Director, Offensive Security

Remote, United States

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

Docusign

Create, commit to, and manage your agreements all in one platform with Docusign IAM. Electronically sign for free.

View all jobs at Docusign

Apply now Apply later

Company Overview

Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).

What you'll do

The Director of Offensive Security owns end‑to‑end offensive security building, coordinating product security incident response (PSIRT), internal/external penetration testing, continuous adversary emulation (red teaming), and more broadly providing an adversarial mindset and TTPs to proactively identify, validate, prioritize, and drive remediation of vulnerabilities and other security risks across products, platforms, and corporate environments.

Through thought leadership and a strong partnership with Security, Product amp; Engineering, and other cross-functional teams, this key leadership role will impact the security posture of Docusign products and services working alongside multiple Security teams including Security Architecture, Bug Bounty, Vulnerability Management, Product Security, Incident Response, and Trust Services.

 

The right candidate has an established record of accomplishment, demonstrates subject area mastery, and experience leading a functional team in product, infra and application security. The ideal candidate will be able to drive clarity of mission and have a strong drive for coaching talent, a bias for action, prioritization and long term impact for this newly formed team.

 

This position is a people manager role reporting to the Group Vice President, Chief Information Security Officer.

 

Responsibility

  • Design and build a world class Offensive Security team and program, applying an adversarial mindset and establishing processes and TTPs to enhance the security of the company and our customers

  • Build and lead a newly defined PSIRT team to build a high performing team to coordinate response and improvements to validated product vulnerability incidents handed

  • Run structured post‑incident reviews focused on exploit mechanics and detection gaps; provide remediation recommendations

  • Set the annual/quarterly penetration testing strategy; oversee internal tests and third‑party engagements for high‑risk products/services

  • Plan and execute intelligence‑driven red team campaigns targeting crown‑jewel assets, lateral movement paths, and detection/control assumptions

  • Coordinate with partner security teams to drive security improvements to infrastructure, services and Docusign products

  • Maintain a unified offensive findings repository; ensure high signal quality, consistent taxonomy, and timely handoff to Vulnerability Management / Product Security

  • Curate external vulnerability and threat intel to prioritize test focus and enrich PSIRT assessments; feed emerging TTPs to Detection and Response

  • Provide pattern and root‑cause insights to Product Security/AppSec for secure design guidance, guardrail tooling, and developer education (advisory role)

  • Partner closely with Vulnerability Management, Product Security, SOC/Detection and Response, Legal, Communications, and Customer Success on coordinated Product response and disclosure

  • Own offensive tooling, lab environments, and automation that improve test fidelity, repeatability, and reporting

  • Recruit, mentor, and retain PSIRT analysts, penetration testers, and red team operators; enforce ethical rules of engagement and data handling

  • Deliver concise executive reporting on offensive coverage, PSIRT responsiveness, detection performance in exercises, and emerging exploit trends—distinct from remediation metrics (owned elsewhere)

  • Escalate urgent exploitability risks when required; drive alignment on priority without assuming downstream remediation control

Job Designation

Remote: Employee is not required to be in or near an office frequently and works from a designated remote work location for the majority of the time.

 

Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.

What you bring

Basic

  • 15+ years in cybersecurity with 5+ years leading security functions such as testing, red / purple teaming, or product vuln incident response

  • Experience with direct leadership of a PSIRT or product vulnerability incident response function (playbooks, severity/risk scoring, coordinated disclosure, CVE or CVD execution)

  • Proven program ownership of structured penetration testing (internal + third-party) and intelligence-driven red team campaigns against cloud-native, API-centric, and distributed architectures

  • Experience with modern web/app stacks, cloud (AWS/GCP/Azure), containers/K8s, authN/Z models, common vuln classes (injection, access control, deserialization, supply chain, cloud misconfig), exploit chains and lateral movement paths

  • Experience with industry frameworks and standards: MITRE ATTCK, CVSS (with contextual modifiers), EPSS (prioritization awareness), ISO/IEC 30111 and 29147 or FIRST guidelines for vulnerability handling/disclosure

  • Ability to translate technical exploitability into concise business and risk narratives for executives (metrics: dwell time, coverage, triage speed, repeat class reduction)

