<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>6964b8e4-caf</externalid>
      <Title>Cybersecurity Engineer</Title>
      <Description><![CDATA[<p>Job Title: Cybersecurity Engineer</p>
<p>Introduction to role</p>
<p>Cybersecurity sits at the heart of our IT strategy. As we move towards ambitious objectives, we are looking for individuals who focus on innovation to maintain a sustainable risk position against an evolving threat landscape, who recognise that adversaries may include organised crime syndicates or state-sponsored attackers, and who understand attackers&#39; motivations and ways of working.</p>
<p>In this role, you will operate within AstraZeneca&#39;s global cybersecurity organisation, collaborating with and influencing multiple functions across China, India, Mexico, Sweden, the US and the UK. Ready to help defend a global enterprise where technology directly supports life-changing medicines?</p>
<p>Accountabilities</p>
<p>In this role, you will engineer cybersecurity solutions across cloud, on-premises and third-party collaboration environments, with a predominant focus on cloud and data. You will collaborate with other teams to perform, assess and evolve IT processes that intersect our cybersecurity priorities, ensuring security is embedded into how work gets done. You will map governance and compliance frameworks and their controls to technical implementation, shifting hardening processes as far left as possible in the lifecycle. You will leverage deep understanding of threats, weaknesses and vulnerabilities around cloud and data to help other areas respond promptly and effectively to contain breaches or address areas of concern. You will also contribute to continuous improvement by analysing incidents, refining standards and influencing architectural decisions that balance risk, performance and usability.</p>
<p>How will you use your expertise to raise the bar?</p>
<p>Essential Skills/Experience</p>
<ul>
<li>Minimum 10 years of experience</li>
<li>Bachelor&#39;s Degree</li>
<li>Must have broad enterprise IT experience with significant cloud and data exposure.</li>
<li>Must have in-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols.</li>
<li>Must have experience designing, deploying, and operating secure networks, systems, application and security architectures at scale.</li>
<li>Must have experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale.</li>
<li>Must have experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&amp;CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures.</li>
<li>Should have experience working in a software development and systems administration organisation, implementing DevSecOps and process automation.</li>
<li>Should have the ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards.</li>
<li>Familiarity with CSPM, CNAPP, and Cloud EDR platforms</li>
<li>Expertise with Microsoft Defender, Sentinel and Splunk</li>
</ul>
<p>Desirable Skills/Experience</p>
<ul>
<li>Identify and articulate architectural trade-offs.</li>
<li>Embed process, governance and security into workflow and technology.</li>
<li>Design and implement software tools and services using modern programming languages.</li>
<li>Manage and lead projects delivering prioritised initiatives at challenging deadlines.</li>
<li>Exert positive influence in a matrixed organisation to drive technology evolution.</li>
<li>Drive efforts to achieve process and technology improvement at scale.</li>
</ul>
<p>The annual base pay for this position ranges from 136,044.00 - 204,066.00 USD Annual (80% - 120%). Hourly and salaried non-exempt employees will also be paid overtime pay when working qualifying overtime hours. Base pay offered may vary depending on multiple individualised factors, including market location, job-related knowledge, skills, and experience. In addition, our positions offer a short-term incentive bonus opportunity; eligibility to participate in our equity-based long-term incentive programme (salaried roles), to receive a retirement contribution (hourly roles), and commission payment eligibility (sales roles).</p>
<p>Benefits offered included a qualified retirement programme [401(k) plan]; paid vacation and holidays; paid leaves; and, health benefits including medical, prescription drug, dental, and vision coverage in accordance with the terms and conditions of the applicable plans. Additional details of participation in these benefit plans will be provided if an employee receives an offer of employment. If hired, employee will be in an &#39;at-will position&#39; and the Company reserves the right to modify base pay (as well as any other discretionary payment or compensation programme) at any time, including for reasons related to individual performance, Company or individual department/team performance, and market factors.</p>
