<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>5c943be1-a6f</externalid>
      <Title>Threat Detection Engineer</Title>
      <Description><![CDATA[<p>We are seeking an experienced Threat Detection Engineer to join our team. As a Threat Detection Engineer, you will be responsible for driving our best-in-class posture through threat hunting, detection engineering, and playbook creation. You will also lead information security response activities and work closely with business and technology teams to deliver positive outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Leveraging multiple data sources to identify modern evolving threats and developing new detection and response approaches</li>
<li>Creating and operating high-fidelity detections mechanisms that drive efficient, effective, and repeatable response</li>
<li>Owning, operating, and automating detection and response workflows to enable the team to focus on strategic objectives</li>
<li>Leading information security response activities for the firm</li>
<li>Working across business and technology teams to deliver positive outcomes across the firm</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>A bachelor&#39;s or master&#39;s degree in computer science or cyber security with a strong IT background or equivalent demonstrable experience</li>
<li>3 years&#39; experience working in a security engineering role, with financial industry experience preferred</li>
<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>
<li>Possession of security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>
<li>Experience with modern security tooling across security domains; network, endpoint, data, identity, and cloud</li>
<li>Experience in standard enterprise technology stack, including Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>
<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>
<li>Required scripting, development, and automation skills using PowerShell or Python and proficient development tools</li>
<li>Experience in OSINT, threat hunting, and analysing malicious emails</li>
<li>Ability to prioritise in a fast-moving, high-pressure, constantly changing environment</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>threat detection, security engineering, cyber security, KQL, SQL, SPL, security certifications, modern security tooling, standard enterprise technology stack, scripting, development, automation, OSINT, threat hunting</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>IT Infrastructure</Employername>
      <Employerlogo>https://logos.yubhub.co/mlp.eightfold.ai.png</Employerlogo>
      <Employerdescription>IT Infrastructure provides IT services and support to various organisations.</Employerdescription>
      <Employerwebsite>https://mlp.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://mlp.eightfold.ai/careers/job/755955470563</Applyto>
      <Location>London, United Kingdom</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>db5c579b-cd5</externalid>
      <Title>Global Security Operations Center Operator</Title>
      <Description><![CDATA[<p>Join the team as Twilio&#39;s next Operator, Global Security Operations Centre (GSOC) who will play a critical role in informing our overall security posture to enable a safe working environment.</p>
<p>As a member of the Corporate Safety &amp; Security team, you&#39;ll utilise best-in-class technology to identify potential business disruptions as early as possible and streamline critical emergency response and notification to minimise impact to our people, assets, operations, or brand reputation.</p>
<p>This position is needed to maintain a broad situational awareness over internal and external physical events that could impact employee safety or pose a threat to business assets or operations across Twilio&#39;s global footprint.</p>
<p>GSOC Operators monitor a variety of data sources including internal access control systems, external incident aggregators, travel safety applications, and general open source reporting materials.</p>
<p>GSOC Operators serve as the primary contact for employees with physical safety and security questions or concerns.</p>
<p>When an incident occurs, the GSOC Operator may dispatch security resources, escalate to crisis management teams, send broad communications to Twilio employees, or execute a mass notification to account for employee safety.</p>
<p>Responsibilities:</p>
<p>Monitoring and Surveillance - Utilise various physical security asset monitoring and surveillance systems to detect potential unauthorized access, suspicious activity, or other security incidents</p>
<p>Monitor open-source threat intelligence and other internal SaaS tools to maintain situational awareness of persistent or emergency global events with potential or direct impact to operations</p>
<p>Security Operations Support - Support access control and visitor management processes</p>
