<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>6964b8e4-caf</externalid>
      <Title>Cybersecurity Engineer</Title>
      <Description><![CDATA[<p>Job Title: Cybersecurity Engineer</p>
<p>Introduction to role</p>
<p>Cybersecurity sits at the heart of our IT strategy. As we move towards ambitious objectives, we are looking for individuals who focus on innovation to maintain a sustainable risk position against an evolving threat landscape, who recognise that adversaries may include organised crime syndicates or state-sponsored attackers, and who understand attackers&#39; motivations and ways of working.</p>
<p>In this role, you will operate within AstraZeneca&#39;s global cybersecurity organisation, collaborating with and influencing multiple functions across China, India, Mexico, Sweden, the US and the UK. Ready to help defend a global enterprise where technology directly supports life-changing medicines?</p>
<p>Accountabilities</p>
<p>In this role, you will engineer cybersecurity solutions across cloud, on-premises and third-party collaboration environments, with a predominant focus on cloud and data. You will collaborate with other teams to perform, assess and evolve IT processes that intersect our cybersecurity priorities, ensuring security is embedded into how work gets done. You will map governance and compliance frameworks and their controls to technical implementation, shifting hardening processes as far left as possible in the lifecycle. You will leverage deep understanding of threats, weaknesses and vulnerabilities around cloud and data to help other areas respond promptly and effectively to contain breaches or address areas of concern. You will also contribute to continuous improvement by analysing incidents, refining standards and influencing architectural decisions that balance risk, performance and usability.</p>
<p>How will you use your expertise to raise the bar?</p>
<p>Essential Skills/Experience</p>
<ul>
<li>Minimum 10 years of experience</li>
<li>Bachelor&#39;s Degree</li>
<li>Must have broad enterprise IT experience with significant cloud and data exposure.</li>
<li>Must have in-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols.</li>
<li>Must have experience designing, deploying, and operating secure networks, systems, application and security architectures at scale.</li>
<li>Must have experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale.</li>
<li>Must have experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&amp;CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures.</li>
<li>Should have experience working in a software development and systems administration organisation, implementing DevSecOps and process automation.</li>
<li>Should have the ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards.</li>
<li>Familiarity with CSPM, CNAPP, and Cloud EDR platforms</li>
<li>Expertise with Microsoft Defender, Sentinel and Splunk</li>
</ul>
<p>Desirable Skills/Experience</p>
<ul>
<li>Identify and articulate architectural trade-offs.</li>
<li>Embed process, governance and security into workflow and technology.</li>
<li>Design and implement software tools and services using modern programming languages.</li>
<li>Manage and lead projects delivering prioritised initiatives at challenging deadlines.</li>
<li>Exert positive influence in a matrixed organisation to drive technology evolution.</li>
<li>Drive efforts to achieve process and technology improvement at scale.</li>
</ul>
<p>The annual base pay for this position ranges from 136,044.00 - 204,066.00 USD Annual (80% - 120%). Hourly and salaried non-exempt employees will also be paid overtime pay when working qualifying overtime hours. Base pay offered may vary depending on multiple individualised factors, including market location, job-related knowledge, skills, and experience. In addition, our positions offer a short-term incentive bonus opportunity; eligibility to participate in our equity-based long-term incentive programme (salaried roles), to receive a retirement contribution (hourly roles), and commission payment eligibility (sales roles).</p>
<p>Benefits offered included a qualified retirement programme [401(k) plan]; paid vacation and holidays; paid leaves; and, health benefits including medical, prescription drug, dental, and vision coverage in accordance with the terms and conditions of the applicable plans. Additional details of participation in these benefit plans will be provided if an employee receives an offer of employment. If hired, employee will be in an &#39;at-will position&#39; and the Company reserves the right to modify base pay (as well as any other discretionary payment or compensation programme) at any time, including for reasons related to individual performance, Company or individual department/team performance, and market factors.</p>
<p>When we put unexpected teams in the same room, we unleash bold thinking with the power to inspire life-changing medicines. In-person working gives us the platform we need to connect, work at pace and challenge perceptions. That&#39;s why we work, on average, a minimum of three days per week from the office. But that doesn&#39;t mean we&#39;re not flexible. We balance the expectation of being in the office while respecting individual flexibility. Join us in our unique and ambitious world.</p>
<p>AstraZeneca offers an environment where cybersecurity work has real-world impact on patients&#39; lives, not just systems and data. Here, technology experts collaborate with scientists and business teams to unlock the potential of data, analytics, AI and machine learning, constantly experimenting with new approaches while keeping critical platforms secure. There is strong investment in digital capabilities, room to explore modern tools through initiatives like hackathons, and a culture that values curiosity, coaching and continuous learning so that every day brings opportunities to grow skills and shape both personal development and the future of healthcare technology.</p>
<p>If this role matches your skills and ambitions, apply now and help protect the digital foundations that enable life-changing medicines!</p>
<p>Date Posted 17-Apr-2026 Closing Date 03-May-2026</p>
<p>Our mission is to build an inclusive environment where equal employment opportunities are available to all applicants and employees. In furtherance of that mission, we welcome and consider applications from all qualified candidates, regardless of their protected characteristics. If you have a disability or special need that requires accommodation, please complete the corresponding section in the application form.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Minimum 10 years of experience, Bachelor&apos;s Degree, Broad enterprise IT experience with significant cloud and data exposure, In-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols, Experience designing, deploying, and operating secure networks, systems, application and security architectures at scale, Experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale, Experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&amp;CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures, Experience working in a software development and systems administration organisation, implementing DevSecOps and process automation, Ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards, Familiarity with CSPM, CNAPP, and Cloud EDR platforms, Expertise with Microsoft Defender, Sentinel and Splunk</Skills>
      <Category>Engineering</Category>
      <Industry>Healthcare</Industry>
      <Employername>Cyber Security Engineering Cloud/Data</Employername>
      <Employerlogo>https://logos.yubhub.co/astrazeneca.eightfold.ai.png</Employerlogo>
      <Employerdescription>AstraZeneca is a multinational pharmaceutical and biotechnology company that develops and commercializes prescription medicines and vaccines for diseases across various therapeutic areas.</Employerdescription>
      <Employerwebsite>https://astrazeneca.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://astrazeneca.eightfold.ai/careers/job/563877689899183</Applyto>
      <Location>Gaithersburg, Maryland, United States of America</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>7cc85573-4a2</externalid>
      <Title>Technical Policy Manager, Cyber Harms</Title>
      <Description><![CDATA[<p>We are seeking a Technical Policy Manager, Cyber Harms to lead our efforts to prevent AI misuse in the cyber domain. As a member of our Safeguards team, you will be responsible for designing and overseeing the execution of capability evaluations to assess the cyber-relevant capabilities of new models. You will also create comprehensive cyber threat models, including attack vectors, exploit chains, precursor identification, and weaponization techniques.</p>
