{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/detection-engineering"},"x-facet":{"type":"skill","slug":"detection-engineering","display":"Detection Engineering","count":17},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_740da2af-174"},"title":"Security Engineer, Detection & Response","description":"<p>We are seeking a Senior Security Engineer with a specialty in Detection and Incident Response to join our Security Engineering team. This role sits at the intersection of security operations and software engineering, requiring you to investigate incidents and build the systems that detect, contain, and prevent them.</p>\n<p>You will design and ship high-precision detections across cloud services and enterprise SaaS, develop automation that shortens response timelines, and mature the telemetry pipelines that make it all possible. Your ability to write production-quality code is just as important as your ability to triage an alert.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Engineer, test, and deploy detection logic across cloud and enterprise environments, treating detections as software with version control, peer review, and measurable performance.</li>\n</ul>\n<ul>\n<li>Build and maintain incident response automation, runbooks, and tooling that reduce containment timelines without sacrificing developer velocity.</li>\n</ul>\n<ul>\n<li>Mature telemetry pipelines through improved schema design, normalization, enrichment, and quality checks that reduce false positives and increase signal fidelity.</li>\n</ul>\n<ul>\n<li>Perform digital incident investigations to identify and contain potential security breaches.</li>\n</ul>\n<ul>\n<li>Conduct digital forensics and malware analysis to understand attack vectors and adversary methodologies.</li>\n</ul>\n<ul>\n<li>Integrate alerting with messaging and ticketing systems to enable fast, traceable response workflows.</li>\n</ul>\n<ul>\n<li>Partner cross-functionally with IT, security, and engineering teams to harden identity and access patterns, close logging and forensics gaps, and implement maintainable guardrails that scale with the organisation.</li>\n</ul>\n<ul>\n<li>Utilize threat intelligence platforms to improve hunting, detection, and response workflows.</li>\n</ul>\n<ul>\n<li>Clearly explain the significance and impact of incidents, providing actionable recommendations to both technical and non-technical stakeholders.</li>\n</ul>\n<p>Ideal Candidate:</p>\n<ul>\n<li>5+ years of experience in Detection Engineering, Incident Response, or Security Operations, with a strong emphasis on building and shipping security tooling and automation.</li>\n</ul>\n<ul>\n<li>Proficiency in at least one programming language (e.g., Python, Go) and comfort writing production-grade code , not just scripts.</li>\n</ul>\n<ul>\n<li>Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments.</li>\n</ul>\n<ul>\n<li>Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically.</li>\n</ul>\n<ul>\n<li>Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs.</li>\n</ul>\n<ul>\n<li>Familiarity with digital forensics tools and malware analysis techniques.</li>\n</ul>\n<ul>\n<li>Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate.</li>\n</ul>\n<ul>\n<li>Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows.</li>\n</ul>\n<ul>\n<li>Strong communication skills, with the ability to translate complex security findings into clear business impact.</li>\n</ul>\n<ul>\n<li>Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus.</li>\n</ul>\n<p>Compensation packages at Scale for eligible roles include base salary, equity, and benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position, determined by work location and additional factors, including job-related skills, experience, interview performance, and relevant education or training. Scale employees in eligible roles are also granted equity based compensation, subject to Board of Director approval. Your recruiter can share more about the specific salary range for your preferred location during the hiring process, and confirm whether the hired role will be eligible for equity grant. You’ll also receive benefits including, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits, a learning and development stipend, and generous PTO. Additionally, this role may be eligible for additional benefits such as a commuter stipend.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_740da2af-174","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Scale","sameAs":"https://scale.com/","logo":"https://logos.yubhub.co/scale.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/scaleai/jobs/4684073005","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$237,600-$297,000 USD","x-skills-required":["Detection Engineering","Incident Response","Security Operations","Cloud Services","Enterprise SaaS","Automation","Telemetry Pipelines","Digital Forensics","Malware Analysis","Threat Intelligence Platforms","SIEM","EDR","SOAR","Cloud-Native Environments","Programming Languages","Python","Go"],"x-skills-preferred":["Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments","Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically","Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs","Familiarity with digital forensics tools and malware analysis techniques","Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate","Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows","Strong communication skills, with the ability to translate complex security findings into clear business impact","Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)"],"datePosted":"2026-04-18T16:00:14.303Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, NY; San Francisco, CA; Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Detection Engineering, Incident Response, Security Operations, Cloud Services, Enterprise SaaS, Automation, Telemetry Pipelines, Digital Forensics, Malware Analysis, Threat Intelligence Platforms, SIEM, EDR, SOAR, Cloud-Native Environments, Programming Languages, Python, Go, Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments, Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically, Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs, Familiarity with digital forensics tools and malware analysis techniques, Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate, Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows, Strong communication skills, with the ability to translate complex security findings into clear business impact, Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":237600,"maxValue":297000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c2aaf7ac-804"},"title":"Security Engineer - Threat Detection","description":"<p><strong>Job Description</strong></p>\n<p>You will design, build, and maintain detections that identify malicious activity across Stripe&#39;s infrastructure, applications, and cloud environments.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle</li>\n<li>Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry</li>\n<li>Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls</li>\n<li>Perform malware analysis and reverse engineering to extract indicators and inform detection strategies</li>\n<li>Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS</li>\n<li>Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic</li>\n<li>Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises</li>\n<li>Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment</li>\n<li>Map detection coverage to MITRE ATT&amp;CK, identifying and prioritizing gaps across key attack surfaces</li>\n<li>Lead projects, mentor teammates, and champion quality standards within the team</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>5+ years of experience in detection engineering, threat hunting, or security operations</li>\n<li>Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)</li>\n<li>Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration</li>\n<li>Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities</li>\n<li>Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)</li>\n<li>Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources</li>\n<li>Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)</li>\n<li>Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences</li>\n<li>Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats</li>\n</ul>\n<p><strong>Preferred Qualifications</strong></p>\n<ul>\n<li>Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments</li>\n<li>Background in malware analysis, reverse engineering, or threat research</li>\n<li>Experience with purple team operations , collaborating with offensive security to validate detections</li>\n<li>Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis</li>\n<li>Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows</li>\n<li>Interest in agentic automation , using LLMs to augment hunting, tuning, or triage</li>\n<li>Experience with detection validation tools (Atomic Red Team, ATT&amp;CK Evaluations)</li>\n<li>Contributions to open-source detection content, research, or conference presentations</li>\n<li>Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c2aaf7ac-804","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Stripe","sameAs":"https://stripe.com/","logo":"https://logos.yubhub.co/stripe.