<p>Manage security-related calls for service and provide general guidance to employees, vendors, and guests</p>
<p>Maintain awareness of business travellers and personnel accessing Twilio facilities</p>
<p>Partner with local site security teams to escalate and dispatch resources for incident and alarm response</p>
<p>Review travel requests to elevated risk locations, assist travellers through the approval process, and cross-reference live itineraries with external incidents</p>
<p>Incident Management - Perform the first point of incident intake across a variety of emergencies, including medical emergencies, natural disasters, fire/evacuation, travel disruptions, and security incidents</p>
<p>Assess and triage events and incidents to determine their impact to operations</p>
<p>Dispatch and coordinate response with emergency response personnel</p>
<p>Communicate effectively on emerging incidents to large audiences to share situational awareness or tactical updates as warranted</p>
<p>Maintain real-time incident documentation for reporting and analysis</p>
<p>Perform Life-Safety checks for Twilio in areas impacted by potentially life-threatening conditions</p>
<p>Participate in post-incident reviews to document and implement corrective action and improvements to future response</p>
<p>Operational Excellence - Maintain a strong understanding of security and emergency standard operating procedures</p>
<p>Utilise critical thinking and problem-solving skills to analyse situations and implement solutions</p>
<p>Support large projects that will improve Twilio&#39;s GSOC capabilities and initiatives</p>
<p>Qualifications:</p>
<ul>
<li>3+ years of experience in a GSOC working environment</li>
</ul>
<ul>
<li>Experience with physical safety and security technology, systems (ACS, IDS, VSS, VMS), travel safety, and mass notification tools</li>
</ul>
<ul>
<li>Experience with open-source intelligence (OSINT) research tools</li>
</ul>
<ul>
<li>Strong critical thinking and problem-solving skills</li>
</ul>
<ul>
<li>Proven ability to follow standard operating procedures and playbooks</li>
</ul>
<ul>
<li>Ability to prioritise tasks in a fast-paced environment</li>
</ul>
<ul>
<li>Ability to stay calm, professional, and think clearly in high-stress situations</li>
</ul>
<ul>
<li>Ability to communicate clearly and concisely; verbal and written</li>
</ul>
<ul>
<li>Ability to work &#39;non-standard&#39; shift hours, to overlap as needed with colleagues and stakeholders in other global locations, including weekend and holiday hours</li>
</ul>
<ul>
<li>English Language Proficiency</li>
</ul>
<p>Desired:</p>
<ul>
<li>Customer service mindset</li>
</ul>
<ul>
<li>Comfortable with a high-tech work environment</li>
</ul>
<ul>
<li>Eager to learn new tools and processes</li>
</ul>
<ul>
<li>Ability to work independently and as part of a team</li>
</ul>
<ul>
<li>Proficiency in Google Suite</li>
</ul>
<p>Additional Language Proficiency</p>
<p>Shift Details: Variable (8–10-hour shifts)</p>
<p>Must be flexible to work holidays, weekends, and occasional overtime.</p>
<p>Travel: Approximately 10% travel is anticipated to help you participate in project or team in-person meetings to help you connect in a meaningful way.</p>
<p>What We Offer:</p>
<p>Working at Twilio offers many benefits, including competitive pay, generous time off, ample parental and wellness leave, healthcare, a retirement savings programme, and much more. Offerings vary by location.</p>
<p>Compensation:</p>
<ul>
<li>Please note this role is open to candidates outside of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Vermont, Washington D.C., and Washington State.</li>
</ul>
<p>The estimated pay ranges for this role are as follows:</p>
<ul>
<li>Based in Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, Vermont or Washington D.C.: $26.27 - $32.84</li>
</ul>
<ul>
<li>Based in New York, New Jersey, Washington State, or California (outside of the San Francisco Bay area): $27.77 - $34.71</li>
</ul>
<ul>
<li>Based in the San Francisco Bay area, California: $30.85 - $38.56</li>
</ul>
<ul>
<li>This role may be eligible to participate in Twilio&#39;s equity plan and corporate bonus plan.</li>
</ul>
<p>All roles are generally eligible for the following benefits: health care insurance, 401(k) retirement account, paid sick time, paid personal time off, paid parental leave.</p>
<p>The successful candidate&#39;s starting salary will be determined based on permissible, non-discriminatory factors such as skills, experience, and geographic location.</p>
<p>Applications for this role are intended to be accepted until November 15 but may change based on business needs.</p>
