<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>9d30cfce-beb</externalid>
      <Title>Security Engineer - Azure Government</Title>
      <Description><![CDATA[<p>We are seeking a skilled Azure Security Engineer to design, implement, and maintain robust security controls across our Azure Gov Cloud environment. In this hands-on role, you will build, strengthen, and maintain our cloud security posture, protect critical workloads, and collaborate with engineering, DevOps, and compliance teams to embed security throughout the development lifecycle.</p>
<p>Key responsibilities include: Implementing, designing, and managing security architecture for Azure Government and Commercial deployments. Configuring and optimising Microsoft Defender for Cloud, Microsoft Sentinel, Microsoft Defender for Endpoint, and related services for threat detection, vulnerability management, and automated response. Designing and enforcing identity &amp; access management using Microsoft Entra ID, Privileged Identity Management (PIM), Conditional Access policies, RBAC, and just-in-time access. Securing network architectures with Azure Firewall, Network Security Groups (NSGs), DDoS Protection, Web Application Firewall (WAF), Network Watcher, and private endpoints. Protecting data at rest and in transit via Azure Key Vault, encryption strategies, data classification, and information protection controls. Developing and maintaining security policies, initiatives, and blueprints using Azure Policy and Microsoft Purview for compliance (NIST, FedRAMP, CMMC, STIGs, etc.). Performing threat hunting, incident response, and forensics using Sentinel playbooks, Log Analytics, and KQL queries. Conducting security reviews of Infrastructure as Code (IaC), containers, Kubernetes (AKS), and serverless workloads. Collaborating with developers and architects to implement DevSecOps practices, including secure CI/CD pipelines, code scanning, and secure defaults. Monitoring and remediating security findings, reducing attack surface, and improving overall security posture per the Microsoft Cloud Security Benchmark (MCSB). Deploying configurations and compliance policies to Azure AVD endpoints using Intune and other Azure native services.</p>
<p>Basic qualifications include: Active U.S. security clearance (e.g., Secret, Top Secret) or eligibility to obtain one. 3+ years of experience in cloud security, cybersecurity engineering, or related roles (with strong Azure focus). Deep hands-on expertise with core Azure security services: Microsoft Defender suite, Sentinel, Intune, Entra ID, Key Vault, Azure Policy, Firewall, Network Watcher, and Purview. Strong understanding of DLP implementation both in cloud and on endpoints utilising Purview and other Microsoft native controls. Experience implementing security in hybrid/multi-cloud environments. Proficiency in scripting/automation (PowerShell, Azure CLI, Bicep/ARM templates, Terraform). Strong understanding of identity federation, zero-trust principles, encryption, network security, and vulnerability management. Familiarity with compliance frameworks (NIST, FedRAMP, CMMC, STIGs, etc.) and regulatory requirements. Excellent problem-solving, analytical, and communication skills. Strong verbal and written communication skills and the ability to stay composed under pressure.</p>
<p>Preferred skills and experience include: Microsoft Certified: Azure Security Engineer Associate (AZ-500), Microsoft Cybersecurity Architect (SC-100). Additional relevant certifications (e.g., CISSP, CCSP, Microsoft Certified: Azure Administrator, AWS Security Specialty, SANS GCPS, SANS GCAD). Deep experience with detection and response engineering and SOC operations. Knowledge of container security (Docker, AKS), secure DevOps, or AI/ML workload protection. Prior experience in government regulations frameworks such as FedRAMP and CMMC.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$180,000 - $440,000 USD</Salaryrange>
      <Skills>Azure Security Engineer, Microsoft Defender for Cloud, Microsoft Sentinel, Microsoft Defender for Endpoint, Azure Key Vault, Azure Policy, Microsoft Purview, Identity &amp; Access Management, Network Security, Data Loss Prevention, Compliance Frameworks, Cloud Security Posture Management, Threat Hunting, Incident Response, Forensics, Infrastructure as Code, Containers, Kubernetes, Serverless Workloads, DevSecOps, CI/CD Pipelines, Code Scanning, Secure Defaults, Microsoft Cloud Security Benchmark, Microsoft Certified: Azure Security Engineer Associate (AZ-500), Microsoft Cybersecurity Architect (SC-100), CISSP, CCSP, Microsoft Certified: Azure Administrator, AWS Security Specialty, SANS GCPS, SANS GCAD, Detection and Response Engineering, SOC Operations, Container Security, Secure DevOps, AI/ML Workload Protection, Government Regulations Frameworks</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>xAI</Employername>
      <Employerlogo>https://logos.yubhub.co/xai.com.png</Employerlogo>
      <Employerdescription>xAI creates AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. The organisation is small and highly motivated, with a flat organisational structure.</Employerdescription>
      <Employerwebsite>https://www.xai.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/xai/jobs/5050657007</Applyto>
      <Location>Palo Alto, CA; Washington, D.C.</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>a4709b50-ce9</externalid>
      <Title>Strategic AE</Title>
      <Description><![CDATA[<p>You&#39;ll be a Strategic AE selling Cursor into consumer-facing enterprises where engineering velocity impacts revenue and customer experience. You&#39;ll win by proving real-world impact and scaling adoption across large product engineering orgs.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Own a vertical portfolio and net-new strategy across retail/hospitality/entertainment</li>
<li>Build relationships across Product Engineering, DevEx, Security, and Procurement</li>
<li>Tie Cursor to outcomes like faster launches, fewer defects, and reduced operational toil</li>
<li>Run hands-on POVs with real repos and production workflows</li>
<li>Navigate enterprise security/compliance reviews and commercial negotiation</li>
<li>Drive adoption plans (enablement, champions, rollout sequencing) and expansions</li>
<li>Share customer learnings to sharpen Cursor&#39;s positioning and rollout playbooks</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>7+ years enterprise closing experience; consumer/internet background is a plus</li>
<li>You&#39;re comfortable selling to technical buyers and quantifying business impact</li>
<li>Strong outbound + account planning chops; you create pipeline consistently</li>
<li>You&#39;re a true hunter - you proactively build pipeline from scratch through outbound prospecting, creative sourcing, and relentless follow-up, rather than relying on inbound demand</li>
<li>High ownership IC who moves fast and communicates crisply</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>enterprise closing experience, selling to technical buyers, outbound account planning, pipeline creation, hunting</Skills>
      <Category>Sales</Category>
      <Industry>Technology</Industry>
      <Employername>Cursor</Employername>
      <Employerlogo>https://logos.yubhub.co/cursor.com.png</Employerlogo>
      <Employerdescription>Cursor is a software company that provides solutions for consumer-facing enterprises.</Employerdescription>
      <Employerwebsite>https://cursor.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://cursor.com/careers/strategic-account-executive-retail-hospitality-entertainment</Applyto>
      <Location></Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>21e4422b-13c</externalid>
      <Title>Security Engineer - Threat Intel</Title>
      <Description><![CDATA[<p>As a Threat Intelligence Engineer at Anthropic, you will be a hands-on practitioner responsible for producing actionable intelligence that drives our detections, hunts, and defensive priorities. You will track the adversaries most likely to target a frontier AI lab, build the tooling and pipelines that turn raw indicators into operational defenses, and work shoulder-to-shoulder with detection engineers and incident responders to make sure intelligence actually changes outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Research, track, and report on threat actors and campaigns targeting AI labs, cloud infrastructure, and the broader technology sector , producing timely, actionable intelligence for Security Engineering stakeholders</li>
<li>Build and maintain tooling and automated pipelines to collect, enrich, correlate, and operationalize indicators of compromise into our detection and alerting stack</li>
<li>Develop and execute intelligence-driven threat hunts across endpoint, cloud, identity, and SaaS telemetry, and turn findings into durable detections</li>
