{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/pentesting"},"x-facet":{"type":"skill","slug":"pentesting","display":"Pentesting","count":6},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_611720bf-294"},"title":"Senior Application Security Engineer","description":"<p>Why join us</p>\n<p>Brex is a financial platform that enables companies to spend smarter and move faster in over 200 markets. It combines global corporate cards and banking with intuitive spend management, bill pay, and travel software.</p>\n<p>As a Senior Application Security Engineer, you will focus on finding and responding to security vulnerabilities across the Brex platform. In this role, you will perform code reviews, design reviews, penetration testing, and vulnerability management. You will develop and maintain tooling to perform static and dynamic testing of the Brex platform and tooling which supports secure developer workflows.</p>\n<p>Application Security is part of our wider Financial Scale organization, which means you will work closely with Security Operations, GRC, Product Security, Front End Platform, IT Infrastructure teams.</p>\n<p>We’re looking for individuals with a strong background and interest in penetration testing. You should have a demonstrated ability to find vulnerabilities in complex systems and craft exploits to demonstrate business impact.</p>\n<p>This role is highly cross-functional and collaborative, you will have the opportunity to work with every engineering team across Brex.</p>\n<p>Building a world-class financial service requires world-class security. Brex is pioneering the next wave of AI-driven financial services for dynamic, high-impact companies like Coinbase, Robinhood, and Anthropic.</p>\n<p>Responsibilities</p>\n<ul>\n<li>Identifying vulnerabilities, demonstrating business impact, and articulating the risk of specific vulnerabilities to drive prioritization efforts</li>\n</ul>\n<ul>\n<li>Perform penetration testing and design reviews, looking for vulnerabilities and insecure designs, work with engineering and product to design secure product features</li>\n</ul>\n<ul>\n<li>Maintain and build internal tools to automate security efforts, perform SAST and DAST testing of the Brex platform, and support secure development practices</li>\n</ul>\n<ul>\n<li>Build and contribute to a culture of collaborative security excellence through technical leadership, learning sessions, and mentorship within the team and wider organization</li>\n</ul>\n<p>Requirements</p>\n<ul>\n<li>5+ years work experience in an Application Security or related role</li>\n</ul>\n<ul>\n<li>Ability to find vulnerabilities in complex systems, demonstrating business impact through custom attack chains</li>\n</ul>\n<ul>\n<li>Experience with a wide range of secure development activities including, threat modeling, developer education, and incident response</li>\n</ul>\n<ul>\n<li>Knowledge of Python, scripting languages, and AI/agentic workflows to automate tasks, build tools and improve productivity</li>\n</ul>\n<ul>\n<li>Collaborative mindset paired with strong written and verbal communication skills</li>\n</ul>\n<p>Bonus points</p>\n<ul>\n<li>Proficiency with Kotlin, gRPC, GraphQL, Kubernetes</li>\n</ul>\n<ul>\n<li>Previous experience as a software engineer</li>\n</ul>\n<ul>\n<li>Consultancy experience performing web application security reviews</li>\n</ul>\n<ul>\n<li>Experience with securing distributed systems in AWS and cloud environments</li>\n</ul>\n<ul>\n<li>Experience with pentesting and securing agentic features and systems</li>\n</ul>\n<ul>\n<li>Contributions to the wider technical community, open source, public research, mentorship, community organizing, blogging, CVEs, presentations, etc</li>\n</ul>\n<p>Experience submitting to bug bounty programs or responsible disclosure programs</p>\n<p>Compensation</p>\n<p>The expected salary range for this role is $192,000 - $240,000. However, the starting base pay will depend on a number of factors including the candidate’s location, skills, experience, market demands, and internal pay parity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_611720bf-294","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Brex","sameAs":"https://brex.com/","logo":"https://logos.yubhub.co/brex.