Security Engineer II - Vulnerability Lifecycle
VerifiedAbout the Role
<p data-renderer-start-pos="1" data-local-id="e505694c9c56">Here at Datadog, we think about Vulnerability Management a little bit differently. We embrace open source software, and recognize our role in the software supply chain. We also see how attackers are weaponizing vulnerabilities faster than ever before. That’s why we’re looking for a Security Engineer who can help us scale and improve our overall vulnerability management lifecycle, and take an AI-first approach to addressing vulnerability risk.</p> <p data-renderer-start-pos="451" data-local-id="2e1d4e233df2"><em data-renderer-mark="true">At Datadog, we place value in our office culture - the relationships and collaboration it builds, and the creativity it brings to the table. We operate as a hybrid workplace to ensure our Datadogs can create a work-life harmony that best fits them.<br><br></em></p> <p data-renderer-start-pos="703" data-local-id="46d08d223ce8"><strong data-renderer-mark="true">What You’ll Do:</strong></p> <ul class="ak-ul" data-local-id="a68c7ea1fdcd" data-indent-level="1"> <li> <p data-renderer-start-pos="722" data-local-id="0999295812b8">Reduce engineering toil related to vulnerability remediation through a “PRs, not tickets” approach.</p> </li> <li> <p data-renderer-start-pos="825" data-local-id="69c85d506ee9">Develop and operate automation to increase detection coverage and remediate root cause issues</p> </li> <li> <p data-renderer-start-pos="922" data-local-id="a805e02ffd9e">Work with critical partners like <span class="acronym-highlight">SDLC</span> Security, Product Security, and a wide range of engineering teams to “shift left” and reduce upstream vulnerabilities entering our ecosystem.</p> </li> <li> <p data-renderer-start-pos="1105" data-local-id="465bc39975ec">Improve the efficiency of our overall vulnerability management lifecycle through thoughtful use of automation and AI.</p> </li> <li> <p data-renderer-start-pos="1226" data-local-id="03c3d282a105">Develop metrics and reporting to provide leadership with an accurate view of overall vulnerability risk.</p> </li> <li> <p data-renderer-start-pos="1334" data-local-id="22418ae53a92">Provide evidence and subject matter expertise for vulnerability management processes and controls for multiple compliance frameworks (<span class="acronym-highlight">SOC2</span>, <span class="acronym-highlight">HIPAA</span>, <span class="acronym-highlight">PCI</span>, FedRAMP, ISO)</p> </li> </ul> <p data-renderer-start-pos="1503" data-local-id="d0cf76687968"> </p> <p data-renderer-start-pos="1505" data-local-id="ff47672a8d29"><strong data-renderer-mark="true">Who You Are:</strong></p> <ul class="ak-ul" data-local-id="4f2ba642a530" data-indent-level="1"> <li> <p data-renderer-start-pos="1521" data-local-id="f28524667651">You have experience with vulnerability management or similar domains like cloud security posture management, SDLC management, etc.</p> </li> <li> <p data-renderer-start-pos="1655" data-local-id="efb0caae4927">You have strong communication skills, with the ability to convey technical information clearly and effectively to both technical and non-technical stakeholders.</p> </li> <li> <p data-renderer-start-pos="1819" data-local-id="b52d03ae3f1a">You have a proven track record of managing cross-functional collaboration between security, engineering, and product teams.</p> </li> <li> <p data-renderer-start-pos="1946" data-local-id="0168953d238d">You are experienced in one or more programming languages (Golang, Python, Java, etc.)</p> </li> <li> <p data-renderer-start-pos="2035" data-local-id="1b895725cf38">You are a U.S. person and able to work on <span class="acronym-highlight">ITAR</span>-controlled projects</p> </li> <li> <p data-renderer-start-pos="2105" data-local-id="97841291b31c">You have a <span class="acronym-highlight">BS</span>/MS/PhD in a Computer Science, Engineering or related scientific field or equivalent experience<br><br></p> </li> </ul> <p data-renderer-start-pos="2219&qu
Related Searches
Explore more opportunities matching this role's title, location, and skills.
Ready to apply?
Click below to apply directly on datadog's careers page.
Get the top 10 hyper-growth roles delivered to your inbox every Tuesday.