<li>Perform technical analysis of malware, phishing infrastructure, and attacker tooling to extract indicators, TTPs, and attribution signals</li>
<li>Partner with Detection Engineering and Incident Response to translate intelligence into detection rules, hunting hypotheses, and incident context in near-real-time</li>
<li>Curate and triage inbound intelligence from commercial feeds, open source, government, and trusted peer relationships , prioritizing what matters for Anthropic&#39;s threat model</li>
<li>Contribute to threat models and risk assessments that inform security architecture and defensive investment across the enterprise</li>
<li>Build and maintain external intelligence-sharing relationships with peer companies, ISACs, and government partners</li>
</ul>
<p>You may be a good fit if you:</p>
<ul>
<li>Have 5+ years of hands-on experience in cyber threat intelligence, threat hunting, or intrusion analysis at an organization facing sophisticated adversaries</li>
<li>Have deep, demonstrable knowledge of specific nation-state or advanced criminal threat actors , their tooling, infrastructure patterns, tradecraft, and targeting</li>
<li>Are a strong engineer: you write production-quality Python (or similar), have built automation and data pipelines, and don&#39;t need to hand requirements to someone else to get tooling built</li>
<li>Are comfortable performing malware analysis, infrastructure analysis (passive DNS, certificate pivoting, netflow), and log analysis to develop and validate your own findings</li>
<li>Have experience authoring detection logic (YARA, Sigma, Snort/Suricata, or SIEM-native queries) and understand what makes a detection durable vs. brittle</li>
<li>Can write clearly and concisely , your intelligence products are read and acted on, not filed away</li>
<li>Have an existing network in the threat intelligence community and a track record of productive bidirectional sharing</li>
</ul>
<p>Strong candidates may have:</p>
<ul>
<li>Experience defending cloud-native and research-heavy environments (AWS/GCP, Kubernetes, ML infrastructure, developer tooling and supply chain)</li>
<li>Prior work operating in a threat intelligence role tracking sophisticated or state-sponsored adversaries, where your analysis directly informed detection, threat hunting, and incident response</li>
<li>Experience applying LLMs or other AI tooling to accelerate intelligence collection, enrichment, and analysis</li>
<li>Public research, conference talks, or open-source tooling contributions in the CTI space</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Python, Cyber threat intelligence, Threat hunting, Intrusion analysis, Malware analysis, Infrastructure analysis, Log analysis, Detection logic, YARA, Sigma, Snort/Suricata, SIEM-native queries, Cloud-native environments, Research-heavy environments, Kubernetes, ML infrastructure, Developer tooling and supply chain, LLMs or other AI tooling</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a company that creates reliable, interpretable, and steerable AI systems. It has a quickly growing team of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5195705008</Applyto>
      <Location>New York City, NY; Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC; San Francisco, CA | New York City, NY</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>3edb5ef9-e20</externalid>
      <Title>CyberSecurity Engineer, SOC Analyst</Title>
      <Description><![CDATA[<p>About Mistral AI</p>
<p>At Mistral AI, we believe in the power of AI to simplify tasks, save time, and enhance learning and creativity. Our technology is designed to integrate seamlessly into daily working life.</p>
<p>We are a dynamic team passionate about AI and its potential to transform society. Our diverse workforce thrives in competitive environments and is committed to driving innovation.</p>
<p>Our teams are distributed between France, USA, UK, Germany and Singapore. We are creative, low-ego and team-spirited. Join us to be part of a pioneering company shaping the future of AI.</p>
<p>Together, we can make a meaningful impact.</p>
<p>Role Summary</p>
<p>Mistral AI is looking for a Security Operations Center (SOC) Analyst to monitor, defend and respond to threats across our rapidly evolving AI ecosystem.</p>
<p>You will treat security telemetry as the core of our active defense. Your objective is to ensure the continuous security of our diverse environment, spanning IT, Engineering, Science, Compute and Infrastructure by building robust detection mechanisms and moving swiftly from alert to automated response.</p>
<p>Responsibilities</p>
<ul>
<li>Partner with engineering and platform teams to ensure the comprehensive centralization of security logs across all Mistral environments.</li>
</ul>
<ul>
<li>Design, test, and continuously tune high-fidelity alert scenarios and correlation rules to detect anomalous behavior while minimizing alert fatigue.</li>
</ul>
<ul>
<li>Operationalize Cyber Threat Intelligence (CTI), monitoring the landscape for threats specific to AI and cloud infrastructure, and integrating actionable intel directly into our detection pipelines.</li>
</ul>
<ul>
<li>Conduct rigorous, deep-dive investigations into security alerts, tracking root causes, identifying potential lateral movement, and determining impact.</li>
</ul>
<ul>
<li>Drive the lifecycle of security incidents from containment to remediation, and coordinate cross-functional crisis management during high-severity events.</li>
</ul>
<p>About You</p>
<ul>
<li>3+ years of experience in a Security Operations Center (SOC), Incident Response, or Threat Hunting role, ideally within a cloud-native or fast-paced tech environment.</li>
</ul>
<ul>
<li>Deep understanding of the threat landscape, the MITRE ATT&amp;CK framework, and the methodologies required to protect high-value infrastructure and intellectual property.</li>
</ul>
<ul>
<li>Strong experience writing complex queries (e.g., KQL, Splunk SPL, or similar) and leveraging SIEM platforms to build out correlation rules and detection logic.</li>
</ul>
<ul>
<li>Ability to write practical automation scripts in Python or Go to interact with security APIs, enrich alert context, and streamline response workflows.</li>
</ul>
<ul>
<li>Proven experience participating in or leading incident response efforts, demonstrating a calm, methodical approach to high-pressure crisis management.</li>
</ul>
<p>Hiring Process</p>
<ul>
<li>Introduction call - 30 min</li>
</ul>
<ul>
<li>Hiring Manager interview - 30 min</li>
</ul>
<ul>
<li>Technical Rounds - Dee-Dive interview - 55 min - Panel interview - 1h15</li>
</ul>
<ul>
<li>Culture-fit discussion - 30 min</li>
</ul>
<ul>
<li>References</li>
</ul>
<p>Additional Information</p>
<p>Location &amp; Remote</p>
<p>The position is based in our Paris HQ offices and we encourage going to the office as much as we can (at least 3 days per week) to create bonds and smooth communication. Our remote policy aims to provide flexibility, improve work-life balance and increase productivity. Each manager can decide the amount of days worked remotely based on autonomy and a specific context (e.g. more flexibility can occur during summer). In any case, employees are expected to maintain regular communication with their teams and be available during core working hours.</p>
<p>What we offer</p>
<ul>
<li>Competitive salary and equity package</li>
</ul>
<ul>
<li>Health insurance</li>
</ul>
<ul>
<li>Transportation allowance</li>
</ul>
<ul>
<li>Sport allowance</li>
</ul>
<ul>
<li>Meal vouchers</li>
</ul>
<ul>
<li>Private pension plan</li>
</ul>
<ul>
<li>Generous parental leave policy</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>Competitive salary and equity package</Salaryrange>
      <Skills>KQL, Splunk SPL, Python, Go, SIEM platforms, Cyber Threat Intelligence, MITRE ATT&amp;CK framework, Threat hunting, Incident response</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI is a technology company that develops high-performance, optimized, open-source and cutting-edge AI models, products and solutions. Its comprehensive AI platform meets enterprise needs, whether on-premises or in cloud environments.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/f9782b09-ca3c-4bfc-ba7a-349551ef9a82</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>da7b99bf-5aa</externalid>
      <Title>Account Executive, Enterprise</Title>
      <Description><![CDATA[<p>As an Enterprise Account Executive, you will play a pivotal role in revolutionizing how enterprises scale customer support by selling Fin, Intercom&#39;s cutting-edge AI agent. Fin leverages advanced artificial intelligence to deliver seamless, efficient, and intelligent support experiences, making it a game-changer for businesses worldwide.</p>