<p>When we put unexpected teams in the same room, we unleash bold thinking with the power to inspire life-changing medicines. In-person working gives us the platform we need to connect, work at pace and challenge perceptions. That&#39;s why we work, on average, a minimum of three days per week from the office. But that doesn&#39;t mean we&#39;re not flexible. We balance the expectation of being in the office while respecting individual flexibility. Join us in our unique and ambitious world.</p>
<p>AstraZeneca offers an environment where cybersecurity work has real-world impact on patients&#39; lives, not just systems and data. Here, technology experts collaborate with scientists and business teams to unlock the potential of data, analytics, AI and machine learning, constantly experimenting with new approaches while keeping critical platforms secure. There is strong investment in digital capabilities, room to explore modern tools through initiatives like hackathons, and a culture that values curiosity, coaching and continuous learning so that every day brings opportunities to grow skills and shape both personal development and the future of healthcare technology.</p>
<p>If this role matches your skills and ambitions, apply now and help protect the digital foundations that enable life-changing medicines!</p>
<p>Date Posted 17-Apr-2026 Closing Date 03-May-2026</p>
<p>Our mission is to build an inclusive environment where equal employment opportunities are available to all applicants and employees. In furtherance of that mission, we welcome and consider applications from all qualified candidates, regardless of their protected characteristics. If you have a disability or special need that requires accommodation, please complete the corresponding section in the application form.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Minimum 10 years of experience, Bachelor&apos;s Degree, Broad enterprise IT experience with significant cloud and data exposure, In-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols, Experience designing, deploying, and operating secure networks, systems, application and security architectures at scale, Experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale, Experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&amp;CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures, Experience working in a software development and systems administration organisation, implementing DevSecOps and process automation, Ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards, Familiarity with CSPM, CNAPP, and Cloud EDR platforms, Expertise with Microsoft Defender, Sentinel and Splunk</Skills>
      <Category>Engineering</Category>
      <Industry>Healthcare</Industry>
      <Employername>Cyber Security Engineering Cloud/Data</Employername>
      <Employerlogo>https://logos.yubhub.co/astrazeneca.eightfold.ai.png</Employerlogo>
      <Employerdescription>AstraZeneca is a multinational pharmaceutical and biotechnology company that develops and commercializes prescription medicines and vaccines for diseases across various therapeutic areas.</Employerdescription>
      <Employerwebsite>https://astrazeneca.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://astrazeneca.eightfold.ai/careers/job/563877689899183</Applyto>
      <Location>Gaithersburg, Maryland, United States of America</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f3f72cf8-865</externalid>
      <Title>Security Engineer, Offensive Security</Title>
      <Description><![CDATA[<p>We are seeking a highly skilled Security Engineer, Offensive Security to join our team. As a member of our Security Engineering team, you will play a key role in safeguarding our AI systems and maintaining the trust of our users and society at large.</p>
<p>Key Responsibilities: Conduct red and purple team engagements simulating advanced threat actors across our cloud infrastructure, endpoints, and bare metal deployments. Penetration test specific, high-value deployments. Contribute to AI-assisted security testing tooling and workflows. Work cross-functionally with other security and engineering teams, particularly on AI-specific attack scenarios. Document and present findings to technical and executive audiences, translating attack narratives into actionable risk insights that inform security roadmaps.</p>
