Vulnerability Management Engineer

CloudflareAustin, TX
5hHybrid

About The Position

At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures list and ranked among the World’s Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Location : Austin, TX (Hybrid) Role Summary Reporting to the Vulnerability Manager, the VM Engineer will be responsible for identifying, analysing, and supporting the remediation of vulnerabilities across Cloudflare's Infrastructure and cloud environments.You will work closely with Engineering, Infrastructure, cloud and compliance teams to identify, triage, and drive timely and effective remediation of security vulnerabilities in line with defined SLAs. A key focus of the role will be supporting DOD IL4 and Fedramp preparation, ensuring vulnerability processes, evidence, and tooling align with regulatory and assurance requirements. We are looking for a proactive, detail oriented individual with the ability to manage multiple remediation activities in parallel.

Requirements

  • Solid understanding of DoD Impact level IL4, FedRAMP, SOC-2, and PCI frameworks.
  • 3+ years Vulnerability Management experience in a heavily regulated environment.
  • Bachelor's degree in Computer Science, Information Security, or security certifications in a related field.
  • Strong communication (written and verbal) and interpersonal skills, with the ability to effectively collaborate with technical and non-technical teams.
  • A strong understanding of CVSS (Common Vulnerability Scoring System) and how to apply risk assessment methodologies in a business context to support remediation..
  • Hands-on experience with vulnerability scanning platforms (e.g., Qualys, Nessus, Rapid7 InsightVM).
  • Strong analytical skills to identify patterns in data and distinguish between theoretical risk and actual exploitability.

Nice To Haves

  • Experience with scripting languages (e.g., Python) for automation.
  • Proficiency in using ticketing tools like JIRA for managing tickets and tasks.
  • Hands on experience with Infrastructure pentesting tools.

Responsibilities

  • Conduct vulnerability scanning, and perform in-depth analysis of findings from scanning tools (e.g., Qualys, Nessus, Rapid7), to verify accuracy, identify systemic patterns, and filter out false positives.
  • Triage, validate and prioritise vulnerabilities using risk based approaches to determine real business impact, and working with engineering and compliance teams to agree remediation actions and timelines.
  • Develop, document, and deliver technical remediation guidance and solutions to enable application and infrastructure teams to remediate efficiently and consistently.
  • Support DOD IL4 and Fedramp preparation, by ensuring vulnerability management processes, evidence, reporting, and controls meet regulatory and assurance expectations.
  • Work closely with engineering and service teams to embed vulnerability management into delivery pipelines , operational processes and change management.
  • Establish strong relationships with engineering teams to track and report status and remediation progress
  • Manage and track the remediation backlog, maintaining focus on risk reduction and measurable progress.
  • Contribute to the continuous improvement of vulnerability management standards, procedures, and playbooks, ensuring alignment with IL4, Fedramp and other compliance requirements.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service