Building a Security Champions Program That Engineers Actually Want to Join | Lorikeet Security Skip to main content
Back to Blog

Building a Security Champions Program That Engineers Actually Want to Join

Lorikeet Security Team February 26, 2026 10 min read

Every security team hits the same scaling wall. You have three security engineers and forty development teams. You cannot be in every design review, every code review, and every sprint planning session. Features ship faster than you can review them. The backlog of security work grows. Engineers treat security as someone else's problem.

A security champions program solves this by embedding security-minded engineers inside every team. Not dedicated security staff. Not reassigned headcount. Existing engineers who volunteer to be their team's security point of contact, receive additional training, and carry the security flag in their daily work.

Done well, a champions program is the highest-leverage investment a security team can make. Done poorly, it is a list of names on a Confluence page that nobody remembers signing up for. Here is how to build one that works.


What a Security Champions Program Actually Is

A security champions program is a formal structure where volunteer engineers from each development team receive additional security training and take on specific security responsibilities within their team. Champions are not security professionals. They are engineers who happen to care about security and have been given the tools and authority to act on it.

The champion serves as a bridge between the central security team and their engineering team. They review code for security issues, raise security concerns during design discussions, triage vulnerability findings for their team's applications, and escalate complex issues to the security team. They reduce the bottleneck that a small security team creates when it tries to be involved in everything.

What champions do

What champions are not

Champions are not a replacement for a professional security team. They do not perform penetration tests. They do not architect security infrastructure. They do not own the security program. They are force multipliers who extend the security team's reach across the organization. The security team still owns strategy, tooling, policy, and deep technical testing. Champions own the day-to-day security hygiene within their teams.


Why It Scales Security Culture

The math behind a champions program is compelling. If you have a 3-person security team and 40 engineering teams, each team gets roughly 2% of security's attention. Add 40 champions spending 15% of their time on security activities, and you have effectively added the equivalent of 6 full-time security engineers to the organization, at zero additional headcount cost.

But the real value is cultural, not mathematical. When security feedback comes from a teammate rather than an external security team, it lands differently. Engineers are more receptive to security guidance from someone who understands their codebase, their deadlines, and their constraints. The feedback loop is shorter. The context is richer. The friction is lower.

Champions also create a security culture that persists even when the security team is not in the room. When the champion asks "have we thought about the security implications of this?" during a design review, it normalizes security thinking as part of engineering, not as an external gate that slows things down.

The cultural shift: Without a champions program, security is something that happens TO engineering teams (audits, pentest findings, compliance requirements). With a champions program, security is something that happens WITHIN engineering teams. That distinction changes everything.


How to Recruit Champions (Without Voluntelling)

The single biggest determinant of program success is how you recruit your champions. Mandating participation kills the program before it starts. The best champions are intrinsically motivated. They are the engineers who already ask security questions in code reviews, who read about vulnerabilities in their spare time, who get excited when they find a bug in their own code.

Recruitment strategies that work

Who makes a good champion

The best champions are not necessarily the most senior engineers. Look for engineers who are curious about how things break, who have strong communication skills, and who are respected by their peers. Technical depth matters less than the ability to influence team behavior and translate security concepts into practical engineering decisions.

Avoid recruiting only from the backend team. Frontend engineers, mobile developers, infrastructure engineers, and QA engineers all bring unique security perspectives. A diverse champion cohort catches a wider range of issues.


The Training Curriculum That Keeps Champions Engaged

A one-time training session does not create a security champion. It creates someone who attended a training once and then forgot about it. Champions need ongoing, structured learning that builds on itself and stays relevant to their daily work.

Month 1-3: Foundation

Month 4-6: Applied skills

Ongoing: Monthly cadence

The key is that training is continuous, practical, and tied to the company's own codebase and findings. Champions who train on abstract examples lose interest. Champions who train on their own application's real code review findings stay engaged because the learning is immediately applicable.


Incentive Structures That Actually Motivate

Asking engineers to take on additional responsibilities without recognition or reward is a fast path to program collapse. The incentive structure does not need to be expensive, but it needs to exist and be visible.

Career incentives

The most powerful incentive is career advancement. Work with engineering leadership to ensure that security champion participation is explicitly recognized in performance reviews and promotion decisions. Add "security champion" to the engineering career ladder as a recognized specialization. Engineers who can demonstrate security expertise alongside their core engineering skills are more valuable, and the organization should reflect that.

Learning incentives

Provide champions with a dedicated training budget. Access to paid training platforms, conference attendance, and certification sponsorship are tangible benefits that attract motivated engineers. If the company would not otherwise pay for a SANS course, but a champion can earn one through active participation, that is a meaningful draw.

Recognition incentives

Time incentives

This is non-negotiable. Champions must have formally allocated time for security activities. If the champion's manager expects 100% delivery velocity while the champion spends 15% of their time on security, the champion will either burn out or quietly drop the security work. Work with engineering leadership to adjust sprint capacity for champions and make it explicit in their team's planning.


