{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/cyber-threat-intelligence"},"x-facet":{"type":"skill","slug":"cyber-threat-intelligence","display":"Cyber Threat Intelligence","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0d6b0b5c-92a"},"title":"Governance, Risk, and Compliance (GRC) SME- (m/w/d) DACH-Region","description":"<p><strong>Job Description</strong></p>\n<p>You will be part of a team that supports CIOs in managing central challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget restrictions. As a Cyber GRC Senior Consultant, you will work with security, IT, and compliance teams to strengthen cybersecurity, manage cyber risks, and ensure regulatory compliance.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Participate in global projects in an international team, supported by over 330,000 technical professionals from our parent company</li>\n<li>Contribute to the development of consulting offerings and innovative go-to-market solutions for the C-Suite to make cyber risks understandable and reducible</li>\n<li>Lead and conduct risk analyses according to the NIST CSF</li>\n<li>Be responsible for conceiving innovative new services using AI and ML where they offer real added value</li>\n<li>Support pre-sales, sales, and account management activities from the perspective of a subject matter expert</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>You have a clear career progression and experience working with renowned consulting firms and large commercial sector customers</li>\n<li>You bring a strong passion for cybersecurity and actively follow current industry trends and developments</li>\n<li>Your cybersecurity expertise includes:</li>\n</ul>\n<p>+ A relevant university degree (Bachelor or Master) in Information Security, Cybersecurity, or IT Security \t+ At least 1-5+ years of experience in the field of Cyber Security/Information Security \t+ A broad business competence profile, including stakeholder management, problem-solving ability, and resilience \t+ Experience in collecting, validating, analyzing, documenting, and communicating information to stakeholders</p>\n<p><strong>Desired Skills</strong></p>\n<ul>\n<li>Good knowledge of the NIST Cybersecurity Framework (CSF)</li>\n<li>A further university degree in Cyber or Information Security</li>\n<li>Cyber Due Diligence Assessments</li>\n<li>Cyber Risk Management for third parties and supply chains</li>\n<li>Review of Incident Response Plans</li>\n<li>Support in tenders, RFP responses, and offers</li>\n<li>Conducting Crisis Management Exercises (CMX)</li>\n<li>Certifications such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM</li>\n<li>Participation in the development of Target Operating Models (TOMs) and RACI matrices</li>\n<li>Creation of Cyber Security Roadmaps</li>\n<li>Support in Post-Incident Reviews</li>\n<li>Analysis and summarization of Cyber Threat Intelligence Reports</li>\n<li>Implementation of Cyber Compliance Programs (DSGVO, DORA, ISO 27001, NIS2, SOX)</li>\n<li>Cyber Risk or Maturity Assessments</li>\n<li>Conception and/or implementation of Awareness Trainings</li>\n<li>Participation in Identity &amp; Access Management Projects</li>\n<li>Participation in Privileged Access Management Projects</li>\n</ul>\n<p><strong>Ideal Candidate Profile</strong></p>\n<ul>\n<li>Our ideal candidates have the following skills:</li>\n</ul>\n<p>+ Strong business competence, particularly in stakeholder management and problem-solving \t+ Experience in preparing and communicating complex information to stakeholders \t+ Very good communication skills in German (C2) and English (C2) and project-related travel readiness \t+ Enjoy working with customers from different industries \t+ Experience in balancing technical and commercial requirements to develop practical solutions \t+ Ability to build lasting business relationships at all levels \t+ Ability to provide expert support and guidance to less experienced colleagues \t+ Ability to explain complex cyber methods in a non-technical and understandable way (written and oral)</p>\n<p><strong>Benefits</strong></p>\n<p>You will be part of a team that supports CIOs in managing central challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget restrictions. Our team of business analysts, enterprise architects, and cyber security specialists combines operational, strategic, analytical, and innovative competencies to drive business-IT alignment, IT governance transformation, IT cost optimization, efficiency improvement, innovation promotion, and cyber risk, governance, and compliance topics.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>You will be part of a globally renowned management consulting firm that is on the front-line of industry disruption. We are a mid-size player with a supportive, entrepreneurial spirit that works with a market-leading brand in every sector, while our parent organization Infosys is a top-5 powerhouse IT brand that is outperforming the market and experiencing rapid growth.</p>\n<p>Our consulting business is annually recognized as one of the UK&#39;s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity, and dedicated training and career paths we offer to our consultants. We are committed to fostering an inclusive work culture that inspires everyone to deliver their best.