{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/admission-controllers"},"x-facet":{"type":"skill","slug":"admission-controllers","display":"Admission Controllers","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_770c5fe8-cce"},"title":"Staff Security Engineer, Vulnerability Management","description":"<p>We are seeking a Staff Security Engineer to lead the most complex technical work in CoreWeave&#39;s Vulnerability Management program.</p>\n<p>As a Staff Security Engineer, you will design and implement scalable triage, prioritization, and remediation-tracking systems across application, infrastructure, and hardware domains. You will set technical standards, drive high-impact initiatives, and mentor engineers through technical leadership, while partnering with leadership on priorities and execution risks.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Lead high-complexity VM technical initiatives and deliver architecture decisions for assigned program areas</li>\n<li>Design and build scalable triage automation, including integrations, decision logic, and production hardening</li>\n<li>Implement end-to-end workflow components from assessment and detection to ticket routing and remediation tracking</li>\n<li>Provide deep technical leadership on hardware-adjacent vulnerabilities (GPU firmware, DPU firmware/BlueField, and BMC surfaces)</li>\n<li>Act as senior technical responder for embargoed disclosures and zero-day events, coordinating with owner teams that deploy fixes</li>\n<li>Improve prioritization logic, severity models, and exception workflows through code, design reviews, and technical proposals</li>\n<li>Produce actionable technical metrics and risk insights for leadership consumption</li>\n<li>Lead root-cause analysis for high-impact vulnerability incidents and implement durable technical improvements</li>\n<li>Mentor IC3/IC4/IC5 engineers through design guidance, code review, and incident coaching</li>\n<li>Partner with security, engineering, and operational stakeholders to improve workflow reliability and accelerate remediation outcomes</li>\n</ul>\n<p>Requirements:</p>\n<ul>\n<li>9+ years of relevant experience with demonstrated strategic impact in vulnerability management, application security, platform security, or cloud security engineering</li>\n<li>Proven track record building and scaling security automation (SOAR workflows, AI/ML systems, detection pipelines) in production environments</li>\n<li>Deep subject matter expertise with vulnerability management best practices: CVSS, EPSS, CISA KEV, threat intelligence integration, and risk-based prioritization frameworks</li>\n<li>Excellent development background with strong coding skills in Python, Go, or similar languages for building scalable, production-grade security systems</li>\n<li>Significant experience with modern vulnerability management tooling (for example Wiz, Semgrep, Rapid7, Tenable, or equivalent)</li>\n<li>Experience with specialized infrastructure: GPU/DPU environments, firmware security, hardware vulnerabilities, or high-performance computing</li>\n<li>Demonstrated track record mentoring engineers across levels and driving cross-functional technical initiatives at organizational scale</li>\n<li>Strong business acumen and understanding of how security decisions impact engineering velocity, customer trust, and business outcomes</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Practical experience building AI/ML-powered security systems (LLM integration, automated decision-making, human-in-the-loop validation) in production</li>\n<li>Experience managing hardware vendor security partnerships (embargoed disclosures and pre-release collaboration)</li>\n<li>Production experience with security automation platforms such as TINES and serverless frameworks (AWS Lambda, GCP Cloud Functions)</li>\n<li>Strong DevOps, DevSecOps, or SRE background with deep experience in AWS/GCP/Azure cloud services and Infrastructure as Code (Terraform, CloudFormation)</li>\n<li>Deep understanding of Kubernetes security (container scanning, admission controllers, supply chain security, runtime protection)</li>\n<li>Experience leading security programs through rapid hypergrowth (10x+ infrastructure scaling) in startup or cloud-native environments</li>\n<li>Practical experience managing vulnerabilities within a FedRAMP-certified environment or similar regulatory frameworks</li>\n</ul>\n<p>Salary and Benefits: The base salary range for this role is $188,000 to $275,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>\n<p>Work Environment:</p>\n<p>While we prioritize a hybrid work environment, remote work may be considered for candidates located more than 30 miles from an office, based on role requirements for specialized skill sets. New hires will be invited to attend onboarding at one of our hubs within their first month. Teams also gather quarterly to support collaboration.