Implementation: A Practical Rollout Plan

Rolling out a champions program across an entire engineering organization at once is a recipe for a program that exists on paper but not in practice. A phased approach builds momentum and allows you to iterate on what works.

Phase 1: Foundation (Weeks 1-4)

  1. Get executive sponsorship from the VP of Engineering or CTO. Without top-down support, the program will be deprioritized.
  2. Define the champion role: responsibilities, time commitment, incentives, and success criteria.
  3. Select 3-5 pilot teams, prioritizing teams that work on security-critical applications.
  4. Recruit pilot champions through open calls and manager recommendations.
  5. Prepare the initial training curriculum.

Phase 2: Pilot (Months 2-4)

  1. Run the foundation training for pilot champions.
  2. Establish the monthly champion meetup cadence.
  3. Assign pilot champions their first real tasks: security code review for an upcoming release, or triage of recent pentest findings for their team.
  4. Collect feedback from champions and their managers weekly.
  5. Iterate on the program structure based on what is and is not working.

Phase 3: Expansion (Months 5-8)

  1. Use pilot champions to recruit the next wave. Peer advocacy is more effective than top-down mandates.
  2. Expand to all engineering teams, aiming for one champion per team.
  3. Launch the first quarterly CTF event.
  4. Formalize the training curriculum based on pilot learnings.
  5. Begin tracking program metrics (covered in the next section).

Phase 4: Maturity (Months 9-12)

  1. Champions begin mentoring newer champions.
  2. Integrate champion responsibilities into the engineering career ladder.
  3. Champions participate in vendor evaluations and security architecture decisions.
  4. Publish the first annual program report to leadership showing measurable impact.

Measuring Success: Metrics That Prove the Program Works

A champions program without metrics is a program that will lose its budget in the next cost-cutting cycle. You need to demonstrate measurable impact to justify the time investment from engineering teams.

Metric What It Measures Target
Vulnerability escape rate Findings that reach production vs. caught in development 30% reduction in Year 1
Time to remediate How fast champion teams fix findings vs. non-champion teams Champion teams 40% faster
Security review coverage Percentage of PRs that receive security-focused review 80% for high-risk changes
Champion retention Percentage of champions still active after 12 months Above 70%
Threat models completed Number of new features that received threat modeling All major features
Security questions in design Frequency of security raised in design reviews (survey) Upward trend quarterly
Training engagement Champion attendance at monthly meetups and CTFs Above 80% attendance

The most compelling metric is the vulnerability escape rate comparison between teams with active champions and teams without. If champion teams consistently catch more issues before production, you have undeniable proof that the program works. This is the number that keeps the CTO's support and the engineering managers' buy-in.


Common Pitfalls and How to Avoid Them

We have seen champions programs fail in predictable ways across dozens of organizations. Here are the patterns to watch for.

The "voluntold" champion

When managers appoint champions without their consent, you get disengaged participants who view the role as a burden. Always ensure champions have opted in. If a team cannot produce a willing volunteer, that team is not ready for a champion, and that is okay. Better to have no champion than a resentful one.

No time allocation

If champions are expected to do security work on top of their full engineering workload, the security work will be the first thing dropped when deadlines tighten. Formal time allocation, communicated to and agreed upon by engineering managers, is non-negotiable.

Training stops after onboarding

A one-time training followed by months of silence kills engagement. The monthly cadence of meetups, new content, and hands-on challenges is what keeps champions active and growing. Treat it like a community, not a certification.

No connection to real work

Champions who only receive theoretical training without applying it to their team's actual codebase will disengage. Every training module should connect to a practical task the champion can execute the following week. After reviewing OWASP Top 10 findings, assign champions to check their own team's code for the same patterns.

Security team hoards the interesting work

If the security team only gives champions grunt work (triage these 200 scanner findings) while keeping the interesting work (pentest review, architecture design, tool evaluation) for themselves, champions will feel like unpaid interns rather than valued collaborators. Give champions meaningful, impactful work that develops their skills.


Tying It All Together: Champions as Part of Your Security Program

A champions program does not exist in isolation. It is one layer of a comprehensive security program that includes professional security testing, automated tooling, compliance frameworks, and executive oversight.

Champions catch the everyday issues: insecure defaults in new code, missing input validation, overly permissive IAM roles. Professional penetration testing catches the complex issues that require specialized expertise: chained attack paths, business logic flaws, and authentication bypass techniques that only a trained offensive security professional would find. The two approaches are complementary, not competitive.

At Lorikeet Security, we frequently work with organizations that have champions programs. The best engagements happen when champions participate in the scoping process, join the kickoff call, and help triage findings during the test. Champions who understand the pentest process become better security advocates for their teams, and the pentest produces better results because the testers have access to insider context about how the application works.

If you are thinking about starting a champions program, it is also worth reading our guides on making your first security hire and building security culture at startups. A champions program works best when it is part of a deliberate strategy, not a reactive response to having too few security staff.

Build security into your engineering culture

Lorikeet Security provides penetration testing, code reviews, and security training that give your champions program real-world context. Let us help you build a security practice that scales with your engineering team.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!