<p>This is a unique opportunity to shape how frontier AI models handle dual-use cybersecurity knowledge,balancing the tremendous potential of AI to advance legitimate security research and defensive capabilities while preventing misuse by malicious actors.</p>
<p>In this role, you will lead and grow a team of technical specialists focused on cyber threat modeling and evaluation frameworks. You will serve as the primary domain expert on cyber harms, advising cross-functional teams on threat landscapes and mitigation strategies.</p>
<p>You will collaborate closely with internal and external threat modeling experts to develop training data for safety systems, and with ML engineers to train these systems, optimizing for both robustness against adversarial attacks and low false-positive rates for legitimate security researchers.</p>
<p>You will also analyze safety system performance in traffic, identifying gaps and proposing improvements. You will conduct regular reviews of existing policies and enforcement systems to identify and address gaps and ambiguities related to cybersecurity risks.</p>
<p>You will develop rigorous stress-testing of safeguards against evolving cyber threats and product surfaces. You will partner with Research, Product, Policy, Security Team, and Frontier Red Team to ensure cybersecurity safety is embedded throughout the model development lifecycle.</p>
<p>You will translate cybersecurity domain knowledge into actionable safety requirements and clearly articulated policies. You will contribute to external communications, including model cards, blog posts, and policy documents related to cybersecurity safety.</p>
<p>You will monitor emerging technologies and threat landscapes for their potential to contribute to new risks and mitigation strategies, and strategically address these.</p>
<p>You will mentor and develop team members, fostering a culture of technical excellence and responsible AI development.</p>
<p>To be successful in this role, you will need to have:</p>
<ul>
<li>An M.S. or PhD in Computer Science, Cybersecurity, or a related technical field, OR equivalent professional experience in offensive or defensive cybersecurity</li>
<li>5+ years of hands-on experience in cybersecurity, with deep expertise in areas such as vulnerability research, exploit development, network security, malware analysis, or penetration testing</li>
<li>2+ years of experience managing technical teams or leading complex technical projects with multiple stakeholders</li>
<li>Experience in scientific computing and data analysis, with proficiency in programming (Python preferred)</li>
<li>Deep expertise in modern cybersecurity, including both offensive techniques (vulnerability research, exploit development, penetration testing, malware analysis) and defensive measures (detection, monitoring, incident response)</li>
<li>Demonstrated ability to create threat models and translate technical cyber risks into policy frameworks</li>
<li>Familiarity with responsible disclosure practices, vulnerability coordination, and cybersecurity frameworks (e.g., MITRE ATT&amp;CK, NIST Cybersecurity Framework, CWE/CVE systems)</li>
<li>Strong analytical and writing skills, with the ability to navigate ambiguity and explain complex technical concepts to non-technical stakeholders</li>
<li>Experience developing policies or guidelines at scale, balancing safety concerns with enabling legitimate use cases</li>
<li>A passion for learning new skills and an ability to rapidly adapt to changing techniques and technologies</li>
<li>Comfort working in a fast-paced environment where priorities may shift as AI capabilities evolve</li>
<li>Track record of translating specialized technical knowledge into actionable safety policies or enforcement guidelines</li>
</ul>
<p>Preferred qualifications include:</p>
<ul>
<li>Background in AI/ML systems, particularly experience with large language models</li>
<li>Experience developing ML-based security systems or adversarial ML research</li>
<li>Experience working with defense, intelligence, or security organizations (e.g., NSA, CISA, national labs, security contractors)</li>
<li>Published security research, disclosed vulnerabilities, or participated in bug bounty programs</li>
<li>Understanding of Trust &amp; Safety operations and content moderation at scale</li>
<li>Certifications such as OSCP, OSCE, GXPN, or equivalent demonstrating technical depth</li>
<li>Understanding of dual-use security research concerns and ethical considerations in AI safety</li>
</ul>
<p>The annual compensation range for this role is $320,000-$405,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Cybersecurity, Vulnerability research, Exploit development, Network security, Malware analysis, Penetration testing, Detection, Monitoring, Incident response, Scientific computing, Data analysis, Programming (Python), Responsible disclosure practices, Vulnerability coordination, Cybersecurity frameworks (MITRE ATT&amp;CK, NIST Cybersecurity Framework, CWE/CVE systems), AI/ML systems, Large language models, ML-based security systems, Adversarial ML research, Defense, intelligence, or security organizations, Published security research, Disclosed vulnerabilities, Bug bounty programs, Trust &amp; Safety operations, Content moderation at scale, Certifications (OSCP, OSCE, GXPN)</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.co.png</Employerlogo>
      <Employerdescription>Anthropic is a technology company that focuses on creating reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.co/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5066981008</Applyto>
      <Location>Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>3f48b4f4-789</externalid>
      <Title>Manager, Detection &amp; Incident Response</Title>
      <Description><![CDATA[<p>We&#39;re seeking a skilled and detail-oriented technical leader to own the day-to-day operations of our Detection and Incident Response team. You&#39;ll be responsible for driving our SIEM and SOAR capabilities and incident response program, partnering with teams throughout Squarespace to improve how we spot and respond to threats.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Contributing to define, collect, and analyze security KPIs and KRIs for the security organization.</li>
<li>Developing and implementing a comprehensive detection and response strategy and roadmap aligned with Squarespace&#39;s overall business objectives and risk appetite.</li>
<li>Overseeing the Security Operations Center (SOC) activities, including threat detection, monitoring, analysis, and proactive hunting.</li>
<li>Owning the health and effectiveness of the SIEM and SOAR platforms, ensuring high-quality data ingestion, alert tuning, and automated response logic.</li>
<li>Establishing and maintaining a robust incident response program, including defining incident playbooks, leading major incident investigations, and conducting post-incident reviews to drive continuous improvement.</li>
<li>Designing and leading regular tabletop exercises to test the organization&#39;s readiness for various incident scenarios.</li>
<li>Serving as the Incident Commander for major security events, coordinating with teams such as Legal, Communications, and HR to ensure clear internal communication and regulatory compliance.</li>
<li>Identifying, evaluating, and implementing new security technologies and tools to enhance detection, prevention, and response capabilities.</li>
<li>Driving continuous improvement of security operations processes through automation, tooling, and best practices.</li>
<li>Staying abreast of emerging security threats, vulnerabilities, and industry trends and proactively advising leadership on necessary adjustments to strengthen Squarespace&#39;s security posture.</li>
<li>Building, mentoring, and leading a high-performing team of security professionals, fostering a culture of continuous learning, collaboration, and accountability.</li>
<li>Acting as a key liaison and trusted advisor to internal stakeholders on security-related matters.</li>
<li>Managing relationships with external security vendors and partners, ensuring effective service delivery and technology adoption.</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>A bachelor&#39;s degree in Computer Science, Information Security, or a related field (or equivalent experience).</li>
<li>7+ years of experience in cybersecurity, with at least 2 years in a leadership or team-lead role.</li>
<li>Deep expertise in Incident Response and Detection Engineering.</li>
<li>Strong knowledge of cloud security operations, specifically within AWS or GCP environments.</li>
<li>Hands-on experience managing and tuning SIEM and SOAR platforms.</li>
<li>Experience automating security workflows and incident response playbooks to reduce manual effort.</li>