  • Demonstrated cross-functional influence and partnership with Product Security/AppSec, Vulnerability Management, Engineering, SOC/Detection and Response, Legal Comms—driving action without owning remediation

  • Track record of building and mentoring high-performing offensive security teams; enforcing ethical rules of engagement and safe handling of production data

  • Tooling automation experience (offensive frameworks, attack path mapping, test orchestration, findings repositories) with evidence of improving signal quality vs. noise

 

Preferred

  • Excellent written and verbal communication under time pressure (executive updates, customer / researcher advisories, post-incident retros)

  • Hands-on exploit development or advanced adversary emulation experience (e.g., custom tooling, bypass techniques)

  • Integration of external threat and exploit intelligence into test scoping and severity assessment

  • Prior success reducing red team dwell time and repeat finding classes through advisory feedback loops

  • Relevant certifications (selective value): OSCP/OSCE, OSEP, CRTO, GIAC GPEN/GXPN/GWAPT, CISSP (breadth)

  • Experience establishing or refining coordinated vulnerability disclosure programs (safe harbor language, researcher engagement metrics)

  • Familiarity with risk quantification or prioritization models (e.g., FAIR elements, internal scoring augmenting CVSS/EPSS)

Wage Transparency

Pay for this position is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience.

 

Based on applicable legislation, the below details pay ranges in the following locations:

 

California: $202,800.00 - $327,625.00 base salary

 

Illinois, Colorado, Massachusetts and Minnesota: $193,100.00 - $272,750.00 base salary

 

Washington, Maryland, New Jersey and New York (including NYC metro area): $193,100.00 - $286,500.00 base salary

 

Washington DC: $202,800.00 - $286,500.00 base salary

 

Ohio: $174,400.00 - $246,325.00 base salary 

 

This role is also eligible for the following:

  • Bonus: Sales personnel are eligible for variable incentive pay dependent on their achievement of pre-established sales goals. Non-Sales roles are eligible for a company bonus plan, which is calculated as a percentage of eligible wages and dependent on company performance.
  • Stock: This role is eligible to receive Restricted Stock Units (RSUs).

 

Global benefits provide options for the following:

  • Paid Time Off: earned time off, as well as paid company holidays based on region
  • Paid Parental Leave: take up to six months off with your child after birth, adoption or foster care placement
  • Full Health Benefits Plans: options for 100% employer paid and minimum employee contribution health plans from day one of employment
  • Retirement Plans: select retirement and pension programs with potential for employer contributions
  • Learning and Development: options for coaching, online courses and education reimbursements
  • Compassionate Care Leave: paid time off following the loss of a loved one and other life-changing events

Life at DocuSign

Working here

Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal.

 

We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live.

 

Accommodation

Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com.

 

If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.

 

Applicant and Candidate Privacy Notice

States Not Eligible for Employment

This position is not eligible for employment in the following states: Alaska, Hawaii, Maine, Mississippi, North Dakota, South Dakota, Vermont, West Virginia and Wyoming.

EEO Statement

It's important to us that we build a talented team that is as diverse as our customers and where all employees feel a deep sense of belonging and thrive. We encourage great talent who bring a range of perspectives to apply for our open positions. Docusign is an Equal Opportunity Employer and makes hiring decisions based on experience, skill, aptitude and a can-do approach. We will not discriminate based on race, ethnicity, color, age, sex, religion, national origin, ancestry, pregnancy, sexual orientation, gender identity, gender expression, genetic information, physical or mental disability, registered domestic partner status, caregiver status, marital status, veteran or military status, or any other legally protected category.

 

EEO Know Your Rights poster

Apply now Apply later
Job stats:  7  2  0

Tags: APIs Application security Automation AWS Azure CISO CISSP Cloud CVSS Exploit GCP GIAC GPEN GWAPT GXPN Incident response Kubernetes Offensive security OSCE OSCP Pentesting Privacy Product security PSIRT Red team SOC Strategy TTPs Vulnerabilities Vulnerability management

Perks/benefits: Career development Equity / stock options Flex vacation Health care Parental leave Salary bonus Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.