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/stripe/jobs/7827230","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["detection engineering","threat hunting","security operations","SIEM platforms","adversary tradecraft","network-based detections","endpoint-based detections","telemetry analysis","detection/query languages","programming","communication skills"],"x-skills-preferred":["fintech","financial services","malware analysis","reverse engineering","purple team operations","big data platforms","AI/LLM-assisted development tools","agentic automation","detection validation tools","open-source detection content","relevant certifications"],"datePosted":"2026-04-18T15:53:27.161Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Ireland"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"detection engineering, threat hunting, security operations, SIEM platforms, adversary tradecraft, network-based detections, endpoint-based detections, telemetry analysis, detection/query languages, programming, communication skills, fintech, financial services, malware analysis, reverse engineering, purple team operations, big data platforms, AI/LLM-assisted development tools, agentic automation, detection validation tools, open-source detection content, relevant certifications"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_62900fcd-562"},"title":"Security Engineer - Offensive Security","description":"<p>As an Offensive Security Engineer on the Proactive Threat team at Stripe, you will simulate the tactics, techniques, and procedures (TTPs) of real-world adversaries to uncover security risks across Stripe&#39;s products and infrastructure.</p>\n<p>You&#39;ll conduct hands-on penetration testing, lead red team engagements, and collaborate with blue team counterparts to validate and improve detection and response capabilities. Your work will directly influence how Stripe builds, ships, and secures financial infrastructure used by millions of businesses worldwide.</p>\n<p>Responsibilities:</p>\n<p>Conduct comprehensive penetration tests across web applications, APIs, cloud environments (AWS/GCP/Azure), mobile applications, and internal infrastructure.</p>\n<p>Plan and execute red team engagements that emulate the TTPs of cyber and criminal threat actors targeting financial services, including initial access, lateral movement, persistence, and data exfiltration scenarios.</p>\n<p>Perform assumed-breach and objective-based assessments to test detection and response capabilities in coordination with defensive teams.</p>\n<p>Partner with detection engineering, threat intelligence, and incident response teams to validate security controls, identify coverage gaps, and improve detection fidelity.</p>\n<p>Contribute adversary tradecraft insights to inform detection rule development, threat hunting hypotheses, and incident response playbooks.</p>\n<p>Support incident investigations by providing offensive expertise, log analysis, and root cause analysis when required.</p>\n<p>Design, develop, and maintain custom offensive tools, scripts, and automation frameworks to enhance assessment efficiency and coverage.</p>\n<p>Build internal platforms and workflows that enable scalable, repeatable offensive operations.</p>\n<p>Contribute to internal security tooling repositories and champion engineering best practices within the team.</p>\n<p>Automate repetitive testing tasks, payload generation, and reporting workflows using modern development practices.</p>\n<p>Produce clear, actionable reports that communicate technical findings, business risk, and remediation guidance to both technical and non-technical stakeholders.</p>\n<p>Act as a subject-matter expert and primary point of contact for stakeholder teams engaged in offensive security programs and Stripe-wide security initiatives.</p>\n<p>Lead offensive security projects end-to-end, mentor junior team members, and foster a culture of continuous learning and knowledge sharing.</p>\n<p>Stay current with emerging threats, vulnerabilities, and attack techniques; share research internally and contribute to the broader security community.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_62900fcd-562","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Stripe","sameAs":"https://stripe.com/","logo":"https://logos.yubhub.co/stripe.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/stripe/jobs/7820898","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Python","Go","Web application security","Cloud platforms (AWS, Azure, or GCP)","Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound)","Adversary tradecraft and frameworks (MITRE ATT&CK)","Excellent written and verbal communication skills"],"x-skills-preferred":["Experience conducting offensive security in fintech, financial services, or other highly regulated environments","Background in vulnerability research, exploit development, or CVE discovery","Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations)","Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support","Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows"],"datePosted":"2026-04-18T15:51:01.913Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Ireland"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Web application security, Cloud platforms (AWS, Azure, or GCP), Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound), Adversary tradecraft and frameworks (MITRE ATT&CK), Excellent written and verbal communication skills, Experience conducting offensive security in fintech, financial services, or other highly regulated environments, Background in vulnerability research, exploit development, or CVE discovery, Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations), Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support, Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_753e9465-6a0"},"title":"Senior Security Software Engineer, eBPF & Security Sensors","description":"<p>We&#39;re seeking an exceptional engineer to join our Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Build an AI-powered platform responsible for all aspects of detection and response capabilities, from detection development to incident response</li>\n<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>\n<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>\n<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>\n<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>\n<li>Mentor engineers and contribute to hiring and growth of the Security team</li>\n<li>Participate in on-call rotations</li>\n</ul>\n<p>You may be a good fit if you</p>\n<ul>\n<li>Have 7+ years of experience in software engineering with a focus on security, infrastructure, or data pipelines</li>\n<li>Have a track record of building and maintaining internal developer tools or security platforms</li>\n<li>Have a strong understanding of data processing pipelines and experience working with large-scale logging systems</li>\n<li>Have experience with test-driven software development or CI/CD (a plus for direct experience with detection-as-code workflows)</li>\n<li>Have experience with infrastructure-as-code (Terraform, CloudFormation)</li>\n<li>Have experience with query optimization for large datasets</li>\n<li>Have experience building stable and scalable services on cloud infrastructure and serverless architectures</li>\n<li>Can write maintainable and secure code in Python</li>\n<li>Have experience working with security teams and translating requirements into technical solutions</li>\n<li>Can lead technical projects with minimal guidance</li>\n<li>Have a track record of driving engineering excellence through high standards, constructive code reviews, and mentorship</li>\n<li>Can lead cross-functional security initiatives and navigate complex organizational dynamics</li>\n<li>Have strong communication skills with the ability to translate technical concepts effectively across all organizational levels</li>\n<li>Have demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>\n<li>Have strong systems thinking with the ability to identify and mitigate risks in complex environments</li>\n</ul>\n<p>Strong candidates may also have experience with</p>\n<ul>\n<li>Building security tooling from the ground up</li>\n<li>Implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>\n<li>Detection engineering or security operations</li>\n<li>SOAR platform or automation development</li>\n<li>Data lake or database architecture</li>\n<li>API design and internal platform creation</li>\n<li>Applying ML/AI to security problems</li>\n<li>Scaling security operations in a high-growth environment</li>\n</ul>\n<p>Logistics</p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_753e9465-6a0","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5108521008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["software engineering","security","infrastructure","data pipelines","ML-powered detection systems","Claude","Python","test-driven software development","CI/CD","infrastructure-as-code","query optimization","cloud infrastructure","serverless architectures"],"x-skills-preferred":["building security tooling","implementing security monitoring solutions","detection engineering","SOAR platform","automation development","data lake","database architecture","API design","internal platform creation","applying ML/AI