<p>This is your chance to join a world-class sales team, driving the upmarket growth of a transformative AI solution. At Intercom, we don&#39;t just sell products; we empower businesses to reimagine their customer support strategies. If you&#39;re looking for ownership, creativity, and the opportunity to lead in a fast-paced environment, this role is for you.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Champion AI transformation: Drive the adoption of Fin, helping enterprise clients unlock the power of AI to automate and scale their support operations.</li>
<li>Full-cycle sales ownership: Manage the entire sales process,from prospecting to close,with a consultative and tailored approach.</li>
<li>Customer advocate: Act as the voice of the customer, collaborating with Product, Marketing, and other teams to refine and enhance the AI-agent offering.</li>
<li>Tailored AI demonstrations: Create and deliver compelling, customized demos that showcase the unique value of Fin as an AI agent.</li>
<li>Revenue-focused: Provide timely, accurate forecasts and ensure clear visibility into your sales pipeline and performance.</li>
<li>Team growth: Contribute to the overall success of the sales team by mentoring peers, sharing best practices, and leading innovative projects to up-level the group.</li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li>Proven success: 5+ years of experience as an Account Executive, with at least 3 years selling SaaS solutions to enterprise clients.</li>
<li>Hunter mentality: Proven track record of outbounding and creating the majority of your pipeline and revenue.</li>
<li>AI expertise: Familiarity with AI-powered solutions, customer engagement tools, or support automation products is a strong advantage.</li>
<li>Quota achiever: Demonstrated ability to consistently meet and exceed sales targets.</li>
<li>Strategic communicator: Exceptional written and verbal communication skills, with the ability to clearly articulate complex AI solutions.</li>
<li>Solution-focused: Thrives in a fast-paced, dynamic environment, managing opportunities across diverse industries.</li>
<li>Customer-centric mindset: Skilled at building trust and creating value in competitive sales landscapes.</li>
<li>Growth-oriented: Displays intellectual curiosity, ambition, and a commitment to personal and team development</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>executive</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>Competitive salary and equity in a fast-growing start-up</Salaryrange>
      <Skills>AI expertise, SaaS solutions, customer engagement tools, support automation products, strategic communication, solution-focused, customer-centric mindset, growth-oriented, hunting mentality, quota achievement, team growth, innovative project leadership</Skills>
      <Category>Sales</Category>
      <Industry>Technology</Industry>
      <Employername>Intercom</Employername>
      <Employerlogo>https://logos.yubhub.co/intercom.com.png</Employerlogo>
      <Employerdescription>Intercom is an AI Customer Service company founded in 2011, trusted by nearly 30,000 global businesses.</Employerdescription>
      <Employerwebsite>https://www.intercom.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/intercom/jobs/7838601</Applyto>
      <Location>London, England</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>7a6b54d5-0a5</externalid>
      <Title>Security Engineer - Threat Intel</Title>
      <Description><![CDATA[<p><strong>About the Role:</strong></p>
<p>Anthropic sits at the frontier of AI development, making us a prime target for nation-state and advanced criminal actors. As a Threat Intelligence Engineer, you&#39;ll produce actionable intelligence that drives our detections, hunts, and defensive priorities.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Research, track, and report on threat actors and campaigns targeting AI labs, cloud infrastructure, and the broader technology sector</li>
<li>Build and maintain tooling and automated pipelines to collect, enrich, correlate, and operationalize indicators of compromise into our detection and alerting stack</li>
<li>Develop and execute intelligence-driven threat hunts across endpoint, cloud, identity, and SaaS telemetry, and turn findings into durable detections</li>
<li>Perform technical analysis of malware, phishing infrastructure, and attacker tooling to extract indicators, TTPs, and attribution signals</li>
<li>Partner with Detection Engineering and Incident Response to translate intelligence into detection rules, hunting hypotheses, and incident context in near-real-time</li>
<li>Curate and triage inbound intelligence from commercial feeds, open source, government, and trusted peer relationships</li>
<li>Contribute to threat models and risk assessments that inform security architecture and defensive investment across the enterprise</li>
<li>Build and maintain external intelligence-sharing relationships with peer companies, ISACs, and government partners</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>Have 5+ years of hands-on experience in cyber threat intelligence, threat hunting, or intrusion analysis at an organization facing sophisticated adversaries</li>
<li>Have deep, demonstrable knowledge of specific nation-state or advanced criminal threat actors</li>
<li>Are a strong engineer with experience writing production-quality Python and building automation and data pipelines</li>
<li>Are comfortable performing malware analysis, infrastructure analysis, and log analysis</li>
<li>Have experience authoring detection logic and understanding what makes a detection durable vs. brittle</li>
<li>Can write clearly and concisely</li>
<li>Have an existing network in the threat intelligence community</li>
</ul>
<p><strong>Strong candidates may have:</strong></p>
<ul>
<li>Experience defending cloud-native and research-heavy environments</li>
<li>Prior work operating in a threat intelligence role tracking sophisticated or state-sponsored adversaries</li>
<li>Experience applying LLMs or other AI tooling to accelerate intelligence collection, enrichment, and analysis</li>
<li>Public research, conference talks, or open-source tooling contributions in the CTI space</li>
</ul>
<p><strong>Logistics</strong></p>
<ul>
<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>
<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>
<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time</li>
<li>Visa sponsorship: We do sponsor visas!</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Python, Cyber threat intelligence, Threat hunting, Intrusion analysis, Malware analysis, Infrastructure analysis, Log analysis, Detection logic, LLMs, AI tooling</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a group of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5195705008</Applyto>
      <Location>New York City, NY; Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC; San Francisco, CA | New York City, NY</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>7f3b4e0a-30f</externalid>
      <Title>Senior Account Executive, Commercial</Title>
      <Description><![CDATA[<p>As a Senior Account Executive, Commercial at Airtable, you will have the opportunity to work closely with a variety of clients and accounts. Each client has unique needs, and you will act as a trusted business advisor, helping them effectively leverage our product to drive maximum impact for their business.</p>
<p>You will enjoy full ownership of building and scaling the commercial and mid-market customer base, with the freedom to shape your approach and make a real impact. You will manage the end-to-end sales process, from discovery to close, including demos, negotiations, and building lasting relationships.</p>
<p>You will become an Airtable product expert, delighting prospects with a phenomenal educational experience, and helping cross-functional teams with product feedback and user insights.</p>
<p>To succeed in this role, you will need 3+ years in a SaaS sales role with a track record of success, minimum 2+ years closing experience. You will also need experience as a customer account manager as well as a new logo hunter.</p>
<p>In addition to your sales expertise, you will need strong business acumen, including prior experience managing multiple concurrent client relationships, anticipating change, adjusting priorities accordingly, and working effectively as a team.</p>
<p>You will embody a growth mindset and seek out opportunities to constantly learn and grow. You will be an extreme curiosity to learn about the product, the industry, and your customer&#39;s businesses.</p>
<p>Nice to have: Language skills, such as French and German, and Airtable or no-code ecosystem experience.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SaaS sales, Customer account management, New logo hunting, Business acumen, Growth mindset, Language skills, Airtable or no-code ecosystem experience</Skills>
