{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/hardware-security"},"x-facet":{"type":"skill","slug":"hardware-security","display":"Hardware Security","count":15},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_fdbf1190-daf"},"title":"Consultant Business Systems","description":"<p>We are seeking a Consultant Business Systems to join our team in Chicago, IL. As a Consultant Business Systems, you will be responsible for IT Service Ownership for SWIFT Alliance Gateway USA, collaborating with key stakeholders to define the technology strategy that aligns with the business goals of the bank, and managing a small team of cross-functional engineers located across Buffalo and India.</p>\n<p>Your responsibilities will include driving down costs through automation, less TOIL and efficient use of Infrastructure, evaluating the SWIFT product and services from functional and non-functional perspective, and delivering change program as per the annual Book of Work. You will also be responsible for collecting resource and cost estimates, establishing baseline budgets, and securing approvals from the Program Steering Committee, tracking expenses against approved budgets and providing monthly progress reports to stakeholders, conducting revenue projections to support business cases, identifying cost savings, and optimizing resource allocation.</p>\n<p>Additionally, you will be responsible for the budget management and reporting for SWIFT Alliance Gateway USA, identifying and managing risks, dependencies, and compliance requirements throughout the service lifecycle, ensuring all functional and regulatory standards are met. You will perform periodic risk assessments, enforce HSBC&#39;s Enterprise and Operational Risk Management Frameworks, and maintain robust control documentation.</p>\n<p>You will participate in audits and implement all security and data privacy controls as per compliance standards, leading program governance forums, project kickoff meetings, and project status updates, and facilitating cross-team collaboration. You will define and execute a detailed communication plan, including escalation protocols and risk communication, maintaining strong working relationships with cross-functional teams, vendors, and resource managers, ensuring alignment with project goals.</p>\n<p>This is a full-time position, Monday-Friday, 40 hours per week, with telecommuting permitted up to 100% from anywhere in the US.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_fdbf1190-daf","directApply":true,"hiringOrganization":{"@type":"Organization","name":"HSBC Technology & Services (USA) Inc.","sameAs":"https://portal.careers.hsbc.com","logo":"https://logos.yubhub.co/portal.careers.hsbc.com.png"},"x-apply-url":"https://portal.careers.hsbc.com/careers/job/563774610161979","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$153,317.00 to $163,317.00 per year","x-skills-required":["Cross border high value payment processing systems and methodologies","Configuring and managing SWIFT Products, including SWIFT Alliance Gateway (SAG), SWIFT Net Link (SNL), and Hardware Security Module (HSM)","Java, IBM MQ, and WebSphere Application Server (WAS)","Production support for SWIFT products","IT Service Ownership for Mission Critical Payment Systems, managing the safety, security, resilience, and availability of IT services","Backlog prioritization, escalation processes, and risk management for US SWIFT Applications","Vendor contract management for critical financial market utilities, specifically with SWIFT, including risk management, relationship oversight, and ongoing contract monitoring","Financial management for SWIFT projects, including providing resource estimates, coordinating with global teams for resource allocation, reviewing and approving timesheets, and analyzing monthly finance reports to manage budget consumption","Project management for SWIFT projects, including creating project plans and milestones, generating weekly status reports, tracking project RAG status, and developing remediation plans to address issues and keep projects on track","Jenkins and GitHub, including automating deployment processes for SWIFT services, managing software upgrades, and ensuring proper version control of software artifacts in GitHub","Agile methodologies and running projects in sprints using JIRA and Confluence"],"x-skills-preferred":[],"datePosted":"2026-04-18T22:09:05.123Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Chicago, IL"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Finance","skills":"Cross border high value payment processing systems and methodologies, Configuring and managing SWIFT Products, including SWIFT Alliance Gateway (SAG), SWIFT Net Link (SNL), and Hardware Security Module (HSM), Java, IBM MQ, and WebSphere Application Server (WAS), Production support for SWIFT products, IT Service Ownership for Mission Critical Payment Systems, managing the safety, security, resilience, and availability of IT services, Backlog prioritization, escalation processes, and risk management for US SWIFT Applications, Vendor contract management for critical financial market utilities, specifically with SWIFT, including risk management, relationship oversight, and ongoing contract monitoring, Financial management for SWIFT projects, including providing resource estimates, coordinating with global teams for resource allocation, reviewing and approving timesheets, and analyzing monthly finance reports to manage budget consumption, Project management for SWIFT projects, including creating project plans and milestones, generating weekly status reports, tracking project RAG status, and developing remediation plans to address issues and keep projects on track, Jenkins and GitHub, including automating deployment processes for SWIFT services, managing software upgrades, and ensuring proper version control of software artifacts in GitHub, Agile methodologies and running projects in sprints using JIRA and Confluence","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":153317,"maxValue":163317,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_de168cba-02c"},"title":"Principal Software Engineer, Platform Security","description":"<p>We&#39;re looking for a principal-level engineer to serve as a technical leader for platform security across Anduril. This role combines deep expertise in cryptography, systems security, and secure architecture with the ability to drive security strategy across business lines and the platform.</p>\n<p>As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Own the technical vision and architecture for platform security across Anduril&#39;s product ecosystem</li>\n<li>Design cryptographic systems, protocols, and key management architectures for autonomous and robotic platforms operating in contested and disconnected environments</li>\n<li>Lead the design of hardware root-of-trust architectures integrating TPMs, TEEs, HSMs, and secure boot across diverse embedded platforms</li>\n<li>Drive the strategy for promoting business-line security implementations into shared, composable platform services</li>\n<li>Serve as the senior technical authority for security architecture reviews across the organization, providing definitive guidance on cryptographic design, protocol security, and system hardening</li>\n<li>Define security patterns, reference architectures, and engineering standards that enable teams across Anduril to build securely and independently</li>\n<li>Mentor and develop senior engineers on the team, raising the bar for security engineering across the organization</li>\n<li>Represent Anduril&#39;s security engineering capabilities to customers, partners, and auditors when deep technical credibility is required</li>\n<li>Evaluate emerging threats, cryptographic standards, and security technologies, driving adoption where they strengthen the platform</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li>12+ years of experience in software engineering, with significant depth in systems security and cryptography</li>\n<li>Expert-level knowledge of cryptographic protocol design, including key management architectures, certificate systems, and cryptographic agility</li>\n<li>Deep experience with hardware security: TPM, TEE, HSM, secure boot, and hardware root-of-trust design across multiple platform types</li>\n<li>Proficient in two or more of: C++, Rust, Go</li>\n<li>Experience designing security architectures for embedded, real-time, or robotic systems with constrained environments</li>\n<li>Track record of leading cross-organizational technical initiatives and driving architectural decisions that span multiple teams</li>\n<li>Strong ability to communicate complex security concepts to engineering leadership, product teams, and external stakeholders</li>\n<li>Experience performing and leading threat modeling, security architecture reviews, and cryptographic design reviews</li>\n<li>Eligible to obtain and maintain active U.S. Secret security clearance</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Experience with post-quantum cryptography, distributed key generation (DKG), or threshold cryptographic schemes</li>\n<li>Background in defense, aerospace, or autonomous systems with exposure to FIPS 140, Common Criteria, or NSA CSfC requirements</li>\n<li>Experience designing secure communication protocols for autonomous platforms or mesh networks</li>\n<li>Deep knowledge of Linux kernel security, mandatory access controls (SELinux/AppArmor), and OS hardening at scale</li>\n<li>Experience building and evolving platform security services consumed by dozens of teams</li>\n<li>Familiarity with compliance frameworks (STIGs, NIST 800-53, CMMC) and translating them into engineering controls that don&#39;t compromise developer velocity</li>\n<li>Publications, patents, or recognized contributions in cryptography or systems security</li>\n<li>Experience with Nix build systems and reproducible build pipelines for security-critical software</li>\n</ul>\n<p>US Salary Range: $254,000-$336,000 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_de168cba-02c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anduril Industries","sameAs":"https://www.andurilindustries.com/","logo":"https://logos.yubhub.co/andurilindustries.