to security problems","scaling security operations"],"datePosted":"2026-04-18T15:49:05.488Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich, CH"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, security, infrastructure, data pipelines, ML-powered detection systems, Claude, Python, test-driven software development, CI/CD, infrastructure-as-code, query optimization, cloud infrastructure, serverless architectures, building security tooling, implementing security monitoring solutions, detection engineering, SOAR platform, automation development, data lake, database architecture, API design, internal platform creation, applying ML/AI to security problems, scaling security operations"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_dcc14ac2-f76"},"title":"Security Software Engineer, Detection & Response Platform","description":"<p>weeted job ad in markdown with  line breaks</p>\n<p><strong>About the role</strong></p>\n<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build AI-powered platform responsible for all aspects of D&amp;R capabilities from detection development to incident response</li>\n<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>\n<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>\n<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>\n<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>\n<li>Mentor engineers and contribute to hiring and growth of the Security team</li>\n<li>Participate in on-call shifts</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>7+ years of experience in software engineering with a focus on security, infrastructure and/or data pipelines</li>\n<li>Track record of building and maintaining internal developer tools or security platforms</li>\n<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>\n</ul>\n<p><strong>Strong candidates may also have experience with:</strong></p>\n<ul>\n<li>Experience building security tooling from the ground up</li>\n<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>\n<li>Background in detection engineering or security operations</li>\n<li>SOAR platform/automation development</li>\n<li>Data lake / Database architecture</li>\n<li>API design and internal platform creation</li>\n<li>Track record of applying ML/AI to security problems</li>\n<li>Experience scaling security operations in a high-growth environment</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_dcc14ac2-f76","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4595463008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000-$405,000 USD","x-skills-required":["Python","Data pipelines","ML-powered detection systems","Security telemetry","Claude","Security operations","Incident response"],"x-skills-preferred":["Experience building security tooling from the ground up","Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)","Background in detection engineering or security operations","SOAR platform/automation development","Data lake / Database architecture","API design and internal platform creation","Track record of applying ML/AI to security problems","Experience scaling security operations in a high-growth environment"],"datePosted":"2026-04-18T15:47:49.797Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Data pipelines, ML-powered detection systems, Security telemetry, Claude, Security operations, Incident response, Experience building security tooling from the ground up, Background in implementing security monitoring solutions (SIEM, log aggregation, EDR), Background in detection engineering or security operations, SOAR platform/automation development, Data lake / Database architecture, API design and internal platform creation, Track record of applying ML/AI to security problems, Experience scaling security operations in a high-growth environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f3f72cf8-865"},"title":"Security Engineer, Offensive Security","description":"<p>We are seeking a highly skilled Security Engineer, Offensive Security to join our team. As a member of our Security Engineering team, you will play a key role in safeguarding our AI systems and maintaining the trust of our users and society at large.</p>\n<p>Key Responsibilities: Conduct red and purple team engagements simulating advanced threat actors across our cloud infrastructure, endpoints, and bare metal deployments. Penetration test specific, high-value deployments. Contribute to AI-assisted security testing tooling and workflows. Work cross-functionally with other security and engineering teams, particularly on AI-specific attack scenarios. Document and present findings to technical and executive audiences, translating attack narratives into actionable risk insights that inform security roadmaps.</p>\n<p>Requirements: 5+ years of hands-on experience in red teaming and offensive security operations. Deep expertise in at least two of: macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines. Track record of discovering novel attack vectors and chaining vulnerabilities creatively. Experience conducting adversarial simulations against well-defended environments. Strong engineering skills (Python, Go, or similar). Ability to write clear findings that drive action, helping teams understand risk and prioritize fixes. Collaborative approach, working in close collaboration with the blue team.</p>\n<p>Preferred Qualifications: Prior work at organizations with state actor threat models. Interest in AI safety and how security engineering contributes to responsible AI developments. Background testing AI/ML systems or agentic workflows. Familiarity with detection engineering and SIEM/EDR platforms from the defensive side. Experience with data center security or hardware-based attacks.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f3f72cf8-865","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5105509008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$300,000-$320,000 USD","x-skills-required":["macOS security","Linux Security","Cloud security (GCP/AWS/Azure)","Kubernetes","CI/CD pipelines","Python","Go"],"x-skills-preferred":["AI-assisted security testing tooling","Detection engineering","SIEM/EDR platforms","Data center security","Hardware-based attacks"],"datePosted":"2026-04-18T15:46:26.256Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly (Travel-Required) | San Francisco, CA | Seattle, WA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines, Python, Go, AI-assisted security testing tooling, Detection engineering, SIEM/EDR platforms, Data center security, Hardware-based attacks","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":320000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_eda84ece-394"},"title":"Security Engineer, Detection & Response","description":"<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams.</p>\n<p>In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams. You will lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic&#39;s technology stack.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Developing and deploying novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>\n<li>Creating and optimizing detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>\n<li>Reviewing Incident Response metrics and procedures and driving continuous improvement</li>\n<li>Working cross-functionally with other security and engineering teams</li>\n</ul>\n<p>Note: This position will require participation in an on-call rotation.</p>\n<p>To be successful in this role, you will need:</p>\n<ul>\n<li>3+ years of software engineering experience, with security experience a plus</li>\n<li>5+ years of detection engineering, incident response, or threat hunting experience</li>\n<li>A solid understanding of cloud environments and operations</li>\n<li>Experience working with engineering teams in a SaaS environment</li>\n<li>Exceptional communication and collaboration skills</li>\n<li>An ability to lead projects with little guidance</li>\n<li>The ability to pick up new languages and technologies quickly</li>\n<li>Experience handling security incidents and investigating anomalies as part of a team</li>\n<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>\n</ul>\n<p>Strong candidates may also have experience with:</p>\n<ul>\n<li>Performing security operations or investigations involving large-scale Kubernetes environments</li>\n<li>A high level of proficiency in Python and query languages such as SQL</li>\n<li>Analyzing attack behavior and prototyping high-quality detections</li>\n<li>Threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>\n<li>Contributing to a high-growth startup environment</li>\n</ul>\n<p>If you&#39;re interested in this role, please submit an application, even if you don&#39;t believe you meet every single qualification. We encourage diversity and inclusion in our hiring process.