Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
The Director of Offensive Security owns end‑to‑end offensive security building, coordinating product security incident response (PSIRT), internal/external penetration testing, continuous adversary emulation (red teaming), and more broadly providing an adversarial mindset and TTPs to proactively identify, validate, prioritize, and drive remediation of vulnerabilities and other security risks across products, platforms, and corporate environments.
Through thought leadership and a strong partnership with Security, Product amp; Engineering, and other cross-functional teams, this key leadership role will impact the security posture of Docusign products and services working alongside multiple Security teams including Security Architecture, Bug Bounty, Vulnerability Management, Product Security, Incident Response, and Trust Services.
The right candidate has an established record of accomplishment, demonstrates subject area mastery, and experience leading a functional team in product, infra and application security. The ideal candidate will be able to drive clarity of mission and have a strong drive for coaching talent, a bias for action, prioritization and long term impact for this newly formed team.
This position is a people manager role reporting to the Group Vice President, Chief Information Security Officer.
Responsibility
Design and build a world class Offensive Security team and program, applying an adversarial mindset and establishing processes and TTPs to enhance the security of the company and our customers
Build and lead a newly defined PSIRT team to build a high performing team to coordinate response and improvements to validated product vulnerability incidents handed
Run structured post‑incident reviews focused on exploit mechanics and detection gaps; provide remediation recommendations
Set the annual/quarterly penetration testing strategy; oversee internal tests and third‑party engagements for high‑risk products/services
Plan and execute intelligence‑driven red team campaigns targeting crown‑jewel assets, lateral movement paths, and detection/control assumptions
Coordinate with partner security teams to drive security improvements to infrastructure, services and Docusign products
Maintain a unified offensive findings repository; ensure high signal quality, consistent taxonomy, and timely handoff to Vulnerability Management / Product Security
Curate external vulnerability and threat intel to prioritize test focus and enrich PSIRT assessments; feed emerging TTPs to Detection and Response
Provide pattern and root‑cause insights to Product Security/AppSec for secure design guidance, guardrail tooling, and developer education (advisory role)
Partner closely with Vulnerability Management, Product Security, SOC/Detection and Response, Legal, Communications, and Customer Success on coordinated Product response and disclosure
Own offensive tooling, lab environments, and automation that improve test fidelity, repeatability, and reporting
Recruit, mentor, and retain PSIRT analysts, penetration testers, and red team operators; enforce ethical rules of engagement and data handling
Deliver concise executive reporting on offensive coverage, PSIRT responsiveness, detection performance in exercises, and emerging exploit trends—distinct from remediation metrics (owned elsewhere)
Escalate urgent exploitability risks when required; drive alignment on priority without assuming downstream remediation control
Remote: Employee is not required to be in or near an office frequently and works from a designated remote work location for the majority of the time.
Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.
Basic
15+ years in cybersecurity with 5+ years leading security functions such as testing, red / purple teaming, or product vuln incident response
Experience with direct leadership of a PSIRT or product vulnerability incident response function (playbooks, severity/risk scoring, coordinated disclosure, CVE or CVD execution)
Proven program ownership of structured penetration testing (internal + third-party) and intelligence-driven red team campaigns against cloud-native, API-centric, and distributed architectures
Experience with modern web/app stacks, cloud (AWS/GCP/Azure), containers/K8s, authN/Z models, common vuln classes (injection, access control, deserialization, supply chain, cloud misconfig), exploit chains and lateral movement paths
Experience with industry frameworks and standards: MITRE ATTCK, CVSS (with contextual modifiers), EPSS (prioritization awareness), ISO/IEC 30111 and 29147 or FIRST guidelines for vulnerability handling/disclosure
Ability to translate technical exploitability into concise business and risk narratives for executives (metrics: dwell time, coverage, triage speed, repeat class reduction)
Demonstrated cross-functional influence and partnership with Product Security/AppSec, Vulnerability Management, Engineering, SOC/Detection and Response, Legal Comms—driving action without owning remediation
Track record of building and mentoring high-performing offensive security teams; enforcing ethical rules of engagement and safe handling of production data
Tooling automation experience (offensive frameworks, attack path mapping, test orchestration, findings repositories) with evidence of improving signal quality vs. noise
Preferred
Excellent written and verbal communication under time pressure (executive updates, customer / researcher advisories, post-incident retros)
Hands-on exploit development or advanced adversary emulation experience (e.g., custom tooling, bypass techniques)
Integration of external threat and exploit intelligence into test scoping and severity assessment
Prior success reducing red team dwell time and repeat finding classes through advisory feedback loops
Relevant certifications (selective value): OSCP/OSCE, OSEP, CRTO, GIAC GPEN/GXPN/GWAPT, CISSP (breadth)
Experience establishing or refining coordinated vulnerability disclosure programs (safe harbor language, researcher engagement metrics)
Familiarity with risk quantification or prioritization models (e.g., FAIR elements, internal scoring augmenting CVSS/EPSS)
Pay for this position is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience.
Based on applicable legislation, the below details pay ranges in the following locations:
California: $202,800.00 - $327,625.00 base salary
Illinois, Colorado, Massachusetts and Minnesota: $193,100.00 - $272,750.00 base salary
Washington, Maryland, New Jersey and New York (including NYC metro area): $193,100.00 - $286,500.00 base salary
Washington DC: $202,800.00 - $286,500.00 base salary
Ohio: $174,400.00 - $246,325.00 base salary
This role is also eligible for the following:
Global benefits provide options for the following:
Working here
Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal.
We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live.
Accommodation
Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com.
If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.
This position is not eligible for employment in the following states: Alaska, Hawaii, Maine, Mississippi, North Dakota, South Dakota, Vermont, West Virginia and Wyoming.
It's important to us that we build a talented team that is as diverse as our customers and where all employees feel a deep sense of belonging and thrive. We encourage great talent who bring a range of perspectives to apply for our open positions. Docusign is an Equal Opportunity Employer and makes hiring decisions based on experience, skill, aptitude and a can-do approach. We will not discriminate based on race, ethnicity, color, age, sex, religion, national origin, ancestry, pregnancy, sexual orientation, gender identity, gender expression, genetic information, physical or mental disability, registered domestic partner status, caregiver status, marital status, veteran or military status, or any other legally protected category.
Software Powered by iCIMS
www.icims.com