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_770c5fe8-cce","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4653130006","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$188,000 to $275,000","x-skills-required":["vulnerability management","application security","platform security","cloud security engineering","security automation","AI/ML systems","detection pipelines","Python","Go","modern vulnerability management tooling","GPU/DPU environments","firmware security","hardware vulnerabilities","high-performance computing"],"x-skills-preferred":["AI/ML-powered security systems","LLM integration","automated decision-making","human-in-the-loop validation","security automation platforms","TINES","serverless frameworks","AWS Lambda","GCP Cloud Functions","DevOps","DevSecOps","SRE","Kubernetes security","container scanning","admission controllers","supply chain security","runtime protection"],"datePosted":"2026-04-18T15:59:06.360Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"vulnerability management, application security, platform security, cloud security engineering, security automation, AI/ML systems, detection pipelines, Python, Go, modern vulnerability management tooling, GPU/DPU environments, firmware security, hardware vulnerabilities, high-performance computing, AI/ML-powered security systems, LLM integration, automated decision-making, human-in-the-loop validation, security automation platforms, TINES, serverless frameworks, AWS Lambda, GCP Cloud Functions, DevOps, DevSecOps, SRE, Kubernetes security, container scanning, admission controllers, supply chain security, runtime protection","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":188000,"maxValue":275000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a3a1df2f-184"},"title":"Principal Engineer, Software Supply Chain Security","description":"<p>As the Principal Engineer, Software Supply Chain Security, you&#39;ll own the technical strategy that secures how software is built and delivered on GitLab&#39;s DevSecOps platform. You&#39;ll provide architectural leadership across multiple engineering teams.</p>\n<p>Your work will shape GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market. You&#39;ll focus on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture.</p>\n<p>Some examples of our projects:</p>\n<ul>\n<li>SLSA Level 3 compliance and provenance attestation across GitLab&#39;s CI/CD platform</li>\n<li>Integrated secrets management and runner security for container-isolated, secure pipelines</li>\n</ul>\n<p>You&#39;ll lead the end-to-end software supply chain security architecture for GitLab&#39;s CI/CD platform, including SLSA Level 3 implementation and CI infrastructure hardening. You&#39;ll drive cross-team technical strategy and decisions across our Software Supply Chain Security (SSCS) stage teams, aligning engineering work to SSCS strategic plans.</p>\n<p>You&#39;ll collaborate with infrastructure and CI/CD teams to design and land long-term initiatives for secure, scalable runner architecture, container isolation, and pipeline security at scale. You&#39;ll propose and validate technical implementations that support architectural changes to improve CI/CD scaling and performance on critical paths.</p>\n<p>You&#39;ll teach, mentor, and coach Staff Engineers and individual contributors, raising the bar on supply chain threat modeling, secrets management, artifact signing, and SBOM lifecycle practices.</p>\n<p>You&#39;ll partner with Engineering Managers and senior leadership to define roadmaps, break down complex initiatives, and enable Staff Engineers to lead sub-department-wide efforts.</p>\n<p>You&#39;ll engage with customers and external stakeholders as a technical consultant and spokesperson for GitLab&#39;s software supply chain security capabilities and roadmap.</p>\n<p>You&#39;ll collaborate with product, security, and compliance stakeholders to ensure features meet enterprise security, governance, and regulatory expectations in the software supply chain security market.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Providing architectural leadership across multiple engineering teams</li>\n<li>Shaping GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market</li>\n<li>Focusing on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture</li>\n</ul>\n<p>Key requirements include:</p>\n<ul>\n<li>Deep expertise in software supply chain security, including threat modeling for supply chain attack vectors, SLSA implementation and attestation systems, and SBOM generation and lifecycle management</li>\n<li>Strong knowledge of artifact signing and verification using the Sigstore ecosystem, including Cosign, Fulcio, Rekor, and in-toto attestations</li>\n<li>Experience designing and hardening CI/CD security, such as runner isolation, pipeline security controls, and secrets management in large-scale environments</li>\n</ul>\n<p>Preferred qualifications include:</p>\n<ul>\n<li>Background in distributed systems and infrastructure, including building resilient CI/CD platforms that process high pipeline volumes and optimizing performance for critical paths</li>\n<li>Practical experience with container security and Kubernetes security, including admission controllers, policy controllers, workload isolation, and registry hardening</li>\n<li>Proficiency in Go or Rust in a production environment, combined with expert-level understanding of CI/CD workflows and DevSecOps best practices</li>\n<li>Experience operating as a Principal or Staff Engineer across multiple development teams, providing architectural leadership and partnering with Engineering Managers and senior leaders</li>\n<li>Demonstrated capacity to clearly communicate complex problems and solutions</li>\n</ul>\n<p>Our Software Supply Chain Security stage engineering teams are responsible for authentication and access within GitLab. We also build features that help customers manage vulnerabilities, dependencies, security policies, and compliance frameworks across their organizations.