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0d6b0b5c-92a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/oexxh4mvWPKhUMdVS3q5pd/hybrid-governance%2C-risk%2C-and-compliance-(grc)-sme--(m%2Fw%2Fd)-dach-region-in-munich-at-infosys-consulting---europe","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cybersecurity","Risk Management","Regulatory Compliance","NIST CSF","Cyber Due Diligence Assessments","Cyber Risk Management","Incident Response Plans","Crisis Management Exercises","Certifications","Target Operating Models","RACI matrices","Cyber Security Roadmaps","Post-Incident Reviews","Cyber Threat Intelligence Reports","Cyber Compliance Programs","Cyber Risk Assessments","Awareness Trainings","Identity & Access Management","Privileged Access Management"],"x-skills-preferred":["German","English","Stakeholder Management","Problem-Solving","Resilience","Communication","Project Management","Business Analysis","Enterprise Architecture","Cyber Security","IT Governance","IT Cost Optimization","Efficiency Improvement","Innovation Promotion"],"datePosted":"2026-03-09T16:54:02.938Z","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"Cybersecurity, Risk Management, Regulatory Compliance, NIST CSF, Cyber Due Diligence Assessments, Cyber Risk Management, Incident Response Plans, Crisis Management Exercises, Certifications, Target Operating Models, RACI matrices, Cyber Security Roadmaps, Post-Incident Reviews, Cyber Threat Intelligence Reports, Cyber Compliance Programs, Cyber Risk Assessments, Awareness Trainings, Identity & Access Management, Privileged Access Management, German, English, Stakeholder Management, Problem-Solving, Resilience, Communication, Project Management, Business Analysis, Enterprise Architecture, Cyber Security, IT Governance, IT Cost Optimization, Efficiency Improvement, Innovation Promotion"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1bdc3caf-792"},"title":"Governance, Risk, and Compliance (GRC) SME - Senior Consultant","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are looking for a highly skilled Cyber GRC (Governance, Risk, and Compliance) Senior Consultant to help organizations strengthen their cybersecurity posture, manage cyber risks, and ensure regulatory compliance. The ideal candidate will have deep expertise in cybersecurity frameworks, risk management, regulatory compliance, and security governance.</p>\n<p>As a Cyber GRC Senior Consultant, you will collaborate with client security, IT, and compliance teams to direct and oversee the development and implementation of cybersecurity policies, conduct risk assessments, and ensure adherence to global security standards and regulations.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>Work on global projects with a truly global team, with the support of over 330,000 technical staff from our parent organization.</p>\n<p>Contribute to the development of consulting go to market offerings and innovative solutions targeted at the C-Suite executive community that help them to understand and mitigate their cyber risks.</p>\n<p>Direct and lead NIST CSF risk assessments</p>\n<p>Oversee the design of innovative new services to lead the market incorporating AI and ML where it brings value.</p>\n<p>Support presales, sales, and account management pursuits from a subject matter expert perspective.</p>\n<p><strong>Requirements</strong></p>\n<p>You will have already achieved strong career progression to date, and experience working with recognized consulting brands and large commercial sector clients. You will have a passion for cyber security and a genuine interest in staying updated with the latest industry trends and developments.</p>\n<p>Your security experience must include:</p>\n<p>A relevant undergrad or post grad degree (Infosec, Cyber Security, IT Security)</p>\n<p>1-5 years+ in the field of cyber security/infosec.</p>\n<p>A broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Your diverse Security experience should include one or some of below:</p>\n<p>A good understanding of NIST CSF</p>\n<p>A post graduate degree in cyber /information security</p>\n<p>Cyber Due Diligence Assessments</p>\n<p>Third- Party &amp; Supply chain Cyber Risk Management</p>\n<p>Incident Response Plan review</p>\n<p>Supporting bids, RFP responses and proposals</p>\n<p>Crisis Management Exercises (CMX)</p>\n<p>Accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM,</p>\n<p>Helped design Target Operating Models (TOMs) and RACI Matrices</p>\n<p>Helping the design of Cyber Security Roadmaps</p>\n<p>Supporting Post Incident Reviews</p>\n<p>Reading and summarising Cyber Threat Intelligence reports</p>\n<p>Cyber Security Risk Assessments or Maturity Assessments</p>\n<p>Design and/deliver awareness training.</p>\n<p>Worked on Identity and Access Management projects.</p>\n<p>Worked on Privileged access management projects</p>\n<p><strong>Our ideal candidate may have some of the following skills:</strong></p>\n<p>Have a broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Enjoy working with different clients from different industries.</p>\n<p>Have some experience in balancing technical and commercial considerations to develop practical advice or solutions for clients.</p>\n<p>Be able to build strong and effective business relationships at all levels</p>\n<p>Be able to support and oversee staff with less experience in their tasks</p>\n<p>Be able to explain complex cyber methodologies using accessible non-technical language (both written and verbal)</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now._</p>\n<p><strong>About your team</strong></p>\n<p>At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology. We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1bdc3caf-792","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/kpLfuJ6MMnQF6UP1PbZm31/remote-governance%2C-risk%2C-and-compliance-(grc)-sme---senior-consultant-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity frameworks","risk management","regulatory compliance","security governance","NIST CSF","cyber due diligence assessments","third-party and supply chain cyber risk management","incident response plan review","crisis management exercises","accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM","target operating models","RACI matrices","cybersecurity