<p>Twilio thinks big. Do you? We like to solve problems, take initiative, pitch in when needed, and are always up for trying new things. That&#39;s why we seek out colleagues who embody our values , something we call Twilio Magic. Additionally, we empower employees to build positive change in their communities by supporting their volunteering and donation efforts. So, if you&#39;re ready to unleash your full potential, do your best work, and be the best version of yourself, apply now!</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>physical safety and security technology, systems (ACS, IDS, VSS, VMS), travel safety, mass notification tools, open-source intelligence (OSINT) research tools, critical thinking and problem-solving skills, standard operating procedures and playbooks, English Language Proficiency, customer service mindset, comfortable with a high-tech work environment, eager to learn new tools and processes, ability to work independently and as part of a team, proficiency in Google Suite</Skills>
      <Category>Security</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio is a cloud communication platform that provides a range of APIs and services for building, scaling, and operating real-time communication and collaboration applications.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7808464</Applyto>
      <Location>Remote - US</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>768a9ce7-713</externalid>
      <Title>Geopolitical Intelligence Analyst</Title>
      <Description><![CDATA[<p>We are seeking a Geopolitical Intelligence Analyst to join our growing Global Safety, Intelligence &amp; Security team. In this role, you will play a critical part in identifying, assessing, and communicating geopolitical risks and nation-state threats to Anthropic&#39;s people, operations, intellectual property, and strategic interests through intelligence collection, analysis, and dissemination.</p>
<p>Responsibilities: Conduct all-source intelligence collection and analysis to identify, assess, and prioritize geopolitical risks and nation-state threats to Anthropic, its personnel, and its operations Produce clear, well-sourced analytical products, from quick-turn situational updates to in-depth strategic assessments and country risk profiles, for executive and cross-functional delivery Work cross-functionally to integrate geopolitical context into enterprise risk decisions, regulatory strategy, and incident response Conduct horizon scanning for emerging geopolitical flashpoints, policy shifts, and macro-trends that could impact Anthropic&#39;s operations or strategic positioning Support event security and corporate strategy by providing geopolitical context for international conferences, government engagements, and multilateral forums where Anthropic participates Conduct country and regional risk assessments to inform decisions on employee travel, international expansion, facility siting, and partnership due diligence Build and maintain relationships with external intelligence partners, government contacts, and industry peers to facilitate information sharing on geopolitical threats to frontier AI companies</p>
<p>Requirements: Hold a bachelor&#39;s degree or higher in international relations, political science, security studies, regional studies, intelligence studies, or a related field Have 5-8 years of experience in geopolitical analysis, political risk, intelligence analysis, or a related domain Experience in all-source intelligence analysis, including proficiency with structured analytic techniques, commercial intelligence platforms, and OSINT methodology Ability to effectively tailor complex geopolitical analysis for various stakeholders, from technical security teams to senior leadership and board-level audiences Demonstrated ability to operate independently with minimal oversight while managing multiple analytical lines of effort simultaneously Are comfortable with a flexible schedule, including on-call availability during international crises and breaking geopolitical events</p>
<p>Preferred qualifications: Background in high-growth technology companies, particularly those with significant geopolitical exposure Professional certifications, IC credentials, or advanced degrees in relevant fields Specialized knowledge of risks unique to the AI sector</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$175,000-$220,000 USD</Salaryrange>
      <Skills>geopolitical analysis, political risk, intelligence analysis, structured analytic techniques, commercial intelligence platforms, OSINT methodology, background in high-growth technology companies, professional certifications, IC credentials, advanced degrees in relevant fields</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5188193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>536aa8eb-f7c</externalid>
      <Title>Technical Influence Operations Threat Investigator</Title>
      <Description><![CDATA[<p>We are looking for a Technical Influence Operations Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for influence operations, disinformation campaigns, coordinated inauthentic behavior, and other forms of information manipulation.</p>