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/brex/jobs/8249884002","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$192,000 - $240,000","x-skills-required":["Python","Secure development activities","Threat modeling","Developer education","Incident response","AI/agentic workflows","Collaborative mindset","Strong written and verbal communication skills"],"x-skills-preferred":["Kotlin","gRPC","GraphQL","Kubernetes","Software engineering","Web application security reviews","Distributed systems in AWS and cloud environments","Pentesting and securing agentic features and systems","Contributions to the wider technical community"],"datePosted":"2026-04-18T15:55:36.756Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Seattle, Washington, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"Python, Secure development activities, Threat modeling, Developer education, Incident response, AI/agentic workflows, Collaborative mindset, Strong written and verbal communication skills, Kotlin, gRPC, GraphQL, Kubernetes, Software engineering, Web application security reviews, Distributed systems in AWS and cloud environments, Pentesting and securing agentic features and systems, Contributions to the wider technical community","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":192000,"maxValue":240000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_28f97bd7-3d7"},"title":"Offensive Security Research Engineer, Safeguards","description":"<p>We are looking for vulnerability researchers to help mitigate the risks that come with building AI systems. One of these risks is the potential for LLMs to enable adversaries to cause harm by automating the attacks that today are carried out by human cybercrime groups, but in the future may be easily carried out by humans misusing LLMs.</p>\n<p>Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p>We are hiring security specialists who are experienced at exploitation and remediation, and are interested in understanding how LLMs could cause harm in the future, so that we can better prepare for this future and mitigate these risks before they arise.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Triage any vulnerabilities discovered, coordinate and assist the external and open-source community in remediation</li>\n<li>Write scaffolds designed to automate typical traditional attack techniques to help clarify our defensive problem selection</li>\n<li>Research how adversaries might misuse LLMs to identify and exploit vulnerabilities at scale in the future</li>\n<li>Develop promising defensive strategies that could mitigate the ability of adversaries to misuse models in harmful ways</li>\n<li>Work with a small, senior team of engineers and researchers to enact a forward-looking security plan</li>\n</ul>\n<p>You may be a good fit if you have:</p>\n<ul>\n<li>3+ years experience with pentesting, vulnerability research, or other offensive security experience</li>\n<li>Senior-level knowledge in at least one related topic area (reverse engineering, network security, exploitation, physical security)</li>\n<li>A history demonstrating desire to do the &#39;dirty work&#39; that results in high-quality outputs</li>\n<li>Software engineering experience</li>\n<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>\n<li>Proven ability to lead cross-functional security initiatives and navigate complex organisational dynamics</li>\n</ul>\n<p>Strong candidates may also have:</p>\n<ul>\n<li>Published research papers on computer security, language modeling, or related topics; or given talks at Defcon, Blackhat, CCC, or related venues</li>\n<li>Familiarity with large language models and how they work; for example, you may have written agent scaffolds</li>\n<li>Reported CVEs, or been awarded for bug bounty vulnerabilities</li>\n<li>Contributed to open-source projects in LLM- or security-adjacent repositories</li>\n</ul>\n<p>The annual compensation range for this role is $320,000-$405,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_28f97bd7-3d7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5123011008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000-$405,000 USD","x-skills-required":["pentesting","vulnerability research","offensive security","reverse engineering","network security","exploitation","physical security","software engineering"],"x-skills-preferred":["large language models","agent scaffolds","CVEs","bug bounty vulnerabilities","open-source projects"],"datePosted":"2026-04-18T15:41:01.125Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"pentesting, vulnerability research, offensive security, reverse engineering, network security, exploitation, physical security, software engineering, large language models, agent scaffolds, CVEs, bug bounty vulnerabilities, open-source projects","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ef01837a-5e3"},"title":"Anthropic Fellows Program — AI Security","description":"<p><strong>About the Role</strong></p>\n<p>The Anthropic Fellows Program is a 4-month, full-time research opportunity for individuals to work on empirical AI research and engineering projects. As an AI Security Fellow, you will be part of a team that focuses on reducing catastrophic risks from advanced AI systems.