Security Engineer
DocuSign
Security Engineer
- Location
- US-WA-Seattle
- Category
- Security
- Position Type
- Regular
Company Overview
Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
What you'll do
As a Security Engineer (Vulnerability Management), you will be both a hands‑on engineer and a trusted partner to our technical stakeholders. You’ll dive into how vulnerabilities actually work, understand the technologies they affect, and provide clear, authoritative guidance to engineering, SRE, and platform teams on risk, impact, and remediation options.
You will operate and tune vulnerability management tooling (including platforms such as Wiz, Microsoft Defender, and related scanners), validate and prioritize findings, and work closely with service owners—using systems such as ServiceNow and Jira—to drive timely remediation. Your work will translate scanner output into actionable, risk‑based work that reduces exposure while allowing teams to move quickly and safely.
This position is an individual contributor role reporting to the Sr Manager, Vulnerability & Configuration Management.
Responsibility
Analyze vulnerabilities in depth
Investigate vulnerabilities from scanners, advisories, and threat intel to understand root cause, affected components, pre‑conditions, and potential impact to Docusign services and infrastructure.
Be an authoritative technical voice
Explain vulnerabilities, exploit chains, and mitigations to engineers, SREs, and architects in clear technical terms, including trade‑offs between short‑term mitigations and long‑term fixes
Operate and tune vulnerability tooling (hands‑on)
Configure, run, and maintain internal and external vulnerability scans (e.g., infrastructure, cloud, container) using tools such as Wiz, Microsoft Defender, and related platforms, ensuring scope accuracy, coverage, and high‑quality signal with minimal noise
Validate and prioritize findings
Validate key findings, identify false positives, and de‑duplicate results. Prioritize vulnerabilities based on severity, exploitability, asset criticality, exposure, and business context
Drive remediation with stakeholders (partnering)
Partner with service, platform, and product teams to define remediation plans, align on timelines and SLAs, and ensure fixes are implemented and verified in production environmentsTranslate data into actionable work
Use Jira and ServiceNow to create clear, contextual tickets that include impact, affected assets, reproduction details (when appropriate), and recommended remediation steps, and track them through closure
Collaborate across security and engineering
Work closely with cloud security, infrastructure, SRE, and application teams to integrate remediation into normal engineering workflows and release cycles, avoiding unnecessary friction while still reducing risk
Contribute to automation and reporting (hands‑on)
Use scripts and queries to enrich vulnerability data, support bulk operations (e.g., ownership updates, tagging), and improve dashboards/metrics used to track risk, SLA performance, and remediation trends
Document and share knowledge
Contribute to runbooks, playbooks, and internal documentation that help stakeholders understand common vulnerability classes, secure configuration patterns, and best‑practice remediation approaches
Support incident and surge response
Assist with analysis and mitigation during high‑risk exposures or emerging threats, including targeted review of affected technologies and assets and close partnership with operations teams
Job Designation
Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation)
Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.
What you bring
Basic
5+ years of industry experience in cybersecurity, with a strong focus on vulnerability management or closely related areas.
Experience with common vulnerability classes (e.g., memory corruption, injection, auth/z flaws, web/app vulnerabilities, misconfigurations, cryptographic weaknesses) and how they manifest in real systems
Ability to read and interpret vulnerability advisories (CVE, vendor bulletins, security research), CVSS/EPSS scores, and vendor guidance, and translate them into clear risk statements and remediation recommendations for technical teams
Experience with key infrastructure and platform technologies, such as Linux and Windows OS, networking fundamentals, web stacks, and at least one major cloud provider (Azure, AWS, or GCP)
Hands‑on experience with one or more vulnerability management and cloud security tools, ideally including: Wiz (CNAPP / cloud exposure management), Microsoft Defender (Defender for Cloud / endpoint / server) and Traditional scanners (e.g., Tenable, Qualys, or similar)
Experience using ticketing and workflow tools such as Jira and ServiceNow to drive vulnerabilities through their lifecycle—from discovery to remediation and closure
Ability to communicate clearly with engineers and technical stakeholders: explain vulnerabilities, impact, tradeoffs, and remediation paths in precise technical language, adjusting depth to audience
Experience writing basic scripts or queries (e.g., Python, PowerShell, Bash, or SQL) to analyze or enrich vulnerability data and support simple automation tasks
Proven ability to manage multiple parallel streams of work, stay organized, and follow through on commitments in a fast‑moving environment
Preferred
Strong collaboration skills and a demonstrated ability to build productive relationships with platform, SRE, and application teams, even when priorities compete
Experience working in a cloud‑heavy environment, including how vulnerabilities apply to IaaS/PaaS services, containers, and Kubernetes workloads
Experience correlating vulnerability data with asset inventories/CMDBs (e.g., via ServiceNow) to improve ownership, attribution, and prioritization
Familiarity with risk‑based scoring (e.g., EPSS, internal risk models) and using context (internet exposure, data sensitivity, compensating controls) to influence priorities and SLAs
Experience contributing to or maintaining dashboards and metrics (e.g., MTTR, SLA compliance, risk debt, exposure trends) for leadership and technical partners
Experience writing or improving runbooks, playbooks, or “how‑to” documentation used by security and engineering teams
Relevant certifications (e.g., Security+, GSEC, GIAC, CISSP) or equivalent practical experience demonstrating similar depth in vulnerability management and infrastructure/cloud security
Experience in a mid‑ to large‑scale environment where you partnered with multiple stakeholder teams to coordinate remediation across many services and platforms
Wage Transparency
Pay for this position is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience.
Based on applicable legislation, the below details pay ranges in the following locations:
Washington, Maryland, New Jersey and New York (including NYC metro area): $137,100.00 - $200,125.00 base salary
This role is also eligible for the following:
- Bonus: Sales personnel are eligible for variable incentive pay dependent on their achievement of pre-established sales goals. Non-Sales roles are eligible for a company bonus plan, which is calculated as a percentage of eligible wages and dependent on company performance.
Global benefits provide options for the following:
- Paid Time Off: earned time off, as well as paid company holidays based on region
- Paid Parental Leave: take up to six months off with your child after birth, adoption or foster care placement
- Full Health Benefits Plans: options for 100% employer paid and minimum employee contribution health plans from day one of employment
- Retirement Plans: select retirement and pension programs with potential for employer contributions
- Learning and Development: options for coaching, online courses and education reimbursements
- Compassionate Care Leave: paid time off following the loss of a loved one and other life-changing events
Work Authorization Notice: Please note that we do not provide visa sponsorship or immigration support for this position. Applicants must already be authorized to work in the United States on a full-time, permanent basis without the need for current or future sponsorship.
Life at DocuSign
Working here
Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal.
We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live.
Accommodation
Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com.
If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.
States Not Eligible for Employment
This position is not eligible for employment in the following states: Alaska, Hawaii, Maine, Mississippi, North Dakota, South Dakota, Vermont, West Virginia and Wyoming.
EEO Statement
It's important to us that we build a talented team that is as diverse as our customers and where all employees feel a deep sense of belonging and thrive. We encourage great talent who bring a range of perspectives to apply for our open positions. Docusign is an Equal Opportunity Employer and makes hiring decisions based on experience, skill, aptitude and a can-do approach. We will not discriminate based on race, ethnicity, color, age, sex, religion, national origin, ancestry, pregnancy, sexual orientation, gender identity, gender expression, genetic information, physical or mental disability, registered domestic partner status, caregiver status, marital status, veteran or military status, or any other legally protected category.