<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>ea8af178-d20</externalid>
      <Title>Information Security Engineer focused on Data Loss Prevention</Title>
      <Description><![CDATA[<p>We&#39;re looking for someone who has spent years thinking adversarially about how sensitive data moves, leaks, and gets exfiltrated. As an Information Security Engineer focused on Data Loss Prevention, you&#39;ll own the security of Palantir&#39;s global data protection program.</p>
<p>Core Responsibilities:</p>
<ul>
<li>Own the security posture of Palantir&#39;s DLP estate , policy architecture, classification standards, and ongoing validation that those standards hold.</li>
</ul>
<ul>
<li>Reduce data exposure risk across the environment: audit and remediate misconfigured policies, coverage gaps, over-permissioned data flows, shadow IT channels, and enforcement blind spots.</li>
</ul>
<ul>
<li>Evaluate, deploy, and own the configuration of data protection tooling across endpoint, network, and cloud vectors: content inspection, data classification, user activity monitoring, and enforcement controls.</li>
</ul>
<ul>
<li>Build and maintain automation for data security operations , policy tuning pipelines, alert triage workflows, access reviews, and data handling hygiene.</li>
</ul>
<ul>
<li>Partner with Identity, Infrastructure, and Legal teams to drive architectural improvements: data classification frameworks, acceptable use enforcement, cloud data governance, and insider threat program integration.</li>
</ul>
<ul>
<li>Translate findings from assessments and incident investigations into durable fixes , policy changes, architectural improvements, and program updates that reduce recurrence.</li>
</ul>
<p>Data Loss Prevention:</p>
<ul>
<li>Deep, working knowledge of DLP architecture: endpoint agents, network inspection, cloud API integrations, policy engines, and content-aware detection across structured and unstructured data.</li>
</ul>
<ul>
<li>Hands-on experience investigating and detecting data exfiltration across the full kill chain , from reconnaissance and staging through exfiltration via web, email, removable media, and cloud sync channels.</li>
</ul>
<ul>
<li>Familiarity with common evasion techniques (encoding, steganography, covert channels, cloud storage abuse) and, critically, what they leave behind.</li>
</ul>
<ul>
<li>Experience building and maturing DLP programs: classification taxonomies, policy tiering by data sensitivity, incident workflow design, and false-positive reduction methodologies.</li>
</ul>
<p>Data Security Fundamentals:</p>
<ul>
<li>Thorough understanding of data security architecture: content inspection techniques, regular expression and fingerprinting-based detection, optical character recognition (OCR) for image-based data, and contextual policy enforcement.</li>
</ul>
<ul>
<li>Ability to assess data flows across complex environments , SaaS, IaaS, on-premises, and hybrid , and identify where controls are absent or insufficient.</li>
</ul>
<ul>
<li>Proficiency with log analysis and forensic investigation tools to reconstruct data movement and user behavior across endpoints and network infrastructure.</li>
</ul>
<ul>
<li>Experience building telemetry pipelines and detections on top of raw DLP event data beyond out-of-the-box vendor alerting.</li>
</ul>
<p>Detection &amp; Response:</p>
<ul>
<li>Proven track record writing high-fidelity detection logic for data exfiltration and insider threat scenarios, not just tuning vendor signatures.</li>
</ul>
<ul>
<li>Experience leading complex incident response investigations involving insider threats, compromised credentials being used to stage and exfiltrate data, or sophisticated external actors.</li>
</ul>
<ul>
<li>Strong forensic fundamentals across endpoint artifacts, network captures, and cloud audit logs relevant to data movement investigations.</li>
</ul>
<p>What We Value:</p>
<ul>
<li>Experience with cloud-native data security controls across major IaaS and SaaS platforms, and hybrid architectures that span on-premises and cloud data stores.</li>
</ul>
<ul>
<li>Prior work in insider threat programs, adversary simulation, or offensive security research , especially focused on data exfiltration tradecraft.</li>
</ul>
<ul>
<li>Public contributions: conference talks, blog posts, or open-source tooling related to data protection or insider threat detection.</li>
</ul>
<p>What We Require:</p>
<ul>
<li>5+ years of hands-on security experience, with the majority focused on data loss prevention, data protection, or insider threat programs.</li>
</ul>
<ul>
<li>Proficiency in Python or a scripting language of your choice for detection development, policy automation, and forensic tooling.</li>
</ul>
<ul>
<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>
</ul>
<ul>
<li>A portfolio of real work: policies you&#39;ve designed, detections you&#39;ve written, investigations you&#39;ve led, or programs you&#39;ve built.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$145,000 - $200,000/year</Salaryrange>
      <Skills>DLP architecture, endpoint agents, network inspection, cloud API integrations, policy engines, content-aware detection, data exfiltration, common evasion techniques, cloud storage abuse, data security architecture, content inspection techniques, regular expression and fingerprinting-based detection, optical character recognition, contextual policy enforcement, log analysis and forensic investigation tools, telemetry pipelines and detections, raw DLP event data, high-fidelity detection logic, insider threat scenarios, incident response investigations, endpoint artifacts, network captures, cloud audit logs, cloud-native data security controls, IaaS and SaaS platforms, hybrid architectures, insider threat programs, adversary simulation, offensive security research, data exfiltration tradecraft, public contributions, conference talks, blog posts, open-source tooling, Python, scripting language, detection development, policy automation, forensic tooling</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and more.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/fde4cd4c-f6fd-4656-a1ce-3ca27bb1878f?utm_source=yubhub.co&amp;utm_medium=jobs_feed&amp;utm_campaign=apply</Applyto>