<p>You will work at the intersection of AI safety and information integrity, combining deep expertise in influence operations with technical investigation skills to identify threat actors who leverage AI to generate synthetic content, amplify narratives, manipulate public discourse, or undermine democratic processes. Your work will directly shape how Anthropic defends against one of the most rapidly evolving categories of AI misuse.</p>
<p>Important context: In this position you may be exposed to explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature. This role may require responding to escalations during weekends and holidays.</p>
<p>Responsibilities:</p>
<ul>
<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for influence operations, including AI-generated disinformation, coordinated inauthentic behavior, astroturfing, and narrative manipulation campaigns</li>
</ul>
<ul>
<li>Conduct technical investigations using SQL, Python, and other tools to analyze large datasets, trace user behavior patterns, and uncover coordinated networks of threat actors conducting influence operations</li>
</ul>
<ul>
<li>Develop influence operation-specific detection capabilities, including abuse signals, behavioral clustering techniques, and detection methodologies tailored to AI-enabled information manipulation</li>
</ul>
<ul>
<li>Create actionable intelligence reports on influence operation TTPs, emerging narrative threats, and threat actor campaigns leveraging AI systems</li>
</ul>
<ul>
<li>Conduct cross-platform threat analysis linking on-platform activity to broader influence campaigns across social media, messaging platforms, and other digital ecosystems</li>
</ul>
<ul>
<li>Monitor and analyze state-sponsored and non-state influence operations that may leverage AI capabilities, with particular focus on operations originating from or targeting geopolitically significant regions</li>
</ul>
<ul>
<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>
</ul>
<ul>
<li>Engage with external stakeholders including government agencies, platform integrity teams, academic researchers, and threat intelligence sharing communities</li>
</ul>
<ul>
<li>Forecast how advances in AI technology,including improved content generation, voice synthesis, and multimodal capabilities,will reshape the influence operations landscape and inform safety-by-design strategies</li>
</ul>
<p>You may be a good fit if you:</p>
<ul>
<li>Have deep subject matter expertise in influence operations, coordinated inauthentic behavior, disinformation, or information warfare</li>
</ul>
<ul>
<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>
</ul>
<ul>
<li>Have experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations</li>
</ul>
<ul>
<li>Have hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations</li>
</ul>
<ul>
<li>Have experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems</li>
</ul>
<ul>
<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>
</ul>
<ul>
<li>Can present analytical work to both technical and non-technical audiences, including government stakeholders and senior leadership</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Experience at a major technology platform working on influence operations, platform integrity, or content authenticity</li>
</ul>
<ul>
<li>Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts</li>
</ul>
<ul>
<li>Experience investigating operations linked to Chinese, Russian, Iranian, or other state-sponsored information campaigns</li>
</ul>
<ul>
<li>Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions</li>
</ul>
<ul>
<li>Familiarity with social network analysis techniques and tools for mapping coordinated behavior</li>
</ul>
<ul>
<li>Background in AI safety, machine learning security, or technology abuse investigation</li>
</ul>
<ul>
<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>
</ul>
<ul>
<li>Active Top Secret security clearance</li>
</ul>
<p>The annual compensation range for this role is $230,000-$290,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote-hybrid</Workarrangement>
      <Salaryrange>$230,000-$290,000 USD</Salaryrange>
      <Skills>Deep subject matter expertise in influence operations, coordinated inauthentic behavior, disinformation, or information warfare, Proficiency in SQL and Python for data analysis and threat detection, Experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations, Hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations, Experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems, Experience at a major technology platform working on influence operations, platform integrity, or content authenticity, Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts, Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions, Familiarity with social network analysis techniques and tools for mapping coordinated behavior, Background in AI safety, machine learning security, or technology abuse investigation</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a company that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5140239008</Applyto>