<p>Requirements: 5+ years of hands-on experience in red teaming and offensive security operations. Deep expertise in at least two of: macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines. Track record of discovering novel attack vectors and chaining vulnerabilities creatively. Experience conducting adversarial simulations against well-defended environments. Strong engineering skills (Python, Go, or similar). Ability to write clear findings that drive action, helping teams understand risk and prioritize fixes. Collaborative approach, working in close collaboration with the blue team.</p>
<p>Preferred Qualifications: Prior work at organizations with state actor threat models. Interest in AI safety and how security engineering contributes to responsible AI developments. Background testing AI/ML systems or agentic workflows. Familiarity with detection engineering and SIEM/EDR platforms from the defensive side. Experience with data center security or hardware-based attacks.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000-$320,000 USD</Salaryrange>
      <Skills>macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines, Python, Go, AI-assisted security testing tooling, Detection engineering, SIEM/EDR platforms, Data center security, Hardware-based attacks</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a technology company that aims to create reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5105509008</Applyto>
      <Location>Remote-Friendly (Travel-Required) | San Francisco, CA | Seattle, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>85f1ada0-78d</externalid>
      <Title>Security Engineer</Title>
      <Description><![CDATA[<p>We&#39;re seeking a Security Engineer at the senior-level or above on our Security Operations team with strong detection engineering experience. You&#39;ll design and develop high-fidelity detection content, build and operate the data pipelines that power our security operations, develop automation playbooks that accelerate response, and work across a uniquely diverse telemetry landscape spanning cloud infrastructure, embedded vessel platforms, corporate systems, and operational technology.</p>
<p>This role is heavily weighted toward detection engineering. You should think in terms of adversary behaviour and telemetry coverage, not just alert triage. You&#39;ll own detections end-to-end: from identifying gaps in coverage, through designing and testing detection logic, to tuning and validating in production.</p>
<p>Key Responsibilities:</p>
<ul>
<li><p>Design, build, test, and tune high-fidelity detection rules and analytic queries across endpoint, cloud, network, identity, and DLP telemetry sources</p>
</li>
<li><p>Develop and maintain detection content using detection-as-code practices including version-controlled logic, automated testing, and CI/CD deployment</p>
</li>
<li><p>Map detection coverage to MITRE ATT&amp;CK, identify gaps, and prioritise new detection development based on threat intelligence and business risk</p>
</li>
<li><p>Engineer correlation rules, behavioural analytics, and anomaly-based detections that minimise false positives while surfacing real adversary tradecraft</p>
</li>
<li><p>Own the detection lifecycle from initial development through production tuning, performance monitoring, and retirement</p>
</li>
<li><p>Build and operate pipelines to ingest, normalise, enrich, and manage security telemetry at scale across diverse data sources, using Terraform and infrastructure-as-code practices to deploy and maintain logging and detection infrastructure</p>
</li>
<li><p>Design and maintain log collection, parsing, and enrichment configurations that ensure the right telemetry is available at the right fidelity for detection and investigation</p>
</li>
<li><p>Evaluate and onboard new telemetry sources as Saronic&#39;s infrastructure and threat landscape evolve</p>
</li>
<li><p>Monitor pipeline health, data quality, and ingestion reliability to ensure detections operate on complete and accurate data</p>
</li>
<li><p>Develop and manage automated response playbooks in SOAR platforms to accelerate containment and reduce analyst toil</p>
</li>
<li><p>Build automation that enriches alerts with contextual data, reducing investigation time and improving analyst decision-making</p>
</li>
<li><p>Support incident response efforts and translate lessons learned into improved detections and playbooks</p>
</li>
<li><p>Partner with SOC analysts, Cloud Security, Product Security, and IT teams to close visibility and detection gaps across environments</p>
</li>
<li><p>Collaborate with threat intelligence to ensure detection engineering is informed by current adversary TTPs relevant to defence, maritime, and autonomous systems</p>