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_eda84ece-394","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4982193008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$300,000-$405,000 USD","x-skills-required":["software engineering","security experience","detection engineering","incident response","threat hunting","cloud environments","operations","EDR","SIEM","SOAR"],"x-skills-preferred":["Python","SQL","Kubernetes","Large Language Models","playbooks","workflows","continuous improvement","collaboration","leadership","new languages and technologies"],"datePosted":"2026-04-18T15:45:14.042Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, EDR, SIEM, SOAR, Python, SQL, Kubernetes, Large Language Models, playbooks, workflows, continuous improvement, collaboration, leadership, new languages and technologies","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_85f1ada0-78d"},"title":"Security Engineer","description":"<p>We&#39;re seeking a Security Engineer at the senior-level or above on our Security Operations team with strong detection engineering experience. You&#39;ll design and develop high-fidelity detection content, build and operate the data pipelines that power our security operations, develop automation playbooks that accelerate response, and work across a uniquely diverse telemetry landscape spanning cloud infrastructure, embedded vessel platforms, corporate systems, and operational technology.</p>\n<p>This role is heavily weighted toward detection engineering. You should think in terms of adversary behaviour and telemetry coverage, not just alert triage. You&#39;ll own detections end-to-end: from identifying gaps in coverage, through designing and testing detection logic, to tuning and validating in production.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li><p>Design, build, test, and tune high-fidelity detection rules and analytic queries across endpoint, cloud, network, identity, and DLP telemetry sources</p>\n</li>\n<li><p>Develop and maintain detection content using detection-as-code practices including version-controlled logic, automated testing, and CI/CD deployment</p>\n</li>\n<li><p>Map detection coverage to MITRE ATT&amp;CK, identify gaps, and prioritise new detection development based on threat intelligence and business risk</p>\n</li>\n<li><p>Engineer correlation rules, behavioural analytics, and anomaly-based detections that minimise false positives while surfacing real adversary tradecraft</p>\n</li>\n<li><p>Own the detection lifecycle from initial development through production tuning, performance monitoring, and retirement</p>\n</li>\n<li><p>Build and operate pipelines to ingest, normalise, enrich, and manage security telemetry at scale across diverse data sources, using Terraform and infrastructure-as-code practices to deploy and maintain logging and detection infrastructure</p>\n</li>\n<li><p>Design and maintain log collection, parsing, and enrichment configurations that ensure the right telemetry is available at the right fidelity for detection and investigation</p>\n</li>\n<li><p>Evaluate and onboard new telemetry sources as Saronic&#39;s infrastructure and threat landscape evolve</p>\n</li>\n<li><p>Monitor pipeline health, data quality, and ingestion reliability to ensure detections operate on complete and accurate data</p>\n</li>\n<li><p>Develop and manage automated response playbooks in SOAR platforms to accelerate containment and reduce analyst toil</p>\n</li>\n<li><p>Build automation that enriches alerts with contextual data, reducing investigation time and improving analyst decision-making</p>\n</li>\n<li><p>Support incident response efforts and translate lessons learned into improved detections and playbooks</p>\n</li>\n<li><p>Partner with SOC analysts, Cloud Security, Product Security, and IT teams to close visibility and detection gaps across environments</p>\n</li>\n<li><p>Collaborate with threat intelligence to ensure detection engineering is informed by current adversary TTPs relevant to defence, maritime, and autonomous systems</p>\n</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li><p>3+ years of hands-on experience in detection engineering, security operations, security automation, or a closely related security engineering role</p>\n</li>\n<li><p>Demonstrated experience designing, testing, and tuning detection rules and analytic queries across production security telemetry (endpoint, cloud, network, identity, or DLP)</p>\n</li>\n<li><p>Hands-on experience with SIEM platforms and proficiency with query languages such as SPL, KQL, or equivalent</p>\n</li>\n<li><p>Experience building and operating security data pipelines, including log ingestion, normalisation, enrichment, and data quality management</p>\n</li>\n<li><p>Understanding of data engineering concepts including ETL pipelines, data modelling, schema design, and indexing as applied to security telemetry</p>\n</li>\n<li><p>Hands-on coding experience in Python, PowerShell, Go, or Rust for security automation, detection tooling, or pipeline development, and familiarity with Terraform for managing detection and logging infrastructure as code</p>\n</li>\n<li><p>Understanding of MITRE ATT&amp;CK framework and its application to detection coverage and gap analysis</p>\n</li>\n<li><p>Ability to obtain and maintain a security clearance</p>\n</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li><p>Experience in defence, aerospace, robotics, autonomy, or other high-assurance environments</p>\n</li>\n<li><p>Experience with EDR platforms including custom detection rule creation and telemetry analysis</p>\n</li>\n<li><p>Experience with cloud-native detection in AWS and Microsoft 365/Azure</p>\n</li>\n<li><p>Experience using Terraform to deploy and manage security monitoring infrastructure, log pipeline components, or cloud-native security service configurations</p>\n</li>\n<li><p>Hands-on experience with incident response, threat hunting, or adversary emulation</p>\n</li>\n<li><p>Exposure to embedded Linux, operational technology, or ICS telemetry and detection</p>\n</li>\n<li><p>Familiarity with NIST SP 800-171, NIST SP 800-53, or CMMC and their logging and monitoring requirements</p>\n</li>\n<li><p>Relevant certifications such as GCIH, GCIA, GCDA, GSOM, OSDA, or OSCP</p>\n</li>\n</ul>\n<p>Additional Information:</p>\n<ul>\n<li><p>Benefits: Medical Insurance, Dental and Vision Insurance, Time Off, Parental Leave, Competitive Salary, Retirement Plan, Stock Options, Life and Disability Insurance, Pet Insurance</p>\n</li>\n<li><p>This role requires access to export-controlled information or items that require &#39;U.S. Person&#39; status.</p>\n</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_85f1ada0-78d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Saronic Technologies","sameAs":"https://www.saronictechnologies.com/","logo":"https://logos.yubhub.co/saronictechnologies.com.png"},"x-apply-url":"https://jobs.lever.co/saronic/79424778-76c1-41c6-8385-cba5f6ddc50e","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["detection engineering","security operations","security automation","SIEM platforms","query languages","data engineering","ETL pipelines","data modelling","schema design","indexing","Python","PowerShell","Go","Rust","Terraform","MITRE ATT&CK framework","security clearance"],"x-skills-preferred":["EDR platforms","cloud-native detection","incident response","threat hunting","adversary emulation","embedded Linux","operational technology","ICS telemetry","NIST SP 800-171","NIST SP 800-53","CMMC","GCIH","GCIA","GCDA","GSOM","OSDA","OSCP"],"datePosted":"2026-04-17T12:56:57.672Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"detection engineering, security operations, security automation, SIEM platforms, query languages, data engineering, ETL pipelines, data modelling, schema design, indexing, Python, PowerShell, Go, Rust, Terraform, MITRE ATT&CK framework, security clearance, EDR platforms, cloud-native detection, incident response, threat hunting, adversary emulation, embedded Linux, operational technology, ICS telemetry, NIST SP 800-171, NIST SP 800-53, CMMC, GCIH, GCIA, GCDA, GSOM, OSDA, OSCP"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9f15a44c-cc5"},"title":"Team Lead, SOC (Security Operations Center)","description":"<p>We are looking for a SOC (Security Operations Center) Team Lead to build and lead our SOC function end-to-end. You will own vulnerability management, alerting and detection engineering, incident response, and the security tooling/infrastructure that enable these missions.</p>\n<p>Key responsibilities include:</p>\n<p>• Leading and growing the team: Manage the SOC team, shape the roadmap, delegate effectively, and mentor engineers.</p>\n<p>• Driving operations: Define vulnerability management processes and coordinate stakeholders for timely remediation. Design, implement, and operate SIEM/SOAR infrastructure (ingestion, normalization, correlation, alerting, playbooks). Specify logging requirements across our main stacks and centralize telemetry in the SIEM. Develop and tune correlation rules and detections; manage CTI intake and operationalize intel. Run continuous improvement to reduce false positives and raise signal quality. Establish crisp procedures for alert triage, escalation, and incident handling &amp; investigation. Lead incident communications with stakeholders and ensure thorough documentation.</p>\n<p>• Engineering and enablement: Contribute to security tooling, automation, and integrations that speed up detection/response. Produce guidance and documentation for product/infra teams; contribute to compliance in the SOC perimeter.</p>\n<p>• Exercises and assurance: Coordinate red/blue exercises, post-mortems, and targeted audits to validate coverage and resilience.