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/andurilindustries/jobs/5087992007","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$254,000-$336,000 USD","x-skills-required":["cryptography","systems security","secure architecture","cryptographic protocol design","key management architectures","certificate systems","cryptographic agility","hardware security","TPM","TEE","HSM","secure boot","hardware root-of-trust design","embedded systems","real-time systems","robotic systems","constrained environments","cross-organizational technical initiatives","architectural decisions","complex security concepts","threat modeling","security architecture reviews","cryptographic design reviews","U.S. Secret security clearance"],"x-skills-preferred":["post-quantum cryptography","distributed key generation","threshold cryptographic schemes","defense","aerospace","autonomous systems","FIPS 140","Common Criteria","NSA CSfC requirements","secure communication protocols","mesh networks","Linux kernel security","mandatory access controls","OS hardening","compliance frameworks","STIGs","NIST 800-53","CMMC","publications","patents","recognized contributions","Nix build systems","reproducible build pipelines"],"datePosted":"2026-04-18T15:49:36.448Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Boston, Massachusetts, United States; Costa Mesa, California, United States; Seattle, Washington, United States; Washington, District of Columbia, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cryptography, systems security, secure architecture, cryptographic protocol design, key management architectures, certificate systems, cryptographic agility, hardware security, TPM, TEE, HSM, secure boot, hardware root-of-trust design, embedded systems, real-time systems, robotic systems, constrained environments, cross-organizational technical initiatives, architectural decisions, complex security concepts, threat modeling, security architecture reviews, cryptographic design reviews, U.S. Secret security clearance, post-quantum cryptography, distributed key generation, threshold cryptographic schemes, defense, aerospace, autonomous systems, FIPS 140, Common Criteria, NSA CSfC requirements, secure communication protocols, mesh networks, Linux kernel security, mandatory access controls, OS hardening, compliance frameworks, STIGs, NIST 800-53, CMMC, publications, patents, recognized contributions, Nix build systems, reproducible build pipelines","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":254000,"maxValue":336000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9e667b9c-eb8"},"title":"Senior Security Engineer II, Vulnerability Management","description":"<p>We are seeking a Senior Security Engineer to build the Vulnerability Management program protecting CoreWeave&#39;s AI infrastructure. You will architect intelligent automation systems that defend the GPU clusters powering breakthrough AI research and enterprise AI applications.</p>\n<p>This role combines technical depth, strategic thinking, and the autonomy to design workflows that will protect infrastructure driving the future of AI.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<ul>\n<li>Build and scale AI-powered triage workflows: evaluate tools (LLM integration, TINES orchestration), architect solutions, and deploy to production</li>\n<li>Drive intelligent, risk-based vulnerability prioritization while simultaneously training AI models,your assessments become the foundation for automation</li>\n<li>Influence automation priorities: recommend which areas of the vulnerability pipeline would most benefit from automation to improve team efficiency</li>\n<li>Design and implement automated detection-to-ticket pipelines: build workflows that generate vulnerability detections, test them, scale across the environment, and auto-create Jira tickets</li>\n<li>Execute remediation campaigns: build automated workflows for EOL product removal, vulnerable software upgrades, and OS migrations at scale</li>\n<li>Manage embargoed vendor disclosures from hardware partners, including embargo verification and zero-day response coordination</li>\n<li>Lead security incident investigations related to high-profile vulnerabilities, coordinating cross-functional response and impact assessment</li>\n<li>Participate in on-call rotation for rapid-response vulnerability analysis during active zero-day events or critical security incidents</li>\n<li>Partner with IT, Infrastructure, and Engineering teams to drive remediation efforts, enforce SLAs, and escalate blockers strategically</li>\n<li>Write daily operations reports documenting vulnerability trends, remediation velocity, and emerging threats for security leadership</li>\n<li>Drive process improvements and workflow automation to improve operational efficiency and reduce manual toil</li>\n</ul>\n<p><strong>Requirements:</strong></p>\n<ul>\n<li>7+ years of relevant experience with demonstrated impact in vulnerability management, application security, platform security, or cloud security engineering</li>\n<li>Bachelor’s or Master’s degree in Computer Science, Computer Engineering, Electrical Engineering, or equivalent practical experience</li>\n<li>Proven hands-on experience building security automation (SOAR workflows, detection pipelines, or vulnerability prioritization frameworks)</li>\n<li>Deep subject matter expertise with vulnerability management best practices: CVSS, EPSS, CISA KEV, exploit intelligence, and compensating controls</li>\n<li>Strong development background with proficiency in Python, Go, or similar languages for building production-grade security tools</li>\n<li>Experience with modern vulnerability management tooling such as Wiz, Semgrep, Rapid7, or similar platforms</li>\n<li>Demonstrated ability to partner with cross-functional teams (IT, SRE, Engineering) to drive remediation without formal authority</li>\n<li>Strong familiarity with common security vulnerabilities and the ability to judge their severity and business impact</li>\n</ul>\n<p><strong>Preferred Qualifications:</strong></p>\n<ul>\n<li>Practical experience building AI/ML-powered security workflows (LLM integration, automated triage, human-in-the-loop validation)</li>\n<li>Experience managing hardware security vulnerabilities (GPU/DPU firmware, BMC/IPMI, specialized compute environments)</li>\n<li>Production experience with security automation platforms such as TINES, Splunk SOAR, or serverless frameworks (AWS Lambda)</li>\n<li>Strong DevOps, DevSecOps, or SRE background with experience in AWS/GCP/Azure cloud services and Infrastructure as Code (Terraform, CloudFormation)</li>\n<li>Deep understanding of container security and Kubernetes (image scanning, admission control, runtime protection, supply chain security)</li>\n<li>Experience supporting customer audits (SOC 2, ISO 27001, FedRAMP) with vulnerability evidence and control validation</li>\n<li>Experience integrating vulnerability management into modern CI/CD pipelines with a &#39;shift-left&#39; mentality</li>\n</ul>\n<p><strong>What We Offer:</strong></p>\n<p>The base salary range for this role is $165,000 to $242,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>\n<p>The range we’ve posted represents the typical compensation range for this role. To determine actual compensation, we review the market rate for each candidate which can include a variety of factors. These include qualifications, experience, interview performance, and location.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9e667b9c-eb8","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4650290006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$165,000 to $242,000","x-skills-required":["vulnerability management","application security","platform security","cloud security engineering","Python","Go","security automation","SOAR workflows","detection pipelines","vulnerability prioritization frameworks","CVSS","EPSS","CISA KEV","exploit intelligence","compensating controls","Wiz","Semgrep","Rapid7"],"x-skills-preferred":["AI/ML-powered security workflows","hardware security vulnerabilities","security automation platforms","DevOps","DevSecOps","SRE","container security","Kubernetes","customer audits","CI/CD pipelines"],"datePosted":"2026-04-18T15:48:06.696Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"vulnerability management, application security, platform security, cloud security engineering, Python, Go, security automation, SOAR workflows, detection pipelines, vulnerability prioritization frameworks, CVSS, EPSS, CISA KEV, exploit intelligence, compensating controls, Wiz, Semgrep, Rapid7, AI/ML-powered security workflows, hardware security vulnerabilities, security automation platforms, DevOps, DevSecOps, SRE, container security, Kubernetes, customer audits, CI/CD pipelines","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":165000,"maxValue":242000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3d3e5c3d-569"},"title":"Senior Engineer, Datacenter Server Lifecycle","description":"<p>As a Senior Engineer on the Datacenter Machine Lifecycle team, you will own the end-to-end operational journey of every machine in our facility , from initial provisioning and deployment, across its working life, through maintenance and refresh, and all the way to decommissioning.</p>\n<p>This is greenfield work: you will help define the processes, tooling, and operational standards that govern how we run and retire hardware at scale.</p>\n<p>A distinguishing aspect of this role is its deep intersection with security. The machines in our datacenter handle some of the most sensitive workloads in AI , training frontier models and serving millions of users interacting with Claude.</p>\n<p>Ensuring that every machine in the fleet is trusted, attested, and operating with a verified chain of integrity from the hardware up is a core part of the job, not an afterthought.</p>\n<p>You will partner closely with our Infrastructure Security team to define and enforce trusted compute standards across the lifecycle, from secure provisioning through end-of-life handling.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Lead the build-out of automation to support datacenters containing tens of thousands of servers.</li>\n</ul>\n<ul>\n<li>Own and define the end-to-end machine lifecycle strategy , from provisioning and deployment through operation, maintenance, refresh, and decommissioning , and maintain automation and operational procedures for common lifecycle events (e.g. hardware failures, firmware upgrades, fleet rotations).</li>\n</ul>\n<ul>\n<li>Partner closely with Infrastructure Security to design and enforce trusted compute standards across the machine lifecycle.</li>\n</ul>\n<ul>\n<li>Work closely with our Networking team to ensure end-to-end connectivity across all sites.</li>\n</ul>\n<ul>\n<li>Build and maintain tooling to track machine health, configuration, and operational status across the full datacenter fleet.</li>\n</ul>\n<p>You May Be a Good Fit If You:</p>\n<ul>\n<li>Have 5+ years of experience in datacenter operations, hardware infrastructure management, or a closely related discipline.