<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>9901c2fb-61c</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>Join us in building the future of finance.</p>
<p>Our mission is to democratize finance for all.</p>
<p>An estimated $124 trillion of assets will be inherited by younger generations in the next two decades. The largest transfer of wealth in human history.</p>
<p>If you’re ready to be at the epicenter of this historic cultural and financial shift, keep reading.</p>
<p>We are building an elite team, applying frontier technologies to the world’s biggest financial problems. We’re looking for bold thinkers. Sharp problem-solvers. Builders who are wired to make an impact.</p>
<p>Robinhood isn’t a place for complacency, it’s where ambitious people do the best work of their careers.</p>
<p>We’re a high-performing, fast-moving team with ethics at the center of everything we do. Expectations are high, and so are the rewards.</p>
<p>The Security Operations (SecOps) team works to safeguard Robinhood and its customers by identifying, investigating, and responding to security threats.</p>
<p>The team monitors production systems, endpoints, and cloud environments, and uses threat intelligence and structured testing to uncover risks before they affect customers.</p>
<p>SecOps partners closely with engineering and infrastructure teams to strengthen detection coverage and response readiness.</p>
<p>The team’s focus is clear: reduce risk, improve visibility, and protect customer trust every day!</p>
<p>As a Security Engineer, Detection &amp; Response, you will strengthen Robinhood’s ability to detect, investigate, and contain security incidents.</p>
<p>You will design and improve detection logic, analyze security telemetry across cloud and endpoint systems, and contribute to measurable reductions in false positives and detection gaps.</p>
<p>You will work directly with SOC analysts and security engineers to refine investigation workflows and document incident findings.</p>
<p>This role is ideal for someone who enjoys hands-on detection engineering and improving how teams respond to real-world threats!</p>
<p>This role is based in our Toronto, Canada office(s), with in-person attendance expected at least 3 days per week.</p>
<p>At Robinhood, we believe in the power of in-person work to accelerate progress, spark innovation, and strengthen community.</p>
<p>Our office experience is intentional, energizing, and designed to fully support high-performing teams.</p>
<p><strong>What you’ll do</strong></p>
<ul>
<li>Investigate security alerts across SIEM, EDR, and cloud security platforms, perform log analysis, and coordinate containment or remediation steps with engineering partners</li>
</ul>
<ul>
<li>Develop, test, and tune detection rules using query languages to improve signal quality and reduce false positives</li>
</ul>
<ul>
<li>Correlate data from multiple telemetry sources to identify attack patterns and determine appropriate response actions</li>
</ul>
<ul>
<li>Monitor emerging threats and update detection logic based on investigation findings and threat intelligence reporting</li>
</ul>
<ul>
<li>Contribute to automation efforts by building or refining SOAR playbooks and scripts that improve investigation speed and consistency</li>
</ul>
<ul>
<li>Document incidents and contribute to post-incident reviews with clear findings and recommended improvements to detection and response processes</li>
</ul>
<p><strong>What you bring</strong></p>
<ul>
<li>2–4 years of experience in security operations, detection engineering, or incident response</li>
</ul>
<ul>
<li>Experience analyzing logs and tuning alerts within SIEMs, EDR platforms, and cloud security tools</li>
</ul>
<ul>
<li>Experience writing detections using query languages (e.g., SQL-like, KQL, or similar)</li>
</ul>
<ul>
<li>Familiarity with threat hunting and investigation techniques across cloud and endpoint environments</li>
</ul>
<ul>
<li>Ability to analyze security telemetry, identify patterns of malicious activity, and recommend practical improvements</li>
</ul>
<ul>
<li>Clear written and verbal communication skills when documenting incidents and collaborating with technical teams</li>
</ul>
<p><strong>Nice to have:</strong></p>
<p>Our ambitious roadmap requires a great culture shaped by exceptional leaders. Here’s what we expect from them:</p>
<ul>
<li>Experience developing and deploying SOAR playbooks to automate detection and response workflows</li>
</ul>
<ul>
<li>Familiarity with AWS, Okta, Kubernetes, and/or Google Workspace security monitoring tools</li>
</ul>
<ul>
<li>Experience writing software to support detection and response tooling with a focus on secure, maintainable code</li>
</ul>
<ul>
<li>Experience in building Agentic workflows, optimizing workflows with Generative AI</li>