      <Location>Remote-Friendly, United States</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>c60fc7e5-9f1</externalid>
      <Title>Insider Risk Investigator - Technical &amp; Human Intelligence</Title>
      <Description><![CDATA[<p>We are seeking an exceptional Insider Risk Investigator with expertise in both human and technical investigations to support and protect Anthropic&#39;s mission.</p>
<p>The Insider Risk Team works cross-functionally to deter, identify, investigate and mitigate risks to Anthropic&#39;s most critical assets,our people, our data, and our infrastructure.</p>
<p>Responsibilities:</p>
<ul>
<li>Triage custom technical detection alerts</li>
<li>Independently conduct end-to-end insider risk investigations while working closely with IT, Detection and Response, Legal, HR and other cross-functional teams</li>
<li>Monitor and triage external threats targeting employees</li>
<li>Conduct sensitive interviews of employees or other involved parties</li>
<li>Perform technical analysis of logs from SIEM, DLP, UEBA systems</li>
<li>Leverage AI tools (Claude, Claude Code) to accelerate investigation workflows and data analysis</li>
<li>Build and maintain investigation documentation</li>
<li>Assist in iterating and improving on processes, procedures and systems to detect, mitigate and investigate insider risks</li>
<li>Work cross-functionally to develop, refine and operationalize insider risk indicators, scenarios and mitigation strategies</li>
<li>Provide rapid-turnaround security assessments to support business operations</li>
<li>Support education and awareness programs to promote a robust security culture</li>
<li>Serve as the subject matter expert for insider risk and provide training to team members as needed</li>
</ul>
<p>You may be a good fit if you have:</p>
<ul>
<li>Bachelor&#39;s degree and/or higher education in a related field</li>
<li>5-8 years of experience in insider risk, corporate investigations or a related domain</li>
<li>3-5 years experience in conducting investigative interviews</li>
<li>Experience conducting OSINT for threat assessment, or counterintelligence</li>
<li>Experience leveraging DLP, UEBA, SIEM, SOAR and other insider risk security tooling for detections and investigations</li>
<li>Broad understanding of internal and external investigations, cybersecurity, interview techniques, risk assessment and managing strong cross-functional relationships</li>
<li>Ability to communicate complex security findings clearly and concisely to non-technical stakeholders (written and verbal)</li>
<li>Track record of rapid response to time-sensitive security requests</li>
<li>Comfort operating across organizational boundaries (Security, People, Legal, IT)</li>
<li>Exceptional communication, collaboration skills and the ability to lead projects with little guidance</li>
<li>Demonstrated ability to operate independently with minimal oversight while managing sensitive cases</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Experience working in the technology industry or at/with AI/ML companies</li>
<li>Experience with counterintelligence investigations and nation-state threat actor TTPs</li>
<li>Background in open-source intelligence collection and analysis</li>
<li>Track record of AI/LLM adoption for productivity gains in investigative work</li>
<li>Experience contributing to a high growth startup environment</li>
<li>Specialized knowledge of risks unique to the AI sector</li>
<li>Experience with data exfiltration investigations across multiple vectors (email, cloud, removable media)</li>
<li>Experience working in government, defense, or high-security environments</li>
</ul>
<p>What makes you successful here:</p>
<ul>
<li>Entrepreneurial mindset: You see gaps and fill them without being asked</li>
<li>Technical + human balance: Equal comfort analyzing log data and conducting sensitive interviews</li>
<li>AI-native approach: You leverage LLMs to work smarter, not just harder</li>
<li>Mission alignment: You understand AI safety stakes and insider risk&#39;s role in protecting that mission</li>
<li>Judgment under uncertainty: You make sound decisions with incomplete information</li>
<li>Clear communicator: You distill complex findings into actionable insights for diverse audiences</li>
<li>Cross-functional navigator: You build relationships and collaborate effectively across teams</li>
</ul>
<p>Annual compensation range for this role is $245,000-$305,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$245,000-$305,000 USD</Salaryrange>