</li>
</ul>
<p>Required Qualifications:</p>
<ul>
<li><p>3+ years of hands-on experience in detection engineering, security operations, security automation, or a closely related security engineering role</p>
</li>
<li><p>Demonstrated experience designing, testing, and tuning detection rules and analytic queries across production security telemetry (endpoint, cloud, network, identity, or DLP)</p>
</li>
<li><p>Hands-on experience with SIEM platforms and proficiency with query languages such as SPL, KQL, or equivalent</p>
</li>
<li><p>Experience building and operating security data pipelines, including log ingestion, normalisation, enrichment, and data quality management</p>
</li>
<li><p>Understanding of data engineering concepts including ETL pipelines, data modelling, schema design, and indexing as applied to security telemetry</p>
</li>
<li><p>Hands-on coding experience in Python, PowerShell, Go, or Rust for security automation, detection tooling, or pipeline development, and familiarity with Terraform for managing detection and logging infrastructure as code</p>
</li>
<li><p>Understanding of MITRE ATT&amp;CK framework and its application to detection coverage and gap analysis</p>
</li>
<li><p>Ability to obtain and maintain a security clearance</p>
</li>
</ul>
<p>Preferred Qualifications:</p>
<ul>
<li><p>Experience in defence, aerospace, robotics, autonomy, or other high-assurance environments</p>
</li>
<li><p>Experience with EDR platforms including custom detection rule creation and telemetry analysis</p>
</li>
<li><p>Experience with cloud-native detection in AWS and Microsoft 365/Azure</p>
</li>
<li><p>Experience using Terraform to deploy and manage security monitoring infrastructure, log pipeline components, or cloud-native security service configurations</p>
</li>
<li><p>Hands-on experience with incident response, threat hunting, or adversary emulation</p>
</li>
<li><p>Exposure to embedded Linux, operational technology, or ICS telemetry and detection</p>
</li>
<li><p>Familiarity with NIST SP 800-171, NIST SP 800-53, or CMMC and their logging and monitoring requirements</p>
</li>
<li><p>Relevant certifications such as GCIH, GCIA, GCDA, GSOM, OSDA, or OSCP</p>
</li>
</ul>
<p>Additional Information:</p>
<ul>
<li><p>Benefits: Medical Insurance, Dental and Vision Insurance, Time Off, Parental Leave, Competitive Salary, Retirement Plan, Stock Options, Life and Disability Insurance, Pet Insurance</p>
</li>
<li><p>This role requires access to export-controlled information or items that require &#39;U.S. Person&#39; status.</p>
</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, security operations, security automation, SIEM platforms, query languages, data engineering, ETL pipelines, data modelling, schema design, indexing, Python, PowerShell, Go, Rust, Terraform, MITRE ATT&amp;CK framework, security clearance, EDR platforms, cloud-native detection, incident response, threat hunting, adversary emulation, embedded Linux, operational technology, ICS telemetry, NIST SP 800-171, NIST SP 800-53, CMMC, GCIH, GCIA, GCDA, GSOM, OSDA, OSCP</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Saronic Technologies</Employername>
      <Employerlogo>https://logos.yubhub.co/saronictechnologies.com.png</Employerlogo>
      <Employerdescription>Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.</Employerdescription>
      <Employerwebsite>https://www.saronictechnologies.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/saronic/79424778-76c1-41c6-8385-cba5f6ddc50e</Applyto>
      <Location>San Francisco</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>4474c998-9c7</externalid>
      <Title>Cyber Security Engineer</Title>
      <Description><![CDATA[<p><strong>Cyber Security Engineer</strong></p>
<p><strong>What we&#39;re all about</strong></p>
<p>At Quantexa, we&#39;re a team of innovators and problem solvers who are passionate about creating real change for our clients and their industries. We&#39;re driven by a desire to do things better than the last time, and we&#39;re always looking for talented individuals to join our team.</p>
<p><strong>The opportunity</strong></p>
<p>We&#39;re seeking a highly skilled Cyber Security Engineer to join our Security Operations team. As a Cyber Security Engineer, you will play a key part in protecting Quantexa&#39;s systems and data from cyber threats. You will be responsible for the day-to-day operation, optimisation, and monitoring of core security platforms, with a particular focus on Zscaler, Cloud monitoring through Wiz, and Endpoint Detection and Response through CrowdStrike.</p>
