OVERVIEW
Live the experience . From professional empowerment to continual learning opportunities. From ongoing investment in new and emerging technologies to a career of self-determination. At Ulta Beauty, our tech team is critical to our scalability—and is recognized that way. We’ve been defined as a “mature start-up.” A place where interdepartmental exposure, open doors, and genuine collaboration is ubiquitous. Where challenges come fast and furious, requiring agility, mental dexterity, and creativity. Where our passion for better solutions drives us and is core to who we are.
We’re engineering for the future of retail, and it’s no-holds-barred. But for those motivated by continual change and ambiguity, by superior leadership, by whip smart colleagues who will press you daily for your very best, you’ll find that virtually nothing’s impossible at Ulta Beauty.
THE IMPACT YOU CAN HAVE :
The IT Manager – Vulnerability Management is responsible for leading the organization’s efforts to identify, assess, and remediate vulnerabilities across IT systems, applications, and infrastructure. This role works closely with cross-functional teams—including Application Development, Infrastructure, Security Operations, and Risk Management—to ensure the company’s digital assets are protected against evolving threats and comply with all applicable regulations. Key responsibilities include developing and executing vulnerability management strategies, overseeing vulnerability scanning and assessment processes, and coordinating timely remediation activities. The manager will monitor external sources for emerging vulnerabilities, produce actionable reports for technical teams and leadership, and integrate vulnerability intelligence into security operations. The role will mentor and develop team members, foster collaboration with internal and external partners, and deliver clear, actionable briefings to leadership. The role requires strong project management skills, the ability to translate technical findings into business risk language, and a commitment to maintaining compliance with regulatory requirements (such as SOX, PCI DSS, and privacy laws).
YOU'LL ACCOMPLISH THESE GOALS BY :
- Project Management : Defines, documents, and carries out small projects. Carries out project approach with stakeholders, and prepares realistic plans (including quality, risk and communications plans) and documents activities against the project schedule, liaising with stakeholders as appropriate.
- Information security - Develops and communicates corporate information security policy, standards and guidelines. Contributes to the development of organizational strategies that address information control requirements. Evaluates and monitors environmental and market trends and pro-actively assesses impact on business strategies, benefits and risks. Manages the provision of authoritative advice and guidance on the requirements for security controls in collaboration with experts in other functions e.g. legal, technical support. Ensures architectural principles are applied during design to reduce risk and drives adoption and adherence to policy, standards and guidelines.
- Relationship Management : Facilitates open communication and discussion between stakeholders, acting as a single point of contact by developing, maintaining and working to stakeholder engagement strategies and plans. Negotiates with stakeholders at senior levels and ensures that organizational policy and strategies are adhered to.
- Problem Management - Ensures that appropriate action is taken to anticipate, investigate and resolve problems in systems and services. Ensures that such problems are fully documented within the relevant reporting system(s). Leads the development of problem solutions. Coordinates the implementation of agreed remedies and preventative measures. Evaluates patterns and trends.
- Resourcing - Develops plans to ensure that the organization has appropriately skilled resources to meet organizational objectives and commitments. Manages the effective implementation of resource planning, recruitment, selection, assessment, on-boarding and transitioning of resources. Evaluates standards, methods and tools for resource management. Ensures compliance with relevant statutory or external regulations and codes of good practice. Promotes the development of resource management policies, standards and guidelines as well as audits and assessment of resource management processes.