<li>Familiarity with security frameworks such as MITRE ATT&amp;CK and NIST.</li>
<li>Excellent communication skills with the ability to lead technical teams during high-pressure incidents and explain complex threats to non-technical stakeholders.</li>
<li>Knowledge of software development, design, and technical operations.</li>
</ul>
<p>Benefits include:</p>
<ul>
<li>Health insurance with 100% covered premiums for you, your spouse or partner, and your dependent children.</li>
<li>Life and income protection.</li>
<li>Fertility and adoption benefits.</li>
<li>Headspace mindfulness app subscription.</li>
<li>Global Employee Assistance Program.</li>
<li>Pension benefits with employer match.</li>
<li>Flexible paid time off.</li>
<li>26 weeks paid maternity leave and 12 weeks paid paternity leave.</li>
<li>2 weeks paid family care leave.</li>
<li>Education reimbursement.</li>
<li>Employee donation match to community organizations.</li>
<li>7 Global Employee Resource Groups (ERGs).</li>
<li>Free lunch and snacks.</li>
<li>Close proximity to cultural landmarks such as Dublin Castle and St. Patrick&#39;s Cathedral.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, SOAR, Incident Response, Cloud Security Operations, AWS, GCP, Security Frameworks, MITRE ATT&amp;CK, NIST, Software Development, Design, Technical Operations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Squarespace</Employername>
      <Employerlogo>https://logos.yubhub.co/squarespace.com.png</Employerlogo>
      <Employerdescription>Squarespace is a design-driven platform helping entrepreneurs build brands and businesses online. It has a team of over 1,700 employees and is headquartered in New York City, with offices in Dublin, Ireland, and Aveiro, Portugal.</Employerdescription>
      <Employerwebsite>https://www.squarespace.com/about/careers</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/squarespace/jobs/7773251</Applyto>
      <Location>Dublin</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>de3eafc7-e74</externalid>
      <Title>Cloudforce One REACT Principal Consultant</Title>
      <Description><![CDATA[<p>About Us</p>
<p>At Cloudflare, we are on a mission to help build a better Internet. We run one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>
<p>Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>
<p>About the Team</p>
<p>Cloudforce One is Cloudflare&#39;s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs).</p>
<p>About the Role</p>
<p>We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors.</p>
<p>Responsibilities</p>
<p>As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.</p>
<p>The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.</p>
<p>Requirements</p>
<p>Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms.</p>
<p>You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang.</p>
<p>Examples of desirable skills, knowledge and experience include:</p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience</li>
<li>3+ years of previous experience in cyber security</li>
<li>2+ years of Incident Response experience</li>
<li>1+ years of customer-facing role</li>
<li>Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists</li>
<li>Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise</li>
<li>Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs</li>
<li>Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis</li>
<li>Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations</li>
<li>Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations</li>
<li>Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies</li>
<li>Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams</li>
<li>Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups</li>
<li>Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS</li>
<li>Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)</li>
<li>Understanding of MITRE ATT&amp;CK and NIST Cyber Security Frameworks standards and requirements</li>
<li>In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems</li>
</ul>
<p>Bonus Points:</p>
<ul>
<li>Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system</li>
<li>Proficient with Yara and writing rules to detect similar malware samples</li>
<li>Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs</li>
<li>Practical malware analysis experience with static, dynamic, and automated malware analysis techniques</li>
<li>Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples</li>
<li>Reverse engineering experience with APT malware with an understanding of common infection vectors</li>
<li>Knowledgeable of current malware techniques to evade detection and obstruct analysis</li>
<li>Experience writing malware reports on unique and interesting aspects of malware</li>
<li>Experience with malware attribution</li>
<li>Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration</li>
<li>Familiarity with bash command line executables to conduct static analysis and investigate IOCs</li>
</ul>
<p>Travel requirements</p>
<p>Ability to travel up to 20% of the time</p>
<p>Position may require foreign and domestic travel, passport will be required</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Digital Forensics, Incident Response, Cybersecurity, Network Forensic Analysis, Reverse Engineering, Malware Analysis, Cloud Incident Response, Communication, Network Protocols, Cloud Environments, MITRE ATT&amp;CK, NIST Cyber Security Frameworks, Windows Operating Systems, Unix, Linux, Mac Operating Systems, Python, Golang, Yara, Source Code, Hex, Binary, Regular Expression, Data Correlation, Network Flow, System Logs, Static Analysis, Dynamic Analysis, Automated Malware Analysis, Malware Attribution, Indicator of Compromise, Infrastructure Enumeration, Bash Command Line Executables</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Cloudflare</Employername>
      <Employerlogo>https://logos.yubhub.co/cloudflare.com.png</Employerlogo>
      <Employerdescription>Cloudflare is a system spanning the globe, providing a network that powers millions of websites and other Internet properties.</Employerdescription>
      <Employerwebsite>https://www.cloudflare.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/cloudflare/jobs/7389902</Applyto>
      <Location>Hybrid</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>62900fcd-562</externalid>
      <Title>Security Engineer - Offensive Security</Title>
      <Description><![CDATA[<p>As an Offensive Security Engineer on the Proactive Threat team at Stripe, you will simulate the tactics, techniques, and procedures (TTPs) of real-world adversaries to uncover security risks across Stripe&#39;s products and infrastructure.</p>
<p>You&#39;ll conduct hands-on penetration testing, lead red team engagements, and collaborate with blue team counterparts to validate and improve detection and response capabilities. Your work will directly influence how Stripe builds, ships, and secures financial infrastructure used by millions of businesses worldwide.</p>
<p>Responsibilities:</p>
<p>Conduct comprehensive penetration tests across web applications, APIs, cloud environments (AWS/GCP/Azure), mobile applications, and internal infrastructure.</p>
<p>Plan and execute red team engagements that emulate the TTPs of cyber and criminal threat actors targeting financial services, including initial access, lateral movement, persistence, and data exfiltration scenarios.</p>
<p>Perform assumed-breach and objective-based assessments to test detection and response capabilities in coordination with defensive teams.</p>
<p>Partner with detection engineering, threat intelligence, and incident response teams to validate security controls, identify coverage gaps, and improve detection fidelity.</p>
<p>Contribute adversary tradecraft insights to inform detection rule development, threat hunting hypotheses, and incident response playbooks.</p>
<p>Support incident investigations by providing offensive expertise, log analysis, and root cause analysis when required.</p>
<p>Design, develop, and maintain custom offensive tools, scripts, and automation frameworks to enhance assessment efficiency and coverage.</p>
<p>Build internal platforms and workflows that enable scalable, repeatable offensive operations.</p>
<p>Contribute to internal security tooling repositories and champion engineering best practices within the team.</p>
<p>Automate repetitive testing tasks, payload generation, and reporting workflows using modern development practices.</p>
<p>Produce clear, actionable reports that communicate technical findings, business risk, and remediation guidance to both technical and non-technical stakeholders.</p>
<p>Act as a subject-matter expert and primary point of contact for stakeholder teams engaged in offensive security programs and Stripe-wide security initiatives.</p>