      <Category>Sales</Category>
      <Industry>Technology</Industry>
      <Employername>Airtable</Employername>
      <Employerlogo>https://logos.yubhub.co/airtable.com.png</Employerlogo>
      <Employerdescription>Airtable is a no-code app platform that empowers people to accelerate their most critical business processes. It has over 500,000 organisations, including 80% of the Fortune 100, relying on it to transform how work gets done.</Employerdescription>
      <Employerwebsite>https://airtable.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/airtable/jobs/8433368002</Applyto>
      <Location>London, United Kingdom</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>5c943be1-a6f</externalid>
      <Title>Threat Detection Engineer</Title>
      <Description><![CDATA[<p>We are seeking an experienced Threat Detection Engineer to join our team. As a Threat Detection Engineer, you will be responsible for driving our best-in-class posture through threat hunting, detection engineering, and playbook creation. You will also lead information security response activities and work closely with business and technology teams to deliver positive outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Leveraging multiple data sources to identify modern evolving threats and developing new detection and response approaches</li>
<li>Creating and operating high-fidelity detections mechanisms that drive efficient, effective, and repeatable response</li>
<li>Owning, operating, and automating detection and response workflows to enable the team to focus on strategic objectives</li>
<li>Leading information security response activities for the firm</li>
<li>Working across business and technology teams to deliver positive outcomes across the firm</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>A bachelor&#39;s or master&#39;s degree in computer science or cyber security with a strong IT background or equivalent demonstrable experience</li>
<li>3 years&#39; experience working in a security engineering role, with financial industry experience preferred</li>
<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>
<li>Possession of security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>
<li>Experience with modern security tooling across security domains; network, endpoint, data, identity, and cloud</li>
<li>Experience in standard enterprise technology stack, including Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>
<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>
<li>Required scripting, development, and automation skills using PowerShell or Python and proficient development tools</li>
<li>Experience in OSINT, threat hunting, and analysing malicious emails</li>
<li>Ability to prioritise in a fast-moving, high-pressure, constantly changing environment</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>threat detection, security engineering, cyber security, KQL, SQL, SPL, security certifications, modern security tooling, standard enterprise technology stack, scripting, development, automation, OSINT, threat hunting</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>IT Infrastructure</Employername>
      <Employerlogo>https://logos.yubhub.co/mlp.eightfold.ai.png</Employerlogo>
      <Employerdescription>IT Infrastructure provides IT services and support to various organisations.</Employerdescription>
      <Employerwebsite>https://mlp.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://mlp.eightfold.ai/careers/job/755955470563</Applyto>
      <Location>London, United Kingdom</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>c2aaf7ac-804</externalid>
      <Title>Security Engineer - Threat Detection</Title>
      <Description><![CDATA[<p><strong>Job Description</strong></p>
<p>You will design, build, and maintain detections that identify malicious activity across Stripe&#39;s infrastructure, applications, and cloud environments.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle</li>
<li>Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry</li>
<li>Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls</li>
<li>Perform malware analysis and reverse engineering to extract indicators and inform detection strategies</li>
<li>Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS</li>
<li>Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic</li>
<li>Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises</li>
<li>Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment</li>
<li>Map detection coverage to MITRE ATT&amp;CK, identifying and prioritizing gaps across key attack surfaces</li>
<li>Lead projects, mentor teammates, and champion quality standards within the team</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>5+ years of experience in detection engineering, threat hunting, or security operations</li>
<li>Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)</li>
<li>Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration</li>
<li>Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities</li>
<li>Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)</li>
<li>Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources</li>
<li>Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)</li>
<li>Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences</li>
<li>Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments</li>
<li>Background in malware analysis, reverse engineering, or threat research</li>
<li>Experience with purple team operations , collaborating with offensive security to validate detections</li>
<li>Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis</li>
<li>Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows</li>
<li>Interest in agentic automation , using LLMs to augment hunting, tuning, or triage</li>
<li>Experience with detection validation tools (Atomic Red Team, ATT&amp;CK Evaluations)</li>
<li>Contributions to open-source detection content, research, or conference presentations</li>
<li>Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, threat hunting, security operations, SIEM platforms, adversary tradecraft, network-based detections, endpoint-based detections, telemetry analysis, detection/query languages, programming, communication skills, fintech, financial services, malware analysis, reverse engineering, purple team operations, big data platforms, AI/LLM-assisted development tools, agentic automation, detection validation tools, open-source detection content, relevant certifications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses, used by millions of companies worldwide.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7827230</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f5d87e3c-d74</externalid>
      <Title>Offensive Security Engineer</Title>
      <Description><![CDATA[<p>As an Offensive Security Engineer at CoreWeave, you will lead efforts to identify and mitigate security risks across internal and external systems.</p>
<p>You&#39;ll perform penetration testing, conduct threat modeling, and provide guidance to engineering teams on secure design and best practices. This role also involves developing security tooling, researching emerging threats, and contributing to the continuous improvement of CoreWeave&#39;s overall security posture.</p>
<p>Some of what you&#39;ll work on:</p>
<ul>
<li>Perform penetration testing as well as purple and red team exercises.</li>
<li>Conduct threat modeling, code reviews, and design reviews for development teams.</li>
<li>Research new attack techniques and develop strategies to counter them.</li>
<li>Develop and enforce security best practices and standards, maintaining internal compliance.</li>
<li>Provide solutions to complex security issues, manage multiple tasks, and prioritize effectively in a fast-paced environment.</li>
<li>Present technical security information to both technical and non-technical audiences.</li>
<li>Maintain technical documentation, reports, and security tooling with attention to detail.</li>
<li>Participate in other security-related initiatives as assigned.</li>
</ul>
<p>Who You Are:</p>
<ul>
<li>5+ years of experience in offensive information security roles.</li>
<li>Proficiency in at least one programming or scripting language (e.g., Go, Python, C/C++) for automation, code reviews, and tooling.</li>
<li>Hands-on penetration testing experience and familiarity with offensive security tools.</li>
<li>Strong technical knowledge of Linux operating systems and containerized environments.</li>
<li>Experience securing Kubernetes and understanding related security practices.</li>
<li>Able to navigate ambiguity, identify root causes, and solve complex security problems.</li>
<li>Excellent written and verbal communication skills with strong technical documentation abilities.</li>
<li>Capable of working independently while managing multiple priorities in a fast-paced environment.</li>
