Director, Vulnerability Management
Hybrid
Cloudflare, Inc.
Make employees, applications and networks faster and more secure everywhere, while reducing complexity and cost.At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the worldās largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazineās Top Company Cultures list and ranked among the Worldās Most Innovative Companies by Fast Company.Ā
We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us!Ā
Available Locations: London, England | Lisbon, Portugal | Austin, Texas
About the roleĀ
We are seeking an experienced Director of Vulnerability Management to lead and mature our security program in this critical area. This role is responsible for defining, implementing, and overseeing the comprehensive strategy for identifying, assessing, prioritizing, and remediating vulnerabilities across our entire technology stack, including applications throughout the software development lifecycle.
What Youāll Do
- Develop and lead teams of skilled professionals in the areas of vulnerability management and application security.Ā
- Enhance and execute comprehensive strategies for vulnerability management and application security that align with the company's risk appetite and business objectives.
- Define and track key performance indicators (KPIs) and metrics to measure the effectiveness of security programs and report on progress to executive leadership.
- Stay abreast of emerging threats, vulnerabilities, and security technologies to continuously evolve and improve security posture.
- Advocate for and secure resources (budget, personnel, tools) necessary to achieve program objectives.
- Recruit, mentor, and develop a high-performing team of security engineers and analysts.
- Foster a culture of continuous learning, collaboration, and accountability within the security team.
- Provide strong technical leadership and guidance to direct reports and cross-functional teams.
- Contribute to the development and enforcement of security policies, standards, and procedures.
- Support internal and external audits by providing evidence of security controls and processes.
- Ensure compliance with internal policies, relevant industry regulations and frameworks.
- Partner closely with engineering, product, IT, and legal teams to embed security best practices throughout the organization.
- Communicate complex security concepts and risks effectively to both technical and non-technical stakeholders.
- Mature the existing vulnerability management program covering infrastructure, networks, containers, cloud environments, and endpoints.
- Oversee the selection, implementation, and optimization of vulnerability scanning tools (e.g. DAST, SAST, SCA, secrets detections, and web application and infrastructure vulnerability scanners) and platforms, and integration into CI/CD pipelines and infrastructure.
- Ensure security technology strategies are aligned with companies' business goals.
- Enforce policies and procedures for vulnerability identification, assessment, prioritization, remediation, and tracking.
- Collaborate with IT operations, engineering, and development teams to ensure timely and effective remediation of identified vulnerabilities.
- Develop security policies, procedures, and guidelines and recommend necessary changes to a given project team to ensure the companyās systems are fully compliant with all applicable regulatory requirements and privacy laws.
- Utilize open communication and managerial courage to ensure the standards, expectations and goals of the organization are respected and upheld.
- Manage the bug bounty program and external application penetration testing engagements.
- Ensure the application security program is integrated into every phase of the software development lifecycle.
- Define and implement secure coding standards, guidelines, and best practices.
- Collaborate closely with development teams to provide security guidance, perform threat modeling, and conduct security reviews of application architecture and codebases.
- Manage and prioritize vulnerability and security findings from various sources (scans, penetration tests, bug bounties, etc.).
- Leverage wide-ranging experiences, professional concepts, and company objectives to resolve complex issues in creative and effective ways.
- Exercise judgment in selecting methods, techniques and evaluation criteria for obtaining results.
Examples of desirable skills, knowledge and experience.
- Extensive experience in information security, with multiple years in a leadership role focused on vulnerability management and/or application security.
- Proven experience building, scaling, and leading successful vulnerability management and application security programs from the ground up or significantly maturing existing ones.
- Deep expertise in modern application security principles, secure SDLC, DevSecOps, and secure coding practices.
- Strong understanding of common web application vulnerabilities (OWASP Top 10) and remediation techniques.
- Hands-on experience with various security tools, including:
- Vulnerability scannersĀ
- SAST (static application security testing)
- DAST (dynamic application security testing)
- SCA (software composition analysis)
- Secrets detection tools
- Web application security testing
- Static and runtime container scanning
- Experience with cloud security (AWS, Azure, GCP) and securing cloud-native applications.
- Familiarity with container security and orchestration technologies (e.g., Docker, Kubernetes).
- Excellent leadership, communication (written and verbal), and interpersonal skills.
- Ability to influence and drive change at all levels of the organization.
- Relevant industry certifications (e.g., CISSP, CISM, CSSLP, CEH) are highly desirable.
- Experience with threat modeling methodologies (e.g., STRIDE, DREAD).
- Experience producing and reviewing Technical Documentation.
Ā
What Makes Cloudflare Special?
Weāre not just a highly ambitious, large-scale technology company. Weāre a highly ambitious, large-scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet.
Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflareās enterprise customers--at no cost.
Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states.
1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. This is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released. Hereās the deal - we donāt store client IP addresses never, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers.
Sound like something youād like to be a part of? Weād love to hear from you!
This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license.
Cloudflare is proud to be an equal opportunity employer. Ā We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. Ā All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer.
Cloudflare provides reasonable accommodations to qualified individuals with disabilities. Ā Please tell us if you require a reasonable accommodation to apply for a job. Examples of reasonable accommodations include, but are not limited to, changing the application process, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. Ā If you require a reasonable accommodation to apply for a job, please contact us via e-mail at hr@cloudflare.com or via mail at 101 Townsend St. San Francisco, CA 94107.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index š°
Tags: Application security Audits AWS Azure CEH CI/CD CISM CISSP Cloud Cloudflare Compliance CSSLP DAST DevSecOps DNS Docker GCP KPIs Kubernetes OWASP Pentesting Privacy SAST SDLC Strategy Vulnerabilities Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.