      <Skills>insider risk, corporate investigations, OSINT, DLP, UEBA, SIEM, SOAR, cybersecurity, interview techniques, risk assessment, AI/ML, counterintelligence, open-source intelligence collection and analysis, AI/LLM adoption, high growth startup environment, data exfiltration investigations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5182430008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>15902828-aa0</externalid>
      <Title>Geopolitical Intelligence Analyst</Title>
      <Description><![CDATA[<p>We are seeking a Geopolitical Intelligence Analyst to join our growing Global Safety, Intelligence &amp; Security team. In this role, you will play a critical part in identifying, assessing, and communicating geopolitical risks and nation-state threats to Anthropic&#39;s people, operations, intellectual property, and strategic interests through intelligence collection, analysis, and dissemination.</p>
<p>Responsibilities: Conduct all-source intelligence collection and analysis to identify, assess, and prioritize geopolitical risks and nation-state threats to Anthropic, its personnel, and its operations Produce clear, well-sourced analytical products, from quick-turn situational updates to in-depth strategic assessments and country risk profiles, for executive and cross-functional delivery Work cross-functionally to integrate geopolitical context into enterprise risk decisions, regulatory strategy, and incident response Conduct horizon scanning for emerging geopolitical flashpoints, policy shifts, and macro-trends that could impact Anthropic&#39;s operations or strategic positioning Support event security and corporate strategy by providing geopolitical context for international conferences, government engagements, and multilateral forums where Anthropic participates Conduct country and regional risk assessments to inform decisions on employee travel, international expansion, facility siting, and partnership due diligence Build and maintain relationships with external intelligence partners, government contacts, and industry peers to facilitate information sharing on geopolitical threats to frontier AI companies</p>
<p>Requirements: Hold a bachelor&#39;s degree or higher in international relations, political science, security studies, regional studies, intelligence studies, or a related field Have 5-8 years of experience in geopolitical analysis, political risk, intelligence analysis, or a related domain Experience in all-source intelligence analysis, including proficiency with structured analytic techniques, commercial intelligence platforms, and OSINT methodology Ability to effectively tailor complex geopolitical analysis for various stakeholders, from technical security teams to senior leadership and board-level audiences Demonstrated ability to operate independently with minimal oversight while managing multiple analytical lines of effort simultaneously Are comfortable with a flexible schedule, including on-call availability during international crises and breaking geopolitical events</p>
<p>Preferred qualifications: Background in high-growth technology companies, particularly those with significant geopolitical exposure Professional certifications, IC credentials, or advanced degrees in relevant fields Specialized knowledge of risks unique to the AI sector</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$175,000-$220,000 USD</Salaryrange>
      <Skills>Geopolitical analysis, Intelligence analysis, Structured analytic techniques, Commercial intelligence platforms, OSINT methodology, Geopolitical risk assessment, Country risk profiling, Incident response, Event security, Corporate strategy, Background in high-growth technology companies, Professional certifications, IC credentials, Advanced degrees in relevant fields, Specialized knowledge of risks unique to the AI sector</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5188193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>7732e8ed-b24</externalid>
      <Title>Cyber Security Engineer</Title>
      <Description><![CDATA[<p><strong>Job Description</strong></p>
<p>You are a forward-thinking cybersecurity professional with a passion for defending critical infrastructure and sensitive data. As a Cyber Security Engineer at Synopsys, you will be responsible for configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</p>
<p><strong>Key Responsibilities</strong></p>
<ul>
<li>Configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</li>
<li>Developing, updating, and documenting Standard Operating Procedures (SOPs) for security tools and maintaining accurate network diagrams.</li>
<li>Creating and deploying host and network countermeasures based on open source intelligence (OSINT), behavioral analysis, and evolving threat landscapes.</li>
<li>Monitoring, tuning, and implementing security controls in tools such as McAfee ePO and Palo Alto to ensure optimal protection.</li>
<li>Managing and troubleshooting Security Information and Event Management (SIEM) feeds, ensuring timely detection and response to security events.</li>