</p>\n<p>The ideal candidate will have 8+ years of experience leading SOC/CSIRT functions, with proven leadership. Hands-on experience with SIEM (e.g., Elastic Security, Sekoia, Splunk) and SOAR platforms is required. Strong experience in vulnerability management (e.g., DefectDojo, Dependency-Track) and remediation workflows is also necessary. Solid grasp of the cyber kill chain / attack lifecycle, detection engineering, and log source coverage is essential. Excellent problem-solving and communication skills are required, as well as the ability to operate in a fast-paced startup environment.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9f15a44c-cc5","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Mistral AI","sameAs":"https://mistral.ai","logo":"https://logos.yubhub.co/mistral.ai.png"},"x-apply-url":"https://jobs.lever.co/mistral/e0b55281-55c6-4143-9bf8-e4418c667f9f","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["SIEM","SOAR","vulnerability management","incident response","security tooling","automation","integrations","cyber kill chain","attack lifecycle","detection engineering","log source coverage"],"x-skills-preferred":["scripting","Python","Bash","modern infra/app stacks","EDR/IDS/IPS","compliance frameworks","security audits/pen-tests"],"datePosted":"2026-04-17T12:47:13.692Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Paris"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SIEM, SOAR, vulnerability management, incident response, security tooling, automation, integrations, cyber kill chain, attack lifecycle, detection engineering, log source coverage, scripting, Python, Bash, modern infra/app stacks, EDR/IDS/IPS, compliance frameworks, security audits/pen-tests"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3e75d44f-c7f"},"title":"Team Lead, SOC (Security Operations Center)","description":"<p>About this role</p>\n<p>We are looking for a SOC (Security Operations Center) Team Lead to build and lead our SOC function end-to-end. You will own vulnerability management, alerting and detection engineering, incident response, and the security tooling/infrastructure that enable these missions. You’ll define processes, collaborate closely with Product, Infra and IT, and continuously improve detection quality and response time.</p>\n<p>Key responsibilities</p>\n<p>• Lead &amp; grow the team: Manage the SOC team, shape the roadmap, delegate effectively, and mentor engineers.</p>\n<p>• Drive operations:\n    - Define vulnerability management processes and coordinate stakeholders for timely remediation.\n    - Design, implement, and operate SIEM/SOAR infrastructure (ingestion, normalization, correlation, alerting, playbooks).\n    - Specify logging requirements across our main stacks and centralize telemetry in the SIEM.\n    - Develop and tune correlation rules and detections; manage CTI intake and operationalize intel.\n    - Run continuous improvement to reduce false positives and raise signal quality.\n    - Establish crisp procedures for alert triage, escalation, and incident handling &amp; investigation.\n    - Lead incident communications with stakeholders and ensure thorough documentation.</p>\n<p>• Engineering &amp; enablement:\n    - Contribute to security tooling, automation, and integrations that speed up detection/response.\n    - Produce guidance and documentation for product/infra teams; contribute to compliance in the SOC perimeter.</p>\n<p>• Exercises &amp; assurance:\n    - Coordinate red/blue exercises, post-mortems, and targeted audits to validate coverage and resilience.</p>\n<p>Requirements</p>\n<p>• 8+ years of experience leading SOC/CSIRT functions, with proven leadership.</p>\n<p>• Hands-on with SIEM (e.g., Elastic Security, Sekoia, Splunk) and SOAR platforms.</p>\n<p>• Strong experience in vulnerability management (e.g., DefectDojo, Dependency-Track) and remediation workflows.</p>\n<p>• Solid grasp of the cyber kill chain / attack lifecycle, detection engineering, and log source coverage.</p>\n<p>• Excellent problem-solving and communication skills; able to operate in a fast-paced startup environment.</p>\n<p>• Builder mindset: pragmatic, automation-oriented, comfortable with ambiguity and ownership.</p>\n<p>Nice to have</p>\n<p>• Bring scripting/automation skills (e.g., Python, Bash) for data pipelines/playbooks.</p>\n<p>• Know modern infra/app stacks (Linux, containers, Kubernetes, cloud), EDR/IDS/IPS.</p>\n<p>• Have exposure to compliance frameworks (ISO 27001, SOC 2) and security audits/pen-tests.</p>\n<p>• Have run purple team exercises and measurable detection-coverage programs.</p>\n<p>• Are comfortable partnering with Product/Platform teams and influencing roadmaps.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3e75d44f-c7f","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Mistral AI","sameAs":"https://mistral.ai"},"x-apply-url":"https://jobs.lever.co/mistral/e0b55281-55c6-4143-9bf8-e4418c667f9f","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["SIEM","SOAR","vulnerability management","remediation workflows","cyber kill chain","detection engineering","log source coverage","problem-solving","communication skills"],"x-skills-preferred":["scripting/automation skills","modern infra/app stacks","EDR/IDS/IPS","compliance frameworks","security audits/pen-tests","purple team exercises"],"datePosted":"2026-03-10T11:33:18.520Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Paris"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SIEM, SOAR, vulnerability management, remediation workflows, cyber kill chain, detection engineering, log source coverage, problem-solving, communication skills, scripting/automation skills, modern infra/app stacks, EDR/IDS/IPS, compliance frameworks, security audits/pen-tests, purple team exercises"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_723d3153-72d"},"title":"Security Engineer, Detection & Response","description":"<p><strong>About the role</strong></p>\n<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams. In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic’s technology stack</li>\n<li>Develop and deploy novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>\n<li>Create and optimise detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>\n<li>Review Incident Response metrics and procedures and drive continuous improvement</li>\n<li>Work cross functionally with other security and engineering teams</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>3+ years of software engineering experience, with security experience a plus and/or</li>\n<li>5+ years of detection engineering, incident response, or threat hunting experience</li>\n<li>A solid understanding of cloud environments and operations</li>\n<li>Experience working with engineering teams in a SaaS environment</li>\n<li>Exceptional communication and collaboration skills</li>\n<li>An ability to lead projects with little guidance</li>\n<li>The ability to pick up new languages and technologies quickly</li>\n<li>Experience handling security incidents and investigating anomalies as part of a team</li>\n<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>\n</ul>\n<p><strong>Strong candidates may also have experience with:</strong></p>\n<ul>\n<li>Experience performing security operations or investigations involving large-scale Kubernetes environments</li>\n<li>A high level of proficiency in Python and query languages such as SQL</li>\n<li>Experience analysing attack behaviour and prototyping high-quality detections</li>\n<li>Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>\n<li>Experience contributing to a high growth startup environment</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_723d3153-72d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4982193008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$300,000 - $405,000 USD","x-skills-required":["software engineering","security experience","detection engineering","incident response","threat hunting","cloud environments","operations","engineering teams","SaaS environment","communication skills","project leadership","new languages and technologies","security incidents","anomalies","EDR","SIEM","SOAR","security tools"],"x-skills-preferred":["Python","SQL","threat intelligence","malware analysis","infrastructure as code","detection engineering","forensics","Kubernetes environments","high growth startup environment"],"datePosted":"2026-03-08T13:58:41.409Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, engineering teams, SaaS environment, communication skills, project leadership, new languages and technologies, security incidents, anomalies, EDR, SIEM, SOAR, security tools, Python, SQL, threat intelligence, malware analysis, infrastructure as code, detection engineering, forensics, Kubernetes environments, high growth startup environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7cdbf387-4bf"},"title":"Security Engineer, Offensive Security","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Team</strong></p>\n<p>The Security Engineering team&#39;s mission is to safeguard our AI systems and maintain the trust of our users and society at large. Whether we&#39;re developing critical security infrastructure, building secure development practices, or partnering with our research and product teams, we are committed to operating as a world-class security organisation and keeping the safety and trust of our users at the forefront of everything we do.