<p>Lead offensive security projects end-to-end, mentor junior team members, and foster a culture of continuous learning and knowledge sharing.</p>
<p>Stay current with emerging threats, vulnerabilities, and attack techniques; share research internally and contribute to the broader security community.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Python, Go, Web application security, Cloud platforms (AWS, Azure, or GCP), Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound), Adversary tradecraft and frameworks (MITRE ATT&amp;CK), Excellent written and verbal communication skills, Experience conducting offensive security in fintech, financial services, or other highly regulated environments, Background in vulnerability research, exploit development, or CVE discovery, Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations), Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support, Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses. It has a large user base, with millions of companies using its services.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7820898</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>1e992e68-7cd</externalid>
      <Title>Staff Engineer, Offensive Security</Title>
      <Description><![CDATA[<p>As a Staff Engineer, Offensive Security at Twilio, you will act as a Technical Lead and design complex attack chains that demonstrate systemic risk. You will spend as much time writing custom code and researching new bypasses as you do executing tests.</p>
<p>In this role, you will:</p>
<p>Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android). Conduct network and cloud level assessments with various tooling. Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives. Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs). Draft high-quality reports that detail the &quot;path to compromise&quot; with clear, reproducible steps for developers. Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners). Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR. Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities. Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth. Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage. Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes. Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement. Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.</p>
<p>Twilio values diverse experiences from all kinds of industries, and we encourage everyone who meets the required qualifications to apply.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Offensive security, Penetration testing, Bug bounty, AppSec, Vulnerability exploitation, MITRE ATT&amp;CK matrix, OWASP Top 10 for web applications, OWASP Top 10 for LLMs, Post exploitation, Adversarial ML, Burp Suite professional, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, C2 frameworks, Python, Bash, C++, Telecom expertise, Excellent written and verbal communication skills, Ability to influence and build effective working relationships with all levels of the organization, Proficiency in multiple languages applicable to the region</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio delivers innovative solutions to hundreds of thousands of businesses and empowers millions of developers worldwide to craft personalized customer experiences.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7622285</Applyto>
      <Location>Remote - Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f2139aac-53b</externalid>
      <Title>Staff Detection &amp; Response Engineer</Title>
      <Description><![CDATA[<p>Secure Every Identity, from AI to Human</p>
<p>Identity is the key to unlocking the potential of AI. Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes. We are looking for builders and owners who operate with speed and urgency and execute with excellence.</p>
<p>This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>
<p><strong>About the Role</strong></p>
<p>As a Staff Detection &amp; Response Engineer at Okta, you will occupy a high-impact leadership role within our Security Operations organisation. This is not just a technical role; it is a strategic one. You will influence security decisions across multiple teams, drive innovation in our defence-in-depth strategies, and act as a force multiplier for our global security posture.</p>
<p>You will be responsible for leading complex threat hunts, managing major security incidents, and architecting the detection frameworks that protect Okta’s infrastructure and customers. You will serve as a bridge between executive leadership and technical teams, ensuring our security objectives align with broader business trends and strategic goals.</p>
<p><strong>What You’ll Do</strong></p>
<p><strong>Technical Leadership &amp; Innovation</strong></p>
<ul>
<li>Threat Hunting: Lead complex, hypothesis-driven threat hunts based on vague intelligence, and develop refined methodologies for the broader team to follow.</li>
</ul>
<ul>
<li>Detection Engineering: Write novel detections and solve complex querying challenges. You will establish the frameworks and standards for detection engineering across the entire security organisation.</li>
</ul>
<ul>
<li>Architectural Influence: Design and validate the effectiveness of preventative control chains and influence the selection and architecture of new security solutions.</li>
</ul>
<ul>
<li>Incident Response: Serve as the technical lead for major incidents, including investigating threats in &#39;foreign&#39; or uncommon environments by leveraging frameworks and your professional network.</li>
</ul>
<p><strong>Global Mindset</strong></p>
<p>While Okta maintains a 24x7 posture, there is a requirement to be available in a crisis out of (your business) hours, and as a thought leader, to interface with colleagues globally.</p>
<p><strong>Strategic Execution</strong></p>
<ul>
<li>Project Ownership: Own multi-quarter objectives and drive them to success, developing project plans that align with Okta’s strategic VMTs (Vision, Metrics, and Targets) and budget.</li>
</ul>
<ul>
<li>Problem Solving: Navigate issues of diverse scope, analysing data against current business trends to provide innovative solutions.</li>
</ul>
<ul>
<li>Innovation: Secure resources for and drive innovation initiatives across multiple teams, facilitating cross-functional workshops to generate new security solutions.</li>
</ul>
<p><strong>Team Advocacy &amp; Mentorship</strong></p>
<ul>
<li>Culture Building: Foster an inclusive, collaborative environment by sharing wins, rewarding team efforts, and encouraging diverse perspectives.</li>
</ul>
<ul>
<li>Mentorship: Act as an advisor to junior colleagues, providing actionable feedback and helping others align their career goals with organisational objectives.</li>
</ul>
<ul>
<li>Consensus Driving: Drive consensus and resolve issues within cross-functional teams, ensuring all stakeholders are aligned on security priorities.</li>
</ul>
<p><strong>Who You Are</strong></p>
<ul>
<li>Expert Investigator: You have a deep understanding of threat actor TTPs and can navigate complex systems even when documentation is sparse.</li>
</ul>
<ul>
<li>Effective Communicator: You can translate complex technical problems for any audience, from executive leadership to junior analysts.</li>
</ul>
<ul>
<li>Resilient Leader: You have a &#39;bottom-line&#39; orientation, persisting through obstacles and setbacks to achieve results.</li>
</ul>
<ul>
<li>Self-Aware &amp; Empathetic: You proactively seek feedback, know your limits, and lead with empathy and compassion.</li>
</ul>
<ul>
<li>Collaboratively Minded: You prioritise the development of others and establish internal and external networks of coaches and mentors.</li>
</ul>
<p><strong>Qualifications</strong></p>
<ul>
<li>Proven experience in a high-growth SaaS or security-focused environment.</li>
</ul>
<ul>
<li>Expertise in querying languages, detection frameworks (e.g., MITRE ATT&amp;CK), and modern IR toolsets.</li>
</ul>
<ul>
<li>Experience managing communications during crises or major security incidents.</li>
</ul>
<ul>
<li>Demonstrated ability to lead project teams and manage budget/resource requirements.</li>
</ul>
<ul>
<li>Strong background in automating response workflows and refining preventative controls.</li>
</ul>
<p><strong>Why Okta?</strong></p>
<p>Okta is the World’s Identity Company. We are building a world where anyone can safely use any technology. As a Staff Engineer, you will play a pivotal role in ensuring that vision remains a reality.</p>
<p>#LI-HYBRID</p>
<p>P6513_3323862</p>
