{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/device-fingerprinting"},"x-facet":{"type":"skill","slug":"device-fingerprinting","display":"Device Fingerprinting","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1421728f-e82"},"title":"Safeguards Analyst, Account Abuse","description":"<p>As a Safeguards Analyst focusing on Account Abuse, you will play a critical role in building and scaling the detection, enforcement, and operational capabilities that protect our platform against scaled abuse.</p>\n<p>You will develop and iterate on account signals and prevention frameworks that consolidate internal and external data into actionable abuse indicators.</p>\n<p>You will develop and optimize identity and account-linking signals using graph-based data infrastructure to detect coordinated and scaled account abuse.</p>\n<p>You will evaluate, integrate, and operationalize third-party vendor signals , assessing whether new data sources provide genuine lift in detection.</p>\n<p>You will expand internal account signals with new data sources and behavioural indicators to improve detection coverage.</p>\n<p>You will build and maintain processes that evaluate new product launches for scaled abuse risks, working closely with product teams to ensure enforcement readiness.</p>\n<p>You will operationalize and iterate on enforcement tooling , including appeals workflows, review processes, and user communications , to maintain quality and scale with growing volume.</p>\n<p>You will analyse enforcement performance through operational metrics, partnering with the team to keep detection accurate as abuse patterns evolve.</p>\n<p>You will manage payment fraud and dispute operations to protect revenue and maintain our standing with payment partners.</p>\n<p>You will coordinate enforcement efforts for policy compliance gaps across products, working with relevant teams to build scalable review processes.</p>\n<p>You will collaborate with cross-functional teams (Engineering, Product, Legal, Data Science) to surface new signals and translate detection capabilities into enforcement workflows.</p>\n<p>You will maintain detailed documentation of signal development, enforcement processes, and operational decisions.</p>\n<p>This role requires 2+ years of experience in risk scoring, fraud detection, trust and safety, or policy enforcement.</p>\n<p>You should have hands-on experience building detection systems, risk models, or enforcement processes and workflows.</p>\n<p>You should have experience evaluating and integrating third-party data sources into detection or scoring pipelines.</p>\n<p>You should have strong SQL and Python skills , this role involves heavy data analysis across complex, multi-table data relationships.</p>\n<p>You should have familiarity with identity signals such as device fingerprinting, account linking, or entity resolution, or experience with appeals processes and customer-facing enforcement communications.</p>\n<p>You should have demonstrated ability to analyse complex data problems and translate findings into actionable improvements.</p>\n<p>You should have strong written and verbal communication skills , ability to explain technical tradeoffs and navigate cross-functional stakeholder conversations.</p>\n<p>Equivalent practical experience or a Bachelor&#39;s degree in Computer Science, Data Science, or related field is required.</p>\n<p>This role offers an annual salary range of $230,000-$310,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1421728f-e82","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5108841008","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$230,000-$310,000 USD","x-skills-required":["risk scoring","fraud detection","trust and safety","policy enforcement","SQL","Python","identity signals","device fingerprinting","account linking","entity resolution","appeals processes","customer-facing enforcement communications"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:44:38.446Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"risk scoring, fraud detection, trust and safety, policy enforcement, SQL, Python, identity signals, device fingerprinting, account linking, entity resolution, appeals processes, customer-facing enforcement communications","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":310000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b6169e99-a3e"},"title":"Safeguards Analyst, Account Abuse","description":"<p><strong>About the Role</strong></p>\n<p>Anthropic is an AI safety and research company working to build reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our customers and society as a whole. As a Safeguards Analyst focusing on Account Abuse, you will play a critical role in building and scaling the detection, enforcement, and operational capabilities that protect our platform against scaled abuse.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Develop and iterate on account signals and prevention frameworks that consolidate internal and external data into actionable abuse indicators</li>\n<li>Develop and optimize identity and account-linking signals using graph-based data infrastructure to detect coordinated and scaled account abuse</li>\n<li>Evaluate, integrate, and operationalize third-party vendor signals — assessing whether new data sources provide genuine lift in detection</li>\n<li>Expand internal account signals with new data sources and behavioural indicators to improve detection coverage</li>\n<li>Build and maintain processes that evaluate new product launches for scaled abuse risks, working closely with product teams to ensure enforcement readiness</li>\n<li>Operationalize and iterate on enforcement tooling — including appeals workflows, review processes, and user communications — to maintain quality and scale with growing volume</li>\n<li>Analyze enforcement performance through operational metrics, partnering with the team to keep detection accurate as abuse patterns evolve</li>\n<li>Manage