<li>Strong desire to continuously learn and adopt new technologies and security techniques.</li>
</ul>
<p>Preferred:</p>
<ul>
<li>Experience with firmware reverse engineering, analyzing binaries, bootloaders, and embedded systems for vulnerabilities.</li>
<li>Relevant certifications such as Sec+, Net+, OSCP, or equivalent.</li>
<li>Experience with EDR tuning, detections-as-code, or threat hunting as part of a Blue Team.</li>
<li>Deep understanding of business-wide security best practices and implementation strategies.</li>
</ul>
<p>Wondering if you&#39;re a good fit?</p>
<p>We believe in investing in our people, and value candidates who can bring their own diversified experiences to our teams – even if you aren&#39;t a 100% skill or experience match.</p>
<p>Here are a few qualities we&#39;ve found compatible with our team.</p>
<p>If some of this describes you, we&#39;d love to talk.</p>
<ul>
<li>You love hunting vulnerabilities and proactively improving security.</li>
<li>You&#39;re curious about evolving attack vectors and defense strategies.</li>
<li>You&#39;re an expert in offensive security techniques and tooling, with a passion for safeguarding systems.</li>
</ul>
<p>Why CoreWeave?</p>
<p>At CoreWeave, we work hard, have fun, and move fast!</p>
<p>We&#39;re in an exciting stage of hyper-growth that you will not want to miss out on.</p>
<p>We&#39;re not afraid of a little chaos, and we&#39;re constantly learning.</p>
<p>Our team cares deeply about how we build our product and how we work together, which is represented through our core values:</p>
<ul>
<li>Be Curious at Your Core</li>
<li>Act Like an Owner</li>
<li>Empower Employees</li>
<li>Deliver Best-in-Class Client Experiences</li>
<li>Achieve More Together</li>
</ul>
<p>We support and encourage an entrepreneurial outlook and independent thinking.</p>
<p>We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems.</p>
<p>As we get set for takeoff, the organization&#39;s growth opportunities are constantly expanding.</p>
<p>You will be surrounded by some of the best talent in the industry, who will want to learn from you, too.</p>
<p>Come join us!</p>
<p>The base salary range for this role is $165,000 to $242,000.</p>
<p>The starting salary will be determined based on job-related knowledge, skills, experience, and market location.</p>
<p>We strive for both market alignment and internal equity when determining compensation.</p>
<p>In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>
<p>What We Offer</p>
<p>The range we&#39;ve posted represents the typical compensation range for this role.</p>
<p>To determine actual compensation, we review the market rate for each candidate which can include a variety of factors.</p>
<p>These include qualifications, experience, interview performance, and location.</p>
<p>In addition to a competitive salary, we offer a variety of benefits to support your needs, including:</p>
<ul>
<li>Medical, dental, and vision insurance</li>
<li>100% paid for by CoreWeave</li>
<li>Company-paid Life Insurance</li>
<li>Voluntary supplemental life insurance</li>
<li>Short and long-term disability insurance</li>
<li>Flexible Spending Account</li>
<li>Health Savings Account</li>
<li>Tuition Reimbursement</li>
<li>Ability to Participate in Employee Stock Purchase Program (ESPP)</li>
<li>Mental Wellness Benefits through Spring Health</li>
<li>Family-Forming support provided by Carrot</li>
<li>Paid Parental Leave</li>
<li>Flexible, full-service childcare support with Kinside</li>
<li>401(k) with a generous employer match</li>
<li>Flexible PTO</li>
<li>Catered lunch each day in our office and data center locations</li>
<li>A casual work environment</li>
<li>A work culture focused on innovative disruption</li>
</ul>
<p>Our Workplace</p>
<p>While we prioritize a hybrid work environment, remote work may be considered for candidates located more than 30 miles from an office, based on role requirements for specialized skill sets.</p>
<p>New hires will be invited to attend onboarding at one of our hubs within their first month.</p>
<p>Teams also gather quarterly to support collaboration.</p>
<p>California Consumer Privacy Act - California applicants only</p>
<p>CoreWeave is an equal opportunity employer, committed to fostering an inclusive and supportive workplace.</p>
<p>All qualified applicants and candidates will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information.</p>
<p>As part of this commitment and consistent with the Americans with Disabilities Act (ADA), CoreWeave will ensure that qualified applicants and candidates with disabilities are provided reasonable accommodations for the hiring process, unless such accommodation would cause an undue hardship.</p>
<p>If reasonable accommodation is needed, please contact: careers@coreweave.com.</p>
<p>Export Control Compliance</p>
<p>This position requires access to export controlled information.</p>
<p>To conform to U.S. Government export regulations applicable to that information, applicant must either be (A) a U.S. person, defined as a (i) U.S. citizen or national, (ii) U.S. lawful permanent resident (green card holder), (iii) refugee under 8 U.S.C. § 1157, or (iv) asylee under 8 U.S.C. § 1158, (B) eligible to access the information under an appropriate export license, or (C) otherwise exempt from the regulations.</p>
<p>Applicant must also comply with all applicable laws and regulations related to the handling and transfer of export-controlled information.</p>
<p>By applying for this position, applicant acknowledges that they have read, understand, and will comply with these requirements.</p>
<p>Failure to comply with these requirements may result in termination of employment, revocation of any security clearances, or other disciplinary action.</p>
<p>Applicant must also agree to undergo a background investigation and obtain any necessary security clearances prior to commencing employment.</p>
<p>Please note that this position is subject to U.S. Government export regulations and may require applicant to sign a non-disclosure agreement (NDA) prior to commencing employment.</p>
<p>Applicant must also agree to comply with all applicable laws and regulations related to the handling and transfer of export-controlled information.</p>
<p>By applying for this position, applicant acknowledges that they have read, understand, and will comply with these requirements.</p>
<p>Failure to comply with these requirements may result in termination of employment, revocation of any security clearances, or other disciplinary action.</p>
<p>Applicant must also agree to undergo a background investigation and obtain any necessary security clearances prior to commencing employment.</p>
<p>Please note that this position is subject to U.S. Government export regulations and may require applicant to sign a non-disclosure agreement (NDA) prior to commencing employment.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$165,000 to $242,000</Salaryrange>
      <Skills>programming or scripting language, penetration testing, threat modeling, code reviews, design reviews, security best practices, Linux operating systems, containerized environments, Kubernetes, security practices, firmware reverse engineering, analyzing binaries, bootloaders, embedded systems, EDR tuning, detections-as-code, threat hunting, business-wide security best practices</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4657803006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>b3a08e4a-8c1</externalid>
      <Title>Senior Security Operations Engineer</Title>
      <Description><![CDATA[<p>Join Brex, the intelligent finance platform that enables companies to spend smarter and move faster in over 200 markets. As a Senior Security Operations Engineer, you will focus on preventing, detecting, and responding to security threats across Brex&#39;s corporate and cloud environments. You will use existing systems and develop tools to improve our security capabilities.</p>
<p>Our team is responsible for functions across corporate security, detection &amp; response, and infrastructure security domains. We perform systems engineering and automation to support those functions. Security Operations is part of our wider Trust &amp; IT organization, which means you will have the opportunity to work closely with Application Security, Corporate Engineering, GRC, and IT.</p>
<p>You will also help build and maintain our team&#39;s open-source project Substation and have the opportunity to contribute to the Brex Tech Blog. You&#39;ll be part of a team that actively contributes to the wider security community and has a commitment to mentorship and engineering excellence.</p>
<p>We&#39;re looking for individuals with a strong background and interest in detecting, responding to, and resolving security incidents and security challenges. You should be comfortable dealing with lots of moving pieces, changing priorities, and new technologies, while having a keen eye for detail.</p>