</li>\n</ul>\n<ul>\n<li>Have deep, hands-on experience with server hardware , including rack deployment, cabling, troubleshooting, and understanding failure modes at scale.</li>\n</ul>\n<ul>\n<li>Understand hardware lifecycle management end-to-end: asset tracking, provisioning workflows, maintenance scheduling, and decommissioning practices.</li>\n</ul>\n<ul>\n<li>Have strong proficiency in at least one programming language (e.g., Python, Rust, Go, or Java).</li>\n</ul>\n<ul>\n<li>Are comfortable navigating ambiguity and working independently to drive progress on complex, cross-functional problems.</li>\n</ul>\n<ul>\n<li>Communicate clearly and can build consensus with a wide range of stakeholders.</li>\n</ul>\n<ul>\n<li>Have working knowledge of modern cloud infrastructure, including Kubernetes, Infrastructure as Code, AWS, and GCP.</li>\n</ul>\n<ul>\n<li>Are comfortable with occasional travel to datacenter sites across North America.</li>\n</ul>\n<p>Strong Candidates May Also Have:</p>\n<ul>\n<li>Hands-on experience with GPU or AI accelerator hardware (e.g. NVIDIA A100/H100, AMD MI300, Google TPUs, or AWS Trainium) and an understanding of their operational demands.</li>\n</ul>\n<ul>\n<li>Familiarity with modern provisioning tooling such as coreboot, LinuxBoot, or u-root.</li>\n</ul>\n<ul>\n<li>Experience building or contributing to datacenter automation or fleet management platforms.</li>\n</ul>\n<ul>\n<li>Experience building and deploying server operating system distributions across thousands of hosts.</li>\n</ul>\n<ul>\n<li>A background in large-scale capacity planning and hardware refresh strategy, ideally at a hyperscaler or large cloud provider.</li>\n</ul>\n<ul>\n<li>Experience with trusted compute and hardware security concepts such as secure boot, TPM, hardware attestation, and firmware verification , or a strong desire to develop deep expertise in this area.</li>\n</ul>\n<p>The annual compensation range for this role is £255,000-£325,000 GBP.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3d3e5c3d-569","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5131038008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"£255,000-£325,000 GBP","x-skills-required":["datacenter operations","hardware infrastructure management","server hardware","programming language","cloud infrastructure","Kubernetes","Infrastructure as Code","AWS","GCP"],"x-skills-preferred":["GPU or AI accelerator hardware","modern provisioning tooling","datacenter automation","fleet management platforms","trusted compute and hardware security concepts"],"datePosted":"2026-04-18T15:47:48.808Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, UK"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"datacenter operations, hardware infrastructure management, server hardware, programming language, cloud infrastructure, Kubernetes, Infrastructure as Code, AWS, GCP, GPU or AI accelerator hardware, modern provisioning tooling, datacenter automation, fleet management platforms, trusted compute and hardware security concepts","baseSalary":{"@type":"MonetaryAmount","currency":"GBP","value":{"@type":"QuantitativeValue","minValue":255000,"maxValue":325000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d615fe4a-c53"},"title":"Manager, IT Hardware","description":"<p>We are seeking an experienced and dynamic IT Hardware Manager to lead our hardware lifecycle management operations across the organisation. This role will be instrumental in overseeing IT procurement, asset management, and our hardware device management platform (Oomnitza), ensuring seamless equipment delivery and tracking that supports our rapidly scaling defence technology operations.</p>\n<p>As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.</p>\n<p>The successful candidate will work at our headquarters in Costa Mesa and lead a team responsible for the strategic planning, procurement, deployment, and lifecycle management of all IT hardware assets.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Leading IT Hardware Operations: Manage and mentor a team responsible for IT procurement, asset management, device provisioning, and hardware lifecycle operations across all Anduril locations.</li>\n</ul>\n<ul>\n<li>Overseeing Procurement Strategy: Define and execute IT hardware procurement strategies, including vendor management, contract negotiations, cost optimisation, and supply chain coordination to ensure timely delivery of equipment.</li>\n</ul>\n<ul>\n<li>Managing Asset Lifecycle: Own the complete hardware asset lifecycle from requisition through deployment, maintenance, refresh cycles, and secure disposition, ensuring compliance with security and regulatory requirements.</li>\n</ul>\n<ul>\n<li>Optimising Oomnitza Platform: Serve as the primary owner of the Oomnitza hardware device management platform, driving continuous improvements in automation, integrations, reporting, and user experience.</li>\n</ul>\n<ul>\n<li>Developing Hardware Roadmap: Define and prioritise the roadmap for hardware standards, refresh cycles, emerging technologies, and asset management tool enhancements aligned with business growth and security requirements.</li>\n</ul>\n<ul>\n<li>Driving Process Excellence: Establish and champion hardware management policies, procedures, and best practices to ensure operational efficiency, cost effectiveness, and compliance with industry standards.</li>\n</ul>\n<ul>\n<li>Strategic Alignment: Partner with IT leadership, Finance, Security, and business stakeholders to align hardware strategies with organisational objectives and budget planning.</li>\n</ul>\n<ul>\n<li>Vendor Management: Build and maintain strategic relationships with hardware vendors, distributors, and service providers to ensure competitive pricing, quality service, and supply chain resilience.</li>\n</ul>\n<ul>\n<li>Data-Driven Decision Making: Monitor hardware inventory, utilisation metrics, procurement cycles, and costs; generate regular reports and insights for senior leadership to inform strategic decisions.</li>\n</ul>\n<ul>\n<li>Supporting Rapid Scaling: Enable Anduril&#39;s growth by ensuring efficient onboarding/offboarding processes, supporting new office openings, and maintaining hardware availability for global operations.</li>\n</ul>\n<ul>\n<li>Security and Compliance: Ensure all hardware procurement and management activities comply with security policies, including device encryption, secure provisioning, and audit requirements necessary for defence contractor operations.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d615fe4a-c53","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anduril Industries","sameAs":"https://www.anduril.com/","logo":"https://logos.yubhub.co/anduril.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/andurilindustries/jobs/5078713007","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$129,000-$171,000 USD","x-skills-required":["IT operations","Hardware lifecycle management","Procurement strategy","Vendor management","Data-driven decision making","Process excellence","Strategic alignment","Security and compliance"],"x-skills-preferred":["Oomnitza platform","API integrations","Automation workflows","Custom reporting","ERP/financial systems integrations","Automation technologies","Scripting","Hardware security requirements"],"datePosted":"2026-04-18T15:44:56.349Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Costa Mesa, California, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Technology","skills":"IT operations, Hardware lifecycle management, Procurement strategy, Vendor management, Data-driven decision making, Process excellence, Strategic alignment, Security and compliance, Oomnitza platform, API integrations, Automation workflows, Custom reporting, ERP/financial systems integrations, Automation technologies, Scripting, Hardware security requirements","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":129000,"maxValue":171000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_cbaf9906-291"},"title":"Platform Hardware Security","description":"<p>We&#39;re seeking a Platform Hardware Security Engineer to design and implement security architectures for bare-metal infrastructure. You&#39;ll work with teams across Anthropic to build firmware, bootloaders, operating systems, and attestation systems to ensure the integrity of our infrastructure from the ground up.</p>\n<p>This role requires expertise in low-level systems security and the ability to architect solutions that balance security requirements with the performance demands of training AI models across our massive fleet.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Design and implement secure boot chains from firmware through OS initialization for diverse hardware platforms (CPUs, BMCs, switches, peripherals, and embedded microcontrollers)</li>\n</ul>\n<ul>\n<li>Architect attestation systems that provide cryptographic proof of system state from hardware root of trust through application layer</li>\n</ul>\n<ul>\n<li>Develop measured boot implementations and runtime integrity monitoring</li>\n</ul>\n<ul>\n<li>Create reference architectures and security requirements for bare-metal deployments</li>\n</ul>\n<ul>\n<li>Integrate security controls with infrastructure teams without impacting training performance</li>\n</ul>\n<ul>\n<li>Prototype and validate security mechanisms before production deployment</li>\n</ul>\n<ul>\n<li>Conduct firmware vulnerability assessments and penetration testing</li>\n</ul>\n<ul>\n<li>Build firmware analysis pipelines for continuous security monitoring</li>\n</ul>\n<ul>\n<li>Document security architectures and maintain threat models</li>\n</ul>\n<ul>\n<li>Collaborate with software and hardware vendors to ensure security capabilities meet our requirements</li>\n</ul>\n<p>Who you are:</p>\n<ul>\n<li>8+ years of experience in systems security, with at least 5 years focused on firmware and hardware security (firmware, bootloaders, and OS-level security)</li>\n</ul>\n<ul>\n<li>Hands-on experience with secure boot, measured boot, and attestation technologies (TPM, Intel TXT, AMD SEV, ARM TrustZone)</li>\n</ul>\n<ul>\n<li>Strong understanding of cryptographic protocols and hardware security modules</li>\n</ul>\n<ul>\n<li>Experience with UEFI/BIOS or embedded firmware security, bootloader hardening, and chain of trust implementation</li>\n</ul>\n<ul>\n<li>Proficiency in low-level programming (C, Rust, Assembly) and systems programming</li>\n</ul>\n<ul>\n<li>Knowledge of firmware vulnerability assessment and threat modeling</li>\n</ul>\n<ul>\n<li>Track record of designing security architectures for complex, distributed systems</li>\n</ul>\n<ul>\n<li>Experience with supply chain security</li>\n</ul>\n<ul>\n<li>Ability to work effectively across hardware and software boundaries</li>\n</ul>\n<ul>\n<li>Knowledge of NIST firmware security guidelines and hardware security frameworks</li>\n</ul>\n<p>Strong candidates may also have:</p>\n<ul>\n<li>Experience with confidential computing technologies and hardware-based TEEs</li>\n</ul>\n<ul>\n<li>Knowledge of SLSA framework and software supply chain security standards</li>\n</ul>\n<ul>\n<li>Experience securing large-scale HPC or cloud infrastructure</li>\n</ul>\n<ul>\n<li>Contributions to open-source security projects (coreboot, CHIPSEC, etc.)