<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>21e4422b-13c</externalid>
      <Title>Security Engineer - Threat Intel</Title>
      <Description><![CDATA[<p>As a Threat Intelligence Engineer at Anthropic, you will be a hands-on practitioner responsible for producing actionable intelligence that drives our detections, hunts, and defensive priorities. You will track the adversaries most likely to target a frontier AI lab, build the tooling and pipelines that turn raw indicators into operational defenses, and work shoulder-to-shoulder with detection engineers and incident responders to make sure intelligence actually changes outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Research, track, and report on threat actors and campaigns targeting AI labs, cloud infrastructure, and the broader technology sector , producing timely, actionable intelligence for Security Engineering stakeholders</li>
<li>Build and maintain tooling and automated pipelines to collect, enrich, correlate, and operationalize indicators of compromise into our detection and alerting stack</li>
<li>Develop and execute intelligence-driven threat hunts across endpoint, cloud, identity, and SaaS telemetry, and turn findings into durable detections</li>
<li>Perform technical analysis of malware, phishing infrastructure, and attacker tooling to extract indicators, TTPs, and attribution signals</li>
<li>Partner with Detection Engineering and Incident Response to translate intelligence into detection rules, hunting hypotheses, and incident context in near-real-time</li>
<li>Curate and triage inbound intelligence from commercial feeds, open source, government, and trusted peer relationships , prioritizing what matters for Anthropic&#39;s threat model</li>
<li>Contribute to threat models and risk assessments that inform security architecture and defensive investment across the enterprise</li>
<li>Build and maintain external intelligence-sharing relationships with peer companies, ISACs, and government partners</li>
</ul>
<p>You may be a good fit if you:</p>
<ul>
<li>Have 5+ years of hands-on experience in cyber threat intelligence, threat hunting, or intrusion analysis at an organization facing sophisticated adversaries</li>
<li>Have deep, demonstrable knowledge of specific nation-state or advanced criminal threat actors , their tooling, infrastructure patterns, tradecraft, and targeting</li>
<li>Are a strong engineer: you write production-quality Python (or similar), have built automation and data pipelines, and don&#39;t need to hand requirements to someone else to get tooling built</li>
<li>Are comfortable performing malware analysis, infrastructure analysis (passive DNS, certificate pivoting, netflow), and log analysis to develop and validate your own findings</li>
<li>Have experience authoring detection logic (YARA, Sigma, Snort/Suricata, or SIEM-native queries) and understand what makes a detection durable vs. brittle</li>
<li>Can write clearly and concisely , your intelligence products are read and acted on, not filed away</li>
<li>Have an existing network in the threat intelligence community and a track record of productive bidirectional sharing</li>
</ul>
<p>Strong candidates may have:</p>
<ul>
<li>Experience defending cloud-native and research-heavy environments (AWS/GCP, Kubernetes, ML infrastructure, developer tooling and supply chain)</li>
<li>Prior work operating in a threat intelligence role tracking sophisticated or state-sponsored adversaries, where your analysis directly informed detection, threat hunting, and incident response</li>
<li>Experience applying LLMs or other AI tooling to accelerate intelligence collection, enrichment, and analysis</li>
<li>Public research, conference talks, or open-source tooling contributions in the CTI space</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Python, Cyber threat intelligence, Threat hunting, Intrusion analysis, Malware analysis, Infrastructure analysis, Log analysis, Detection logic, YARA, Sigma, Snort/Suricata, SIEM-native queries, Cloud-native environments, Research-heavy environments, Kubernetes, ML infrastructure, Developer tooling and supply chain, LLMs or other AI tooling</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a company that creates reliable, interpretable, and steerable AI systems. It has a quickly growing team of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5195705008</Applyto>
      <Location>New York City, NY; Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC; San Francisco, CA | New York City, NY</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
  </jobs>
</source>