<li>Designing and implementing custom QRadar dashboards to visualize and analyze critical security datasets.</li>
<li>Leading incident response efforts, ensuring chain of custody is maintained and investigations are thoroughly documented.</li>
<li>Characterizing and analyzing network and host traffic to identify anomalous activity and mitigate potential threats.</li>
<li>Developing and deploying custom Data Loss Prevention (DLP) signatures within Microsoft O365, Palo Alto, and McAfee environments.</li>
</ul>
<p><strong>Impact</strong></p>
<ul>
<li>Strengthening the security posture of Ansys Government Initiatives (AGI) by proactively defending against emerging threats.</li>
<li>Ensuring compliance with rigorous federal and organizational security standards, supporting government and commercial initiatives.</li>
<li>Reducing risk of data breaches and operational disruptions through robust countermeasure development and incident response.</li>
<li>Enhancing operational readiness by keeping security documentation, SOPs, and network diagrams current and actionable.</li>
<li>Empowering internal teams and stakeholders by providing clear security guidance, training, and technical leadership.</li>
<li>Contributing to a culture of continuous improvement, innovation, and collaboration within the security team and broader organization.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Minimum two (2) years performing system administrator duties for Windows and/or Linux environments.</li>
<li>This position requires a government security clearance. You must be a U.S. citizen for consideration.</li>
<li>SEC+ or equivalent industry-recognized certification.</li>
<li>At least two (2) years of experience in an Enterprise Security Operation Center (SOC) or similar response team.</li>
<li>Minimum two (2) years supporting the Federal Government—either directly or as a contractor—in a security-related field.</li>
<li>Strong technical understanding of current hardware and software technologies, including security tools and platforms.</li>
</ul>
<p><strong>Who You Are</strong></p>
<ul>
<li>Analytical thinker with excellent problem-solving and decision-making skills.</li>
<li>Organized, self-motivated, and able to prioritize competing requests in a dynamic environment.</li>
<li>Exceptional communicator, able to translate complex technical concepts for diverse audiences and present information to groups.</li>
<li>Collaborative team player, eager to support and learn from colleagues while driving collective success.</li>
<li>Customer-focused, with strong relationship management skills and a commitment to user education and support.</li>
<li>Adaptable and resilient, ready to respond to urgent issues and evolving security challenges.</li>
</ul>
<p><strong>The Team You’ll Be A Part Of</strong></p>
<p>You’ll join the Ansys Government Initiatives (AGI) Cybersecurity team, a specialized group dedicated to protecting sensitive government and commercial assets. The team collaborates closely with internal stakeholders, federal partners, and industry experts to safeguard critical infrastructure and ensure compliance with the highest security standards. Together, you’ll drive innovation, share knowledge, and foster a culture of trust and resilience.</p>
<p><strong>Rewards and Benefits</strong></p>
<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$101000-$152000</Salaryrange>
      <Skills>host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, proxies, Security Information and Event Management (SIEM) feeds, Data Loss Prevention (DLP) signatures, Microsoft O365, Palo Alto, McAfee ePO, QRadar, custom dashboards, incident response, chain of custody, investigations, network and host traffic, anomalous activity, threat mitigation, open source intelligence (OSINT), behavioral analysis, evolving threat landscapes, security controls, security tools, platforms, technical leadership, user education, relationship management</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a leading provider of electronic design automation (EDA) software and services. The company has a global presence with over 10,000 employees.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/exton/cyber-security-engineer-agi-ansys-government-initiatives/44408/92312998208</Applyto>
      <Location>Exton, Pennsylvania</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>1ee98770-f81</externalid>
      <Title>Technical Influence Operations Threat Investigator</Title>
      <Description><![CDATA[<p><strong>About Anthropic</strong></p>
<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>
<p><strong>About the Role</strong></p>
<p>We are looking for a Technical Influence Operations Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for influence operations, disinformation campaigns, coordinated inauthentic behaviour, and other forms of information manipulation.</p>
