{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/fuzzing"},"x-facet":{"type":"skill","slug":"fuzzing","display":"Fuzzing","count":8},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_cef90895-c6d"},"title":"Technical Program Manager, Security (Coordinated Vulnerability Disclosure)","description":"<p>As a Technical Program Manager for Security, Coordinated Vulnerability Disclosure (CVD), you will build and lead the programs that govern how Anthropic responsibly discloses software vulnerabilities discovered by our AI-powered tools.</p>\n<p>These tools have already found real zero-days in Firefox, the Linux kernel, and other critical software. The challenge is no longer just finding vulnerabilities; it is managing the consequences of finding them at unprecedented scale and speed.</p>\n<p>Traditional coordinated disclosure frameworks were designed for a world where a researcher might find one serious vulnerability every few weeks. AI-powered discovery has changed that equation entirely; Claude can surface hundreds of findings in a single codebase in a single day.</p>\n<p>This role exists to ensure that every finding reaches the right maintainer, at the right pace, with the right context, and that Anthropic meets its Responsible Scaling Policy (RSP) commitments in the process.</p>\n<p>You will own the end-to-end CVD lifecycle: from internal triage and human validation of AI-generated findings, through tiered disclosure timelines, to external coordination with vendors, open-source maintainers, and organizations.</p>\n<p>This role requires deep collaboration across Security Engineering, Legal, Communications, Product, and Frontier Red Team to ensure Anthropic operates as a responsible steward of the vulnerabilities its tools discover.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Own end-to-end CVD program strategy and execution: Define and drive the roadmap for coordinated vulnerability disclosure, from AI-generated finding through maintainer notification, remediation tracking, and public disclosure.</li>\n</ul>\n<ul>\n<li>Lead internal triage and quality assurance: Establish and manage the human review process that validates all AI-generated findings before external disclosure.</li>\n</ul>\n<ul>\n<li>Design and operate tiered disclosure timelines: Implement severity-based disclosure windows with appropriate extension policies.</li>\n</ul>\n<ul>\n<li>Build and manage pacing and submission models: Develop rate-limiting frameworks that govern how many findings are submitted to each project, scaled to maintainer capacity and project size.</li>\n</ul>\n<ul>\n<li>Lead external coordination and partner engagement: Manage relationships with open-source maintainers and closed-source vendors.</li>\n</ul>\n<ul>\n<li>Establish program metrics and reporting: Define and track the metrics that determine program health, including fix rates, false-positive rates, median time-to-patch, and qualitative maintainer feedback.</li>\n</ul>\n<ul>\n<li>Drive response category classification: Manage the process for classifying findings into response categories (latent vulnerability, active exploitation, ecosystem-level pattern) and ensure the appropriate response protocol is triggered for each category.</li>\n</ul>\n<ul>\n<li>Lead cross-functional coordination: Manage stakeholder relationships across Security Engineering, Legal, Communications, Product, and Frontier Red Team to drive alignment and execution on disclosure initiatives.</li>\n</ul>\n<ul>\n<li>Collaborate with senior leadership and executives: Communicate program vision, risks, and progress with executive presence.</li>\n</ul>\n<p>You May Be a Good Fit If You Have:</p>\n<ul>\n<li>10+ years of experience in cybersecurity, vulnerability management, or security operations, with at least 4+ years leading vulnerability disclosure, vulnerability management, or coordinated response programs.</li>\n</ul>\n<ul>\n<li>Deep understanding of coordinated vulnerability disclosure processes, including experience working with CERT/CC, MITRE CVE, or similar coordination bodies.</li>\n</ul>\n<ul>\n<li>Technical familiarity with vulnerability discovery tooling, static analysis, fuzzing infrastructure (e.g., OSS-Fuzz, CodeQL), and the triage workflows that turn raw findings into actionable reports.</li>\n</ul>\n<ul>\n<li>Experience engaging directly with open-source maintainers and understanding the dynamics of open-source project governance, contributor capacity, and maintainer burnout.</li>\n</ul>\n<ul>\n<li>Proven experience as a Technical Program Manager or similar role in a cybersecurity or technology-focused environment, with a track record of leading complex, cross-organizational programs to successful completion.</li>\n</ul>\n<ul>\n<li>Executive communication skills with demonstrated ability to influence decisions at the senior leadership and C-suite level.</li>\n</ul>\n<p>Ability to manage highly ambiguous problems and navigate challenges to achieve program objectives in a fast-paced, evolving environment.</p>\n<p>Strong collaboration skills with proven ability to partner across diverse technical and non-technical stakeholders including Security Engineering, Legal, Communications, and Product teams.</p>\n<p>Strong Candidates May Also Have:</p>\n<ul>\n<li>Experience building vulnerability disclosure or coordinated response programs from the ground up in high-growth technology companies.