<p>Below is the annual salary range for candidates located in Canada. Your actual salary will depend on factors such as your skills, qualifications, and experience. In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental, and vision insurance, RRSP with a match, healthcare spending, telemedicine, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. To learn more about our Total Rewards program, please visit: https://rewards.okta.com/can.</p>
<p>The annual base salary range for this position for candidates located in Canada is between: $141,000-$211,000 CAD</p>
<p>The Okta Experience</p>
<ul>
<li>Supporting Your Well-Being</li>
</ul>
<ul>
<li>Driving Social Impact</li>
</ul>
<ul>
<li>Developing Talent and Fostering Connection + Community</li>
</ul>
<p>We are intentional about connection. Our global community, spanning over 20 offices worldwide, is united by a drive to innovate. Your journey begins with an immersive, in-person onboarding experience designed to accelerate your impact and connect you to our mission and team from day one.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$141,000-$211,000 CAD</Salaryrange>
      <Skills>querying languages, detection frameworks, MITRE ATT&amp;CK, modern IR toolsets, project management, budget/resource management, automating response workflows, refining preventative controls</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Okta</Employername>
      <Employerlogo>https://logos.yubhub.co/okta.com.png</Employerlogo>
      <Employerdescription>Okta builds identity management software for businesses. It has a global presence with over 20 offices.</Employerdescription>
      <Employerwebsite>https://www.okta.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/okta/jobs/7492429</Applyto>
      <Location>Toronto, Ontario, Canada</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>0ac5b404-7fb</externalid>
      <Title>Consulting Architect, Security, Canberra</Title>
      <Description><![CDATA[<p>You will have the opportunity to work with tremendous Services, Engineering and Sales teams and wear many hats. This is a critical role, as Consultants have an amazing chance to make an immediate impact on the success of Elastic and our customers.</p>
<p>We are looking for a delivery architect that demonstrates visionary leadership by orchestrating and implementing Elastic solutions, generating customer business value from our products. Grouping responsibilities in the following areas:</p>
<p><strong>Assess and Design</strong></p>
<ul>
<li>Thoroughly analyze and understand customer business pain points and intricate technical challenges</li>
<li>Gather requirements in complex enterprise customer environments</li>
<li>Master Elastic solution architectural design on platforms integrating with other enterprise technologies</li>
<li>Create and build out customer road maps</li>
<li>Demonstrate technical authority by proficiently articulating complex technical solutions in clear language, effectively persuading the audience to embrace recommended best practices while presenting and delivering Elastic&#39;s optimal solutions.</li>
</ul>
<p><strong>Implement and Deliver</strong></p>
<ul>
<li>Lead technology workshops that include hands-on mentoring, whiteboarding, and solution development</li>
<li>Deliver outcome-based solutions</li>
<li>Lead, hands-on-deploy (from data onboarding, configuration, visualizations, alerting), and seamlessly integrate Elastic products and APIs into intricate platform architectures, harnessing years of technical expertise</li>
<li>Master data modeling, develop and optimize queries, tune and scale clusters, prioritizing fast search and analytics at scale</li>
<li>Solve our customers’ most challenging platform, configuration, data and cyber security problems</li>
</ul>
<p><strong>Grow and Expand</strong></p>
<ul>
<li>Orchestrate and implement capacity planning in mission-critical environments</li>
<li>Perform technical audits, upgrades, platform migrations, and use-case expansion</li>
<li>Work with and guide our customers along their ever-maturing Cyber journey</li>
</ul>
<p><strong>Influence and Collaborate</strong></p>
<ul>
<li>Work closely with the Elastic Engineering, Product Management, and Support teams to identify feature enhancements, extensions, and product defects</li>
<li>Engage with the Elastic Sales team to scope opportunities while assessing technical risks, questions, or concerns</li>
<li>Be a mentor/coach for your fellow Elastic consultants</li>
<li>Demonstrated ability to communicate to a variety of stakeholders up to the C-suite level</li>
</ul>
<p><strong>What You Bring Along</strong></p>
<ul>
<li>Minimum of 5 years as a Consulting Architect or senior IT functional leadership experience</li>
<li>History of working as a Consultant delivering professional services engagements</li>
<li>Strong customer advocacy, relationship-building, presentation and communications skills</li>
<li>Ability to lead meetings with project owners and C-level stakeholders.</li>
<li>Ability to articulate the business value of an outcome-based delivery while being technically savvy and hands-on</li>
<li>Demonstrated experience of technical leadership throughout project lifecycles</li>
<li>Solid experience deploying Elastic Security solutions or similar domains (Splunk, Arcsight, IBM QRadar). Alternatively, at least 2 years experience working as a Security Analyst, preferably utilising SIEM or endpoint security applications in a Threat Detection and Response focussed role</li>
<li>Knowledge of the MITRE ATT&amp;CK framework and how it can be applied for Enterprise defence</li>
<li>Fundamental understanding and experience of security tool capabilities</li>
<li>Understanding and passion for cyber security and open-source technology</li>
<li>Hands-on experience in on-prem systems and/or public/private cloud platforms like AWS, Azure, GCP, Openstack</li>
<li>Hands-on experience in Linux</li>
<li>Good understanding of networking, security, containerization, serverless, DevOps in system landscapes and infrastructure automation knowledge.</li>
<li>Experience utilising programming or scripting languages in a corporate environment like Python, Javascript, Go or Chef/Puppet etc.</li>
<li>Understanding of databases</li>
<li>Ability and willingness to travel from time to time as required</li>
<li>Comfortable working remotely in a highly distributed team</li>
</ul>
<p><strong>Bonus Points</strong></p>
<ul>
<li>BS in Computer Science or related Information Security / Cybersecurity field</li>
<li>Certifications and specialized training in Information Security and Cybersecurity</li>
<li>Deep understanding of Enterprise cyber defence in large networks</li>
<li>Deep understanding of Elasticsearch and Lucene, including Elastic Certified Engineer certification</li>
<li>Experience working closely with a pre-sales organization in scoping the needs of Customers</li>
<li>Experience with Statement of Work delivery</li>
<li>Experience with both Agile and Waterfall methodologies</li>
<li>Experience contributing to an open-source project or documentation</li>
<li>Endpoint tool skills and experience ingesting network feeds into Elastic for security purposes</li>
<li>Experience as a Software Engineer, System Administrator, or DevOps Engineer</li>
</ul>
<p><strong>Additional Information - We Take Care of Our People</strong></p>
<p>As a distributed company, diversity drives our identity. Whether you’re looking to launch a new career or grow an existing one, Elastic is the type of company where you can balance great work with great life. Your age is only a number. It doesn’t matter if you’re just out of college or your children are; we need you for what you can do.</p>
<p>We strive to have parity of benefits across regions and while regulations differ from place to place, we believe taking care of our people is the right thing to do.</p>
<ul>
<li>Competitive pay based on the work you do here and not your previous salary</li>
<li>Health coverage for you and your family in many locations</li>
<li>Ability to craft your calendar with flexible locations and schedules for many roles</li>
<li>Generous number of vacation days each year</li>
<li>Increase your impact - We match up to $2000 (or local currency equivalent) for financial donations and service</li>
<li>Up to 40 hours each year to use toward volunteer projects you love</li>
<li>Embracing parenthood with minimum of 16 weeks of parental leave</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Delivery architecture, Elastic solutions, Customer business value, Technical leadership, Security solutions, SIEM, Endpoint security, MITRE ATT&amp;CK framework, Security tool capabilities, Open-source technology, Cloud platforms, Linux, Networking, Containerization, Serverless, DevOps, Infrastructure automation, Programming languages, Databases</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Elastic</Employername>
      <Employerlogo>https://logos.yubhub.co/elastic.co.png</Employerlogo>