<p>You will work at the intersection of AI safety and information integrity, combining deep expertise in influence operations with technical investigation skills to identify threat actors who leverage AI to generate synthetic content, amplify narratives, manipulate public discourse, or undermine democratic processes. Your work will directly shape how Anthropic defends against one of the most rapidly evolving categories of AI misuse.</p>
<p>_Important context: In this position you may be exposed to explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature. This role may require responding to escalations during weekends and holidays._</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for influence operations, including AI-generated disinformation, coordinated inauthentic behaviour, astroturfing, and narrative manipulation campaigns</li>
</ul>
<ul>
<li>Conduct technical investigations using SQL, Python, and other tools to analyse large datasets, trace user behaviour patterns, and uncover coordinated networks of threat actors conducting influence operations</li>
</ul>
<ul>
<li>Develop influence operation-specific detection capabilities, including abuse signals, behavioural clustering techniques, and detection methodologies tailored to AI-enabled information manipulation</li>
</ul>
<ul>
<li>Create actionable intelligence reports on influence operation TTPs, emerging narrative threats, and threat actor campaigns leveraging AI systems</li>
</ul>
<ul>
<li>Conduct cross-platform threat analysis linking on-platform activity to broader influence campaigns across social media, messaging platforms, and other digital ecosystems</li>
</ul>
<ul>
<li>Monitor and analyse state-sponsored and non-state influence operations that may leverage AI capabilities, with particular focus on operations originating from or targeting geopolitically significant regions</li>
</ul>
<ul>
<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>
</ul>
<ul>
<li>Engage with external stakeholders including government agencies, platform integrity teams, academic researchers, and threat intelligence sharing communities</li>
</ul>
<ul>
<li>Forecast how advances in AI technology—including improved content generation, voice synthesis, and multimodal capabilities—will reshape the influence operations landscape and inform safety-by-design strategies</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>Have deep subject matter expertise in influence operations, coordinated inauthentic behaviour, disinformation, or information warfare</li>
</ul>
<ul>
<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>
</ul>
<ul>
<li>Have experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations</li>
</ul>
<ul>
<li>Have hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations</li>
</ul>
<ul>
<li>Have experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems</li>
</ul>
<ul>
<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>
</ul>
<ul>
<li>Can present analytical work to both technical and non-technical audiences, including government stakeholders and senior leadership</li>
</ul>
<p><strong>Strong candidates may also have:</strong></p>
<ul>
<li>Experience at a major technology platform working on influence operations, platform integrity, or content authenticity</li>
</ul>
<ul>
<li>Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts</li>
</ul>
<ul>
<li>Experience investigating operations linked to Chinese, Russian, Iranian, or other state-sponsored information campaigns</li>
</ul>
<ul>
<li>Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions</li>
</ul>
<ul>
<li>Familiarity with social network analysis techniques and tools for mapping coordinated behaviour</li>
</ul>
<ul>
<li>Background in AI safety, machine learning security, or technology abuse investigation</li>
</ul>
<ul>
<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>
</ul>
<ul>
<li>Active Top Secret security clearance</li>
</ul>
<p><strong>Logistics</strong></p>
<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration attorney to assist with the process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$230,000 - $290,000 USD</Salaryrange>
      <Skills>SQL, Python, influence operations, disinformation, coordinated inauthentic behaviour, astroturfing, narrative manipulation campaigns, large language models, open-source intelligence (OSINT) methodologies, social network analysis techniques, fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic, background in intelligence analysis, information operations, or counter-disinformation, experience building and scaling threat detection systems or abuse monitoring programs</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a rapidly growing organisation that aims to create reliable, interpretable, and steerable AI systems. The company has a team of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5140239008</Applyto>
      <Location>Remote-Friendly, United States</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>