</li>\n</ul>\n<ul>\n<li>Background as a CVE Numbering Authority (CNA) operator, or experience managing the operational requirements of CVE issuance, embargo coordination, and formal vulnerability tracking.</li>\n</ul>\n<ul>\n<li>Familiarity with AI/ML-powered security tooling and the unique challenges of managing AI-generated vulnerability reports at scale, including false-positive filtering and quality assurance.</li>\n</ul>\n<ul>\n<li>Experience with vulnerability management platforms and tracking systems (e.g., HackerOne, Bugcrowd, or custom internal tooling).</li>\n</ul>\n<ul>\n<li>Prior work in security research, penetration testing, or red teaming that provides firsthand understanding of the vulnerability lifecycle from discovery through remediation.</li>\n</ul>\n<ul>\n<li>Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP) and their intersection with vulnerability disclosure requirements.</li>\n</ul>\n<p>Experience managing multi-stakeholder disclosure scenarios involving ecosystem-level vulnerabilities that affect multiple projects simultaneously.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_cef90895-c6d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5123769008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$290,000-$405,000 USD","x-skills-required":["cybersecurity","vulnerability management","security operations","coordinated vulnerability disclosure","AI-powered tooling","static analysis","fuzzing infrastructure","open-source maintainers","compliance frameworks","vulnerability management platforms","tracking systems"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:56:16.224Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, vulnerability management, security operations, coordinated vulnerability disclosure, AI-powered tooling, static analysis, fuzzing infrastructure, open-source maintainers, compliance frameworks, vulnerability management platforms, tracking systems","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":290000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_faffcca4-e94"},"title":"Research Engineer, Cybersecurity Reinforcement Learning","description":"<p>About the role</p>\n<p>We&#39;re hiring for the Cybersecurity RL team within Horizons. As a Research Engineer, you&#39;ll help to safely advance the capabilities of our models in secure coding, vulnerability remediation, and other areas of defensive cybersecurity.</p>\n<p>This role blends research and engineering, requiring you to both develop novel approaches and realize them in code. Your work will include designing and implementing RL environments, conducting experiments and evaluations, delivering your work into production training runs, and collaborating with other researchers, engineers, and cybersecurity specialists across and outside Anthropic.</p>\n<p>The role requires domain expertise in cybersecurity paired with interest or experience in training safe AI models. For example, you might be a white hat hacker who&#39;s curious about how LLMs could augment or transform your work, a security engineer interested in how AI could help harden systems at scale, or a detection and response professional wondering how models could enhance defensive workflows.</p>\n<p>Responsibilities</p>\n<ul>\n<li>Design and implement RL environments for secure coding and vulnerability remediation</li>\n<li>Conduct experiments and evaluations to assess the effectiveness of our models</li>\n<li>Deliver your work into production training runs to advance the capabilities of our models</li>\n<li>Collaborate with other researchers, engineers, and cybersecurity specialists across and outside Anthropic</li>\n</ul>\n<p>Requirements</p>\n<ul>\n<li>Experience in cybersecurity research</li>\n<li>Experience with machine learning</li>\n<li>Strong software engineering skills</li>\n<li>Ability to balance research exploration with engineering implementation</li>\n<li>Passion for AI&#39;s potential and commitment to developing safe and beneficial systems</li>\n</ul>\n<p>Strong candidates may also have:</p>\n<ul>\n<li>Professional experience in security engineering, fuzzing, detection and response, or other applied defensive work</li>\n<li>Experience participating in or building CTF competitions and cyber ranges</li>\n<li>Academic research experience in cybersecurity</li>\n<li>Familiarity with RL techniques and environments</li>\n<li>Familiarity with LLM training methodologies</li>\n</ul>\n<p>Logistics</p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>\n<p>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links,visit anthropic.com/careers directly for confirmed position openings.</p>\n<p>How we&#39;re different</p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>\n<p>Come work with us!