</ul>
<p><strong>What we offer</strong></p>
<ul>
<li>Challenging, high-impact work to grow your career</li>
</ul>
<ul>
<li>Performance driven compensation with multipliers for outsized impact, bonus programs, and equity ownership</li>
</ul>
<ul>
<li>Top tier benefits to fuel your work, including supplemental health insurance, ancillary insurance, and mental health support programs</li>
</ul>
<ul>
<li>Lifestyle wallet - a highly flexible employer-paid benefits spending account expenses beyond traditional benefits such as wellness, childcare, learning, and more.</li>
</ul>
<ul>
<li>Time off to recharge including company holidays, paid time off, sick time, paid volunteer time off, parental leave, and more!</li>
</ul>
<ul>
<li>Exceptional office experience with catered meals, events, and comfortable workspaces.</li>
</ul>
<ul>
<li>Monthly commuter stipend to help offset in-office commuting costs</li>
</ul>
<p>Our team is committed to providing an inclusive and welcoming interview experience for all candidates. If you require a specific accommodation during the application or interview process due to a physical or mental condition, please complete this Applicant Accommodation Form to notify our team. The form should only be completed if you need a specific accommodation.</p>
<p>AI Usage Disclosure: Robinhood uses artificial intelligence (AI) tools to support parts of our recruiting process. These tools enhance the efficiency and consistency of our hiring process; however, all hiring decisions are made by our hiring teams.</p>
<p>Vacancy Notice: This job posting represents an existing vacancy that we are actively seeking to fill.</p>
<p>In addition to the base pay range listed below, this role is also eligible for bonus opportunities + equity + benefits.</p>
<p>Base pay for the successful applicant will depend on a variety of job-related factors, which may include education, training, experience, location, business needs, or market demands.</p>
<p>The expected base pay range for this role is based on the location where the work will be performed.</p>
<p>Base Pay Range: Toronto, ON $136,000-$160,000 CAD</p>
<p>Click here to learn more about our Total Rewards, which vary by region and entity.</p>
<p>If our mission energizes you and you’re ready to build the future of finance, we look forward to seeing your application.</p>
<p>Robinhood provides equal opportunity for all applicants, offers reasonable accommodations upon request, and complies with applicable equal employment and privacy laws.</p>
<p>Inclusion is built into how we hire and work,welcoming different backgrounds, perspectives, and experiences so everyone can do their best.</p>
<p>Please review the Privacy Policy for your country of application.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$136,000-$160,000 CAD</Salaryrange>
      <Skills>SIEM, EDR, cloud security platforms, query languages, threat hunting, investigation techniques, security telemetry, detection logic, automation efforts, SOAR playbooks, AWS, Okta, Kubernetes, Google Workspace security monitoring tools, Generative AI</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Robinhood</Employername>
      <Employerlogo>https://logos.yubhub.co/robinhood.com.png</Employerlogo>
      <Employerdescription>Robinhood is a financial services company that provides a mobile app for buying and selling stocks, options, ETFs, and cryptocurrencies.</Employerdescription>
      <Employerwebsite>https://www.robinhood.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/robinhood/jobs/7697727</Applyto>
      <Location>Toronto, Canada</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>4b2dc51f-f02</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>Join us in building the future of finance.</p>
<p>Our mission is to democratize finance for all.</p>
<p>An estimated $124 trillion of assets will be inherited by younger generations in the next two decades. The largest transfer of wealth in human history.</p>
<p>If you’re ready to be at the epicenter of this historic cultural and financial shift, keep reading.</p>
<p><strong>About the team + role</strong></p>
<p>We are building an elite team, applying frontier technologies to the world’s biggest financial problems. We’re looking for bold thinkers. Sharp problem-solvers. Builders who are wired to make an impact.</p>
<p>Robinhood isn’t a place for complacency, it’s where ambitious people do the best work of their careers.</p>
<p>We’re a high-performing, fast-moving team with ethics at the center of everything we do. Expectations are high, and so are the rewards.</p>
<p>The Security Operations (SecOps) team works to safeguard Robinhood and its customers by identifying, investigating, and responding to security threats.</p>