</li>\n</ul>\n<ul>\n<li>Background in formal verification or security proof techniques</li>\n</ul>\n<ul>\n<li>Experience with silicon root of trust implementations</li>\n</ul>\n<ul>\n<li>Experience working with building foundational technical designs, operational leadership, and vendor collaboration</li>\n</ul>\n<ul>\n<li>Previous work with AI/ML infrastructure security</li>\n</ul>\n<p>Annual Salary: $405,000-$485,000 USD</p>\n<p>Logistics:</p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n</ul>\n<ul>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n</ul>\n<ul>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n</ul>\n<ul>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n</ul>\n<ul>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p>Why work with us?</p>\n<ul>\n<li>Competitive compensation and benefits</li>\n</ul>\n<ul>\n<li>Optional equity donation matching</li>\n</ul>\n<ul>\n<li>Generous vacation and parental leave</li>\n</ul>\n<ul>\n<li>Flexible working hours</li>\n</ul>\n<ul>\n<li>Lovely office space in which to collaborate with colleagues</li>\n</ul>\n<p>Guidance on Candidates&#39; AI Usage: Learn about our policy for using AI in our application process</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_cbaf9906-291","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4929689008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$405,000-$485,000 USD","x-skills-required":["Secure boot","Measured boot","Attestation technologies","Cryptographic protocols","Hardware security modules","UEFI/BIOS or embedded firmware security","Bootloader hardening","Chain of trust implementation","Low-level programming","Systems programming","Firmware vulnerability assessment","Threat modeling","Supply chain security","NIST firmware security guidelines","Hardware security frameworks"],"x-skills-preferred":["Confidential computing technologies","Hardware-based TEEs","SLSA framework","Software supply chain security standards","Large-scale HPC or cloud infrastructure","Open-source security projects","Formal verification","Security proof techniques","Silicon root of trust implementations","Vendor collaboration","AI/ML infrastructure security"],"datePosted":"2026-04-18T15:43:00.394Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York City, NY | Seattle, WA; San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Secure boot, Measured boot, Attestation technologies, Cryptographic protocols, Hardware security modules, UEFI/BIOS or embedded firmware security, Bootloader hardening, Chain of trust implementation, Low-level programming, Systems programming, Firmware vulnerability assessment, Threat modeling, Supply chain security, NIST firmware security guidelines, Hardware security frameworks, Confidential computing technologies, Hardware-based TEEs, SLSA framework, Software supply chain security standards, Large-scale HPC or cloud infrastructure, Open-source security projects, Formal verification, Security proof techniques, Silicon root of trust implementations, Vendor collaboration, AI/ML infrastructure security","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":405000,"maxValue":485000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c629a0da-f6c"},"title":"Security Engineer","description":"<p>We&#39;re seeking a Security Engineer at the senior-level or above focused on hardware, embedded systems, and firmware security to own the security posture of Saronic&#39;s vessel hardware platforms from silicon to system.</p>\n<p>You will be the technical authority on hardware root of trust, secure boot, firmware integrity, embedded system hardening, and the security of third-party hardware integrations. Your work ensures that every component on the vessel is resilient against tampering, exploitation, and supply chain compromise, designed in from the start and maintained across the fleet lifecycle.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li><p>Conduct hardware security assessments including fault injection, side-channel analysis, interface evaluation, and bus protocol analysis across Saronic-built and third-party hardware including sensors, radios, navigation systems, propulsion controllers, and communication modules</p>\n</li>\n<li><p>Evaluate and harden physical interfaces, debug ports, maintenance access points, and removable media interfaces on vessel hardware</p>\n</li>\n<li><p>Evaluate supply chain security risks for hardware components and recommend provenance validation, anti-tamper, and attestation controls</p>\n</li>\n<li><p>Develop and maintain a hardware security testing capability including tooling, methodology, and repeatable test procedures</p>\n</li>\n<li><p>Design and implement secure boot chains establishing hardware root of trust from power-on through application launch, integrating TPM, secure elements, and HSMs for device identity, key storage, measured boot, and remote attestation</p>\n</li>\n<li><p>Design and implement secure firmware update mechanisms including signed updates, rollback protection, and verified delivery across the fleet</p>\n</li>\n<li><p>Own the cryptographic key lifecycle for hardware-bound keys, including provisioning, rotation, revocation, and escrow</p>\n</li>\n<li><p>Harden embedded Linux systems on vessel platforms, including kernel configuration, mandatory access controls, secure IPC, and attack surface reduction</p>\n</li>\n<li><p>Secure operational technology protocols and interfaces used in vessel control systems, propulsion, navigation, and sensor fusion including CAN bus, NMEA, and maritime/industrial communication protocols</p>\n</li>\n<li><p>Define security boundaries, trust zones, and segmentation strategies for vessel-internal compute and communication architectures</p>\n</li>\n<li><p>Drive threat modeling across vessel hardware subsystems and translate findings into actionable engineering requirements</p>\n</li>\n<li><p>Produce secure-by-design reference architectures and define hardware and firmware security standards, testing requirements, and acceptance criteria integrated into engineering workflows</p>\n</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li><p>6+ years of hands-on experience in hardware security, embedded systems security, firmware security, or a closely related security engineering role</p>\n</li>\n<li><p>Deep expertise in hardware hacking techniques including fault injection, side-channel attacks, JTAG/SWD exploitation, bus sniffing/injection, and physical security assessments</p>\n</li>\n<li><p>Demonstrated experience designing and implementing secure boot chains, hardware root of trust, and secure firmware update mechanisms in production systems</p>\n</li>\n<li><p>Strong experience assessing third-party hardware integrations and evaluating supply chain security risks</p>\n</li>\n<li><p>Deep knowledge of embedded Linux security hardening, kernel security, and mandatory access control frameworks</p>\n</li>\n<li><p>Experience with operational technology security, industrial protocols, or control system security</p>\n</li>\n<li><p>Proficiency in C, C++, Python, or Rust in the context of firmware, embedded, or systems-level security work, and with hardware security testing tools</p>\n</li>\n<li><p>Ability to obtain and maintain a security clearance</p>\n</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li><p>Experience in defense, aerospace, robotics, autonomy, maritime, or other high-assurance environments</p>\n</li>\n<li><p>Experience with autonomous systems, unmanned vehicles, or safety-critical embedded platforms</p>\n</li>\n<li><p>Experience with RTOS, microcontroller security, or resource-constrained device environments</p>\n</li>\n<li><p>Knowledge of CAN bus, NMEA protocols, maritime communication systems, RF/GPS/GNSS security, or ICS security standards</p>\n</li>\n<li><p>Familiarity with defense or safety-critical compliance frameworks (NIST SP 800-53, IEC 62443, Common Criteria, or equivalent)</p>\n</li>\n<li><p>Relevant certifications such as OSEE, GXPN, GSE, or hardware-focused credentials</p>\n</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c629a0da-f6c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Saronic Technologies","sameAs":"https://www.saronictechnologies.com/","logo":"https://logos.yubhub.co/saronictechnologies.com.png"},"x-apply-url":"https://jobs.lever.co/saronic/4b15b1b4-3c34-47ad-b964-dbcf0f8a3dc4","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Hardware security","Embedded systems security","Firmware security","Fault injection","Side-channel analysis","Interface evaluation","Bus protocol analysis","Physical security assessments","Secure boot chains","Hardware root of trust","Firmware integrity","Embedded system hardening","Third-party hardware integrations","Supply chain security risks","Provenance validation","Anti-tamper","Attestation controls","Hardware security testing","Tooling","Methodology","Repeatable test procedures","Device identity","Key storage","Measured boot","Remote attestation","Signed updates","Rollback protection","Verified delivery","Cryptographic key lifecycle","Provisioning","Rotation","Revocation","Escrow","Embedded Linux systems","Kernel configuration","Mandatory access controls","Secure IPC","Attack surface reduction","Operational technology protocols","Industrial protocols","Control system security","CAN bus","NMEA","Maritime/industrial communication protocols","Security boundaries","Trust zones","Segmentation strategies","Threat modeling","Actionable engineering requirements","Secure-by-design reference architectures","Hardware and firmware security standards","Testing requirements","Acceptance criteria","Engineering workflows","C","C++","Python","Rust","Hardware security testing tools"],"x-skills-preferred":["Defense","Aerospace","Robotics","Autonomy","Maritime","High-assurance environments","Autonomous systems","Unmanned vehicles","Safety-critical embedded platforms","RTOS","Microcontroller security","Resource-constrained device environments","NMEA protocols","Maritime communication