Sr Manager, Vulnerability & Exposure Management

Datavant
Remote - United StatesPosted 24 February 2026

Job Description

<div class="content-intro"><p>Datavant is the data collaboration platform trusted for healthcare. Guided by our mission to make the world’s health data secure, accessible and actionable, we provide critical data solutions for organizations across the healthcare ecosystem - including providers, health plans, researchers, and life sciences companies. From fulfilling a single patient’s request for their medical records to powering the AI revolution in healthcare, Datavanters are building the future of how data is connected and used to improve health. <br><br>By joining Datavant today, you’re stepping onto a driven and highly collaborative team that is passionate about creating transformative change in healthcare.</p></div><p><strong>What We’re Looking For</strong></p> <p>As the Sr Manager of Vulnerability Exposure Management, you will lead and grow a highly technical team responsible for the vulnerability and attack surface exposure reduction of Datavant’s applications and infrastructure. You’ll play a pivotal role in defining the strategy and framework for the management of risk in a shared responsibility model, guiding a team of skilled engineers, and partnering with cross-functional leaders to drive down vulnerabilities and weaknesses.</p> <p><strong>What You Will Do</strong></p> <ul> <li>Use your deep understanding of vulnerability management to help refine the shared responsibility vulnerability and exposure management framework for Datavant.</li> <li>Consolidate the infrastructure and application security detection functions under a single banner.</li> <li>Simplify and where possible, automate the onboarding and integration to our scanning technologies beyond out of the box vendor connections.</li> <li>Provide direct technical engineering guidance and coaching, including code review to your team.</li> <li>Own creating the reporting and presentation for our exposure posture across all detection sources, with metrics rolled up and broken down across multiple facets to drive risk reduction.</li> <li>Smoothly mesh vulnerability management practices into our secure SDLC.</li> <li>Identify and implement a solution to give Datavant a prioritized, single pane of glass view of all vulnerabilities and misconfigurations.</li> <li>Work directly with security senior leadership to ensure maturity, depth, and coverage of our exposure management program. </li> <li>Speak on vulnerability management to government agencies on behalf of Datavant for our FedRAMP compliance.</li> <li>Have an understanding of risks, but may have some knowledge gaps in depth of risk management. It’s OK, we’ll teach you. The core skill set you bring to the table is an engineering mindset.</li> <li>Own new projects for advancing security in our environment. Be the deep technical expert and collaborate with others on the teams to ensure project success. Your impact here cannot be understated, you are a core contributor and have deep influence to empower Datavant greatness.</li> </ul> <p><strong>What You Need to Succeed</strong></p> <ul> <li>Proven experience leading a vulnerability management program, with a strong ability to build, mentor, and inspire technical talent.</li> <li>Well-formed opinions on what makes a successful vulnerability and exposure management program</li> <li>Understanding and background in standing up vulnerability aggregation and/or ASPM platforms.</li> <li>Strong experience with vulnerability identification sources including application penetration testing, application code scanning(SCA, SAST), cloud and container analysis(CNAPP).</li> <li>Depth of knowledge working with Wiz.</li> <li>Experience with attack surface management tools.</li> <li>An engineering background with practical knowledge of how to automate and integrate systems through custom software development, building pipelines, and LCNC orchestration.</li> <li>Excellent collaboration and communication skills, capable of influencing stakeholders across technical and non-technical team ... (truncated, view full listing at source)