</p>\n<p>The base salary range for this role&#39;s listed level is currently for residents of the United States only. This range is intended to reflect the role&#39;s base salary rate in locations throughout the US. Grade level and salary ranges are determined through interviews and a review of education, experience, knowledge, skills, abilities of the applicant, equity with other team members, alignment with market data, and geographic location. The base salary range does not include any bonuses, equity, or benefits.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a3a1df2f-184","directApply":true,"hiringOrganization":{"@type":"Organization","name":"GitLab","sameAs":"https://about.gitlab.com/","logo":"https://logos.yubhub.co/about.gitlab.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/gitlab/jobs/8373553002","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$157,900-$338,400 USD","x-skills-required":["software supply chain security","threat modeling","SLSA implementation","attestation systems","SBOM generation","lifecycle management","artifact signing","verification","Sigstore ecosystem","Cosign","Fulcio","Rekor","in-toto attestations","CI/CD security","runner isolation","pipeline security controls","secrets management","distributed systems","infrastructure","container security","Kubernetes security","admission controllers","policy controllers","workload isolation","registry hardening","Go","Rust","CI/CD workflows","DevSecOps best practices"],"x-skills-preferred":["background in distributed systems and infrastructure","practical experience with container security and Kubernetes security","proficiency in Go or Rust in a production environment","expert-level understanding of CI/CD workflows and DevSecOps best practices","experience operating as a Principal or Staff Engineer across multiple development teams"],"datePosted":"2026-04-18T15:45:22.426Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote, Canada; Remote, Israel; Remote, Netherlands; Remote, United Kingdom; Remote, US"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software supply chain security, threat modeling, SLSA implementation, attestation systems, SBOM generation, lifecycle management, artifact signing, verification, Sigstore ecosystem, Cosign, Fulcio, Rekor, in-toto attestations, CI/CD security, runner isolation, pipeline security controls, secrets management, distributed systems, infrastructure, container security, Kubernetes security, admission controllers, policy controllers, workload isolation, registry hardening, Go, Rust, CI/CD workflows, DevSecOps best practices, background in distributed systems and infrastructure, practical experience with container security and Kubernetes security, proficiency in Go or Rust in a production environment, expert-level understanding of CI/CD workflows and DevSecOps best practices, experience operating as a Principal or Staff Engineer across multiple development teams","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":157900,"maxValue":338400,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_41528416-21c"},"title":"Staff+ Software Security Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Team</strong></p>\n<p>The Security Engineering team protects Anthropic&#39;s AI systems and maintains the trust of our users and society. We define the authentication architecture for our training infrastructure, design the cryptographic foundations that protect model weights and training data, and drive the developer security program that shapes how engineers build and ship software.</p>\n<p><strong>About the role:</strong></p>\n<ul>\n<li>Scope, design, and build complex security systems end to end, maintaining them through production and driving through ambiguous technical challenges with minimal oversight</li>\n<li>Identify systematic risks through threat modeling and risk assessment, then build the controls and infrastructure that address them</li>\n<li>Mentor engineers across the security team and broader engineering organisation, contribute to hiring, and grow security engineering culture at Anthropic</li>\n<li>Enable other teams to build their own security solutions by providing design pattern guidance and expanding security ownership beyond the security team</li>\n</ul>\n<p><strong>Developer security and supply chain</strong></p>\n<ul>\n<li>Build and advance our developer security program by embedding security practices into the software development lifecycle and developer workflows</li>\n<li>Harden CI/CD pipelines against supply chain attacks through isolated build environments, signed attestations, dependency verification, and automated policy enforcement</li>\n</ul>\n<p><strong>Identity and secrets management</strong></p>\n<ul>\n<li>Architect systems that protect sensitive assets including model weights, customer data, and training datasets</li>\n<li>Build and operate credential issuance, rotation, and workload authentication across our multi-cloud environments</li>\n</ul>\n<p><strong>Infrastructure security</strong></p>\n<ul>\n<li>Implement and maintain cloud security controls including IAM, network segmentation, VPC architecture, and encryption across our multi-cloud and on-prem environments</li>\n<li>Contribute