</p>\n<p><strong>What You&#39;ll Do:</strong></p>\n<ul>\n<li>Conduct red and purple team engagements simulating advanced threat actors across our cloud infrastructure, endpoints and bare metal deployments.</li>\n<li>Penetration test specific, high value deployments.</li>\n<li>Contribute to AI-assisted security testing tooling and workflows.</li>\n<li>Work cross functionally with other security and engineering teams, particularly on AI-specific attack scenarios.</li>\n<li>Document and present findings to technical and executive audiences, translating attack narratives into actionable risk insights that inform security roadmaps.</li>\n</ul>\n<p><strong>Who You Are:</strong></p>\n<ul>\n<li>5+ years of hands-on experience in red teaming and offensive security operations.</li>\n<li>Deep expertise in at least two of: macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines.</li>\n<li>Track record of discovering novel attack vectors and chaining vulnerabilities creatively.</li>\n<li>Experience conducting adversarial simulations against well-defended environments.</li>\n<li>Strong engineering skills (Python, Go, or similar).</li>\n<li>Ability to write clear findings that drive action, helping teams understand risk and prioritise fixes.</li>\n<li>Collaborative approach, working in close collaboration with the blue team.</li>\n</ul>\n<p><strong>Strong candidates may also have experience with:</strong></p>\n<ul>\n<li>Prior work at organisations with state actor threat models.</li>\n<li>Interest in AI safety and how security engineering contributes to responsible AI developments.</li>\n<li>Background testing AI/ML systems or agentic workflows.</li>\n<li>Familiarity with detection engineering and SIEM/EDR platforms from the defensive side.</li>\n<li>Experience with data centre security or hardware-based attacks.</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional relocation assistance, and a comprehensive benefits package that includes medical, dental, and vision insurance, 401(k) matching, and paid time off.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7cdbf387-4bf","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5105509008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$300,000 - $320,000USD","x-skills-required":["macOS security","Linux Security","Cloud security (GCP/AWS/Azure)","Kubernetes","CI/CD pipelines","Python","Go"],"x-skills-preferred":["AI safety","Detection engineering","SIEM/EDR platforms","Data centre security","Hardware-based attacks"],"datePosted":"2026-03-08T13:49:17.591Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Seattle, WA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines, Python, Go, AI safety, Detection engineering, SIEM/EDR platforms, Data centre security, Hardware-based attacks","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":320000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a634db45-4fd"},"title":"Security Engineer Lead, Corporate Security","description":"<p><strong>About the Role:</strong></p>\n<p>We’re looking for a Security Engineering Lead to own and drive Anthropic’s Corporate Security programme. This is a player-coach Tech Lead Manager (TLM) role: you’ll be both the most senior technical individual contributor on corporate security and the people leader for a lean, high-impact team of Security Engineers.</p>\n<p>Corporate Security at Anthropic encompasses everything that protects our people, endpoints, networks, SaaS ecosystem, and corporate data—the full surface area outside of production infrastructure. The scope is broad and the team is deliberately small, which means you’ll need deep technical skills across multiple domains, strong judgment about where to invest, and a bias toward automation and engineering-driven solutions over manual process.</p>\n<p>You’ll report into Security leadership and partner closely with IT, Infrastructure Security, Detection &amp; Response, and GRC teams. This role is high-visibility and high-autonomy: you’ll be expected to define the roadmap, make architectural decisions, and represent Corporate Security across the company.</p>\n<p><strong>Responsibilities:</strong></p>\n<p><strong>Technical Leadership &amp; Hands-on Engineering</strong></p>\n<ul>\n<li>Own the security architecture, tooling, and controls for Anthropic’s corporate environment end-to-end, including endpoint fleets (macOS, Windows, ChromeOS), campus and office networks, SaaS applications, mobile devices</li>\n<li>Design, build, and ship security automation, integrations, and internal tooling—including leveraging Claude and LLMs to accelerate security workflows</li>\n<li>Define and enforce security baselines, hardening standards, and configuration policies across all corporate platforms</li>\n<li>Define what it means to operate safely in an environment where AI agents act more like humans than actual humans</li>\n<li>Evaluate, select, deploy, and operate corporate security tools (EDR/XDR, MDM, ZTNA, CASB/SSPM, email security, DLP, browser security, etc.)</li>\n<li>Drive vulnerability management for corporate assets, including patch orchestration, risk-based prioritization, and exception management</li>\n<li>Lead security reviews of new SaaS adoptions, corporate infrastructure changes, and IT projects</li>\n</ul>\n<p><strong>People Leadership &amp; Team Building</strong></p>\n<ul>\n<li>Manage, mentor, and grow a purposefully lean team of Security Engineers; set clear expectations, run effective 1:1s, and create an environment where engineers do the best work of their careers</li>\n<li>Hire and build the team as scope expands—own the hiring bar and pipeline for Corporate Security Engineering roles</li>\n<li>Balance your own IC contributions with the team’s needs; know when to go deep on a problem yourself and when to delegate and coach</li>\n<li>Foster a culture of operational excellence, blameless incident review, and continuous improvement</li>\n</ul>\n<p><strong>Strategy &amp; Cross-Functional Partnership</strong></p>\n<ul>\n<li>Define and own the Corporate Security roadmap, aligning investments to Anthropic’s risk profile and growth trajectory</li>\n<li>Partner with IT Operations to ensure security is embedded in endpoint provisioning, network design, and SaaS lifecycle management</li>\n<li>Collaborate with Detection &amp; Response on telemetry coverage, detection engineering, and incident handling for corporate-sourced events</li>\n<li>Partner with Infrastructure and Security Engineering teams to ensure security standards are consistent across all of Anthropic</li>\n<li>Communicate security posture, risks, and investment needs to Security leadership and cross-functional stakeholders clearly and persuasively</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have 8+ years of Security Engineering experience in a corporate/enterprise security domain (endpoint security, network security, SaaS security, identity, or a combination)</li>\n<li>Have 2+ years of experience managing or tech-leading a team of engineers, with a demonstrated track record of developing talent and shipping results through others</li>\n<li>Are a strong engineer who still writes code regularly—you can prototype a tool, write a detection, build an integration, or debug a complex configuration issue</li>\n<li>Have deep experience with macOS fleet security (this is our primary platform) and solid working knowledge of Windows and ChromeOS security</li>\n<li>Have hands-on experience deploying and operating EDR/XDR, MDM, ZTNA/zero trust, and identity security solutions at scale</li>\n<li>Understand modern SaaS security challenges: shadow IT, OAuth token sprawl, data exfiltration paths, SaaS-to-SaaS integrations, and SSPM/CASB tooling</li>\n<li>Can work independently with high autonomy, manage ambiguity, and make sound risk-based prioritization decisions in a fast-paced environment</li>\n<li>Have excellent communication skills and can translate complex security topics into clear recommendations for technical and non-technical audiences</li>\n</ul>\n<p>Strong candidates may have:</p>\n<ul>\n<li>Securing corporate environments at high-growth AI, cloud, or developer-tools companies</li>\n<li>Maturing a Corporate Security function from early stage, including defining scope, selecting the initial toolset, and hiring the founding team</li>\n<li>Advanced macOS security (system extensions, endpoint security framework, MDM profile engineering, Declarative Device Management)</li>\n<li>Network security architecture for hybrid/multi-office environments, including SD-WAN, ZTNA, DNS security, and network segmentation</li>\n<li>Browser security and isolation technologies (e.g., Island, Talon/Palo Alto, Chrome Enterprise)</li>\n<li>Proficiency in Python, Go, or similar languages for building sec</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a634db45-4fd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5135098008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["macOS fleet security","endpoint security","network security","SaaS security","identity security","EDR/XDR","MDM","ZTNA","CASB/SSPM","email security","DLP","browser security","patch orchestration","risk-based prioritization","exception management","security automation","integrations","internal