</p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_faffcca4-e94","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5025624008","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$300,000-$405,000 USD","x-skills-required":["cybersecurity research","machine learning","software engineering","research exploration","engineering implementation"],"x-skills-preferred":["security engineering","fuzzing","detection and response","RL techniques","LLM training methodologies"],"datePosted":"2026-04-18T15:43:50.288Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity research, machine learning, software engineering, research exploration, engineering implementation, security engineering, fuzzing, detection and response, RL techniques, LLM training methodologies","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_27d6fab4-848"},"title":"Staff Product Security Engineer","description":"<p>Job Title: Staff Product Security Engineer</p>\n<p>Location: United States</p>\n<p>Department: Security</p>\n<p>Job Description:</p>\n<p>This role can be based remotely anywhere in the United States. The Product Security Team&#39;s mission is to left-shift SDLC (Security Development Lifecycle) processes for all code written in Databricks (for customer use or supporting customers internally) to reduce the likelihood of introducing new vulnerabilities in production and minimize the count and effect of externally identified vulnerabilities on Databricks Services.</p>\n<p>You will be an individual contributor on the product security team at Databricks, managing SDLC functions for features and products within Databricks. This would include, but is not limited to, security design reviews, threat models, manual code reviews, exploit writing, and exploit chain creation. You will also support IR and VRP programs when there is a vulnerability report or a product security incident.</p>\n<p>You will work with a global team, spread across various locations in the US and EMEA.</p>\n<p>The impact you will have:</p>\n<ul>\n<li>Full SDLC support for new product features being developed in ENG and non-ENG teams. This would include threat modeling, design review, manual code review, exploit writing, etc.</li>\n</ul>\n<ul>\n<li>Work with other security teams to provide support for incident response and vulnerability response as and when needed.</li>\n</ul>\n<ul>\n<li>Work with the results of SAST tools to help evaluate and identify false positives and file defects for real issues.</li>\n</ul>\n<ul>\n<li>Work on DAST tools and related automation for auto-assessment and defect filing.</li>\n</ul>\n<ul>\n<li>Maintain the automation framework and add new features as needed to support different security compliances that Databricks may want to get into – FedRamp, PCI, HIPAA, etc.</li>\n</ul>\n<ul>\n<li>Prioritize security from a risk management perspective, rather than an absolute textbook version.</li>\n</ul>\n<ul>\n<li>Help develop and implement security processes to improve the overall productivity of the product security organization and the SDLC process in general</li>\n</ul>\n<p>What we look for:</p>\n<ul>\n<li>3-10 years&#39; experience with the threat modeling process and ability to find design problems based on a block diagram of data flow.</li>\n</ul>\n<ul>\n<li>Solid understanding on at least two of the following domains: web security, cloud security, systems security, and applied cryptography.</li>\n</ul>\n<ul>\n<li>Proficient with one or more of programming languages (Python/Java/Scala/JavaScript) and ability to read code to identify security defects.</li>\n</ul>\n<ul>\n<li>Strong skills on scripting and automation on exploits.</li>\n</ul>\n<ul>\n<li>Fuzzing skills are good to have.</li>\n</ul>\n<ul>\n<li>Exploit writing skills are a positive and greatly required.</li>\n</ul>\n<p>Pay Range Transparency:</p>\n<p>Databricks is committed to fair and equitable compensation practices. The pay range(s) for this role is listed below and represents the expected base salary range for non-commissionable roles or on-target earnings for commissionable roles. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to job-related skills, depth of experience, relevant certifications and training, and specific work location. Based on the factors above, Databricks anticipated utilizing the full width of the range. The total compensation package for this position may also include eligibility for annual performance bonus, equity, and the benefits listed above.</p>\n<p>For more information regarding which range your location is in visit our page here.</p>\n<p>Zone 1 Pay Range: $190,000 - $261,250 USD</p>\n<p>Zone 2 Pay Range: $171,000 - $235,200 USD</p>\n<p>Zone 3 Pay Range: $161,500 - $222,100 USD</p>\n<p>Zone 4 Pay Range: $152,000 - $209,000 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_27d6fab4-848","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Databricks","sameAs":"https://databricks.com","logo":"https://logos.yubhub.co/databricks.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/databricks/jobs/7882009002","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$190,000 - $261,250 USD","x-skills-required":["threat modeling","security design reviews","manual code reviews","exploit writing","exploit chain creation","incident response","vulnerability response","SAST tools","DAST tools","automation","FedRamp","PCI","HIPAA","risk management","security processes","productivity","SDLC process","web security","cloud security","systems security","applied cryptography","programming languages","scripting","fuzzing"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:42:34.724Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"threat modeling, security design reviews, manual code reviews, exploit writing, exploit chain creation, incident response, vulnerability response, SAST tools, DAST tools, automation, FedRamp, PCI, HIPAA, risk management, security processes, productivity, SDLC process, web security, cloud security, systems security, applied cryptography, programming languages, scripting, fuzzing","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":190000,"maxValue":261250,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b284be7d-7d6"},"title":"Product Security Engineer","description":"<p>Meet Yubico: the creator of the most secure passkeys and leading provider of hardware authentication security keys. Our company’s mission is to make secure login easy and available for everyone.