Company Overview
Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people's lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign's Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
What you'll do
As a Security Engineer (Vulnerability Management), you will be both a handson engineer and a trusted partner to our technical stakeholders. You'll dive into how vulnerabilities actually work, understand the technologies they affect, and provide clear, authoritative guidance to engineering, SRE, and platform teams on risk, impact, and remediation options. You will operate and tune vulnerability management tooling (including platforms such as Wiz, Microsoft Defender, and related scanners), validate and prioritize findings, and work closely with service owners-using systems such as ServiceNow and Jira-to drive timely remediation. Your work will translate scanner output into actionable, riskbased work that reduces exposure while allowing teams to move quickly and safely. This position is an individual contributor role reporting to the Sr Manager, Vulnerability & Configuration Management. Responsibility
Analyze vulnerabilities in depth Investigate vulnerabilities from scanners, advisories, and threat intel to understand root cause, affected components, preconditions, and potential impact to Docusign services and infrastructure. Be an authoritative technical voice Explain vulnerabilities, exploit chains, and mitigations to engineers, SREs, and architects in clear technical terms, including tradeoffs between shortterm mitigations and longterm fixes Operate and tune vulnerability tooling (handson) Configure, run, and maintain internal and external vulnerability scans (e.g., infrastructure, cloud, container) using tools such as Wiz, Microsoft Defender, and related platforms, ensuring scope accuracy, coverage, and highquality signal with minimal noise Validate and prioritize findings Validate key findings, identify false positives, and deduplicate results. Prioritize vulnerabilities based on severity, exploitability, asset criticality, exposure, and business context Drive remediation with stakeholders (partnering) Partner with service, platform, and product teams to define remediation plans, align on timelines and SLAs, and ensure fixes are implemented and verified in production environments Translate data into actionable work Use Jira and ServiceNow to create clear, contextual tickets that include impact, affected assets, reproduction details (when appropriate), and recommended remediation steps, and track them through closure Collaborate across security and engineering Work closely with cloud security, infrastructure, SRE, and application teams to integrate remediation into normal engineering workflows and release cycles, avoiding unnecessary friction while still reducing risk Contribute to automation and reporting (handson) Use scripts and queries to enrich vulnerability data, support bulk operations (e.g., ownership updates, tagging), and improve dashboards/metrics used to track risk, SLA performance, and remediation trends Document and share knowledge Contribute to runbooks, playbooks, and internal documentation that help stakeholders understand common vulnerability classes, secure configuration patterns, and bestpractice remediation approaches Support incident and surge response Assist with analysis and mitigation during highrisk exposures or emerging threats, including targeted review of affected technologies and assets and close partnership with operations teams
Job Designation
Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation) Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.
What you bring
Basic
5+ years of industry experience in cybersecurity, with a strong focus on vulnerability management or closely related areas. Experience with common vulnerability classes (e.g., memory corruption, injection, auth/z flaws, web/app vulnerabilities, misconfigurations, cryptographic weaknesses) and how they manifest in real systems Ability to read and interpret vulnerability advisories (CVE, vendor bulletins, security research), CVSS/EPSS scores, and vendor guidance, and translate them into clear risk statements and remediation recommendations for technical teams Experience with key infrastructure and platform technologies, such as Linux and Windows OS, networking fundamentals, web stacks, and at least one major cloud provider (Azure, AWS, or GCP) Handson experience with one or more vulnerability management and cloud security tools, ideally including: Wiz (CNAPP / cloud exposure management), Microsoft Defender (Defender for Cloud / endpoint / server) and Traditional scanners (e.g., Tenable, Qualys, or similar) Experience using ticketing and workflow tools such as Jira and ServiceNow to drive vulnerabilities through their lifecycle-from discovery to remediation and closure Ability to communicate clearly with engineers and technical stakeholders: explain vulnerabilities, impact, tradeoffs, and remediation paths in precise technical language, adjusting depth to audience Experience writing basic scripts or queries (e.g., Python, PowerShell, Bash, or SQL) to analyze or enrich vulnerability data and support simple automation tasks Proven ability to manage multiple parallel streams of work, stay organized, and follow through on commitments in a fastmoving environment
Preferred
Strong collaboration skills and a demonstrated ability to build productive relationships with platform, SRE, and application teams, even when priorities compete Experience working in a cloudheavy environment, including how vulnerabilities apply to IaaS/PaaS services, containers, and Kubernetes workloads Experience correlating vulnerability data with asset inventories/CMDBs (e.g., via ServiceNow) to improve ownership, attribution, and prioritization Familiarity with riskbased scoring (e.g., EPSS, internal risk models) and using context (internet exposure, data sensitivity, compensating controls) to influence priorities and SLAs Experience contributing to or maintaining dashboards and metrics (e.g., MTTR, SLA compliance, risk debt, exposure trends) for leadership and technical partners Experience writing or improving runbooks, playbooks, or "howto" documentation used by security and engineering teams Relevant certifications (e.g., Security+, GSEC, GIAC, CISSP) or equivalent practical experience demonstrating similar depth in vulnerability management and infrastructure/cloud security Experience in a mid to largescale environment where you partnered with multiple stakeholder teams to coordinate remediation across many services and platforms
Wage Transparency
Pay for this position is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Based on applicable legislation, the below details pay ranges in the following locations: Washington, Maryland, New Jersey and New York (including NYC metro area): $137,100.00 - $200,125.00 base salary This role is also eligible for the following:
- Bonus: Sales personnel are eligible for variable incentive pay dependent on their achievement of pre-established sales goals. Non-Sales roles are eligible for a company bonus plan, which is calculated as a percentage of eligible wages and dependent on company performance.
Global benefits provide options for the following:
- Paid Time Off: earned time off, as well as paid company holidays based on region
- Paid Parental Leave: take up to six months off with your child after birth, adoption or foster care placement
- Full Health Benefits Plans: options for 100% employer paid and minimum employee contribution health plans from day one of employment
- Retirement Plans: select retirement and pension programs with potential for employer contributions
- Learning and Development: options for coaching, online courses and education reimbursements
- Compassionate Care Leave: paid time off following the loss of a loved one and other life-changing events
Work Authorization Notice: Please note that we do not provide visa sponsorship or immigration support for this position. Applicants must already be authorized to work in the United States on a full-time, permanent basis without the need for current or future sponsorship.
Life at Docusign
Working here Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what's right, every day. At Docusign, everything is equal. We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you'll be loved by us, our customers, and the world in which we live. Accommodation Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com. If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance. Applicant and Candidate Privacy Notice
States Not Eligible for Employment
This position is not eligible for employment in the following states: Alaska, Hawaii, Maine, Mississippi, North Dakota, South Dakota, Vermont, West Virginia and Wyoming.
Equal Opportunity Employer
It's important to us that we build a talented team that is as diverse as our customers and where all employees feel a deep sense of belonging and thrive. We encourage great talent who bring a range of perspectives to apply for our open positions. Docusign is an Equal Opportunity Employer and makes hiring decisions based on experience, skill, aptitude and a can-do approach. We will not discriminate based on race, ethnicity, color, age, sex, religion, national origin, ancestry, pregnancy, sexual orientation, gender identity, gender expression, genetic information, physical or mental disability, registered domestic partner status, caregiver status, marital status, veteran or military status, or any other legally protected category. EEO Know Your Rights poster #LI-Hybrid
|