<p>Most importantly, you should be enthusiastic about working with a variety of backgrounds, roles, and people across Brex. Building a world-class financial service requires world-class security.</p>
<p>As a Senior Security Operations Engineer, you will:</p>
<ul>
<li>Work on a highly cross-functional team to prevent, detect, and respond to security threats across Brex&#39;s corporate and cloud environments</li>
<li>Perform security incident response, investigation, remediation, and documentation, participate in periodic threat hunting and security exercises</li>
<li>Leading, scoping, and building features, participate in designing, and maintaining tools and systems which support the team&#39;s domains – corporate security, detection &amp; response, and infrastructure security</li>
<li>Collaborating and partnering with engineering and operations teams to drive remediation of security issues, while balancing prioritization of those security issues within SLA and teams&#39; respective backlogs</li>
<li>Caring about secure system design, valuing building things correctly, an understanding of a MVP approach, and an empathetic mindset when working with others</li>
</ul>
<p>Requirements:</p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Engineering, or related field OR equivalent training/fellowship OR 5+ years work experience</li>
<li>Experience working in a corporate security, detection &amp; response, or infrastructure security role with responsibilities for security alert triage and security incident response</li>
<li>Familiarity with CI/CD systems and DevOps workflows (e.g., Buildkite, Flux, Git, Terraform) in cloud environments (e.g., AWS, Azure, GCP)</li>
<li>Experience with deploying and maintaining some of the security services and tools owned by the team (e.g., SIEM, data pipelines, SOAR, domain monitoring, endpoint tooling, email protection tooling, cloud security tools)</li>
<li>While not primarily a development role, the team develops and maintains tools written in Go and Python, so experience with coding is required</li>
<li>You thrive in a collaborative environment filled with a diverse group of people with different expertise and backgrounds</li>
</ul>
<p>Bonus points:</p>
<ul>
<li>Proficiency with Go and other programming languages</li>
<li>Experience with securing distributed systems in AWS, cloud, and Kubernetes environments</li>
<li>Contributions to the wider technical community (open source, public research, mentorship, community organizing, blogging, presentations, etc.)</li>
</ul>
<p>Compensation:</p>
<p>The expected salary range for this role is $192,000 - $240,000. However, the starting base pay will depend on a number of factors including the candidate&#39;s location, skills, experience, market demands, and internal pay parity. Depending on the position offered, equity and other forms of compensation may be provided as part of a total compensation package.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$192,000 - $240,000</Salaryrange>
      <Skills>Security Operations, Cloud Security, CI/CD Systems, DevOps Workflows, Go, Python, Security Incident Response, Threat Hunting, Secure System Design, Open Source Development, Community Organizing, Blogging, Presentations</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Brex</Employername>
      <Employerlogo>https://logos.yubhub.co/brex.com.png</Employerlogo>
      <Employerdescription>Brex is a financial technology company that provides corporate cards and banking services to businesses.</Employerdescription>
      <Employerwebsite>https://brex.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/brex/jobs/8339252002</Applyto>
      <Location>San Francisco, California, United States</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>62900fcd-562</externalid>
      <Title>Security Engineer - Offensive Security</Title>
      <Description><![CDATA[<p>As an Offensive Security Engineer on the Proactive Threat team at Stripe, you will simulate the tactics, techniques, and procedures (TTPs) of real-world adversaries to uncover security risks across Stripe&#39;s products and infrastructure.</p>
<p>You&#39;ll conduct hands-on penetration testing, lead red team engagements, and collaborate with blue team counterparts to validate and improve detection and response capabilities. Your work will directly influence how Stripe builds, ships, and secures financial infrastructure used by millions of businesses worldwide.</p>
<p>Responsibilities:</p>
<p>Conduct comprehensive penetration tests across web applications, APIs, cloud environments (AWS/GCP/Azure), mobile applications, and internal infrastructure.</p>
<p>Plan and execute red team engagements that emulate the TTPs of cyber and criminal threat actors targeting financial services, including initial access, lateral movement, persistence, and data exfiltration scenarios.</p>
<p>Perform assumed-breach and objective-based assessments to test detection and response capabilities in coordination with defensive teams.</p>
<p>Partner with detection engineering, threat intelligence, and incident response teams to validate security controls, identify coverage gaps, and improve detection fidelity.</p>
<p>Contribute adversary tradecraft insights to inform detection rule development, threat hunting hypotheses, and incident response playbooks.</p>
<p>Support incident investigations by providing offensive expertise, log analysis, and root cause analysis when required.</p>
<p>Design, develop, and maintain custom offensive tools, scripts, and automation frameworks to enhance assessment efficiency and coverage.</p>
<p>Build internal platforms and workflows that enable scalable, repeatable offensive operations.</p>
<p>Contribute to internal security tooling repositories and champion engineering best practices within the team.</p>
<p>Automate repetitive testing tasks, payload generation, and reporting workflows using modern development practices.</p>
<p>Produce clear, actionable reports that communicate technical findings, business risk, and remediation guidance to both technical and non-technical stakeholders.</p>
<p>Act as a subject-matter expert and primary point of contact for stakeholder teams engaged in offensive security programs and Stripe-wide security initiatives.</p>
<p>Lead offensive security projects end-to-end, mentor junior team members, and foster a culture of continuous learning and knowledge sharing.</p>
<p>Stay current with emerging threats, vulnerabilities, and attack techniques; share research internally and contribute to the broader security community.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Python, Go, Web application security, Cloud platforms (AWS, Azure, or GCP), Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound), Adversary tradecraft and frameworks (MITRE ATT&amp;CK), Excellent written and verbal communication skills, Experience conducting offensive security in fintech, financial services, or other highly regulated environments, Background in vulnerability research, exploit development, or CVE discovery, Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations), Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support, Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses. It has a large user base, with millions of companies using its services.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7820898</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>15c4b934-99c</externalid>
      <Title>Director, Sales</Title>
      <Description><![CDATA[<p><strong>About the role</strong></p>
<p>Descript is redefining how teams create, collaborate, and communicate with video and audio. As we scale and accelerate adoption across the enterprise, we are seeking an exceptional Sales Director for the US to lead this next chapter of growth.</p>
<p>This is a rare opportunity to build, mentor, and inspire a high-performing team of Account Executives as they partner with some of the world’s most innovative companies,helping them transform how they produce content with AI-powered workflows.</p>
<p><strong>Team Leadership &amp; Growth</strong></p>
<ul>
<li>Build, lead, and coach a US-based team of Enterprise Account Executives focused on landing and expanding high-value customers.</li>
</ul>
<ul>
<li>Set clear expectations, operating rhythms, and performance standards to consistently deliver and exceed ARR targets.</li>
</ul>
<ul>
<li>Cultivate a high-trust, high-accountability environment where top performers can do the best work of their careers.</li>
</ul>
<p><strong>Sales Strategy &amp; Execution</strong></p>
<ul>
<li>Own pipeline health for your segment, ensuring predictable future revenue through rigorous qualification, forecasting, and deal inspection.</li>
</ul>
<ul>