</p>\n<p>Yubico was founded in 2007 by Stina and Jakob Ehrensvard, and is public on Nasdaq Stockholm Main Market: YUBICO. Our customers include Fortune 500 companies, hundreds of government agencies and millions of individuals in over 160 countries that rely on Yubico technology to secure access to computers, online services and mobile apps.</p>\n<p>The Role: The Product Security team is responsible for ensuring Yubico develops and maintains secure products and services. As part of the Product Security team, your primary responsibility will be to collaborate with the firmware and software teams to design and integrate solutions that support secure design and development practices.</p>\n<p>Tasks &amp; Responsibilities:</p>\n<ul>\n<li>Define and evangelize requirements and guidance for secure by design and secure by default principles</li>\n<li>Implement automation to prevent and detect security flaws in all phases of development</li>\n<li>Conduct design reviews and manual security assessments</li>\n<li>Lead training and awareness sessions</li>\n<li>Define and implement metrics to provide visibility into the impact of your work</li>\n<li>Define, lead, and influence processes to secure products and services</li>\n<li>Identify and advocate for new and novel uses of Yubico’s technology</li>\n</ul>\n<p>Basic Qualifications:</p>\n<ul>\n<li>3+ years in a product security role</li>\n<li>3+ years of software development</li>\n<li>Proficiency in threat modeling</li>\n<li>Proficiency in C</li>\n<li>Knowledge of common vulnerability classes</li>\n<li>Experience in static code analysis</li>\n</ul>\n<p>Optional Skills and Experience:</p>\n<ul>\n<li>Knowledge of WebAuthn, OATH HOTP, OATH TOTP, U2F, PIV, or OpenPGP</li>\n<li>Proficiency in .NET or C++</li>\n<li>Experience developing for ARM</li>\n<li>Experience in targeted fuzzing</li>\n</ul>\n<p>Additional Information\nWe are an equal opportunity employer, we value diversity and uphold an inclusive environment where all people feel that they are equally respected and valued. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity or expression, age, marital status, religion, national origin, disability, protected Veteran status or any other characteristic protected by law.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b284be7d-7d6","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Yubico","sameAs":"https://www.yubico.com/","logo":"https://logos.yubhub.co/yubico.com.png"},"x-apply-url":"https://jobs.lever.co/yubico/646cd3ab-3be7-4987-a508-6bfdf83c71cc","x-work-arrangement":"remote","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$120,000-140,000 per year","x-skills-required":["product security","software development","threat modeling","C","static code analysis"],"x-skills-preferred":["WebAuthn",".NET","C++","ARM","targeted fuzzing"],"datePosted":"2026-04-17T13:13:08.372Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Western US"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"product security, software development, threat modeling, C, static code analysis, WebAuthn, .NET, C++, ARM, targeted fuzzing","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":120000,"maxValue":140000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_4b414123-045"},"title":"Product Security Engineer II","description":"<p>We are seeking a Product Security Engineer II to join our growing security team. This role will be critical in ensuring the security of our products across the entire software development lifecycle (SDLC) and provide support on different security initiatives.</p>\n<p>You will work closely with engineering, product, and operations teams to embed security best practices from design through to deployment.</p>\n<p>Key responsibilities include:</p>\n<p>Supporting the execution of a comprehensive product security strategy that aligns with the company&#39;s goals and risk appetite.\nWorking hands-on across code, infrastructure, and CI/CD to create agents, services, and pipelines that detect, prevent, and remediate risks leveraging AI where it adds value.\nDesigning, building, and operating security automation for the SDLC (code scanning, dependency risk management, secrets detection, policy-as-code) integrated into CI/CD.\nPerforming manual design and implementation reviews of Greenlight products and services from a security perspective.\nEstablishing and enforcing secure development standards (i.e., API security, security patterns, IaC, etc.) and best practices across the organization.\nServing as a subject matter expert on the practical security of our AI and LLM ecosystem. Leading threat modeling exercises for novel AI systems applying advanced security and privacy best practices.\nLeveraging automations and tools to continuously test, fuzz, and validate products and platform components for security issues.