systems","RF/GPS/GNSS security","ICS security standards","Defense or safety-critical compliance frameworks","OSEE","GXPN","GSE","Hardware-focused credentials"],"datePosted":"2026-04-17T12:57:49.070Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Hardware security, Embedded systems security, Firmware security, Fault injection, Side-channel analysis, Interface evaluation, Bus protocol analysis, Physical security assessments, Secure boot chains, Hardware root of trust, Firmware integrity, Embedded system hardening, Third-party hardware integrations, Supply chain security risks, Provenance validation, Anti-tamper, Attestation controls, Hardware security testing, Tooling, Methodology, Repeatable test procedures, Device identity, Key storage, Measured boot, Remote attestation, Signed updates, Rollback protection, Verified delivery, Cryptographic key lifecycle, Provisioning, Rotation, Revocation, Escrow, Embedded Linux systems, Kernel configuration, Mandatory access controls, Secure IPC, Attack surface reduction, Operational technology protocols, Industrial protocols, Control system security, CAN bus, NMEA, Maritime/industrial communication protocols, Security boundaries, Trust zones, Segmentation strategies, Threat modeling, Actionable engineering requirements, Secure-by-design reference architectures, Hardware and firmware security standards, Testing requirements, Acceptance criteria, Engineering workflows, C, C++, Python, Rust, Hardware security testing tools, Defense, Aerospace, Robotics, Autonomy, Maritime, High-assurance environments, Autonomous systems, Unmanned vehicles, Safety-critical embedded platforms, RTOS, Microcontroller security, Resource-constrained device environments, NMEA protocols, Maritime communication systems, RF/GPS/GNSS security, ICS security standards, Defense or safety-critical compliance frameworks, OSEE, GXPN, GSE, Hardware-focused credentials"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_576661da-536"},"title":"Member of Technical Staff, Security Engineering","description":"<p>At Anchorage Digital, we are building the world’s most advanced digital asset platform for institutions to participate in crypto.\\n\\nWe are seeking a highly skilled Member of Technical Staff, Security Engineering to join our team. This role will be responsible for developing and implementing high-quality, secure code for cryptographic controls throughout our infrastructure.\\n\\nKey Responsibilities:\\n\\n* Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure.\\n* Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails.\\n* Foster an efficient testing culture while reducing technical debt and unnecessary processes.\\n\\nComplexity and Impact of Work:\\n\\n* Build robust, resilient components that are easily integrated by other teams to ensure asset and data security.\\n* Develop and maintain threat models for cryptosystem guarantees, both internal and external.\\n* Monitor technical debt and proactively identify areas for improvement.\\n* Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight.\\n* Coordinate team members across engineering boundaries and drive projects from inception to completion.\\n\\nOrganizational Knowledge:\\n\\n* Understand and help implement the company&#39;s strategy by participating in planning and defining the Security Team&#39;s strategic goals in alignment with Anchorage Digital&#39;s overall objectives.\\n* Stay alert to emerging company objectives and industry trends that could affect organizational success.\\n* Consider security holistically across the entire product ecosystem while fostering a security-first company culture.\\n\\nCommunication and Influence:\\n\\n* Share knowledge broadly across the team while preventing single points of failure.\\n* Mentor and guide engineers throughout the Engineering team.\\n* Collaborate across teams to solve problems, review specifications, and engage in technical discussions.\\n* Communicate insights and recommendations clearly to improve processes and address technical debt.\\n\\nYou may be a fit for this role if you have:\\n\\n* A strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries.\\n* Experience with the configuration and use of Hardware Security Modules (HSMs) for secure key generation, storage, and management.\\n* Understanding and implementation of various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC).\\n* Ability to identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies.\\n* Developed computer science fundamentals, such as concurrency, algorithms, and data structures.\\n* Genuine care about code quality and test infrastructure.\\n* Prioritization of security, end-user experience, and business value over &#39;cool tech&#39;.\\n\\nAlthough not a requirement, bonus points if:\\n\\n* You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations.\\n* You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_576661da-536","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anchorage Digital","sameAs":"https://anchorage.com","logo":"https://logos.yubhub.co/anchorage.com.png"},"x-apply-url":"https://jobs.lever.co/anchorage/e5d0f1ac-3126-481e-857f-db6ae8eb67e9","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cryptography","symmetric/asymmetric encryption","hashing algorithms","digital signatures","key exchange protocols","Hardware Security Modules (HSMs)","authentication and authorization","multi-factor authentication","OAuth 2.0","role-based access control (RBAC)","threat modeling","computer science fundamentals","concurrency","algorithms","data structures"],"x-skills-preferred":[],"datePosted":"2026-04-17T12:24:08.463Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"cryptography, symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, Hardware Security Modules (HSMs), authentication and authorization, multi-factor authentication, OAuth 2.0, role-based access control (RBAC), threat modeling, computer science fundamentals, concurrency, algorithms, data structures"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ee9f5559-165"},"title":"Cloud Security Software Engineer","description":"<p>Job Description:</p>\n<p>About Engineering at Engine by Starling</p>\n<p>At Engine by Starling, we don&#39;t do &#39;checkbox security&#39;,we build security software. We treat security as a first-class engineering discipline, where the solution to a threat isn&#39;t a policy, but a robust, concurrent system written in Go.</p>\n<p>As a Cloud Security Software Engineer, you will be a hands-on builder responsible for the security architecture of our multi-tenant core banking platform. You&#39;ll spend your days architecting and writing Go-based tooling, automating defenses, and ensuring our infrastructure across AWS and GCP is secure by design and compliant by default.</p>\n<p>The Mission</p>\n<p>Your mission is to solve complex security problems through software engineering, focusing on three core pillars:</p>\n<ul>\n<li>Identity &amp; Network Security: Engineering high-performance IAM controls and zero-trust network architectures. You will lead the way in refining edge-defense strategies and trust redirection, ensuring every request is verified and encrypted at scale.</li>\n<li>Unified Vulnerability Orchestration: Architecting a custom &#39;single pane of glass&#39; for security data. You will build Go-based API integrations and microservices that bridge scanning engines, dependency trackers, and internal portals into a seamless, automated ecosystem.</li>\n<li>Compliance as Code: Building the automated systems that provide real-time evidence for frameworks like SOC 2, ISO 27001 &amp; PCI. You’ll ensure we stay compliant through continuous, automated validation rather than manual overhead.</li>\n</ul>\n<p>The Team</p>\n<p>You will be a key member of our growing Security Engineering team, working at the intersection of Infrastructure, Cross-Cutting, and GRC. We operate like a specialized product team: we identify security friction and build the software to eliminate it. You won’t work in a silo; you’ll collaborate with engineers across the business to deliver a platform that is resilient by default.</p>\n<p>About You</p>\n<p>We are looking for Software Engineers who are passionate about the Go ecosystem and want to apply those skills to mission-critical security challenges. Whether you come from a Security Engineering background or you are a Backend Engineer with a &#39;security-first&#39; mindset, we value your ability to write clean, maintainable, and efficient code.</p>\n<p>What you’ll get to do</p>\n<ul>\n<li>Engineering Security Tooling: Lead the design and maintenance of our internal security tool suite, written primarily in Go, to automate evidence collection and real-time remediation of security alerts.</li>\n<li>Infrastructure as Code: Write and peer-review Terraform and custom providers to manage identity and core infrastructure across AWS and GCP.</li>\n<li>Supply Chain Security: Build automated systems to manage container provenance and integrate security analysis into our CI/CD pipelines (GitHub Actions/TeamCity).</li>\n<li>Cloud Native Defense: Engineer Kubernetes security solutions leveraging Cilium, eBPF, and custom controllers to protect our microservices.</li>\n<li>Cryptographic Engineering (PKI): Build and maintain our Go-based Certificate Authority (CA) tooling and internal PKI infrastructure.</li>\n<li>Incident Response: Support the team in automated incident response, building the tools that help us investigate and mitigate threats faster.</li>\n</ul>\n<p>Requirements</p>\n<p>What skills are essential:</p>\n<ul>\n<li>Go Specialist: You are proficient in Go. You understand its concurrency models, testing patterns, and how to build idiomatic, performant services.</li>\n<li>The Builder Mindset: You find manual work a personal affront. If a task needs to be done twice, you’ve already started planning the automation for it.</li>\n<li>Cloud Native: Practical experience with AWS or GCP, ideally managed through Terraform.</li>\n<li>Container Expertise: You understand Kubernetes internals,from the runtime security to the service mesh.</li>\n<li>Identity &amp; Networking: Strong understanding of cloud identity models and network protocols.</li>\n</ul>\n<p>What skills are desirable:</p>\n<ul>\n<li>Experience with Cilium or eBPF-based security monitoring.</li>\n<li>Knowledge of Sigstore/Cosign, image provenance, and SBOMs.</li>\n<li>Familiarity with hardware security modules (HSMs) or advanced cryptography.</li>\n<li>Cloud-native security certifications (AWS/GCP).