Similar Jobs at Cloudflare
Cloud • Information Technology • Security • Software • Cybersecurity
Lead and scale the global internal events program by managing strategies, execution, and collaborations to engage employees culturally and effectively.
Cloud • Information Technology • Security • Software • Cybersecurity
As a Solutions Architect, you'll collaborate with sales and technical teams to enhance Cloudflare's AI/Developer Platform, driving revenue and customer adoption through innovative solutions and strategic programs.
Top Skills:
AIAWSAzureCloud ComputingCloudflareFull-Stack EngineeringGCPJavaScriptMl
Cloud • Information Technology • Security • Software • Cybersecurity
The Senior Cloudflare One Specialist will advise customers on security and performance solutions, focusing on the Cloudflare One product suite and collaborating with sales and partners to drive success.
Top Skills:
AWSAzureCasbCloudflare One Product SuiteDlpDns SecurityEmail SecurityGCPIdentity Provider IntegrationNetworking FundamentalsSaseSecure Web GatewaySIEMZero Trust Networking
Available Locations: London, England | Lisbon, Portugal | Austin, Texas
About the role
We are seeking an experienced Director of Vulnerability Management to lead and mature our security program in this critical area. This role is responsible for defining, implementing, and overseeing the comprehensive strategy for identifying, assessing, prioritizing, and remediating vulnerabilities across our entire technology stack, including applications throughout the software development lifecycle.
What You'll Do
Examples of desirable skills, knowledge and experience.
About the role
We are seeking an experienced Director of Vulnerability Management to lead and mature our security program in this critical area. This role is responsible for defining, implementing, and overseeing the comprehensive strategy for identifying, assessing, prioritizing, and remediating vulnerabilities across our entire technology stack, including applications throughout the software development lifecycle.
What You'll Do
- Develop and lead teams of skilled professionals in the areas of vulnerability management and application security.
- Enhance and execute comprehensive strategies for vulnerability management and application security that align with the company's risk appetite and business objectives.
- Define and track key performance indicators (KPIs) and metrics to measure the effectiveness of security programs and report on progress to executive leadership.
- Stay abreast of emerging threats, vulnerabilities, and security technologies to continuously evolve and improve security posture.
- Advocate for and secure resources (budget, personnel, tools) necessary to achieve program objectives.
- Recruit, mentor, and develop a high-performing team of security engineers and analysts.
- Foster a culture of continuous learning, collaboration, and accountability within the security team.
- Provide strong technical leadership and guidance to direct reports and cross-functional teams.
- Contribute to the development and enforcement of security policies, standards, and procedures.
- Support internal and external audits by providing evidence of security controls and processes.
- Ensure compliance with internal policies, relevant industry regulations and frameworks.
- Partner closely with engineering, product, IT, and legal teams to embed security best practices throughout the organization.
- Communicate complex security concepts and risks effectively to both technical and non-technical stakeholders.
- Mature the existing vulnerability management program covering infrastructure, networks, containers, cloud environments, and endpoints.
- Oversee the selection, implementation, and optimization of vulnerability scanning tools (e.g. DAST, SAST, SCA, secrets detections, and web application and infrastructure vulnerability scanners) and platforms, and integration into CI/CD pipelines and infrastructure.
- Ensure security technology strategies are aligned with companies' business goals.
- Enforce policies and procedures for vulnerability identification, assessment, prioritization, remediation, and tracking.
- Collaborate with IT operations, engineering, and development teams to ensure timely and effective remediation of identified vulnerabilities.
- Develop security policies, procedures, and guidelines and recommend necessary changes to a given project team to ensure the company's systems are fully compliant with all applicable regulatory requirements and privacy laws.
- Utilize open communication and managerial courage to ensure the standards, expectations and goals of the organization are respected and upheld.
- Manage the bug bounty program and external application penetration testing engagements.
- Ensure the application security program is integrated into every phase of the software development lifecycle.
- Define and implement secure coding standards, guidelines, and best practices.
- Collaborate closely with development teams to provide security guidance, perform threat modeling, and conduct security reviews of application architecture and codebases.
- Manage and prioritize vulnerability and security findings from various sources (scans, penetration tests, bug bounties, etc.).
- Leverage wide-ranging experiences, professional concepts, and company objectives to resolve complex issues in creative and effective ways.
- Exercise judgment in selecting methods, techniques and evaluation criteria for obtaining results.
Examples of desirable skills, knowledge and experience.
- Extensive experience in information security, with multiple years in a leadership role focused on vulnerability management and/or application security.
- Proven experience building, scaling, and leading successful vulnerability management and application security programs from the ground up or significantly maturing existing ones.
- Deep expertise in modern application security principles, secure SDLC, DevSecOps, and secure coding practices.
- Strong understanding of common web application vulnerabilities (OWASP Top 10) and remediation techniques.
- Hands-on experience with various security tools, including:
- Vulnerability scanners
- SAST (static application security testing)
- DAST (dynamic application security testing)
- SCA (software composition analysis)
- Secrets detection tools
- Web application security testing
- Static and runtime container scanning
- Experience with cloud security (AWS, Azure, GCP) and securing cloud-native applications.
- Familiarity with container security and orchestration technologies (e.g., Docker, Kubernetes).
- Excellent leadership, communication (written and verbal), and interpersonal skills.
- Ability to influence and drive change at all levels of the organization.
- Relevant industry certifications (e.g., CISSP, CISM, CSSLP, CEH) are highly desirable.
- Experience with threat modeling methodologies (e.g., STRIDE, DREAD).
- Experience producing and reviewing Technical Documentation.
Cloudflare Austin, Texas, USA Office
405 Comal St, Austin, TX, United States, 78702
What you need to know about the Austin Tech Scene
Austin has a diverse and thriving tech ecosystem thanks to home-grown companies like Dell and major campuses for IBM, AMD and Apple. The state’s flagship university, the University of Texas at Austin, is known for its engineering school, and the city is known for its annual South by Southwest tech and media conference. Austin’s tech scene spans many verticals, but it’s particularly known for hardware, including semiconductors, as well as AI, biotechnology and cloud computing. And its food and music scene, low taxes and favorable climate has made the city a destination for tech workers from across the country.
Key Facts About Austin Tech
- Number of Tech Workers: 180,500; 13.7% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Dell, IBM, AMD, Apple, Alphabet
- Key Industries: Artificial intelligence, hardware, cloud computing, software, healthtech
- Funding Landscape: $4.5 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Live Oak Ventures, Austin Ventures, Hinge Capital, Gigafund, KdT Ventures, Next Coast Ventures, Silverton Partners
- Research Centers and Universities: University of Texas, Southwestern University, Texas State University, Center for Complex Quantum Systems, Oden Institute for Computational Engineering and Sciences, Texas Advanced Computing Center

