams to embed vulnerability management into delivery pipelines , operational processes and change management.

Skills

Required

  • Solid understanding of DoD Impact level IL4, FedRAMP, SOC-2, and PCI frameworks.
  • 3+ years Vulnerability Management experience in a heavily regulated environment.
  • Bachelor's degree in Computer Science, Information Security, or security certifications in a related field.
  • Strong communication (written and verbal) and interpersonal skills, with the ability to effectively collaborate with technical and non-technical teams.
  • A strong understanding of CVSS (Common Vulnerability Scoring System) and how to apply risk assessment methodologies in a business context to support remediation.
  • Hands-on experience with vulnerability scanning platforms (e.g., Qualys, Nessus, Rapid7 InsightVM).
  • Strong analytical skills to identify patterns in data and distinguish between theoretical risk and actual exploitability.

Nice to have

  • Experience with scripting languages (e.g., Python) for automation.
  • Proficiency in using ticketing tools like JIRA for managing tickets and tasks.
  • Hands on experience with Infrastructure pentesting tools.

What the JD emphasized

  • DOD IL4
  • Fedramp preparation
  • heavily regulated environment