<li>Drive a strong outbound and pipeline-generation culture; ensure every rep has mastery of PG fundamentals and takes ownership of top-of-funnel creation.</li>
</ul>
<ul>
<li>Refine and implement strategic account plans to deepen executive-level engagement, unlock new use cases, and accelerate expansion.</li>
</ul>
<p><strong>Cross-Functional Collaboration</strong></p>
<ul>
<li>Partner closely with Marketing, Product, and Customer Success to align on messaging, customer outcomes, lifecycle strategies, and enterprise motion efficiency.</li>
</ul>
<ul>
<li>Provide structured feedback to GTM and Product leadership,grounded in customer insights,to influence roadmap and narrative development.</li>
</ul>
<p><strong>Talent Acquisition &amp; Development</strong></p>
<ul>
<li>Proactively recruit, nurture, and hire exceptional enterprise sales talent; all leaders at Descript are expected to build strong recruiting pipelines.</li>
</ul>
<ul>
<li>Develop a repeatable operating model for onboarding, training, and coaching to ensure long-term rep success and rapid productivity.</li>
</ul>
<p><strong>What you bring</strong></p>
<ul>
<li>Extensive experience leading enterprise sales teams with quotas and a track record of landing and expanding complex accounts.</li>
</ul>
<ul>
<li>Deep expertise in pipeline generation, outbound sales motions, and building rigorous sales operating cadences.</li>
</ul>
<ul>
<li>Experience with value-driven, methodological sales processes (e.g., MEDDPICC, Command of the Message).</li>
</ul>
<ul>
<li>A strong history of proactively recruiting, headhunting, and developing top-performing SaaS sellers.</li>
</ul>
<ul>
<li>Successful prior experience as a top-performing Enterprise AE before moving into leadership.</li>
</ul>
<ul>
<li>Experience in high-growth B2B SaaS environments, and a passion for the pace, ambiguity, and opportunity that come with scale.</li>
</ul>
<ul>
<li>Superior organization, prioritization, and time management skills.</li>
</ul>
<p>The base salary range for this role is $180,000-$240,000/year. Final offer amounts will carefully consider multiple factors, including prior experience, expertise, location, and may vary from the amount above.</p>
<p><strong>About Descript</strong></p>
<p>Descript is building a simple, intuitive, fully-powered editing tool for video and audio , an editing tool built for the age of AI. We are a team of 150 and the backing of some of the world&#39;s greatest investors (OpenAI, Andreessen Horowitz, Redpoint Ventures, Spark Capital).</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$180,000-$240,000/year</Salaryrange>
      <Skills>Extensive experience leading enterprise sales teams with quotas, Deep expertise in pipeline generation, outbound sales motions, and building rigorous sales operating cadences, Experience with value-driven, methodological sales processes (e.g., MEDDPICC, Command of the Message), A strong history of proactively recruiting, headhunting, and developing top-performing SaaS sellers, Successful prior experience as a top-performing Enterprise AE before moving into leadership</Skills>
      <Category>Sales</Category>
      <Industry>Technology</Industry>
      <Employername>Descript</Employername>
      <Employerlogo>https://logos.yubhub.co/descript.com.png</Employerlogo>
      <Employerdescription>Descript is building a simple, intuitive, fully-powered editing tool for video and audio. It has a team of 150 and backing from OpenAI, Andreessen Horowitz, Redpoint Ventures, and Spark Capital.</Employerdescription>
      <Employerwebsite>https://descript.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/descript/jobs/7676257003</Applyto>
      <Location>Remote | San Francisco, CA | Montreal, CA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>eda84ece-394</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams.</p>
<p>In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams. You will lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic&#39;s technology stack.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Developing and deploying novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>
<li>Creating and optimizing detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>
<li>Reviewing Incident Response metrics and procedures and driving continuous improvement</li>
<li>Working cross-functionally with other security and engineering teams</li>
</ul>
<p>Note: This position will require participation in an on-call rotation.</p>
<p>To be successful in this role, you will need:</p>
<ul>
<li>3+ years of software engineering experience, with security experience a plus</li>
<li>5+ years of detection engineering, incident response, or threat hunting experience</li>
<li>A solid understanding of cloud environments and operations</li>
<li>Experience working with engineering teams in a SaaS environment</li>
<li>Exceptional communication and collaboration skills</li>
<li>An ability to lead projects with little guidance</li>
<li>The ability to pick up new languages and technologies quickly</li>
<li>Experience handling security incidents and investigating anomalies as part of a team</li>
<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>
</ul>
<p>Strong candidates may also have experience with:</p>
<ul>
<li>Performing security operations or investigations involving large-scale Kubernetes environments</li>
<li>A high level of proficiency in Python and query languages such as SQL</li>
<li>Analyzing attack behavior and prototyping high-quality detections</li>
<li>Threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>
<li>Contributing to a high-growth startup environment</li>
</ul>
<p>If you&#39;re interested in this role, please submit an application, even if you don&#39;t believe you meet every single qualification. We encourage diversity and inclusion in our hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000-$405,000 USD</Salaryrange>
      <Skills>software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, EDR, SIEM, SOAR, Python, SQL, Kubernetes, Large Language Models, playbooks, workflows, continuous improvement, collaboration, leadership, new languages and technologies</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4982193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>59d34c91-41e</externalid>
      <Title>Named Hunter Enterprise Account Executive (Nordics)</Title>
      <Description><![CDATA[<p>Want to help solve the world&#39;s toughest problems with data and AI? As a Named Enterprise Hunter Account Executive based in Copenhagen, Denmark, you will be responsible for driving strategic growth and expanding our footprint across the Nordics&#39; most critical enterprise accounts.</p>
<p>Reporting to the Director of Enterprise Sales, you will assess your list of assigned accounts and develop a strategy to execute against it. You will build a customer base, identifying and closing new logo opportunities, and lead your customers and partners to identify impactful big data and AI use cases whilst proving out their value on the Databricks Lakehouse platform.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Identifying land opportunities and developing the expand/consumption use cases</li>
<li>Orchestrating and utilising internal teams to maximise the impact on your ecosystem</li>
<li>Building exceptional value with all engagements to guide successful negotiations to close</li>
</ul>
<p>We look for candidates with a minimum of 5+ years of experience selling SaaS solutions to Enterprise Customers, extensive experience and strong performance in new logo hunting, and experience working in Big Data, Cloud, or SaaS industries with some technical sales experience.</p>
<p>Benefits include comprehensive benefits and perks that meet the needs of all employees, and a commitment to fostering a diverse and inclusive culture where everyone can excel.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SaaS solutions, Enterprise Customers, Big Data, Cloud, Technical sales experience, New logo hunting, Account planning, MEDDPICC, Value Selling, Accurate forecasting</Skills>
      <Category>Sales</Category>
      <Industry>Technology</Industry>
      <Employername>Databricks</Employername>
      <Employerlogo>https://logos.yubhub.co/databricks.com.png</Employerlogo>
      <Employerdescription>Databricks operates at the leading edge of the Data and AI space, serving over 10,000 organisations worldwide.</Employerdescription>
      <Employerwebsite>https://databricks.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/databricks/jobs/8400281002</Applyto>
      <Location>Remote - Denmark</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>ec440b77-f8f</externalid>
      <Title>Named Hunter Enterprise Account Executive (Nordics)</Title>
      <Description><![CDATA[<p>We&#39;re looking for a Named Enterprise Hunter Account Executive to join the team to maximise the phenomenal market opportunity that exists for Databricks across the Nordics.</p>