      <Employerdescription>Elastic is a software company that develops and sells software products for searching, analyzing, and visualizing data.</Employerdescription>
      <Employerwebsite>https://www.elastic.co/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/elastic/jobs/7567087</Applyto>
      <Location>Australia</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>0ae6f8dc-4fd</externalid>
      <Title>Staff Engineer, AI Security</Title>
      <Description><![CDATA[<p>Join the team as Twilio&#39;s next Staff Engineer, AI Security.</p>
<p>As a Staff Engineer, AI Security on the AppSec team, you&#39;ll lead autonomous defense for the AI lifecycle. Build multi-agent frameworks and secure gateways while integrating real-time security gates and identity standards. By mentoring Security and R&amp;D to define the MLSecOps roadmap, you&#39;ll ensure a &#39;secure-by-default&#39; future for agentic workflows and resilient AI innovation.</p>
<p>Responsibilities:</p>
<p>Serve as the primary subject matter expert for all AI and machine learning security initiatives across security and R&amp;D.</p>
<p>Design and manage AI gateways to provide a centralized control plane for authentication and authorization and rate limiting across all model and tool interactions.</p>
<p>Build and maintain an autonomous security agentic framework that utilizes multi agent orchestration for end to end investigation and alert triage and remediation.</p>
<p>Develop agentic identity models using OAuth 2.1 to propagate identity across trust boundaries and prevent the confused deputy problem.</p>
<p>Help govern the AI augmented software development lifecycle by integrating real time security gates into the developer environment and CI/CD pipeline.</p>
<p>Manage Agentic Security Solutions that secure AI lifecycle and manage AI workloads at runtime.</p>
<p>Author company wide AI security standards and implement these security checks across Twilio&#39;s stack.</p>
<p>Implement human in the loop checkpoints and transactional safety protocols for high impact or destructive agentic actions.</p>
<p>Partner with engineering leadership to set the long term roadmap for identity centric security and automated posture management.</p>
<p>Act as a knowledge multiplier by mentoring security engineers and developing secure by default paved road templates for R&amp;D teams</p>
<p>Qualifications:</p>
<p>8+ years of experience in security engineering with at least 3 years focused on AI or machine learning security operations (MLSecOps).</p>
<p>Expertise in orchestrating multi-agent systems with AWS Strands, LangGraph, and CrewAI, specializing in runtime isolation, PII redaction, and defending against indirect prompt injection in agentic environments.</p>
<p>Hands-on experience with AI-specific frameworks (e.g., MITRE ATLAS, MAESTRO, OWASP Top 10 for LLMs/Agents/MCP) to threat model and defend against a wide spectrum of risks, including direct/indirect prompt injection, training data poisoning, tool poisoning, and data exfiltration within agentic workflows.</p>
<p>Proficiency in securing end-to-end AI pipelines, from data ingestion and training to model deployment and monitoring.</p>
<p>Strong communication skills to translate complex AI risks into actionable business logic for stakeholders.</p>
<p>Desired:</p>
<p>Hands-on experience in modern application security tooling including SAST and SCA and DAST with experience adapting these tools to catch AI specific vulnerabilities like indirect prompt injection.</p>
<p>Expertise in identity standards including OAuth 2.1 and PKCE.</p>
<p>Experience with AI Red Teaming and conducting adversarial simulations against Large Language Models (LLMs) and agentic systems.</p>
<p>Proficiency in at least one general programming language (Python, Go, etc) with experience in container security and workload isolation.</p>
<p>Proven ability to operate with autonomy and drive high impact outcomes in ambiguous environments by identifying and executing on critical projects without predefined roadmaps or direct supervision.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>security engineering, AI and machine learning security, multi-agent systems, AWS Strands, LangGraph, CrewAI, runtime isolation, PII redaction, indirect prompt injection, AI-specific frameworks, MITRE ATLAS, MAESTRO, OWASP Top 10 for LLMs/Agents/MCP, end-to-end AI pipelines, data ingestion, training, model deployment, monitoring, strong communication skills, modern application security tooling, SAST and SCA and DAST, identity standards, OAuth 2.1, PKCE, AI Red Teaming, adversarial simulations, Large Language Models, container security, workload isolation</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio delivers innovative solutions to hundreds of thousands of businesses and empowers millions of developers worldwide to craft personalized customer experiences.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7821462</Applyto>
      <Location>Remote - Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>85f1ada0-78d</externalid>
      <Title>Security Engineer</Title>
      <Description><![CDATA[<p>We&#39;re seeking a Security Engineer at the senior-level or above on our Security Operations team with strong detection engineering experience. You&#39;ll design and develop high-fidelity detection content, build and operate the data pipelines that power our security operations, develop automation playbooks that accelerate response, and work across a uniquely diverse telemetry landscape spanning cloud infrastructure, embedded vessel platforms, corporate systems, and operational technology.</p>
<p>This role is heavily weighted toward detection engineering. You should think in terms of adversary behaviour and telemetry coverage, not just alert triage. You&#39;ll own detections end-to-end: from identifying gaps in coverage, through designing and testing detection logic, to tuning and validating in production.</p>
<p>Key Responsibilities:</p>
<ul>
<li><p>Design, build, test, and tune high-fidelity detection rules and analytic queries across endpoint, cloud, network, identity, and DLP telemetry sources</p>
</li>
<li><p>Develop and maintain detection content using detection-as-code practices including version-controlled logic, automated testing, and CI/CD deployment</p>
</li>
<li><p>Map detection coverage to MITRE ATT&amp;CK, identify gaps, and prioritise new detection development based on threat intelligence and business risk</p>
</li>
<li><p>Engineer correlation rules, behavioural analytics, and anomaly-based detections that minimise false positives while surfacing real adversary tradecraft</p>
</li>
<li><p>Own the detection lifecycle from initial development through production tuning, performance monitoring, and retirement</p>
</li>
<li><p>Build and operate pipelines to ingest, normalise, enrich, and manage security telemetry at scale across diverse data sources, using Terraform and infrastructure-as-code practices to deploy and maintain logging and detection infrastructure</p>
</li>
<li><p>Design and maintain log collection, parsing, and enrichment configurations that ensure the right telemetry is available at the right fidelity for detection and investigation</p>
</li>
<li><p>Evaluate and onboard new telemetry sources as Saronic&#39;s infrastructure and threat landscape evolve</p>
</li>
<li><p>Monitor pipeline health, data quality, and ingestion reliability to ensure detections operate on complete and accurate data</p>
</li>
<li><p>Develop and manage automated response playbooks in SOAR platforms to accelerate containment and reduce analyst toil</p>
</li>
<li><p>Build automation that enriches alerts with contextual data, reducing investigation time and improving analyst decision-making</p>
</li>
<li><p>Support incident response efforts and translate lessons learned into improved detections and playbooks</p>
</li>
<li><p>Partner with SOC analysts, Cloud Security, Product Security, and IT teams to close visibility and detection gaps across environments</p>
</li>
<li><p>Collaborate with threat intelligence to ensure detection engineering is informed by current adversary TTPs relevant to defence, maritime, and autonomous systems</p>
</li>
</ul>
<p>Required Qualifications:</p>
<ul>
<li><p>3+ years of hands-on experience in detection engineering, security operations, security automation, or a closely related security engineering role</p>
</li>
<li><p>Demonstrated experience designing, testing, and tuning detection rules and analytic queries across production security telemetry (endpoint, cloud, network, identity, or DLP)</p>
</li>
<li><p>Hands-on experience with SIEM platforms and proficiency with query languages such as SPL, KQL, or equivalent</p>
</li>
<li><p>Experience building and operating security data pipelines, including log ingestion, normalisation, enrichment, and data quality management</p>