</li>\n</ul>\n<p>Benefits</p>\n<ul>\n<li>33 days holiday (including public holidays, which you can take when it works best for you)</li>\n<li>An extra day’s holiday for your birthday</li>\n<li>Annual leave is increased with length of service, and you can choose to buy or sell up to five extra days off</li>\n<li>16 hours paid volunteering time a year</li>\n<li>Salary sacrifice, company enhanced pension scheme</li>\n<li>Life insurance at 4x your salary &amp; group income protection</li>\n<li>Private Medical Insurance with VitalityHealth including mental health support and cancer care. Partner benefits include discounts with Waitrose, Mr&amp;Mrs Smith and Peloton</li>\n<li>Generous family-friendly policies</li>\n<li>Incentives refer a friend scheme</li>\n<li>Perkbox membership giving access to retail discounts, a wellness platform for physical and mental health, and weekly free and boosted perks</li>\n<li>Access to initiatives like Cycle to Work, Salary Sacrificed Gym partnerships and Electric Vehicle (EV) leasing</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ee9f5559-165","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Engine by Starling","sameAs":"https://www.enginebystarling.com/","logo":"https://logos.yubhub.co/enginebystarling.com.png"},"x-apply-url":"https://apply.workable.com/j/094F13AD03","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Go","Terraform","Kubernetes","Cilium","eBPF","Sigstore","Cosign","image provenance","SBOMs","hardware security modules","advanced cryptography","cloud-native security certifications"],"x-skills-preferred":[],"datePosted":"2026-03-20T16:14:38.230Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Go, Terraform, Kubernetes, Cilium, eBPF, Sigstore, Cosign, image provenance, SBOMs, hardware security modules, advanced cryptography, cloud-native security certifications"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3a6efc4b-131"},"title":"ASIC Security Staff Engineer","description":"<p><strong>Overview</strong></p>\n<p>We are seeking a highly skilled ASIC Security Staff Engineer to join our team at Synopsys. As a key member of our Security IP team, you will be responsible for designing and implementing secure ASIC solutions for various industries.</p>\n<p><strong>Job Description</strong></p>\n<p><strong>What You&#39;ll Be Doing:</strong></p>\n<ul>\n<li>Designing and implementing RTL in Verilog and/or System Verilog for Security Applications.</li>\n<li>Creating and designing test environments for digital hardware Security IP cores and subsystems using System Verilog and UVM.</li>\n<li>Conducting hardware verification of IP cores and subsystems utilizing modern verification techniques such as UVM or formal verification.</li>\n<li>Collaborating with hardware and software security experts to perform functional and performance analysis of embedded hardware/software IP solutions.</li>\n<li>Working within an international team setup, contributing to global projects.</li>\n<li>Ensuring adherence to high-quality standards and best practices in digital design and verification processes.</li>\n</ul>\n<p><strong>The Impact You Will Have:</strong></p>\n<ul>\n<li>Enhancing the performance and security of our IP cores and subsystems.</li>\n<li>Contributing to the rapid integration of advanced capabilities into SoCs, meeting unique performance, power, and size requirements.</li>\n<li>Reducing time-to-market for differentiated products with minimized risk.</li>\n<li>Driving innovation in the fields of CyberSecurity, High Performance Computing, Artificial Intelligence, and Automotive.</li>\n<li>Collaborating with a diverse team to deliver leading-edge solutions that shape the future of technology.</li>\n<li>Playing a key role in maintaining Synopsys&#39; position as a leader in chip design and software security.</li>\n</ul>\n<p><strong>What You&#39;ll Need:</strong></p>\n<ul>\n<li>3+ years Experience in RTL design of hardware IP components.</li>\n<li>Proficiency in ASIC verification using System Verilog, UVM, and or Verilog</li>\n<li>Ability to create detailed specifications for test environments.</li>\n<li>MSc or PhD in Electrical Engineering or Computer Science.</li>\n<li>Strong understanding of IC Design flows and exceptional problem-solving and debugging skills.</li>\n</ul>\n<p><strong>Who You Are:</strong></p>\n<ul>\n<li>A strong communicator with excellent written and verbal skills.</li>\n<li>A team player who thrives in a collaborative international environment.</li>\n<li>An innovative thinker who is passionate about technology and continuous improvement.</li>\n<li>Detail-oriented and committed to delivering high-quality work.</li>\n<li>Adaptable and able to manage multiple tasks effectively.</li>\n</ul>\n<p><strong>The Team You’ll Be A Part Of:</strong></p>\n<p>You will be joining the Security IP team in Eindhoven at the High Tech Campus, a dynamic and innovative group dedicated to extending the Security IP business in markets such as CyberSecurity, High Performance Computing, Artificial Intelligence, and Automotive. Our team is composed of experts in hardware and software security, working together to develop state-of-the-art IP cores and subsystems. We value collaboration, creativity, and a commitment to excellence.</p>\n<p><strong>Rewards and Benefits:</strong></p>\n<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>\n<p>At Synopsys, we want talented people of every background to feel valued and supported to do their best work. Synopsys considers all applicants for employment without regard to race, color, religion, national origin, gender, sexual orientation, age, military veteran status, or disability.</p>\n<p><strong>Benefits</strong></p>\n<p>At Synopsys, innovation is driven by our incredible team around the world. We feel honored to work alongside such talented and passionate individuals who choose to make a difference here every day. We&#39;re proud to provide the comprehensive benefits and rewards that our team truly deserves.</p>\n<p>Visit Benefits Page</p>\n<ul>\n<li>### Health &amp; Wellness</li>\n</ul>\n<p>Comprehensive medical and healthcare plans that work for you and your family.</p>\n<ul>\n<li>### Time Away</li>\n</ul>\n<p>In addition to company holidays, we have ETO and FTO Programs.</p>\n<ul>\n<li>### Family Support</li>\n</ul>\n<p>Maternity and paternity leave, parenting resources, adoption and surrogacy assistance, and more.</p>\n<ul>\n<li>### ESPP</li>\n</ul>\n<p>Purchase Synopsys common stock at a 15% discount, with a 24 month look-back.</p>\n<ul>\n<li>### Retirement Plans</li>\n</ul>\n<p>Save for your future with our retirement plans that vary by region and country.</p>\n<ul>\n<li>### Compensation</li>\n</ul>\n<p>Competitive salaries.</p>\n<p>\\<em>\\</em> Benefits vary by country and region - check with your recruiter to confirm</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3a6efc4b-131","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/eindhoven/asic-security-staff-engineer/44408/91940192192","x-work-arrangement":"onsite","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["RTL design","Verilog","System Verilog","UVM","Formal verification","IC Design flows","Problem-solving and debugging skills"],"x-skills-preferred":["ASIC verification","Digital hardware Security IP cores and subsystems","Embedded hardware/software IP solutions"],"datePosted":"2026-03-09T11:09:25.644Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Eindhoven"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"RTL design, Verilog, System Verilog, UVM, Formal verification, IC Design flows, Problem-solving and debugging skills, ASIC verification, Digital hardware Security IP cores and subsystems, Embedded hardware/software IP solutions"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_fb4fa003-a73"},"title":"Platform Hardware Security Engineer","description":"<p><strong>About the Role</strong></p>\n<p>We&#39;re seeking a Platform Hardware Security Engineer to design and implement security architectures for bare-metal infrastructure. You&#39;ll work with teams across Anthropic to build firmware, bootloaders, operating systems, and attestation systems to ensure the integrity of our infrastructure from the ground up.</p>\n<p>This role requires expertise in low-level systems security and the ability to architect solutions that balance security requirements with the performance demands of training AI models across our massive fleet.</p>\n<p><strong>What you&#39;ll do:</strong></p>\n<ul>\n<li>Design and implement secure boot chains from firmware through OS initialization for diverse hardware platforms (CPUs, BMCs, switches, peripherals, and embedded microcontrollers)</li>\n<li>Architect attestation systems that provide cryptographic proof of system state from hardware root of trust through application layer</li>\n<li>Develop measured boot implementations and runtime integrity monitoring</li>\n<li>Create reference architectures and security requirements for bare-metal deployments</li>\n<li>Integrate security controls with infrastructure teams without impacting training performance</li>\n<li>Prototype and validate security mechanisms before production deployment</li>\n<li>Conduct firmware vulnerability assessments and penetration testing</li>\n<li>Build firmware analysis pipelines for continuous security monitoring</li>\n<li>Document security architectures and maintain threat models</li>\n<li>Collaborate with software and hardware vendors to ensure security capabilities meet our requirements</li>\n</ul>\n<p><strong>Who you are:</strong></p>\n<ul>\n<li>8+ years of experience in systems security, with at least 5 years focused on firmware and hardware security (firmware, bootloaders, and OS-level security)</li>\n<li>Hands-on experience with secure boot, measured boot, and attestation technologies (TPM, Intel TXT, AMD SEV, ARM TrustZone)</li>\n<li>Strong understanding of cryptographic protocols and hardware security modules</li>\n<li>Experience with UEFI/BIOS or embedded firmware security, bootloader hardening, and chain of trust implementation</li>\n<li>Proficiency in low-level programming (C, Rust, Assembly) and systems programming</li>\n<li>Knowledge of firmware vulnerability assessment and threat modeling</li>\n<li>Track record of designing security architectures for complex, distributed systems</li>\n<li>Experience with supply chain security</li>\n<li>Ability to work effectively across hardware and software boundaries</li>\n<li>Knowledge of NIST firmware security guidelines and hardware security frameworks</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Experience with confidential computing technologies and hardware-based TEEs</li>\n<li>Knowledge of SLSA framework and software supply chain security standards</li>\n<li>Experience securing large-scale HPC or cloud infrastructure</li>\n<li>Contributions to open-source security projects (coreboot, CHIPSEC, etc.)