<p>Reporting to the Director of Enterprise Sales, you will be responsible for driving strategic growth and expanding our footprint across the region&#39;s most critical enterprise accounts.</p>
<p>Key responsibilities include:</p>
<p>Assessing your list of assigned accounts and developing a strategy to execute against it Building a customer base, identifying and closing new logo opportunities Leading your customers and partners to identify impactful big data and AI use cases whilst proving out their value on the Databricks Lakehouse platform Identifying land opportunities and developing the expand / consumption use cases Orchestrating and utilising internal teams to maximise the impact on your ecosystem Building exceptional value with all engagements to guide successful negotiations to close point</p>
<p>Requirements include:</p>
<p>Minimum 5+ years of experience selling SaaS solutions to Enterprise Customers Extensive experience and strong performance in new logo hunting Experience working in Big Data, Cloud, or SaaS industries with some technical sales experience Successful experience selling complex software deals and quota over-achievement Understanding of consumption based land and expand sales models is advantageous Knowledge of the Data &amp; AI space with some technology sales experience Evidence of creating demand that delivered substantial business value Experience of following robust sales methodologies and process, e.g. account planning, MEDDPICC, Value Selling and accurate forecasting Experience of building effective champions, collaborative teams and partnerships to support execution of your territory plan Understanding of how to identify all key uses cases and buying centres in an opportunity to increase the impact of Databricks in an organisation Fluency in business English and a Nordic language is required</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>executive</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SaaS solution sales, Enterprise customer sales, New logo hunting, Big Data and Cloud industry experience, Technical sales experience, Complex software deal sales, Consumption based land and expand sales models, Data and AI space knowledge, Sales methodologies and process, Account planning, MEDDPICC, Value Selling, Accurate forecasting</Skills>
      <Category>Sales</Category>
      <Industry>Technology</Industry>
      <Employername>Databricks</Employername>
      <Employerlogo>https://logos.yubhub.co/databricks.com.png</Employerlogo>
      <Employerdescription>Databricks operates at the leading edge of the Data and AI space, serving over 10,000 organisations worldwide.</Employerdescription>
      <Employerwebsite>https://databricks.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/databricks/jobs/8402166002</Applyto>
      <Location>Stockholm, Sweden</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>55d2bc34-fc1</externalid>
      <Title>CyberSecurity Engineer, SOC Analyst</Title>
      <Description><![CDATA[<p>About Mistral AI
At Mistral AI, we believe in the power of AI to simplify tasks, save time, and enhance learning and creativity. Our technology is designed to integrate seamlessly into daily working life.</p>
<p>Role Summary
Mistral AI is looking for a Security Operations Center (SOC) Analyst to monitor, defend and respond to threats across our rapidly evolving AI ecosystem. You will treat security telemetry as the core of our active defense. Your objective is to ensure the continuous security of our diverse environment, spanning IT, Engineering, Science, Compute and Infrastructure by building robust detection mechanisms and moving swiftly from alert to automated response.</p>
<p>Responsibilities
• Partner with engineering and platform teams to ensure the comprehensive centralization of security logs across all Mistral environments.
• Design, test, and continuously tune high-fidelity alert scenarios and correlation rules to detect anomalous behavior while minimizing alert fatigue.
• Operationalize Cyber Threat Intelligence (CTI), monitoring the landscape for threats specific to AI and cloud infrastructure, and integrating actionable intel directly into our detection pipelines.
• Conduct rigorous, deep-dive investigations into security alerts, tracking root causes, identifying potential lateral movement, and determining impact.
• Drive the lifecycle of security incidents from containment to remediation, and coordinate cross-functional crisis management during high-severity events.</p>
<p>About You
• 3+ years of experience in a Security Operations Center (SOC), Incident Response, or Threat Hunting role, ideally within a cloud-native or fast-paced tech environment.
• Deep understanding of the threat landscape, the MITRE ATT&amp;CK framework, and the methodologies required to protect high-value infrastructure and intellectual property.
• Strong experience writing complex queries (e.g., KQL, Splunk SPL, or similar) and leveraging SIEM platforms to build out correlation rules and detection logic.
• Ability to write practical automation scripts in Python or Go to interact with security APIs, enrich alert context, and streamline response workflows.
• Proven experience participating in or leading incident response efforts, demonstrating a calm, methodical approach to high-pressure crisis management.</p>
<p>Hiring Process
• Introduction call - 30 min
• Hiring Manager interview - 30 min
• Technical Rounds - Dee-Dive interview - 55 min - Panel interview - 1h15
• Culture-fit discussion - 30 min
• References</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Security Operations Center (SOC), Incident Response, Threat Hunting, KQL, Splunk SPL, SIEM platforms, Python, Go, security APIs, alert context, response workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI is an AI company that provides high-performance, optimized, open-source and cutting-edge models, products and solutions. Its comprehensive AI platform meets enterprise needs, whether on-premises or in cloud environments.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/f9782b09-ca3c-4bfc-ba7a-349551ef9a82</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>723d3153-72d</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p><strong>About the role</strong></p>
<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams. In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic’s technology stack</li>
<li>Develop and deploy novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>
<li>Create and optimise detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>
<li>Review Incident Response metrics and procedures and drive continuous improvement</li>
<li>Work cross functionally with other security and engineering teams</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>3+ years of software engineering experience, with security experience a plus and/or</li>
<li>5+ years of detection engineering, incident response, or threat hunting experience</li>
<li>A solid understanding of cloud environments and operations</li>
<li>Experience working with engineering teams in a SaaS environment</li>
<li>Exceptional communication and collaboration skills</li>
<li>An ability to lead projects with little guidance</li>
<li>The ability to pick up new languages and technologies quickly</li>
<li>Experience handling security incidents and investigating anomalies as part of a team</li>
<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>
</ul>
<p><strong>Strong candidates may also have experience with:</strong></p>
<ul>
<li>Experience performing security operations or investigations involving large-scale Kubernetes environments</li>
<li>A high level of proficiency in Python and query languages such as SQL</li>
<li>Experience analysing attack behaviour and prototyping high-quality detections</li>
<li>Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>
<li>Experience contributing to a high growth startup environment</li>
</ul>
<p><strong>Deadline to apply:</strong></p>
<p>None. Applications will be reviewed on a rolling basis.</p>
<p><strong>Logistics</strong></p>
<ul>
<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000 - $405,000 USD</Salaryrange>
      <Skills>software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, engineering teams, SaaS environment, communication skills, project leadership, new languages and technologies, security incidents, anomalies, EDR, SIEM, SOAR, security tools, Python, SQL, threat intelligence, malware analysis, infrastructure as code, detection engineering, forensics, Kubernetes environments, high growth startup environment</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a quickly growing organisation with a mission to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4982193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>