tooling","Claude","LLMs","security baselines","hardening standards","configuration policies","vulnerability management","security reviews","IT projects","team management","team building","operational excellence","blameless incident review","continuous improvement","security roadmap","risk profile","growth trajectory","IT operations","endpoint provisioning","network design","SaaS lifecycle management","detection engineering","incident handling","infrastructure security","security engineering","security standards","communication","security posture","risks","investment needs"],"x-skills-preferred":["Python","Go","similar languages","macOS security","Windows security","ChromeOS security","advanced macOS security","system extensions","endpoint security framework","MDM profile engineering","Declarative Device Management","network security architecture","SD-WAN","ZTNA","DNS security","network segmentation","browser security and isolation technologies","Island","Talon/Palo Alto","Chrome Enterprise"],"datePosted":"2026-03-08T13:46:03.242Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"macOS fleet security, endpoint security, network security, SaaS security, identity security, EDR/XDR, MDM, ZTNA, CASB/SSPM, email security, DLP, browser security, patch orchestration, risk-based prioritization, exception management, security automation, integrations, internal tooling, Claude, LLMs, security baselines, hardening standards, configuration policies, vulnerability management, security reviews, IT projects, team management, team building, operational excellence, blameless incident review, continuous improvement, security roadmap, risk profile, growth trajectory, IT operations, endpoint provisioning, network design, SaaS lifecycle management, detection engineering, incident handling, infrastructure security, security engineering, security standards, communication, security posture, risks, investment needs, Python, Go, similar languages, macOS security, Windows security, ChromeOS security, advanced macOS security, system extensions, endpoint security framework, MDM profile engineering, Declarative Device Management, network security architecture, SD-WAN, ZTNA, DNS security, network segmentation, browser security and isolation technologies, Island, Talon/Palo Alto, Chrome Enterprise"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9152bb38-f8b"},"title":"Global Detection and Response Lead","description":"<p><strong>Global Detection and Response Lead</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>San Francisco $347K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>OpenAI’s Security organization exists to enable safe, responsible innovation at scale. As our systems, infrastructure, and research footprint grow, we invest deeply in world-class security capabilities that protect our people, products, and users without slowing progress.</p>\n<p>This organization safeguards OpenAI’s environments by building advanced detection systems, driving real-time response capabilities, scaling telemetry and logging infrastructure, and delivering actionable threat intelligence to stay ahead of adversaries.</p>\n<p><strong>About the Role</strong></p>\n<p>We are seeking a <strong>Global Detection and Response Lead</strong> to own and scale OpenAI’s cybersecurity detection and response operations. In this role, you will set the strategy and drive execution for security monitoring, incident response, recovery, and post-incident improvements across our global infrastructure.</p>\n<p>You will be a hands-on leader with deep technical credibility and strong operational instincts. You will build and mentor high-performing teams, partner closely with Infrastructure, Research, Product Security, Enterprise Security, IT, and Engineering, and ensure that detection and response capabilities are embedded by design into the systems that power OpenAI.</p>\n<p>This is a strategic and practical leadership role requiring deep technical credibility, operational rigor, and the ability to build high-performing teams in a fast-moving environment.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Oversee global detection and response operations, including continuous monitoring, triage, investigation, containment, and remediation of security events across a diverse set of networks and infrastructure.</li>\n</ul>\n<ul>\n<li>Lead, mentor, and directly manage several small teams of senior engineers across observability, detection and response, and threat intelligence. Hire and scale these functions deliberately and proportionately as OpenAI’s compute footprint and platform ambitions grow.</li>\n</ul>\n<ul>\n<li>Ensure world-class operational rigor and readiness through management of incident playbooks, on-call and escalation paths, tabletop exercises, and continuous improvement of response quality and speed.</li>\n</ul>\n<ul>\n<li>Improve detection quality and coverage by partnering with engineering teams to ensure critical telemetry is available, reliable, and actionable across cloud, corporate, and production environments.</li>\n</ul>\n<ul>\n<li>Deeply partner across all of OpenAI to evaluate and respond to emergent security concerns in a frontier AI lab environment, such as detection and response strategies for agents operating across infrastructure at scale.</li>\n</ul>\n<ul>\n<li>Build a world-class security program capable of withstanding tier-1 adversaries by maximally embracing our own models to solve frontier security problems.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have 10+ years in cybersecurity with deep expertise in detection engineering, incident response, and security operations.</li>\n</ul>\n<ul>\n<li>Have an active U.S. Government security clearance (Top Secret) or willingness and eligibility to obtain one.</li>\n</ul>\n<ul>\n<li>Are mission-oriented, have unimpeachable integrity, and are passionate and motivated to detect and respond to adversaries in a highly complex, fast-paced environment.</li>\n</ul>\n<ul>\n<li>Have deep experience building and leading detection and response, instrumentation/observability, and threat intelligence teams across a global footprint, including airgapped and sovereign environments.</li>\n</ul>\n<ul>\n<li>Have stellar leadership skills, and a demonstrated history of driving durable, and continuous improvements to programs, processes, and people.</li>\n</ul>\n<ul>\n<li>Have exceptional written and verbal communication skills, can remain calm under pressure, and can effectively run command of security incidents involving numerous stakeholders across a diverse gamut of teams, expertise, and seniority.</li>\n</ul>\n<ul>\n<li>Have deep expertise in modern observability stacks (e.g., SIEM, data lakes, EDR, cloud telemetry, logging) and detection primi</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9152bb38-f8b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/c8855563-e744-4fa0-a497-34c8d25d2d76","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$347K – $490K","x-skills-required":["cybersecurity","detection engineering","incident response","security operations","observability","threat intelligence","cloud telemetry","logging","SIEM","data lakes","EDR"],"x-skills-preferred":[],"datePosted":"2026-03-06T18:32:16.205Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, detection engineering, incident response, security operations, observability, threat intelligence, cloud telemetry, logging, SIEM, data lakes, EDR","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":347000,"maxValue":490000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d4efa5c8-cef"},"title":"Offensive Security Engineer, Hardware","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Offensive Security Engineer, Hardware</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>San Francisco$293K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI’s technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.</p>\n<p><strong>About the Role</strong></p>\n<p>We&#39;re seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI&#39;s security posture. This role isn&#39;t your typical red team job - it&#39;s an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization.</p>\n<p>You&#39;ll have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy. This role will be primarily focused on continuously testing our hardware products and related services.</p>\n<p><strong>In this role you will:</strong></p>\n<ul>\n<li>Collaborate proactively with engineering teams to enhance security and mitigate risks in hardware, firmware, and software.</li>\n</ul>\n<ul>\n<li>Perform comprehensive penetration testing on our diverse suite of products.</li>\n</ul>\n<ul>\n<li>Leverage advanced automation and OpenAI technologies to optimize your offensive security work.</li>\n</ul>\n<ul>\n<li>Present insightful, actionable findings clearly and compellingly to inspire impactful change.</li>\n</ul>\n<ul>\n<li>Influence security strategy by providing attacker-driven insights into risk and threat modeling.</li>\n</ul>\n<p><strong>You might thrive in this role if you have:</strong></p>\n<ul>\n<li>7+ years of hands-on experience or exceptional accomplishments demonstrating equivalent expertise.</li>\n</ul>\n<ul>\n<li>Exceptional skill in code review, identifying novel and subtle vulnerabilities.