<p>The team monitors production systems, endpoints, and cloud environments, and uses threat intelligence and structured testing to uncover risks before they affect customers.</p>
<p>SecOps partners closely with engineering and infrastructure teams to strengthen detection coverage and response readiness.</p>
<p>The team’s focus is clear: reduce risk, improve visibility, and protect customer trust every day!</p>
<p>As a Security Engineer, Detection &amp; Response, you will strengthen Robinhood’s ability to detect, investigate, and contain security incidents.</p>
<p>You will design and improve detection logic, analyze security telemetry across cloud and endpoint systems, and contribute to measurable reductions in false positives and detection gaps.</p>
<p>You will work directly with SOC analysts and security engineers to refine investigation workflows and document incident findings.</p>
<p>This role is ideal for someone who enjoys hands-on detection engineering and improving how teams respond to real-world threats!</p>
<p>This role is based in our Menlo Park, CA office, with in-person attendance expected at least 3 days per week.</p>
<p>At Robinhood, we believe in the power of in-person work to accelerate progress, spark innovation, and strengthen community.</p>
<p>Our office experience is intentional, energizing, and designed to fully support high-performing teams.</p>
<p><strong>What you’ll do</strong></p>
<ul>
<li>Investigate security alerts across SIEM, EDR, and cloud security platforms, perform log analysis, and coordinate containment or remediation steps with engineering partners</li>
</ul>
<ul>
<li>Develop, test, and tune detection rules using query languages to improve signal quality and reduce false positives</li>
</ul>
<ul>
<li>Correlate data from multiple telemetry sources to identify attack patterns and determine appropriate response actions</li>
</ul>
<ul>
<li>Monitor emerging threats and update detection logic based on investigation findings and threat intelligence reporting</li>
</ul>
<ul>
<li>Contribute to automation efforts by building or refining SOAR playbooks and scripts that improve investigation speed and consistency</li>
</ul>
<ul>
<li>Document incidents and contribute to post-incident reviews with clear findings and recommended improvements to detection and response processes</li>
</ul>
<p><strong>What you bring</strong></p>
<ul>
<li>2–4 years of experience in security operations, detection engineering, or incident response</li>
</ul>
<ul>
<li>Experience analyzing logs and tuning alerts within SIEMs, EDR platforms, and cloud security tools</li>
</ul>
<ul>
<li>Experience writing detections using query languages (e.g., SQL-like, KQL, or similar)</li>
</ul>
<ul>
<li>Familiarity with threat hunting and investigation techniques across cloud and endpoint environments</li>
</ul>
<ul>
<li>Ability to analyze security telemetry, identify patterns of malicious activity, and recommend practical improvements</li>
</ul>
<ul>
<li>Clear written and verbal communication skills when documenting incidents and collaborating with technical teams</li>
</ul>
<p><strong>Nice to have:</strong></p>
<p>Our ambitious roadmap requires a great culture shaped by exceptional leaders. Here’s what we expect from them:</p>
<ul>
<li>Experience developing and deploying SOAR playbooks to automate detection and response workflows</li>
</ul>
<ul>
<li>Familiarity with AWS, Okta, Kubernetes, and/or Google Workspace security monitoring tools</li>
</ul>
<ul>
<li>Experience writing software to support detection and response tooling with a focus on secure, maintainable code</li>
</ul>
<ul>
<li>Experience in building Agentic workflows, optimizing workflows with Generative AI</li>
</ul>
<p><strong>What we offer</strong></p>
<ul>
<li>Challenging, high-impact work to grow your career.</li>
</ul>
<ul>
<li>Performance-driven compensation with multipliers for outsized impact, bonus programs, equity ownership, and 401(k) matching.</li>
</ul>
<ul>
<li>Best-in-class benefits to fuel your work, including 100% paid health insurance for employees with 90% coverage for dependents.</li>
</ul>
<ul>
<li>Lifestyle wallet , a highly flexible benefits spending account for wellness, learning, and more.</li>
</ul>
<ul>
<li>Employer-paid life &amp; disability insurance, fertility benefits, and mental health benefits.</li>
</ul>
<ul>
<li>Time off to recharge including company holidays, paid time off, sick time, parental leave, and more!</li>
</ul>
<ul>
<li>Exceptional office experience with catered meals, events, and comfortable workspaces.</li>
</ul>
<p>In addition to the base pay range listed below, this role is also eligible for bonus opportunities + equity + benefits.</p>
<p>Base pay for the successful applicant will depend on a variety of job-related factors, which may include education, training, experience, location, business needs, or market demands.</p>