\nPerforming penetration testing and retesting to validate fixes.\nResponsible for triaging findings from security researchers and leading incident response for PSIRT.\nOn-call support for incident response and leading product-related security events and vulnerabilities.\nFostering a culture of security awareness and ownership across the Engineering and Product organizations.\nStaying current with the latest security threats, vulnerabilities, and industry best practices to continuously evolve our security controls and processes.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_4b414123-045","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Greenlight","sameAs":"https://www.greenlight.com/","logo":"https://logos.yubhub.co/greenlight.com.png"},"x-apply-url":"https://jobs.lever.co/greenlight/6daa8340-f262-454c-be7d-e3adc813fe0e","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Node.js","Java/Kotlin","React","Redux","Swift","SwiftUI","AWS","MySQL","DynamoDB","Redis","Kubernetes","Ambassador","Helm","Rancher","SAST","DAST","IAST","Penetration testing","Fuzzing","Scripting","Automation","Exploit writing","Cloud security principles"],"x-skills-preferred":["Security assessment of IoT hardware/firmware","Contribution to security community","Experience at Fintech or similar regulated companies","Startup Agility"],"datePosted":"2026-04-17T12:36:02.056Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"Node.js, Java/Kotlin, React, Redux, Swift, SwiftUI, AWS, MySQL, DynamoDB, Redis, Kubernetes, Ambassador, Helm, Rancher, SAST, DAST, IAST, Penetration testing, Fuzzing, Scripting, Automation, Exploit writing, Cloud security principles, Security assessment of IoT hardware/firmware, Contribution to security community, Experience at Fintech or similar regulated companies, Startup Agility"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f73f108d-30a"},"title":"Senior Security Engineer, Agentic Red Team","description":"<p>Job Title: Senior Security Engineer, Agentic Red Team</p>\n<p>We&#39;re a team of scientists, engineers, machine learning experts, and more, working together to advance the state of the art in artificial intelligence.</p>\n<p><strong>About Us</strong> The Agentic Red Team is a specialized, high-velocity unit within Google DeepMind Security. Our mission is to close the &#39;Agentic Launch Gap&#39;,the critical window where novel AI capabilities outpace traditional security reviews.</p>\n<p><strong>The Role</strong> As a Senior Security Engineer on the Agentic Red Team, you will be the primary technical executor of our adversarial engagements. You will work &#39;in the room&#39; with product builders, identifying architectural flaws during the design phase long before formal reviews begin.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<ul>\n<li>Execute Agile Red Teaming: Conduct rapid, high-impact security assessments on agentic services, focusing on vulnerabilities unique to GenAI such as prompt injection, tool-use escalation, and autonomous lateral movement.</li>\n<li>Develop Advanced Exploits: Engineer and execute complex attack sequences that exploit non-deterministic model behaviors, agentic logic errors, and data poisoning vectors.</li>\n<li>Build Automated Defenses: Write code to transform manual vulnerability discoveries into automated regression testing frameworks (&#39;Auto Red Teaming&#39;) that prevent regression in future model versions.</li>\n<li>Embed with Product Teams: Partner directly with developers during the design and build phases to provide immediate feedback, effectively shortening the feedback loop between offensive findings and defensive engineering.</li>\n<li>Curate Threat Intelligence: Maintain and expand a library of agent-specific attack patterns and exploit primitives to establish robust release criteria for new models.</li>\n</ul>\n<p><strong>About You</strong> In order to set you up for success as a Software Engineer at Google DeepMind, we look for the following skills and experience:</p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Information Security, or equivalent practical experience.</li>\n<li>Experience in Red Teaming, Offensive Security, or Adversarial Machine Learning.</li>\n<li>Strong coding skills in Python, Go, or C++ with experience building security tools or automation.</li>\n<li>Technical understanding of LLM architectures, agentic workflows (e.g., chain-of-thought reasoning), and common AI vulnerability classes.</li>\n</ul>\n<p><strong>Preferred Qualifications</strong></p>\n<ul>\n<li>Hands-on experience developing exploits for GenAI models (e.g., prompt injection, adversarial examples, training data extraction).</li>\n<li>Experience working in a consulting capacity with product teams or in a fast-paced &#39;startup-like&#39; environment.</li>\n<li>Familiarity with AI safety benchmarks, evaluation frameworks, and fuzzing techniques.</li>\n<li>Ability to translate complex probabilistic risks into actionable engineering fixes for developers.</li>\n</ul>\n<p><strong>Salary &amp; Benefits</strong> The US base salary range for this full-time position is between $166,000 - $244,000 + bonus + equity + benefits.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f73f108d-30a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Google DeepMind","sameAs":"https://deepmind.com/","logo":"https://logos.yubhub.co/deepmind.