<p><strong>Responsibilities</strong></p>
<p><strong>Wiz (Cloud Security Posture Management)</strong></p>
<ul>
<li>Monitor and triage Wiz findings daily, validating alerts and determining operational impact.</li>
<li>Perform tuning and threat hunting within Wiz and other tooling.</li>
<li>Identify misconfigurations, excessive permissions, and exposed assets, escalating where required.</li>
<li>Track remediation progress with engineering owners and ensure closure of high-priority issues.</li>
</ul>
<p><strong>Zscaler (Web Security Tunnel 2.0)</strong></p>
<ul>
<li>Review and triage Zscaler alerts and policy violations, following documented response procedures.</li>
<li>Investigate suspicious traffic, access attempts, and user activity to determine legitimacy and risk.</li>
<li>Support enforcement actions by validating policy alignment and working with IT and Cloud teams to remediate issues.</li>
<li>Monitor coverage and configuration across users and locations, identifying gaps or misconfigurations.</li>
<li>Support policy tuning by analysing false positives and recommending rule or policy adjustments.</li>
<li>Contribute to playbook development, operational maturity, and ongoing service readiness.</li>
</ul>
<p><strong>CrowdStrike (Endpoint Detection and Response)</strong></p>
<ul>
<li>Review and triage endpoint detections, applying documented response steps.</li>
<li>Execute containment actions, including network isolation and sensor troubleshooting.</li>
<li>Validate full sensor coverage across the estate and address gaps in coordination with IT.</li>
<li>Support tuning activities by analysing false positives and proposing rule refinements.</li>
<li>Contribute to playbook improvements and operational readiness tasks.</li>
</ul>
<p><strong>Security Operations</strong></p>
<ul>
<li>Conduct initial investigation of security incidents, collect evidence, and escalate based on severity with a keen eye on the quality of the output.</li>
<li>Perform daily review of alerts across our SIEM, Wiz, CrowdStrike, and other platforms.</li>
<li>Validate vulnerabilities and configuration weaknesses raised by scanning tools.</li>
<li>Ability to interpret and operationalise threat intelligence, understand how it informs detection, prioritisation, and response activities, and clearly communicate technical threat intelligence to non-technical stakeholders.</li>
<li>Support cloud security controls, identity hygiene checks, and network policy reviews.</li>
<li>Contribute to the ongoing maturity and documentation of operational processes.</li>
</ul>
<p><strong>Collaboration and Ways of Working</strong></p>
<ul>
<li>Act as a trusted operational partner to the Cyber Security Manager and the wider Information Security team, providing proactive support and consistent engagement.</li>
<li>Partner closely with DevOps, IT, and Engineering teams to drive timely and effective remediation actions.</li>
<li>Deliver clear and concise updates on incidents and operational activities proactively, without the need for prompting.</li>
<li>Actively participate in team stand ups, contributing constructively to continuous improvement and operational maturity.</li>
<li>Support senior engineers with platform enhancements, integrations, and controlled change activities.</li>
</ul>
<p><strong>What you&#39;ll bring</strong></p>
<ul>
<li>Demonstrated hands-on experience with security operations, incident triage, or vulnerability management.</li>
<li>Familiarity with EDR platforms (ideally CrowdStrike) and security telemetry analysis.</li>
<li>Knowledge of cloud environments, particularly Azure including Entra and Conditional Access, and a good understanding of cloud security concepts.</li>
<li>Ability to understand alert context, assess impact, and follow structured response processes.</li>
<li>Strong attention to detail, disciplined documentation, and good communication skills.</li>
</ul>
<p><strong>Benefits</strong></p>
<ul>
<li>Competitive salary</li>
<li>Company bonus</li>
<li>Hybrid workplace &amp; free access to global WeWork locations &amp; events</li>
<li>Pension Scheme with a company contribution of 6% (if you contribute 4% or more)</li>
<li>25 days annual leave</li>
<li>Flexible working hours</li>
<li>Professional development opportunities</li>