to cluster security controls including RBAC policies, namespace isolation, workload identity, and pod security</li>\n<li>Contribute to continuous cloud security posture management using infrastructure-as-code scanning, misconfiguration detection, and automated remediation</li>\n</ul>\n<p><strong>Secure frameworks</strong></p>\n<ul>\n<li>Build critical security foundations including cryptographic frameworks, mTLS infrastructure, secure serialization, and authorization systems, designed to prevent entire classes of vulnerabilities and empower engineering teams to work securely without becoming security experts themselves</li>\n<li>Partner with product, research, infrastructure, and other security teams to ensure frameworks integrate smoothly with lower-layer security controls</li>\n</ul>\n<p><strong>You may be a good fit if you have:</strong></p>\n<ul>\n<li>At least 8 years of software engineering experience with deep security expertise, including leading complex security initiatives independently</li>\n<li>Bachelor&#39;s degree in Computer Science or equivalent industry experience</li>\n<li>Strong programming skills in Python or at least one systems language such as Go, Rust, or C/C++</li>\n<li>Deep understanding of identity systems, cryptographic primitives, and secrets management</li>\n<li>Working knowledge of Kubernetes security primitives including RBAC, namespaces, network policies, and service accounts</li>\n<li>Experience leading cross-functional security initiatives and navigating complex organisational dynamics</li>\n<li>Outstanding communication skills, translating technical concepts effectively across all levels of the organisation</li>\n<li>A track record of bringing clarity and ownership to ambiguous technical problems and driving them to resolution</li>\n<li>Low ego and high empathy, with a history of growing the engineers around you and supporting diverse, inclusive teams</li>\n<li>Passion for AI safety and the role security engineering plays in building trustworthy AI systems</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Designed or operated identity and secrets management systems for large-scale AI or cloud infrastructure</li>\n<li>Built security frameworks or libraries adopted across an engineering organisation</li>\n<li>Led a developer security program including supply chain security, secure build infrastructure, and SDLC integrations</li>\n<li>Built or secured CI infrastructure using Nix, Bazel, or Kubernetes-based deploy systems, with depth in toolchain issues, CI/CD pipelines, and developer workflow optimisation</li>\n<li>Implemented machine identity or workload authentication systems using SPIFFE/SPIRE, mTLS, or equivalent</li>\n<li>Understanding of Linux systems internals including namespaces, cgroups, and seccomp, and how these underpin container and workload isolation</li>\n<li>Contributed to the security architecture of multi-cloud environments including network segmentation, data protection, and access governance</li>\n<li>Experience with network security controls including admission controllers, CNI-level policy, service mesh security, and east-west traffic enforcement</li>\n<li>Experience building runtime security monitoring using eBPF or kernel security policies</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None, applications will be received on a rolling basis.</p>\n<p><strong>The annual compensation range for this role is listed below.</strong></p>\n<p>For sales roles, the range provided is the role’s On Target Earnings (&quot;OTE&quot;) range, meaning the total amount of money an employee is expected to earn in a year, including bonuses and other forms of compensation.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_41528416-21c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5120512008","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"The annual compensation range for this role is listed below.\n\nFor sales roles, the range provided is the role’s On Target Earnings (\"OTE\") range, meaning the total amount of money an employee is expected to earn in a year, including bonuses and other forms of compensation.","x-skills-required":["Python","Go","Rust","C/C++","Kubernetes","RBAC","namespaces","network policies","service accounts","identity systems","cryptographic primitives","secrets management"],"x-skills-preferred":["Nix","Bazel","Kubernetes-based deploy systems","SPIFFE/SPIRE","mTLS","Linux systems internals","namespaces","cgroups","seccomp","container and workload isolation","multi-cloud environments","network segmentation","data protection","access governance","admission controllers","CNI-level policy","service mesh security","east-west traffic enforcement","runtime security monitoring","eBPF","kernel security policies"],"datePosted":"2026-03-08T13:52:38.657Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Rust, C/C++, Kubernetes, RBAC, namespaces, network policies, service accounts, identity systems, cryptographic primitives, secrets management, Nix, Bazel, Kubernetes-based deploy systems, SPIFFE/SPIRE, mTLS, Linux systems internals, namespaces, cgroups, seccomp, container and workload isolation, multi-cloud environments, network segmentation, data protection, access governance, admission controllers, CNI-level policy, service mesh security, east-west traffic enforcement, runtime security monitoring, eBPF, kernel security policies"}]}