payment fraud and dispute operations to protect revenue and maintain our standing with payment partners</li>\n<li>Coordinate enforcement efforts for policy compliance gaps across products, working with relevant teams to build scalable review processes</li>\n<li>Collaborate with cross-functional teams (Engineering, Product, Legal, Data Science) to surface new signals and translate detection capabilities into enforcement workflows</li>\n<li>Maintain detailed documentation of signal development, enforcement processes, and operational decisions</li>\n</ul>\n<p><strong>Qualifications:</strong></p>\n<ul>\n<li>2+ years of experience in risk scoring, fraud detection, trust and safety, or policy enforcement</li>\n<li>Hands-on experience building detection systems, risk models, or enforcement processes and workflows</li>\n<li>Experience evaluating and integrating third-party data sources into detection or scoring pipelines</li>\n<li>Strong SQL and Python skills — this role involves heavy data analysis across complex, multi-table data relationships</li>\n<li>Familiarity with identity signals such as device fingerprinting, account linking, or entity resolution, or experience with appeals processes and customer-facing enforcement communications</li>\n<li>Demonstrated ability to analyze complex data problems and translate findings into actionable improvements</li>\n<li>Strong written and verbal communication skills — ability to explain technical tradeoffs and navigate cross-functional stakeholder conversations</li>\n<li>Equivalent practical experience or a Bachelor&#39;s degree in Computer Science, Data Science, or related field</li>\n</ul>\n<p><strong>You might be a good fit if you:</strong></p>\n<ul>\n<li>Have built risk scores, detection systems, signal pipelines, or enforcement processes in a previous role — identity verification, trust and safety, or similar</li>\n<li>Are comfortable working with ambiguous, noisy data and extracting meaningful signal</li>\n<li>Think critically about signal quality and enforcement performance — evaluating whether new detection signals or processes meaningfully improve outcomes</li>\n<li>Have experience with graph-based data, account-linking problems, or cross-functional process design</li>\n<li>Are proactive about identifying gaps in existing detection or enforcement and proposing new approaches</li>\n<li>Have experience leveraging generative AI tools to support analytical, detection, or enforcement workflows</li>\n<li>Can balance deep analytical work with cross-functional collaboration and stakeholder coordination</li>\n<li>Have a background or interest in cybersecurity or threat intelligence (a plus, not a requirement)</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b6169e99-a3e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5108841008","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$230,000 - $310,000USD","x-skills-required":["risk scoring","fraud detection","trust and safety","policy enforcement","SQL","Python","graph-based data infrastructure","identity signals","device fingerprinting","account linking","entity resolution","appeals processes","customer-facing enforcement communications"],"x-skills-preferred":["generative AI tools","cross-functional process design","cybersecurity","threat intelligence"],"datePosted":"2026-03-08T14:00:53.781Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"risk scoring, fraud detection, trust and safety, policy enforcement, SQL, Python, graph-based data infrastructure, identity signals, device fingerprinting, account linking, entity resolution, appeals processes, customer-facing enforcement communications, generative AI tools, cross-functional process design, cybersecurity, threat intelligence","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":310000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_138b24e2-2bd"},"title":"Senior Software Engineer, Anti-Abuse & Security","description":"<p>Rewrite this job ad in your own words, matching the tone of voice of the original. Reuse the same section headings from the original ad (e.g. if the ad says &quot;Responsibilities&quot;, use that heading, not &quot;What you&#39;ll do&quot;).</p>\n<p>Start with an opening paragraph (no heading): what the role is, who the company is, why it matters. If the ad mentions salary, include it here.</p>\n<p>Rephrase bullet points in your own words while keeping the factual content. Combine related points where it makes sense.</p>\n<p>For benefits/perks: gather them from anywhere in the ad into one section. If the ad mentions nothing about benefits, omit a benefits section entirely.</p>\n<p>Do not invent information that is not in the original ad.</p>\n<p><strong>About the role</strong> The Anti-Abuse team is the front line defending Replit&#39;s platform from exploitation. We detect and shut down phishing deployments, prevent cryptomining on free-tier infrastructure, stop LLM token farming, and keep bad actors from weaponizing the platform against our users. This is adversarial work: attackers adapt constantly, and we build the detection systems, heuristics, and automated responses that stay ahead of them.</p>\n<p>What makes this role unique is the AI-native nature of Replit&#39;s platform. You&#39;ll work on problems that barely exist elsewhere: building guardrails for AI-generated code, detecting prompt injection attacks at scale, and using LLMs as a defensive tool against abuse. If you want hands-on experience applying AI to security problems, this is one of the few places you can do it in production with real attackers. You&#39;ll own problems end-to-end, from identifying emerging abuse patterns to shipping the systems that stop them at scale.