<p>The expected base pay range for this role is based on the location where the work will be performed and is aligned to one of 3 compensation zones.</p>
<p>For other locations not listed, compensation can be discussed with your recruiter during the interview process.</p>
<p>Base Pay Range:</p>
<p>Zone 1 (Menlo Park, CA; New York, NY; Bellevue, WA; Washington, DC): $157,000-$185,000 USD</p>
<p>Zone 2 (Denver, CO; Westlake, TX; Chicago, IL): $139,000-$163,000 USD</p>
<p>Zone 3 (Lake Mary, FL; Clearwater, FL; Gainesville, FL): $122,000-$144,000 USD</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$157,000-$185,000 USD</Salaryrange>
      <Skills>SIEM, EDR, cloud security platforms, log analysis, query languages, threat hunting, endpoint environments, security telemetry, detection logic, SOAR playbooks, scripting</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Robinhood</Employername>
      <Employerlogo>https://logos.yubhub.co/robinhood.com.png</Employerlogo>
      <Employerdescription>Robinhood is a financial services company that provides a mobile app for buying and selling stocks, options, ETFs, and cryptocurrencies.</Employerdescription>
      <Employerwebsite>https://www.robinhood.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/robinhood/jobs/7697725</Applyto>
      <Location>Menlo Park, CA</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>21e4422b-13c</externalid>
      <Title>Security Engineer - Threat Intel</Title>
      <Description><![CDATA[<p>As a Threat Intelligence Engineer at Anthropic, you will be a hands-on practitioner responsible for producing actionable intelligence that drives our detections, hunts, and defensive priorities. You will track the adversaries most likely to target a frontier AI lab, build the tooling and pipelines that turn raw indicators into operational defenses, and work shoulder-to-shoulder with detection engineers and incident responders to make sure intelligence actually changes outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Research, track, and report on threat actors and campaigns targeting AI labs, cloud infrastructure, and the broader technology sector , producing timely, actionable intelligence for Security Engineering stakeholders</li>
<li>Build and maintain tooling and automated pipelines to collect, enrich, correlate, and operationalize indicators of compromise into our detection and alerting stack</li>
<li>Develop and execute intelligence-driven threat hunts across endpoint, cloud, identity, and SaaS telemetry, and turn findings into durable detections</li>
<li>Perform technical analysis of malware, phishing infrastructure, and attacker tooling to extract indicators, TTPs, and attribution signals</li>
<li>Partner with Detection Engineering and Incident Response to translate intelligence into detection rules, hunting hypotheses, and incident context in near-real-time</li>
<li>Curate and triage inbound intelligence from commercial feeds, open source, government, and trusted peer relationships , prioritizing what matters for Anthropic&#39;s threat model</li>
<li>Contribute to threat models and risk assessments that inform security architecture and defensive investment across the enterprise</li>
<li>Build and maintain external intelligence-sharing relationships with peer companies, ISACs, and government partners</li>
</ul>
<p>You may be a good fit if you:</p>
<ul>
<li>Have 5+ years of hands-on experience in cyber threat intelligence, threat hunting, or intrusion analysis at an organization facing sophisticated adversaries</li>
<li>Have deep, demonstrable knowledge of specific nation-state or advanced criminal threat actors , their tooling, infrastructure patterns, tradecraft, and targeting</li>
<li>Are a strong engineer: you write production-quality Python (or similar), have built automation and data pipelines, and don&#39;t need to hand requirements to someone else to get tooling built</li>
<li>Are comfortable performing malware analysis, infrastructure analysis (passive DNS, certificate pivoting, netflow), and log analysis to develop and validate your own findings</li>
<li>Have experience authoring detection logic (YARA, Sigma, Snort/Suricata, or SIEM-native queries) and understand what makes a detection durable vs. brittle</li>
<li>Can write clearly and concisely , your intelligence products are read and acted on, not filed away</li>
<li>Have an existing network in the threat intelligence community and a track record of productive bidirectional sharing</li>
</ul>
<p>Strong candidates may have:</p>
<ul>
<li>Experience defending cloud-native and research-heavy environments (AWS/GCP, Kubernetes, ML infrastructure, developer tooling and supply chain)</li>