</li>\n<li>Background in formal verification or security proof techniques</li>\n<li>Experience with silicon root of trust implementations</li>\n<li>Experience working with building foundational technical designs, operational leadership, and vendor collaboration</li>\n<li>Previous work with AI/ML infrastructure security</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_fb4fa003-a73","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4929689008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$405,000 - $485,000 USD","x-skills-required":["firmware security","hardware security","secure boot","measured boot","attestation technologies","cryptographic protocols","hardware security modules","UEFI/BIOS","embedded firmware security","bootloader hardening","chain of trust implementation","low-level programming","systems programming","firmware vulnerability assessment","threat modeling","supply chain security","NIST firmware security guidelines","hardware security frameworks"],"x-skills-preferred":["confidential computing technologies","hardware-based TEEs","SLSA framework","software supply chain security standards","large-scale HPC or cloud infrastructure","open-source security projects","formal verification","security proof techniques","silicon root of trust implementations","AI/ML infrastructure security"],"datePosted":"2026-03-08T13:47:08.377Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York City, NY; Seattle, WA; San Francisco, CA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"firmware security, hardware security, secure boot, measured boot, attestation technologies, cryptographic protocols, hardware security modules, UEFI/BIOS, embedded firmware security, bootloader hardening, chain of trust implementation, low-level programming, systems programming, firmware vulnerability assessment, threat modeling, supply chain security, NIST firmware security guidelines, hardware security frameworks, confidential computing technologies, hardware-based TEEs, SLSA framework, software supply chain security standards, large-scale HPC or cloud infrastructure, open-source security projects, formal verification, security proof techniques, silicon root of trust implementations, AI/ML infrastructure security","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":405000,"maxValue":485000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9d1edc39-95f"},"title":"Senior Engineer, Datacenter Server Lifecycle","description":"<p><strong>About the Role</strong></p>\n<p>Anthropic is expanding beyond cloud infrastructure, and this role sits at the heart of that effort. As a Senior Engineer on the Datacenter Machine Lifecycle team, you will own the end-to-end operational journey of every machine in our facility — from initial provisioning and deployment, across its working life, through maintenance and refresh, and all the way to decommissioning. This is greenfield work: you will help define the processes, tooling, and operational standards that govern how we run and retire hardware at scale.</p>\n<p>A distinguishing aspect of this role is its deep intersection with security. The machines in our datacenter handle some of the most sensitive workloads in AI — training frontier models and serving millions of users interacting with Claude. Ensuring that every machine in the fleet is trusted, attested, and operating with a verified chain of integrity from the hardware up is a core part of the job, not an afterthought. You will partner closely with our Infrastructure Security team to define and enforce trusted compute standards across the lifecycle, from secure provisioning through end-of-life handling.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Lead the build-out of automation to support datacenters containing tens of thousands of servers.</li>\n<li>Own and define the end-to-end machine lifecycle strategy — from provisioning and deployment through operation, maintenance, refresh, and decommissioning — and maintain automation and operational procedures for common lifecycle events (e.g. hardware failures, firmware upgrades, fleet rotations).</li>\n<li>Partner closely with Infrastructure Security to design and enforce trusted compute standards across the machine lifecycle.</li>\n<li>Work closely with our Networking team to ensure end-to-end connectivity across all sites.</li>\n<li>Build and maintain tooling to track machine health, configuration, and operational status across the full datacenter fleet.</li>\n</ul>\n<p><strong>You May Be a Good Fit If You</strong></p>\n<ul>\n<li>Have 5+ years of experience in datacenter operations, hardware infrastructure management, or a closely related discipline.</li>\n<li>Have deep, hands-on experience with server hardware — including rack deployment, cabling, troubleshooting, and understanding failure modes at scale.</li>\n<li>Understand hardware lifecycle management end-to-end: asset tracking, provisioning workflows, maintenance scheduling, and decommissioning practices.</li>\n<li>Have strong proficiency in at least one programming language (e.g., Python, Rust, Go, or Java).</li>\n<li>Are comfortable navigating ambiguity and working independently to drive progress on complex, cross-functional problems.</li>\n<li>Communicate clearly and can build consensus with a wide range of stakeholders.</li>\n<li>Have working knowledge of modern cloud infrastructure, including Kubernetes, Infrastructure as Code, AWS, and GCP.</li>\n<li>Are comfortable with occasional travel to datacenter sites across North America.</li>\n</ul>\n<p><strong>Strong Candidates May Also Have</strong></p>\n<ul>\n<li>Hands-on experience with GPU or AI accelerator hardware (e.g. NVIDIA A100/H100, AMD MI300, Google TPUs, or AWS Trainium) and an understanding of their operational demands.</li>\n<li>Familiarity with modern provisioning tooling such as coreboot, LinuxBoot, or u-root.</li>\n<li>Experience building or contributing to datacenter automation or fleet management platforms.</li>\n<li>Experience building and deploying server operating system distributions across thousands of hosts.</li>\n<li>A background in large-scale capacity planning and hardware refresh strategy, ideally at a hyperscaler or large cloud provider.</li>\n<li>Experience with trusted compute and hardware security concepts such as secure boot, TPM, hardware attestation, and firmware verification — or a strong desire to develop deep expertise in this area.</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</p>\n<p><strong>Your safety matters to us.</strong> To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9d1edc39-95f","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5131038008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"£255,000 - £325,000GBP","x-skills-required":["datacenter operations","hardware infrastructure management","server hardware","programming language","cloud infrastructure","Kubernetes","Infrastructure as Code","AWS","GCP"],"x-skills-preferred":["GPU or AI accelerator hardware","modern provisioning tooling","datacenter automation","fleet management platforms","server operating system distributions","trusted compute and hardware security concepts"],"datePosted":"2026-03-08T13:45:45.465Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, UK"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"datacenter operations, hardware infrastructure management, server hardware, programming language, cloud infrastructure, Kubernetes, Infrastructure as Code, AWS, GCP, GPU or AI accelerator hardware, modern provisioning tooling, datacenter automation, fleet management platforms, server operating system distributions, trusted compute and hardware security concepts","baseSalary":{"@type":"MonetaryAmount","currency":"GBP","value":{"@type":"QuantitativeValue","minValue":255000,"maxValue":325000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_698ab01f-9f8"},"title":"Technical Lead, Host Assurance","description":"<p><strong>Technical Lead, Host Assurance</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco; Seattle</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$347K – $385K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<p><strong>Benefits</strong></p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p><strong>About the Team</strong></p>\n<p>Security is foundational to OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity.</p>\n<p>The Security organization protects OpenAI’s technology, people, and products by building and operating deeply technical systems that must work reliably at massive scale. Our work underpins OpenAI’s commitments around safety, privacy, and security across research, products, and emerging platforms.</p>\n<p><strong>About the Role</strong></p>\n<p>OpenAI is seeking a Technical Lead, Host Assurance to own and scale the trust foundations for bare-metal platforms across OpenAI’s global infrastructure. This is a player-coach role for a deeply hands-on builder and proven people leader who owns the Host Assurance charter end-to-end —designing, building, and operating the core security infrastructure that establishes trust in hardware platforms before they are eligible to run workloads.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Own host assurance outcomes by defining and evolving the baseline security properties required for bare-metal hosts to be eligible for production use.</li>\n</ul>\n<ul>\n<li>Ensure hosts are verifiably trustworthy from delivery and installation through secure bootstrap and readiness to join orchestration systems.</li>\n</ul>\n<ul>\n<li>Design, implement, and operate the Host Assurance platform, including: HSM-backed services and key-management infrastructure, PKI and certificate-issuance systems that eliminate static credentials, and host identity, attestation, and measurement tooling.</li>\n</ul>\n<ul>\n<li>Validate delivered hardware and firmware against vendor claims and continuously detect and manage drift over time.</li>\n</ul>\n<ul>\n<li>Eliminate insecure bootstrap patterns while preserving deployment throughput and operational reliability. Partner with provisioning, fleet, and orchestration teams to deliver paved paths where the secure approach is the easiest approach.</li>\n</ul>\n<ul>\n<li>Set and uphold a high bar for reliability, resilience, and operational hygiene across foundational trust services. Lead incident response and post-incident learning when issues arise, driving systemic improvements that keep these systems dependable at scale.</li>\n</ul>\n<ul>\n<li>Lead, mentor, and directly manage a small team of senior engineers across PKI, operating systems, hardware security, and platform engineering. Hire and scale the Host Assurance function deliberately and proportionately as OpenAI’s compute footprint and platform ambitions grow.