      <Location>London</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>74fda95b-69c</externalid>
      <Title>Information Security Engineer focused on Data Loss Prevention</Title>
      <Description><![CDATA[<p><strong>JOB DESCRIPTION</strong></p>
<p>A World-Changing Company</p>
<p>Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.</p>
<p><strong>The Role</strong></p>
<p>We&#39;re looking for someone who has spent years thinking adversarially about how sensitive data moves, leaks, and gets exfiltrated , not just enforcing policies, but understanding every layer of how data can be abused, detected, and protected. If you&#39;ve built content inspection pipelines, tuned classification policies against real insider threat cases, or reverse-engineered an exfiltration channel that bypassed existing controls, this is the team you want to be on.</p>
<p>As an Information Security Engineer focused on Data Loss Prevention, you&#39;ll own the security of Palantir&#39;s global data protection program. Your team runs 24/7 prevention, detection, and investigation of data security events across our entire environment. The adversaries we face are sophisticated. We need someone who is more so.</p>
<p><strong>Core Responsibilities</strong></p>
<ul>
<li>Own the security posture of Palantir&#39;s DLP estate , policy architecture, classification standards, and ongoing validation that those standards hold.</li>
</ul>
<ul>
<li>Reduce data exposure risk across the environment: audit and remediate misconfigured policies, coverage gaps, over-permissioned data flows, shadow IT channels, and enforcement blind spots.</li>
</ul>
<ul>
<li>Evaluate, deploy, and own the configuration of data protection tooling across endpoint, network, and cloud vectors: content inspection, data classification, user activity monitoring, and enforcement controls.</li>
</ul>
<ul>
<li>Build and maintain automation for data security operations , policy tuning pipelines, alert triage workflows, access reviews, and data handling hygiene.</li>
</ul>
<ul>
<li>Partner with Identity, Infrastructure, and Legal teams to drive architectural improvements: data classification frameworks, acceptable use enforcement, cloud data governance, and insider threat program integration.</li>
</ul>
<ul>
<li>Translate findings from assessments and incident investigations into durable fixes , policy changes, architectural improvements, and program updates that reduce recurrence.</li>
</ul>
<p><strong>What We&#39;re Looking For</strong></p>
<p>Data Loss Prevention</p>
<ul>
<li>Deep, working knowledge of DLP architecture: endpoint agents, network inspection, cloud API integrations, policy engines, and content-aware detection across structured and unstructured data.</li>
</ul>
<ul>
<li>Hands-on experience investigating and detecting data exfiltration across the full kill chain , from reconnaissance and staging through exfiltration via web, email, removable media, and cloud sync channels.</li>
</ul>
<ul>
<li>Familiarity with common evasion techniques (encoding, steganography, covert channels, cloud storage abuse) and, critically, what they leave behind.</li>
</ul>
<ul>
<li>Experience building and maturing DLP programs: classification taxonomies, policy tiering by data sensitivity, incident workflow design, and false-positive reduction methodologies.</li>
</ul>
<p>Data Security Fundamentals</p>
<ul>
<li>Thorough understanding of data security architecture: content inspection techniques, regular expression and fingerprinting-based detection, optical character recognition (OCR) for image-based data, and contextual policy enforcement.</li>
</ul>
<ul>
<li>Ability to assess data flows across complex environments , SaaS, IaaS, on-premises, and hybrid , and identify where controls are absent or insufficient.</li>
</ul>
<ul>
<li>Proficiency with log analysis and forensic investigation tools to reconstruct data movement and user behavior across endpoints and network infrastructure.</li>
</ul>
<ul>
<li>Experience building telemetry pipelines and detections on top of raw DLP event data beyond out-of-the-box vendor alerting.</li>
</ul>
<p>Detection &amp; Response</p>
<ul>
<li>Proven track record writing high-fidelity detection logic for data exfiltration and insider threat scenarios, not just tuning vendor signatures.</li>
</ul>
<ul>
<li>Experience leading complex incident response investigations involving insider threats, compromised credentials being used to stage and exfiltrate data, or sophisticated external actors.</li>
</ul>
<ul>
<li>Strong forensic fundamentals across endpoint artifacts, network captures, and cloud audit logs relevant to data movement investigations.</li>
</ul>
<p><strong>What We Value</strong></p>
<ul>
<li>Experience with cloud-native data security controls across major IaaS and SaaS platforms, and hybrid architectures that span on-premises and cloud data stores.</li>
</ul>
<ul>
<li>Prior work in insider threat programs, adversary simulation, or offensive security research , especially focused on data exfiltration tradecraft.</li>
</ul>
<ul>
<li>Public contributions: conference talks, blog posts, or open-source tooling related to data protection or insider threat detection.</li>
</ul>
<p><strong>What We Require</strong></p>
<ul>
<li>5+ years of hands-on security experience, with the majority focused on data loss prevention, data protection, or insider threat programs.</li>