</li>
<li><p>Understanding of data engineering concepts including ETL pipelines, data modelling, schema design, and indexing as applied to security telemetry</p>
</li>
<li><p>Hands-on coding experience in Python, PowerShell, Go, or Rust for security automation, detection tooling, or pipeline development, and familiarity with Terraform for managing detection and logging infrastructure as code</p>
</li>
<li><p>Understanding of MITRE ATT&amp;CK framework and its application to detection coverage and gap analysis</p>
</li>
<li><p>Ability to obtain and maintain a security clearance</p>
</li>
</ul>
<p>Preferred Qualifications:</p>
<ul>
<li><p>Experience in defence, aerospace, robotics, autonomy, or other high-assurance environments</p>
</li>
<li><p>Experience with EDR platforms including custom detection rule creation and telemetry analysis</p>
</li>
<li><p>Experience with cloud-native detection in AWS and Microsoft 365/Azure</p>
</li>
<li><p>Experience using Terraform to deploy and manage security monitoring infrastructure, log pipeline components, or cloud-native security service configurations</p>
</li>
<li><p>Hands-on experience with incident response, threat hunting, or adversary emulation</p>
</li>
<li><p>Exposure to embedded Linux, operational technology, or ICS telemetry and detection</p>
</li>
<li><p>Familiarity with NIST SP 800-171, NIST SP 800-53, or CMMC and their logging and monitoring requirements</p>
</li>
<li><p>Relevant certifications such as GCIH, GCIA, GCDA, GSOM, OSDA, or OSCP</p>
</li>
</ul>
<p>Additional Information:</p>
<ul>
<li><p>Benefits: Medical Insurance, Dental and Vision Insurance, Time Off, Parental Leave, Competitive Salary, Retirement Plan, Stock Options, Life and Disability Insurance, Pet Insurance</p>
</li>
<li><p>This role requires access to export-controlled information or items that require &#39;U.S. Person&#39; status.</p>
</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, security operations, security automation, SIEM platforms, query languages, data engineering, ETL pipelines, data modelling, schema design, indexing, Python, PowerShell, Go, Rust, Terraform, MITRE ATT&amp;CK framework, security clearance, EDR platforms, cloud-native detection, incident response, threat hunting, adversary emulation, embedded Linux, operational technology, ICS telemetry, NIST SP 800-171, NIST SP 800-53, CMMC, GCIH, GCIA, GCDA, GSOM, OSDA, OSCP</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Saronic Technologies</Employername>
      <Employerlogo>https://logos.yubhub.co/saronictechnologies.com.png</Employerlogo>
      <Employerdescription>Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.</Employerdescription>
      <Employerwebsite>https://www.saronictechnologies.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/saronic/79424778-76c1-41c6-8385-cba5f6ddc50e</Applyto>
      <Location>San Francisco</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>ace25108-b9c</externalid>
      <Title>Staff Product Security Engineer</Title>
      <Description><![CDATA[<p>We are seeking an experienced and motivated Staff Product Security Engineer to join our growing Security team. As a Staff Product Security Engineer, you will be responsible for the end-to-end security of our consumer products, digital platform, and emerging hardware device line.</p>
<p>Your day-to-day will involve leading security architecture/design review and threat modeling sessions with product and engineering teams, translating threats into actionable, risk-rated engineering remediations prioritized by severity, conducting hands-on penetration testing and security assessments across our full product stack, and driving PSIRT operations by triaging incoming vulnerability reports, leading technical investigations, coordinating remediation with engineering, scoring severity (CVSS), managing coordinated disclosure with external researchers, and on-call incidents.</p>
<p>You will also shape the posture of our AI-assisted development environment, defining and enforcing enterprise policies for Claude and Cursor, and partner across the organization, sitting in design review with architects, advising product managers and engineering teams on security and compliance implications of new features, briefing executives on emerging AI threats, mentoring junior security engineers, and collaborating with the AI team on securing ML pipelines.</p>
<p>As a champion of security culture, you will run developer training on secure coding with AI assistants, evangelize security by design for products, and ensure every engineer understands that product security is an enabler and not a gate.</p>
<p>You will bring 10+ years of product security experience spanning application security, cloud security, and secure SDLC, expert-level threat modeling using STRIDE, PASTA, or equivalent across web, mobile, cloud, embedded, and AI systems, hands-on penetration testing skills across applications, API, cloud infrastructure, and hardware/firmware, and deep hands-down AI security expertise and expert-level understanding of OWASP Top 10 for LLM, API, Web, Mobile, and practical experience with MITRE.</p>
<p>You will have strong hands-on experience in security tools SAST, DAST, SCA, and securing AI development tools specifically Claude and Cursor, and understand MCP security risks and know how to architect enterprise guardrails that enable safe AI-assisted development.</p>
<p>You will also have strong programming ability and capability to review code, build security tools, automate workflows, and be credible with the engineering teams you partner with.</p>
<p>Preferred experience includes hardware and embedded security experience with knowledge of secure boot, firmware integrity, hardware root of trust, and IoT threat modeling experience, and experience in the Financial industry, knowledge of PCI DSS, COPPA, or demonstrated ability to learn regulated domains quickly.</p>
<p>Work perks at Greenlight include medical, dental, vision, and HSA match, paid life insurance, AD&amp;D, and disability benefits, traditional 401k with company match, unlimited PTO, paid company holidays and pop-up bonus holidays, professional development stipends, mental health resources, 1:1 financial planners, fertility healthcare, 100% paid parental and caregiving leave, plus cleaning service and meals during your leave, flexible WFH, both remote and in-office opportunities, fully stocked kitchen, catered lunches, and occasional in-office happy hours, and employee resource groups.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$165,000-200,000</Salaryrange>
      <Skills>product security, application security, cloud security, secure SDLC, threat modeling, penetration testing, security assessments, PSIRT operations, AI security, OWASP Top 10, MITRE, SAST, DAST, SCA, Claude, Cursor, MCP security, firmware integrity, hardware root of trust, IoT threat modeling, hardware and embedded security, PCI DSS, COPPA</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Greenlight</Employername>
      <Employerlogo>https://logos.yubhub.co/greenlight.com.png</Employerlogo>
      <Employerdescription>Greenlight is a family fintech company that provides a banking app for families, serving over 6 million parents and kids.</Employerdescription>
      <Employerwebsite>https://www.greenlight.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/greenlight/18b7ac30-dbf6-4078-bf50-06772c47fdc7</Applyto>
      <Location>Atlanta</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>10ab61a1-14e</externalid>
      <Title>Cyber Security Engineering, Sr Engineer</Title>
      <Description><![CDATA[<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>
<p>You are a passionate and experienced cybersecurity professional with a keen eye for detail and a deep understanding of threat detection and mitigation. You thrive in fast-paced, collaborative environments and are energized by the challenge of staying ahead of evolving cyber threats. Your technical expertise spans across log aggregation platforms like Elastic, scripting languages such as Python, and enterprise SIEMs. You have a strong grasp of threat actor techniques, vulnerabilities, and exploits, and you leverage frameworks like Mitre ATT&amp;CK to inform your detection strategies.</p>
<p>You are committed to continuous learning, regularly updating your knowledge to remain at the forefront of cybersecurity advancements. Your analytical mindset enables you to dissect complex security incidents and identify patterns that others might miss. You value clear documentation and process consistency, ensuring that your work can be easily understood and replicated by your peers.</p>