<li>Access to a range of employee benefits, including health insurance, gym membership, and more</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Cloud Security Posture Management, Endpoint Detection and Response, Web Security, Security Operations, Threat Intelligence, Cloud Security, Azure, Conditional Access, Entra, CrowdStrike, Wiz, Zscaler, SIEM, Vulnerability Management, Incident Triage, EDR Platforms, Security Telemetry Analysis, Cloud Security Posture Management, Endpoint Detection and Response, Web Security, Security Operations, Threat Intelligence, Cloud Security, Azure, Conditional Access, Entra, CrowdStrike, Wiz, Zscaler, SIEM, Vulnerability Management, Incident Triage, EDR Platforms, Security Telemetry Analysis</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Quantexa</Employername>
      <Employerlogo>https://logos.yubhub.co/view.com.png</Employerlogo>
      <Employerdescription>Quantexa is a technology company that provides data analytics and risk management solutions to various industries. It has a global presence with a diverse team of professionals.</Employerdescription>
      <Employerwebsite>https://jobs.workable.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.workable.com/view/5jNMqMFg7cJnLPEDaozihW/hybrid-cyber-security-engineer-in-london-at-quantexa</Applyto>
      <Location>London</Location>
      <Country></Country>
      <Postedate>2026-03-09</Postedate>
    </job>
    <job>
      <externalid>7cdbf387-4bf</externalid>
      <Title>Security Engineer, Offensive Security</Title>
      <Description><![CDATA[<p><strong>About Anthropic</strong></p>
<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>
<p><strong>About the Team</strong></p>
<p>The Security Engineering team&#39;s mission is to safeguard our AI systems and maintain the trust of our users and society at large. Whether we&#39;re developing critical security infrastructure, building secure development practices, or partnering with our research and product teams, we are committed to operating as a world-class security organisation and keeping the safety and trust of our users at the forefront of everything we do.</p>
<p><strong>What You&#39;ll Do:</strong></p>
<ul>
<li>Conduct red and purple team engagements simulating advanced threat actors across our cloud infrastructure, endpoints and bare metal deployments.</li>
<li>Penetration test specific, high value deployments.</li>
<li>Contribute to AI-assisted security testing tooling and workflows.</li>
<li>Work cross functionally with other security and engineering teams, particularly on AI-specific attack scenarios.</li>
<li>Document and present findings to technical and executive audiences, translating attack narratives into actionable risk insights that inform security roadmaps.</li>
</ul>
<p><strong>Who You Are:</strong></p>
<ul>
<li>5+ years of hands-on experience in red teaming and offensive security operations.</li>
<li>Deep expertise in at least two of: macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines.</li>
<li>Track record of discovering novel attack vectors and chaining vulnerabilities creatively.</li>
<li>Experience conducting adversarial simulations against well-defended environments.</li>
<li>Strong engineering skills (Python, Go, or similar).</li>
<li>Ability to write clear findings that drive action, helping teams understand risk and prioritise fixes.</li>
<li>Collaborative approach, working in close collaboration with the blue team.</li>
</ul>
<p><strong>Strong candidates may also have experience with:</strong></p>
<ul>
<li>Prior work at organisations with state actor threat models.</li>
<li>Interest in AI safety and how security engineering contributes to responsible AI developments.</li>
<li>Background testing AI/ML systems or agentic workflows.</li>
<li>Familiarity with detection engineering and SIEM/EDR platforms from the defensive side.</li>
<li>Experience with data centre security or hardware-based attacks.</li>
</ul>
<p><strong>Logistics</strong></p>
<ul>
<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>
<p><strong>Come work with us!</strong></p>
<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional relocation assistance, and a comprehensive benefits package that includes medical, dental, and vision insurance, 401(k) matching, and paid time off.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$300,000 - $320,000USD</Salaryrange>
      <Skills>macOS security, Linux Security, Cloud security (GCP/AWS/Azure), Kubernetes, CI/CD pipelines, Python, Go, AI safety, Detection engineering, SIEM/EDR platforms, Data centre security, Hardware-based attacks</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that aims to create reliable, interpretable, and steerable AI systems. It has a quickly growing team of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5105509008</Applyto>
      <Location>San Francisco, CA, Seattle, WA</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>