</ul>
<ul>
<li>Proficiency in Python or a scripting language of your choice for detection development, policy automation, and forensic tooling.</li>
</ul>
<ul>
<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>
</ul>
<ul>
<li>A portfolio of real work: policies you&#39;ve designed, detections you&#39;ve written, investigations you&#39;ve led, or programs you&#39;ve built.</li>
</ul>
<p><strong>Additional Information</strong></p>
<p><strong>Salary</strong></p>
<p>The estimated salary range for this position is estimated to be $145,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individual’s relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$145,000 - $200,000/year</Salaryrange>
      <Skills>DLP architecture, endpoint agents, network inspection, cloud API integrations, policy engines, content-aware detection, structured and unstructured data, data exfiltration, kill chain, web, email, removable media, cloud sync channels, common evasion techniques, encoding, steganography, covert channels, cloud storage abuse, DLP programs, classification taxonomies, policy tiering, incident workflow design, false-positive reduction methodologies, data security architecture, content inspection techniques, regular expression, fingerprinting-based detection, optical character recognition, contextual policy enforcement, log analysis, forensic investigation tools, telemetry pipelines, detections, vendor alerting, high-fidelity detection logic, insider threat scenarios, tuning vendor signatures, incident response investigations, insider threats, compromised credentials, sophisticated external actors, endpoint artifacts, network captures, cloud audit logs, data movement investigations, cloud-native data security controls, IaaS and SaaS platforms, hybrid architectures, on-premises and cloud data stores, insider threat programs, adversary simulation, offensive security research, data exfiltration tradecraft, conference talks, blog posts, open-source tooling, data protection, insider threat detection, Python, scripting language, detection development, policy automation, forensic tooling, TS/SCI security clearance, portfolio of real work, policies, investigations, programs</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Palantir</Employername>
      <Employerlogo>https://logos.yubhub.co/palantir.com.png</Employerlogo>
      <Employerdescription>Palantir builds software for data-driven decisions and operations, empowering partners to develop lifesaving drugs, forecast supply chain disruptions, and more.</Employerdescription>
      <Employerwebsite>https://www.palantir.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/palantir/3c788579-eec7-4897-b446-4afc944e79be?utm_source=yubhub.co&amp;utm_medium=jobs_feed&amp;utm_campaign=apply</Applyto>
      <Location>London</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>a073ba96-c0e</externalid>
      <Title>Senior Security Engineer, Insider Risk</Title>
      <Description><![CDATA[<p>As a Senior Insider Risk Engineer, you will lead the technical engineering of our user-centric monitoring capabilities. Your primary focus will be the development, tuning, and optimization of Data Loss Prevention (DLP) policies and the ingestion/analysis of cloud-native, endpoint and SaaS audit logs.</p>
<p>You will operate with a high degree of autonomy in designing, implementing, and evolving detection logic and telemetry pipelines, transforming raw telemetry into actionable behavioural intelligence.</p>
<p><strong>DLP Policy Engineering:</strong> Design, develop, and deploy advanced detection logic and use cases within the Insider Risk platforms to identify unauthorized data movement, anomalous system activity, and policy violations. Independently identify gaps in detection coverage and propose, implement, and tune new DLP use cases to address emerging insider risk scenarios.</p>
<p><strong>Cloud &amp; SaaS Telemetry Analysis:</strong> Work with Security Engineering department to ingest and normalize high-fidelity telemetry from cloud environments, SaaS services, and endpoint agents into the Insider Risk security stack/tooling.</p>
<p><strong>Behavioural Detection Development:</strong> Design and implement technical &#39;tripwires&#39; and behavioural models that identify patterns associated with data exfiltration, such as unusual download volumes, unauthorized file sharing, or anomalous access to sensitive repositories.</p>
<p><strong>Data Pipeline Oversight:</strong> Define telemetry requirements and partner with Security Engineering to build and maintain high-fidelity data pipelines from DLP agents and cloud providers into our monitoring platforms.</p>
<p><strong>Technical Incident Support:</strong> Serve as the technical subject matter expert during complex investigations, providing deep-dive forensic analysis, log reconstruction and evidence gathering and preservation. Drive improvements to investigative tooling, detection feedback loops, and post-incident telemetry requirements.</p>
<p><strong>Infrastructure Maintenance:</strong> Manage the health, configuration, and continuous optimization of the Insider Risk technology stack.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$165,000 to $242,000</Salaryrange>
      <Skills>Data Loss Prevention (DLP), Cloud-native security tools, Endpoint agents, SaaS services, Security Engineering, User and Entity Behaviour Analytics (UEBA), Cloud Security Posture Management (CSPM), Data classification frameworks, Global privacy regulations, High-sensitivity environments</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4674246006?utm_source=yubhub.co&amp;utm_medium=jobs_feed&amp;utm_campaign=apply</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA/ San Franciso, CA</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
  </jobs>
</source>