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/deepmind/jobs/7596438","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$166,000 - $244,000 + bonus + equity + benefits","x-skills-required":["Python","Go","C++","Red Teaming","Offensive Security","Adversarial Machine Learning","LLM architectures","agentic workflows","chain-of-thought reasoning","AI vulnerability classes"],"x-skills-preferred":["prompt injection","adversarial examples","training data extraction","AI safety benchmarks","evaluation frameworks","fuzzing techniques"],"datePosted":"2026-03-16T14:39:43.939Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Mountain View, California, US; New York City, New York, US; Zurich, Switzerland"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, C++, Red Teaming, Offensive Security, Adversarial Machine Learning, LLM architectures, agentic workflows, chain-of-thought reasoning, AI vulnerability classes, prompt injection, adversarial examples, training data extraction, AI safety benchmarks, evaluation frameworks, fuzzing techniques","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":166000,"maxValue":244000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b0188062-45f"},"title":"Research Engineer, Cybersecurity Reinforcement Learning","description":"<p><strong>About the role</strong></p>\n<p>We&#39;re hiring for the Cybersecurity RL team within Horizons. As a Research Engineer, you&#39;ll help to safely advance the capabilities of our models in secure coding, vulnerability remediation, and other areas of defensive cybersecurity.</p>\n<p>This role blends research and engineering, requiring you to both develop novel approaches and realise them in code. Your work will include designing and implementing RL environments, conducting experiments and evaluations, delivering your work into production training runs, and collaborating with other researchers, engineers, and cybersecurity specialists across and outside Anthropic.</p>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have experience in cybersecurity research.</li>\n<li>Have experience with machine learning.</li>\n<li>Have strong software engineering skills.</li>\n<li>Can balance research exploration with engineering implementation.</li>\n<li>Are passionate about AI&#39;s potential and committed to developing safe and beneficial systems.</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Professional experience in security engineering, fuzzing, detection and response, or other applied defensive work.</li>\n<li>Experience participating in or building CTF competitions and cyber ranges.</li>\n<li>Academic research experience in cybersecurity.</li>\n<li>Familiarity with RL techniques and environments.</li>\n<li>Familiarity with LLM training methodologies.</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lot more.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b0188062-45f","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5025624008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$300,000 - $405,000 USD","x-skills-required":["cybersecurity research","machine learning","software engineering","RL techniques and environments","LLM training methodologies"],"x-skills-preferred":["security engineering","fuzzing","detection and response","CTF competitions and cyber ranges","academic research in cybersecurity"],"datePosted":"2026-03-08T13:44:27.551Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity research, machine learning, software engineering, RL techniques and environments, LLM training methodologies, security engineering, fuzzing, detection and response, CTF competitions and cyber ranges, academic research in cybersecurity","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_e933f315-f05"},"title":"Offensive Security Engineer","description":"<p>We&#39;re looking for a security engineer to join EA&#39;s Enterprise Red Team. You will help us identify threat vectors before they can be exploited in our systems, services, cloud infrastructure or applications.</p>\n<p><strong>What you&#39;ll do</strong></p>\n<ul>\n<li>Be part of the offense! Find and exploit security vulnerabilities for defensive purposes to help identify risks and lead mitigations</li>\n<li>Perform architecture and threat model reviews to identify security vulnerabilities with a focus on AI applications, agents, and infrastructure</li>\n</ul>\n<p><strong>What you need</strong></p>\n<ul>\n<li>4+ years&#39; experience in penetration testing and/or red team operations</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_e933f315-f05","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Electronic Arts","sameAs":"https://jobs.ea.com","logo":"https://logos.yubhub.co/jobs.ea.com.png"},"x-apply-url":"https://jobs.ea.com/en_US/careers/JobDetail/Offensive-Security-Engineer/211484","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["penetration testing","red team operations","programming experience in Golang, Python, Java, C#, C/C++"],"x-skills-preferred":["DevSecOps","CI/CD pipelines","application analysis","fuzzing","static analysis","app scanning"],"datePosted":"2026-01-15T02:04:26.827Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"penetration testing, red team operations, programming experience in Golang, Python, Java, C#, C/C++, DevSecOps, CI/CD pipelines, application analysis, fuzzing, static analysis, app scanning"}]}