</p>\n<p><strong>In this role you will…</strong></p>\n<ul>\n<li>Design and implement LLM guardrails that detect abuse scenarios in AI-generated code and agent interactions</li>\n<li>Build AI-powered detection systems that use LLMs to identify malicious patterns, classify threats, and automate response decisions</li>\n<li>Build and operate abuse detection systems that identify phishing, cryptomining, account takeover, and financial fraud across millions of daily user actions</li>\n<li>Design automated response mechanisms that enforce platform policies without manual intervention</li>\n<li>Own the full abuse response lifecycle: detection, investigation, enforcement, and handling appeals alongside Support and Legal</li>\n<li>Analyze attack patterns using BigQuery and Hex, turning investigation findings into new detection rules</li>\n<li>Maintain and extend internal detection tools (Slurper, Netwatch) that continuously monitor user activity</li>\n<li>Integrate and tune security scanners (SAST, SCA) in CI pipelines with tight performance SLAs</li>\n<li>Track abuse trends, measure detection effectiveness, and adapt defenses as attack patterns evolve</li>\n</ul>\n<p><strong>Required skills and experience:</strong></p>\n<ul>\n<li>4+ years of experience in security engineering, anti-abuse, trust &amp; safety, or fraud detection</li>\n<li>Strong programming skills in Python and/or TypeScript for building detection systems and automation</li>\n<li>Experience with SQL and data analysis at scale (BigQuery, Snowflake, or similar)</li>\n<li>Experience building or fine-tuning ML/LLM-based classifiers for security or abuse detection</li>\n<li>Familiarity with prompt injection, jailbreaking, and other LLM-specific attack vectors</li>\n<li>Ability to investigate complex abuse patterns and translate findings into automated defenses</li>\n<li>Familiarity with common attack patterns: phishing infrastructure, account takeover, credential stuffing, resource abuse</li>\n<li>Clear communication skills for working across Security, Support, Legal, and Engineering teams.</li>\n</ul>\n<p><strong>Nice to have:</strong></p>\n<ul>\n<li>Experience at a platform company dealing with user-generated content or compute abuse (hosting providers, cloud platforms, developer tools)</li>\n<li>Background in fraud detection, payment abuse, or financial crime</li>\n<li>Familiarity with device fingerprinting, IP reputation, and email validation services</li>\n<li>Experience with CI/CD security tooling (SAST, SCA, Dependabot, Snyk)</li>\n<li>Knowledge of container security, Linux internals, or cloud infrastructure (GCP preferred)</li>\n<li>Prior work with abuse reporting pipelines, trust &amp; safety tooling, or content moderation systems</li>\n</ul>\n<p><strong>Tools + Tech Stack for this role</strong></p>\n<ul>\n<li><strong>Languages:</strong> Python, TypeScript, Go, SQL</li>\n<li><strong>Data:</strong> BigQuery, Hex</li>\n<li><strong>Detection tools:</strong> Slurper, Netwatch, Stytch (device fingerprint); ClearOut (email reputation)</li>\n<li><strong>CI/CD Security: Dependabot, Snyk, SAST/SCA scanners</strong></li>\n<li><strong>Infrastructure: GCP, Kubernetes</strong></li>\n<li><strong>Collaboration: Linear, Slack, Zendesk (for abuse reports)</strong></li>\n</ul>\n<p><strong>This role may</strong> _<strong>not</strong>_ <strong>be a fit if</strong></p>\n<ul>\n<li>You prefer deep security research over building operational detection systems</li>\n<li>You want to focus on vulnerability management, pentesting, or bug bounty triage (that&#39;s our Security team)</li>\n<li>You&#39;re looking for a role with predictable, well-defined problems rather than constantly adapting to adversarial behavior</li>\n<li>You prefer working in isolation rather than partnering closely with Support, Legal, and cross-functional teams</li>\n<li>You&#39;re uncomfortable making enforcement decisions that affect real users</li>\n</ul>\n<p>_This is a full-time role that can be held from our Foster City, CA office. The role has an in-office requirement of Monday, Wednesday, and Friday._</p>\n<p><strong>Full-Time Employee Benefits Include:</strong> 💰 Competitive Salary &amp; Equity 💹 401(k) Program with a 4% match ⚕️ Health, Dental, Vision and Life Insurance 🩼 Short Term and Long Term Disability 🚼 Paid Parental, Medical, Caregiver Leave 🚗 Commuter Benefits 📱 Monthly Wellness Stipend 🧑‍💻 Autonomous Work Environment 🖥 In Office Set-Up Reimbursement 🏝 Flexible Time Off (FTO) + Holidays 🚀 Quarterly Team Gatherings ☕ In Office Amenities</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_138b24e2-2bd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Replit","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/replit.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/replit/5bdadf61-7955-46e8-8fdf-bd69818358b7","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$190K – $240K","x-skills-required":["security engineering","anti-abuse","trust & safety","fraud detection","Python","TypeScript","SQL","BigQuery","Hex","ML/LLM-based classifiers","prompt injection","jailbreaking","common attack patterns","phishing infrastructure","account takeover","credential stuffing","resource abuse"],"x-skills-preferred":["experience at a platform company","fraud detection","payment abuse","financial crime","device fingerprinting","IP reputation","email validation services","CI/CD security tooling","container security","Linux internals","cloud infrastructure"],"datePosted":"2026-03-07T15:19:04.069Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Foster City, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"security engineering, anti-abuse, trust & safety, fraud detection, Python, TypeScript, SQL, BigQuery, Hex, ML/LLM-based classifiers, prompt injection, jailbreaking, common attack patterns, phishing infrastructure, account takeover, credential stuffing, resource abuse, experience at a platform company, fraud detection, payment abuse, financial crime, device fingerprinting, IP reputation, email validation services, CI/CD security tooling, container security, Linux internals, cloud infrastructure","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":190000,"maxValue":240000,"unitText":"YEAR"}}}]}