ADDITIONAL RESPONSIBILITIES :
Create security plans, policies, standards and training that prepares the organization to respond efficiently and effectively to vulnerabilities.Develop, implement, and maintain the organization’s vulnerability management program, including policies, procedures, and standards for identifying, assessing, and remediating vulnerabilities across all IT assets.Oversee regular vulnerability scanning and assessment activities for infrastructure, applications, cloud environments, and networks; ensure timely and effective remediation of identified risks.Coordinate with IT, application development, infrastructure, and security operations teams to prioritize and remediate vulnerabilities based on risk and business impact.Monitor external sources for emerging vulnerabilities, threat actor activity, and campaigns; produce actionable intelligence and reports for technical teams and leadership.Lead the selection, deployment, and optimization of vulnerability management tools and platforms, ensuring comprehensive coverage and automation of detection and remediation processes.Track and report on vulnerability management metrics, remediation progress, and overall security posture to executive leadership; translate technical findings into business risk language.Ensure compliance with regulatory requirements (SOX, PCI DSS, privacy laws) and participate in internal / external audits related to vulnerability management.Coordinate and lead incident response actions related to vulnerabilities, including assessment, containment, mitigation, and documentation across teams.Support forensic investigations and vulnerability remediation, applying findings to strengthen system security and reduce exposure.Mentor and develop vulnerability management analysts and engineers, fostering continuous learning and professional growth.Automate and optimize vulnerability detection, alert triage, and remediation workflows to reduce false positives and accelerate incident resolution.Facilitate cross-functional collaboration with SOC, IR, engineering, and risk teams to ensure vulnerability management outcomes are actionable and aligned with business needs.Remain current on industry best practices, emerging threats, and new technologies in vulnerability management; continuously improve processes based on feedback and lessons learned.Coordinate staff when responding to urgent issues and findings.Control budgets for vulnerability manabement and monitor expenses.Attend meetings with other managers to determine operational needs.Participates and contributes to information security-related internal / external audits.Remain aware of and apply industry best practices in security techniques.Performs other duties as assignedESSENTIALS FOR SUCCESS :
Bachelor's degree in Computer Science, CIS, or equivalent professional experience8+ years of IT experience in technology position with a broad knowledge of IT hardware and software5 years’ experience managing technology teams5+ years experience as an IT security administration / security technicianKnowledgeable as to IT security concepts, compliance, principles, and toolsAbility to understand business needs; ability to establish and maintain a high level of business partner trust and confidence in ITRM’s concern for end users and other stakeholdersAbility to work in team in diverse / multiple stakeholder environmentsAbility to follow-up, follow through and deliver timely resultsExcellent analysis / troubleshooting skills, able to solve problems efficientlyExcellent communication skills; feels comfortable working with non-technical business partnersAble to motivate others to drive desired resultsStrong experience in establishing business processesDemonstrated ability to present recommendations to senior leaders for effective decision makingWork with production support and project consultants in an onshore / offshore modelProven track record of delivering high quality solutions on time and on scheduleFlexibility of providing support during odd hours, weekends, and peak seasonsMinimal travel required (training / conferences)Retail industry experience preferred#LI-HYBRID
#LI - ML1
The pay range for this position is $119,300.00 - $160,000.00 / Year with the opportunity for eligible associates to earn additional compensation pursuant to the Company’s bonus plan. Exact pay will be based on factors including, but not limited to relevant education, qualifications, certifications, experience, level, shift, geographic location, and business and organizational needs. Full-time positions are eligible for paid time off, health, dental, vision, life and disability benefits. Part-time positions are eligible for dental, vision, life, and disability benefits. For additional information concerning our benefits, visit our Benefits and Career Development page :
ABOUT
At Ulta Beauty (NASDAQ : ULTA), the possibilities are beautiful . Ulta Beauty is the largest North American beauty retailer and the premier beauty destination for cosmetics, fragrance, skin care products, hair care products and salon services. We bring possibilities to life through the power of beauty each and every day in our stores and online with more than 25,000 products from approximately 500 well-established and emerging beauty brands across all categories and price points, including Ulta Beauty’s own private label. Ulta Beauty also offers a full-service salon in every store featuring—hair, skin, brow, and make-up services.
We will consider for employment all qualified applicants, including those with arrest records, conviction records, or other criminal histories, in a manner consistent with the requirements of any applicable state and local laws, including the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, the San Francisco Fair Chance Ordinance, and the New York City Fair Chance Act.