<li>Prior work operating in a threat intelligence role tracking sophisticated or state-sponsored adversaries, where your analysis directly informed detection, threat hunting, and incident response</li>
<li>Experience applying LLMs or other AI tooling to accelerate intelligence collection, enrichment, and analysis</li>
<li>Public research, conference talks, or open-source tooling contributions in the CTI space</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Python, Cyber threat intelligence, Threat hunting, Intrusion analysis, Malware analysis, Infrastructure analysis, Log analysis, Detection logic, YARA, Sigma, Snort/Suricata, SIEM-native queries, Cloud-native environments, Research-heavy environments, Kubernetes, ML infrastructure, Developer tooling and supply chain, LLMs or other AI tooling</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a company that creates reliable, interpretable, and steerable AI systems. It has a quickly growing team of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5195705008</Applyto>
      <Location>New York City, NY; Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC; San Francisco, CA | New York City, NY</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>7a6b54d5-0a5</externalid>
      <Title>Security Engineer - Threat Intel</Title>
      <Description><![CDATA[<p><strong>About the Role:</strong></p>
<p>Anthropic sits at the frontier of AI development, making us a prime target for nation-state and advanced criminal actors. As a Threat Intelligence Engineer, you&#39;ll produce actionable intelligence that drives our detections, hunts, and defensive priorities.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Research, track, and report on threat actors and campaigns targeting AI labs, cloud infrastructure, and the broader technology sector</li>
<li>Build and maintain tooling and automated pipelines to collect, enrich, correlate, and operationalize indicators of compromise into our detection and alerting stack</li>
<li>Develop and execute intelligence-driven threat hunts across endpoint, cloud, identity, and SaaS telemetry, and turn findings into durable detections</li>
<li>Perform technical analysis of malware, phishing infrastructure, and attacker tooling to extract indicators, TTPs, and attribution signals</li>
<li>Partner with Detection Engineering and Incident Response to translate intelligence into detection rules, hunting hypotheses, and incident context in near-real-time</li>
<li>Curate and triage inbound intelligence from commercial feeds, open source, government, and trusted peer relationships</li>
<li>Contribute to threat models and risk assessments that inform security architecture and defensive investment across the enterprise</li>
<li>Build and maintain external intelligence-sharing relationships with peer companies, ISACs, and government partners</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>Have 5+ years of hands-on experience in cyber threat intelligence, threat hunting, or intrusion analysis at an organization facing sophisticated adversaries</li>
<li>Have deep, demonstrable knowledge of specific nation-state or advanced criminal threat actors</li>
<li>Are a strong engineer with experience writing production-quality Python and building automation and data pipelines</li>
<li>Are comfortable performing malware analysis, infrastructure analysis, and log analysis</li>
<li>Have experience authoring detection logic and understanding what makes a detection durable vs. brittle</li>
<li>Can write clearly and concisely</li>
<li>Have an existing network in the threat intelligence community</li>
</ul>
<p><strong>Strong candidates may have:</strong></p>
<ul>
<li>Experience defending cloud-native and research-heavy environments</li>
<li>Prior work operating in a threat intelligence role tracking sophisticated or state-sponsored adversaries</li>
<li>Experience applying LLMs or other AI tooling to accelerate intelligence collection, enrichment, and analysis</li>
<li>Public research, conference talks, or open-source tooling contributions in the CTI space</li>
</ul>
<p><strong>Logistics</strong></p>
<ul>
<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>
<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>
<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time</li>
<li>Visa sponsorship: We do sponsor visas!</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Python, Cyber threat intelligence, Threat hunting, Intrusion analysis, Malware analysis, Infrastructure analysis, Log analysis, Detection logic, LLMs, AI tooling</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a group of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5195705008</Applyto>
      <Location>New York City, NY; Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC; San Francisco, CA | New York City, NY</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
  </jobs>
</source>