</li>\n</ul>\n<ul>\n<li>Act as a hands-on technical leader,</li>\n</ul>\n<p><strong>What You Will Do</strong></p>\n<ul>\n<li>Design, implement, and operate the Host Assurance platform</li>\n</ul>\n<ul>\n<li>Validate delivered hardware and firmware against vendor claims</li>\n</ul>\n<ul>\n<li>Eliminate insecure bootstrap patterns</li>\n</ul>\n<ul>\n<li>Set and uphold a high bar for reliability, resilience, and operational hygiene</li>\n</ul>\n<ul>\n<li>Lead, mentor, and directly manage a small team of senior engineers</li>\n</ul>\n<ul>\n<li>Act as a hands-on technical leader</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_698ab01f-9f8","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/b702919c-6de5-4f42-8810-29c746bab89e","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$347K – $385K • Offers Equity","x-skills-required":["Host Assurance","bare-metal platforms","security infrastructure","trust foundations","PKI","certificate-issuance systems","host identity","attestation","measurement tooling","HSM-backed services","key-management infrastructure","operating systems","hardware security","platform engineering","incident response","post-incident learning","reliability","resilience","operational hygiene"],"x-skills-preferred":["Cloud computing","Containerization","DevOps","Networking","Security protocols","Compliance"," girls in tech"," diversity and inclusion"],"datePosted":"2026-03-06T18:29:49.465Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco; Seattle"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Host Assurance, bare-metal platforms, security infrastructure, trust foundations, PKI, certificate-issuance systems, host identity, attestation, measurement tooling, HSM-backed services, key-management infrastructure, operating systems, hardware security, platform engineering, incident response, post-incident learning, reliability, resilience, operational hygiene, Cloud computing, Containerization, DevOps, Networking, Security protocols, Compliance,  girls in tech,  diversity and inclusion","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":347000,"maxValue":385000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_30988fbe-71f"},"title":"Software Engineer, Encryption","description":"<p><strong>Software Engineer, Encryption</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco; Remote - US</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Consumer Products</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$292K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<p><strong>Benefits</strong></p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p><strong>About the Team</strong></p>\n<p>The Encryption team works across product, engineering, security, and safety to build advanced privacy products and infrastructure at OpenAI. Our mission is to provide world-class security features to users so their private data remains private, even from OpenAI. We use technologies like client-side encryption, hardware security modules (HSMs), and trusted execution environments (TEEs), and design modern crypto, storage, and authentication protocols to ship product features across ChatGPT and our future consumer devices.</p>\n<p><strong>About the Role</strong></p>\n<p>We’re looking for software engineers to design, build, and scale novel privacy features and infrastructure across ChatGPT and our future consumer devices.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Ship fast while balancing difficult trade-offs in complex domains</li>\n</ul>\n<ul>\n<li>Build core abstractions for encrypted storage, sync, and recovery, especially when paired with inference in trusted execution environments</li>\n</ul>\n<ul>\n<li>Build product features for authentication, encryption, and storage across ChatGPT and future consumer devices</li>\n</ul>\n<ul>\n<li>Build and maintain infrastructure for hardware security modules (HSMs)</li>\n</ul>\n<ul>\n<li>Integrate with private inference and computing infrastructure</li>\n</ul>\n<ul>\n<li>Operate systems at scale with high reliability, including an on-call rotation</li>\n</ul>\n<ul>\n<li>Collaborate with a diverse set of cross-functional teams across product, engineering, security, safety, policy, and legal</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Care deeply about user privacy and security</li>\n</ul>\n<ul>\n<li>Have 5+ years of experience in professional software engineering</li>\n</ul>\n<ul>\n<li>Have experience designing end-to-end encryption protocols (e.g. Labyrinth)</li>\n</ul>\n<ul>\n<li>Have experience building intuitive authentication experiences for users</li>\n</ul>\n<ul>\n<li>Have experience building and scaling HSM infra under strict security requirements (e.g. Juicebox)</li>\n</ul>\n<ul>\n<li>Take pride in building and operating scalable, reliable, secure systems</li>\n</ul>\n<ul>\n<li>Can collaborate well and drive alignment in the face of difficult trade-offs</li>\n</ul>\n<ul>\n<li>Are comfortable with ambiguity and rapid change</li>\n</ul>\n<p><strong>Workplace &amp; Location</strong></p>\n<p>This role may be based in San Francisco, CA or remotely in the US with occasional travel to our HQ. We use a hybrid work model of 3 days in the office per week and offer relocation assistance to new employees.</p>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_30988fbe-71f","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/a71c177c-d75e-4b2b-b9c0-1b37bfcd9618","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$292K – $490K • Offers Equity","x-skills-required":["software engineering","encryption","hardware security modules (HSMs)","trusted execution environments (TEEs)","crypto","storage","authentication protocols","private inference and computing infrastructure","operating systems","cross-functional teams"],"x-skills-preferred":["end-to-end encryption protocols","intuitive authentication experiences","HSM infra under strict security requirements","scalable, reliable, secure systems","collaboration","ambiguity and rapid change"],"datePosted":"2026-03-06T18:28:16.760Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, encryption, hardware security modules (HSMs), trusted execution environments (TEEs), crypto, storage, authentication protocols, private inference and computing infrastructure, operating systems, cross-functional teams, end-to-end encryption protocols, intuitive authentication experiences, HSM infra under strict security requirements, scalable, reliable, secure systems, collaboration, ambiguity and rapid change","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":292000,"maxValue":490000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_6ce96801-e78"},"title":"Software Engineer, Encryption","description":"<p><strong>Software Engineer, Encryption</strong></p>\n<p><strong>About the Team</strong></p>\n<p>The Encryption team works across product, engineering, security, and safety to build advanced privacy products and infrastructure at OpenAI. Our mission is to provide world-class security features to users so their private data remains private, even from OpenAI. We use technologies like client-side encryption, hardware security modules (HSMs), and trusted execution environments (TEEs), and design modern crypto, storage, and authentication protocols to ship product features across ChatGPT and our future consumer devices.</p>\n<p><strong>About the Role</strong></p>\n<p>We’re looking for software engineers to design, build, and scale novel privacy features and infrastructure across ChatGPT and our future consumer devices.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Ship fast while balancing difficult trade-offs in complex domains</li>\n</ul>\n<ul>\n<li>Build core abstractions for encrypted storage, sync, and recovery, especially when paired with inference in trusted execution environments</li>\n</ul>\n<ul>\n<li>Build product features for authentication, encryption, and storage across ChatGPT and future consumer devices</li>\n</ul>\n<ul>\n<li>Build and maintain infrastructure for hardware security modules (HSMs)</li>\n</ul>\n<ul>\n<li>Integrate with private inference and computing infrastructure</li>\n</ul>\n<ul>\n<li>Operate systems at scale with high reliability, including an on-call rotation</li>\n</ul>\n<ul>\n<li>Collaborate with a diverse set of cross-functional teams across product, engineering, security, safety, policy, and legal</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Care deeply about user privacy and security</li>\n</ul>\n<ul>\n<li>Have 5+ years of experience in professional software engineering</li>\n</ul>\n<ul>\n<li>Have experience designing end-to-end encryption protocols (e.g. Labyrinth)</li>\n</ul>\n<ul>\n<li>Have experience building intuitive authentication experiences for users</li>\n</ul>\n<ul>\n<li>Have experience building and scaling HSM infra under strict security requirements (e.g. Juicebox)</li>\n</ul>\n<ul>\n<li>Take pride in building and operating scalable, reliable, secure systems</li>\n</ul>\n<ul>\n<li>Can collaborate well and drive alignment in the face of difficult trade-offs</li>\n</ul>\n<ul>\n<li>Are comfortable with ambiguity and rapid change</li>\n</ul>\n<p><strong>Workplace &amp; Location</strong></p>\n<p>This role may be based remotely in the UK or EU with occasional travel to our HQ. We use a hybrid work model of 3 days in the office per week and offer relocation assistance to new employees.</p>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_6ce96801-e78","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/988bf175-3219-4e75-baa6-52ecd147ea0f","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["software engineering","encryption","hardware security modules (HSMs)","trusted execution environments (TEEs)","client-side encryption","crypto","storage","authentication protocols","private inference and computing infrastructure"],"x-skills-preferred":["end-to-end encryption protocols","intuitive authentication experiences","HSM infra under strict security requirements"],"datePosted":"2026-03-06T18:27:32.762Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, UK; Dublin, Ireland; EMEA | Remote - Poland; Munich, Germany; Paris, France; Remote - Brussels"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, encryption, hardware security modules (HSMs), trusted execution environments (TEEs), client-side encryption, crypto, storage, authentication protocols, private inference and computing infrastructure, end-to-end encryption protocols, intuitive authentication experiences, HSM infra under strict security requirements"}]}