roadmaps","post-incident reviews","cyber threat intelligence reports","cybersecurity risk assessments","identity and access management","privileged access management"],"x-skills-preferred":["stakeholder management","problem-solving","resilience","data and information gathering","data and information validation","data and information synthesis","data and information documentation","data and information communication","interpersonal skills","written communication skills","verbal communication skills"],"datePosted":"2026-03-09T16:53:00.785Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"cybersecurity frameworks, risk management, regulatory compliance, security governance, NIST CSF, cyber due diligence assessments, third-party and supply chain cyber risk management, incident response plan review, crisis management exercises, accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM, target operating models, RACI matrices, cybersecurity roadmaps, post-incident reviews, cyber threat intelligence reports, cybersecurity risk assessments, identity and access management, privileged access management, stakeholder management, problem-solving, resilience, data and information gathering, data and information validation, data and information synthesis, data and information documentation, data and information communication, interpersonal skills, written communication skills, verbal communication skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_18528dac-ae1"},"title":"Threat Collections Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Role</strong></p>\n<p>We are looking for a Threat Collections Engineer to join our Threat Intelligence team. In this role, you will build the infrastructure that powers our threat discovery capabilities—integrating external data sources, developing detection systems for automated lead generation, and creating internal tooling that scales our investigators&#39; impact.</p>\n<p>This is a foundational engineering role on a small, high-impact team. You will take projects from proof-of-concept to production, work closely with investigators to understand their needs, and help scale what may become a multi-person collections function.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build automated detection systems that use disparate signals to identify abusive behaviour.</li>\n<li>Take systems from idea to proof-of-concept to production-grade with appropriate monitoring, documentation, and maintenance processes</li>\n<li>Develop and maintain YARA rule infrastructure, including tools for writing, validating, and testing rules against real data</li>\n<li>Create integrations with external threat intelligence platforms (e.g. VirusTotal, Censys, Urlscan) via MCP servers to enable multi-source correlation during investigations</li>\n<li>Build data pipelines that ingest intelligence from RSS feeds, CTI news sources, and partner sharing, using Claude to extract TTPs and generate targeted hunting queries</li>\n<li>Develop behavioural analytics capabilities using DBT-based frameworks and create searchable audit logging infrastructure</li>\n<li>Establish feedback loops with investigators to tune detection systems and reduce false positives</li>\n<li>Scrape and normalise data from external sources to feed threat detection and enrichment workflows</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have strong coding proficiency in Python and SQL for building detection logic, data pipelines, and automation</li>\n<li>Have experience with data pipeline orchestration tools (Airflow, DBT, or similar)</li>\n<li>Have familiarity with threat intelligence concepts including IOCs, YARA rules, and threat correlation techniques</li>\n<li>Have experience integrating external APIs and building data ingestion systems</li>\n<li>Can translate investigator needs and workflows into technical requirements</li>\n<li>Are comfortable building v0 systems and iterating based on user feedback</li>\n<li>Have strong communication skills for working closely with non-engineering stakeholders</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Experience with threat intelligence sharing frameworks (e.g. MISP, STIX/TAXII)</li>\n<li>Background in cyber threat intelligence, security operations, or abuse detection</li>\n<li>Experience building MCP servers or similar tool integrations for AI systems</li>\n<li>Familiarity with web scraping and data extraction at scale</li>\n<li>Experience with behavioural analytics or anomaly detection systems</li>\n<li>Understanding of LLM capabilities and how to leverage them for automation</li>\n<li>A Top Secret Clearance</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.** Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</strong></p>\n<p><strong>Your safety matters to us.** To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics as it does with computer science.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_18528dac-ae1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5074937008","x-work-arrangement":"remote","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$300,000 - $320,000 USD","x-skills-required":["Python","SQL","Airflow","DBT","YARA rules","Threat intelligence","API integration","Data ingestion","Web scraping","Data extraction"],"x-skills-preferred":["MISP","STIX/TAXII","Cyber threat intelligence","Security operations","Abuse detection","LLM capabilities","Automation"],"datePosted":"2026-03-08T13:53:41.541Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, SQL, Airflow, DBT, YARA rules, Threat intelligence, API integration, Data ingestion, Web scraping, Data extraction, MISP, STIX/TAXII, Cyber threat intelligence, Security operations, Abuse detection, LLM capabilities, Automation","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":320000,"unitText":"YEAR"}}}]}