</li>\n</ul>\n<ul>\n<li>Demonstrated mastery assessing complex technology stacks, including:</li>\n</ul>\n<ul>\n<li>Proven ability to reverse engineer bootrom images, firmware, or silicon-level components.</li>\n</ul>\n<ul>\n<li>Deep familiarity with low-level kernel operations, secure boot processes, and hardware-software interactions.</li>\n</ul>\n<ul>\n<li>Hands-on experience building and validating secure boot chains and threat models.</li>\n</ul>\n<ul>\n<li>Proficiency with hardware debugging tools (UART, JTAG, SWD, oscilloscopes, logic analyzers).</li>\n</ul>\n<ul>\n<li>Solid programming skills in C/C++, Python, or assembly for embedded systems.</li>\n</ul>\n<ul>\n<li>Industry experience securing consumer hardware (e.g., mobile devices, IoT, chipsets).</li>\n</ul>\n<ul>\n<li>Excellent written and verbal communication skills for technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts.</li>\n</ul>\n<ul>\n<li>Excellent coding skills, capable of writing robust tools and automation for offensive operations.</li>\n</ul>\n<ul>\n<li>Ability to communicate complex technical concepts effectively through compelling storytelling.</li>\n</ul>\n<ul>\n<li>Proven track record of not just finding vulnerabilities but actively contributing to solutions in complex codebases.</li>\n</ul>\n<p><strong>Bonus points:</strong></p>\n<ul>\n<li>Prior experience working in tech startups or fast-paced technology environments.</li>\n</ul>\n<ul>\n<li>Experience in related disciplines such as Software Engineering (SWE), Detection Engineering, Site Reliability Engineering (SRE), Security Engineering, or IT Infrastructure.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives and experiences of our team members.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d4efa5c8-cef","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/f123bbe4-7f19-46c8-a6ab-4a5d7b714988","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$293K – $490K","x-skills-required":["code review","penetration testing","advanced automation","secure boot processes","hardware debugging tools","C/C++","Python","assembly","embedded systems","consumer hardware","firmware","silicon-level components","low-level kernel operations","secure boot chains","threat models","UART","JTAG","SWD","oscilloscopes","logic analyzers","solid programming skills","industry experience","excellent written and verbal communication skills","trust boundaries","risk assessment","dynamic contexts","compelling storytelling","complex technical concepts","offensive operations","robust tools and automation"],"x-skills-preferred":["tech startups","fast-paced technology environments","Software Engineering","Detection Engineering","Site Reliability Engineering","Security Engineering","IT Infrastructure"],"datePosted":"2026-03-06T18:29:30.545Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"code review, penetration testing, advanced automation, secure boot processes, hardware debugging tools, C/C++, Python, assembly, embedded systems, consumer hardware, firmware, silicon-level components, low-level kernel operations, secure boot chains, threat models, UART, JTAG, SWD, oscilloscopes, logic analyzers, solid programming skills, industry experience, excellent written and verbal communication skills, trust boundaries, risk assessment, dynamic contexts, compelling storytelling, complex technical concepts, offensive operations, robust tools and automation, tech startups, fast-paced technology environments, Software Engineering, Detection Engineering, Site Reliability Engineering, Security Engineering, IT Infrastructure","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":293000,"maxValue":490000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7e965433-47d"},"title":"Manager Cyber Security – SOC & Detection Engineering","description":"<p>Opening. This role is responsible for shaping the future of security operations and driving the development of modern SOC and detection services in the enterprise and public sector. analysed the following tasks:</p>\n<p><strong>What you&#39;ll do</strong></p>\n<p>You will be responsible for the strategic development and operational management of SOC and CDC projects with a focus on SIEM, XDR, SOAR, and vulnerability management solutions. This includes responsibility for architecture, transition, and optimization of detection and response platforms (e.g. SIEM modernization, XDR introduction, tool rollouts, detection engineering).</p>\n<ul>\n<li>Strategische Weiterentwicklung und operative Steuerung von SOC- und CDC-Projekten mit Fokus auf SIEM-, XDR-, SOAR- und Vulnerability-Management-Lösungen</li>\n<li>Verantwortung für Architektur, Transition und Optimierung von Detection- und Response-Plattformen (z. B. SIEM-Modernisierung, XDR-Einführung, Tool-Rollouts, Detection Engineering)</li>\n</ul>\n<p><strong>What you need</strong></p>\n<p>To be successful in this role, you will need the following skills:</p>\n<ul>\n<li>Abgeschlossenes Studium im MINT-Bereich oder vergleichbare Qualifikation sowie mindestens 5–7 Jahre Berufserfahrung in der Cyber Security mit Schwerpunkt SOC, SIEM, XDR oder Detection Engineering</li>\n<li>Leidenschaft für Security-Architekturen, Incident Response, Detection Use Cases und idealerweise Vulnerability Management</li>\n<li>Expertise im Unternehmerischen Denken sowie Erfahrung in Projektleitung, Presales oder Business Development im Beratungsumfeld und idealer Weise Erfahrung mit Microsoft Sentinel, Microsoft Defender, Crowdstrike oder PaloAlto Cortex SOAR</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7e965433-47d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"MHP - A Porsche Company","sameAs":"https://jobs.porsche.com","logo":"https://logos.yubhub.co/jobs.porsche.com.png"},"x-apply-url":"https://jobs.porsche.com/index.php?ac=jobad&id=19859","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Abgeschlossenes Studium im MINT-Bereich oder vergleichbare Qualifikation","mindestens 5–7 Jahre Berufserfahrung in der Cyber Security mit Schwerpunkt SOC, SIEM, XDR oder Detection Engineering","Leidenschaft für Security-Architekturen, Incident Response, Detection Use Cases und idealerweise Vulnerability Management"],"x-skills-preferred":["Expertise im Unternehmerischen Denken","Erfahrung in Projektleitung, Presales oder Business Development im Beratungsumfeld","Erfahrung mit Microsoft Sentinel, Microsoft Defender, Crowdstrike oder PaloAlto Cortex SOAR"],"datePosted":"2026-03-04T14:09:15.499Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Deutschlandweit & Hybrid Work"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Abgeschlossenes Studium im MINT-Bereich oder vergleichbare Qualifikation, mindestens 5–7 Jahre Berufserfahrung in der Cyber Security mit Schwerpunkt SOC, SIEM, XDR oder Detection Engineering, Leidenschaft für Security-Architekturen, Incident Response, Detection Use Cases und idealerweise Vulnerability Management, Expertise im Unternehmerischen Denken, Erfahrung in Projektleitung, Presales oder Business Development im Beratungsumfeld, Erfahrung mit Microsoft Sentinel, Microsoft Defender, Crowdstrike oder PaloAlto Cortex SOAR"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_81f97af7-71e"},"title":"Detection Engineer","description":"<p>The Security Detections Engineer is responsible for designing, building and continuously improving EA&#39;s detection and response capabilities across our global environment.</p>\n<p><strong>What you&#39;ll do</strong></p>\n<p>You will work closely with Security Operations (SOC) to produce meaningful alerts that mitigate risk, and with Security Engineering to evolve the automation platforms and integrations that enable scalable content delivery, enrichment, correlation, and noise reduction across EA&#39;s security tooling.</p>\n<ul>\n<li>Responsibility 1: Design, build and continuously improve EA&#39;s detection and response capabilities across our global environment.</li>\n<li>Responsibility 2: Work closely with Security Operations (SOC) to produce meaningful alerts that mitigate risk.</li>\n</ul>\n<p><strong>What you need</strong></p>\n<ul>\n<li>Demonstrated experience in security detection engineering in an enterprise environment.</li>\n<li>Proficiency in automation development (Python preferred) and building/consuming APIs (REST, auth patterns, secrets handling).</li>\n</ul>\n<p><strong>Why this matters</strong></p>\n<p>This role owns the end-to-end detection lifecycle-from threat-informed use case design through validation, tuning, and operational handoff, while also developing automation that reduces engineering toil and increases speed and consistency in mitigating risks as they are discovered.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_81f97af7-71e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Electronic Arts","sameAs":"https://jobs.ea.com","logo":"https://logos.yubhub.co/jobs.ea.com.png"},"x-apply-url":"https://jobs.ea.com/en_US/careers/JobDetail/Security-Detection-Engineer/212301","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["security detection engineering","automation development","APIs"],"x-skills-preferred":["Python","SOAR"],"datePosted":"2026-02-10T14:05:28.428Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Guildford, Surrey, United Kingdom"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"security detection engineering, automation development, APIs, Python, SOAR"}]}