<p>You are a natural communicator, able to articulate security concepts to both technical and non-technical stakeholders. Your collaborative spirit drives cross-functional engagement, enhancing the organization’s security posture. With a high tolerance for autonomy, you are comfortable taking initiative and leading projects to completion. Certifications such as CISSP, GCIH, GCFE, GCFA, or GMON are a testament to your dedication, but your practical experience is what truly sets you apart.</p>
<p>You will be responsible for building detection logics using log aggregation platforms like Elastic in large enterprise environments, maintaining and improving existing detection tools and systems to ensure optimal performance and reliability, creating and maintaining documentation for detection processes and procedures to ensure clarity and consistency, utilizing your knowledge of threat actor techniques, vulnerabilities, and exploits to identify and help mitigate potential security risks, collaborating with cross-functional teams to enhance overall security posture and response strategies, staying up-to-date with the latest advancements in cybersecurity to continuously improve detection capabilities.</p>
<p>By joining our team, you will enhance the security posture of Synopsys by identifying and mitigating potential threats, contribute to the development and maintenance of robust detection tools and systems, improve the efficiency and effectiveness of security operations through automation and scripting, provide valuable insights and recommendations to enhance overall security strategies, support the continuous improvement of detection processes and procedures, and elevate the organization&#39;s resilience and readiness against emerging cyber threats.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$101000-$152000</Salaryrange>
      <Skills>ci/cd methodology, elastic, python, enterprise siems, mitre att&amp;ck framework, threat detection, incident response, security operations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a technology company that develops software used in chip design, verification, and manufacturing.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/austin/cyber-security-engineering-sr-engineer-16007/44408/92616533008</Applyto>
      <Location>Austin</Location>
      <Country></Country>
      <Postedate>2026-04-05</Postedate>
    </job>
    <job>
      <externalid>c76d0c6d-ec7</externalid>
      <Title>Technical Policy Manager, Cyber Harms</Title>
      <Description><![CDATA[<p><strong>About the Role:</strong></p>
<p>We are looking for a cybersecurity expert to lead our efforts to prevent AI misuse in the cyber domain. As a Cyber Harms Technical Policy Manager, you will lead a team applying deep technical expertise to inform the design of safety systems that detect harmful cyber behaviours and prevent misuse by sophisticated threat actors.</p>
<p><strong>In this role, you will:</strong></p>
<ul>
<li>Lead and grow a team of technical specialists focused on cyber threat modelling and evaluation frameworks</li>
<li>Design and oversee execution of capability evaluations (&#39;evals&#39;) to assess the cyber-relevant capabilities of new models</li>
<li>Create comprehensive cyber threat models, including attack vectors, exploit chains, precursor identification, and weaponization techniques</li>
<li>Develop and iterate on usage policies that govern responsible use of our models for emerging capabilities and use cases related to cyber harms</li>
<li>Serve as the primary domain expert on cyber harms, advising cross-functional teams on threat landscapes and mitigation strategies</li>
<li>Collaborate closely with internal and external threat modelling experts to develop training data for safety systems, and with ML engineers to train these systems, optimising for both robustness against adversarial attacks and low false-positive rates for legitimate security researchers</li>
<li>Analyse safety system performance in traffic, identifying gaps and proposing improvements</li>
<li>Conduct regular reviews of existing policies and enforcement systems to identify and address gaps and ambiguities related to cybersecurity risks</li>
<li>Develop rigorous stress-testing of safeguards against evolving cyber threats and product surfaces</li>
<li>Partner with Research, Product, Policy, Security Team, and Frontier Red Team to ensure cybersecurity safety is embedded throughout the model development lifecycle</li>
<li>Translate cybersecurity domain knowledge into actionable safety requirements and clearly articulated policies</li>
<li>Contribute to external communications, including model cards, blog posts, and policy documents related to cybersecurity safety</li>
<li>Monitor emerging technologies and threat landscapes for their potential to contribute to new risks and mitigation strategies, and strategically address these</li>
<li>Mentor and develop team members, fostering a culture of technical excellence and responsible AI development</li>
</ul>
<p><strong>You may be a good fit if you have:</strong></p>
<ul>
<li>An M.S. or PhD in Computer Science, Cybersecurity, or a related technical field, OR equivalent professional experience in offensive or defensive cybersecurity</li>
<li>5+ years of hands-on experience in cybersecurity, with deep expertise in areas such as vulnerability research, exploit development, network security, malware analysis, or penetration testing</li>
<li>2+ years of experience managing technical teams or leading complex technical projects with multiple stakeholders</li>
<li>Experience in scientific computing and data analysis, with proficiency in programming (Python preferred)</li>
<li>Deep expertise in modern cybersecurity, including both offensive techniques (vulnerability research, exploit development, penetration testing, malware analysis) and defensive measures (detection, monitoring, incident response)</li>
<li>Demonstrated ability to create threat models and translate technical cyber risks into policy frameworks</li>
<li>Familiarity with responsible disclosure practices, vulnerability coordination, and cybersecurity frameworks (e.g., MITRE ATT&amp;CK, NIST Cybersecurity Framework, CWE/CVE systems)</li>
<li>Strong analytical and writing skills, with the ability to navigate ambiguity and explain complex technical concepts to non-technical stakeholders</li>
<li>Experience developing policies or guidelines at scale, balancing safety concerns with enabling legitimate use cases</li>
<li>A passion for learning new skills and an ability to rapidly adapt to changing techniques and technologies</li>
<li>Comfort working in a fast-paced environment where priorities may shift as AI capabilities evolve</li>
<li>Track record of translating specialised technical knowledge into actionable safety policies or enforcement guidelines</li>
</ul>
<p><strong>Preferred Qualifications:</strong></p>
<ul>
<li>Background in AI/ML systems, particularly experience with large language models</li>
<li>Experience developing ML-based security systems or adversarial ML research</li>
<li>Experience working with defence, intelligence, or security organisations (e.g., NSA, CISA, national labs, security contractors)</li>
<li>Published security research, disclosed vulnerabilities, or participated in bug bounty programs</li>
<li>Understanding of Trust &amp; Safety operations and content moderation at scale</li>
<li>Certifications such as OSCP, OSCE, GXPN, or equivalent demonstrating technical depth</li>
<li>Understanding of dual-use security research concerns and ethical considerations in AI safety</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>The annual compensation for this role is not specified in the job posting.</Salaryrange>
      <Skills>cybersecurity, vulnerability research, exploit development, network security, malware analysis, penetration testing, scientific computing, data analysis, programming (Python), threat modelling, policy frameworks, responsible disclosure practices, vulnerability coordination, cybersecurity frameworks (e.g., MITRE ATT&amp;CK, NIST Cybersecurity Framework, CWE/CVE systems), AI/ML systems, large language models, ML-based security systems, adversarial ML research, defence, intelligence, or security organisations, NSA, CISA, national labs, security contractors, published security research, disclosed vulnerabilities, bug bounty programs, Trust &amp; Safety operations, content moderation at scale, OSCP, OSCE, GXPN, or equivalent certifications, dual-use security research concerns, ethical considerations in AI safety</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a quickly growing organisation with a mission to create reliable, interpretable, and steerable AI systems. The company&apos;s team consists of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5066981008</Applyto>
      <Location>San Francisco, CA, Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>