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Conduct empirical AI research and engineering projects aligned with Anthropic&#39;s research priorities</li>\n<li>Collaborate with mentors and peers to achieve project goals</li>\n<li>Present research findings and results to the team and wider community</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>Fluency in Python programming</li>\n<li>Strong technical background in computer science, mathematics, or physics</li>\n<li>Ability to implement ideas quickly and communicate clearly</li>\n</ul>\n<p><strong>Nice to Have</strong></p>\n<ul>\n<li>Experience with pentesting, vulnerability research, or other offensive security work</li>\n<li>Experience with empirical ML research projects</li>\n<li>Experience with deep learning frameworks and experiment management</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>To participate in the Fellows program, you must have work authorization in the UK and be located in the UK during the program</li>\n<li>Workspace locations: London and Berkeley</li>\n<li>Visa sponsorship: Not currently available</li>\n</ul>\n<p><strong>Application Process</strong></p>\n<p>Applications and interviews are managed by Constellation, our official recruiting partner for this program. Clicking &#39;Apply here&#39; will redirect you to Constellation&#39;s application portal.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ef01837a-5e3","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5030244008","x-work-arrangement":"onsite","x-experience-level":"entry|mid|senior|staff|executive","x-job-type":"full-time","x-salary-range":"$3,850 USD / £2,310 / $4,300 CAD per week","x-skills-required":["Python","Computer Science","Mathematics","Physics"],"x-skills-preferred":["Pentesting","Vulnerability Research","Offensive Security Work","Empirical ML Research Projects","Deep Learning Frameworks","Experiment Management"],"datePosted":"2026-04-18T15:38:42.812Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, UK; Ontario, CAN; Remote-Friendly, United States; San Francisco, CA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Computer Science, Mathematics, Physics, Pentesting, Vulnerability Research, Offensive Security Work, Empirical ML Research Projects, Deep Learning Frameworks, Experiment Management","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":2310,"maxValue":4300,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_5fba9d7d-674"},"title":"AI Security Fellow","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>AI Security at Anthropic</strong></p>\n<p>We believe we are at an inflection point for AI&#39;s impact on cybersecurity. Models are now useful for cybersecurity tasks in practice: for example, Claude can now outperform human teams in some cybersecurity competitions and help us discover vulnerabilities in our own code.</p>\n<p>We are looking for researchers and engineers to help us accelerate defensive use of AI to secure code and infrastructure.</p>\n<p><strong>Anthropic Fellows Program Overview</strong></p>\n<p>The Anthropic Fellows Program is designed to accelerate AI security and safety research, and foster research talent. We provide funding and mentorship to promising technical talent - regardless of previous experience - to research the frontier of AI security and safety for four months.</p>\n<p>Fellows will primarily use external infrastructure (e.g. open-source models, public APIs) to work on an empirical project aligned with our research priorities, with the goal of producing a public output (e.g. a paper submission). In our previous cohorts, over 80% of fellows produced papers (more below).</p>\n<p>We run multiple cohorts of Fellows each year. This application is for cohorts starting in July 2026 and beyond.</p>\n<p><strong>What to Expect</strong></p>\n<ul>\n<li>Direct mentorship from Anthropic researchers</li>\n<li>Access to a shared workspace (in either Berkeley, California or London, UK)</li>\n<li>Connection to the broader AI safety research community</li>\n<li>Weekly stipend of 3,850 USD / 2,310 GBP / 4,300 CAD &amp; access to benefits (benefits vary by country)</li>\n<li>Funding for compute (~$15k/month) and other research expenses</li>\n</ul>\n<p><strong>Mentors, Research Areas, &amp; Past Projects</strong></p>\n<p>Fellows will undergo a project selection &amp; mentor matching process. Potential mentors include:</p>\n<ul>\n<li>Nicholas Carlini</li>\n<li>Keri Warr</li>\n<li>Evyatar Ben Asher</li>\n<li>Keane Lucas</li>\n<li>Newton Cheng</li>\n</ul>\n<p>On our Alignment Science and Frontier Red Team blogs, you can read about some past Fellows projects, including:</p>\n<ul>\n<li>AI agents find $4.6M in blockchain smart contract exploits: Winnie Xiao and Cole Killian, mentored by Nicholas Carlini and Alwin Peng</li>\n<li>Strengthening Red Teams: A Modular Scaffold for Control Evaluations: Chloe Loughridge et al., mentored by Jon Kutasov and Joe Benton</li>\n</ul>\n<p><strong>You may be a good fit if you</strong></p>\n<ul>\n<li>Are motivated by reducing catastrophic risks from advanced AI systems</li>\n<li>Are excited to transition into full-time empirical AI safety research and would be interested in a full-time role at Anthropic</li>\n</ul>\n<p><strong>Please note:</strong></p>\n<p>We do not guarantee that we will make any full-time offers to fellows. However, strong performance during the program may indicate that a Fellow would be a good fit here at Anthropic. In previous cohorts, over 40% of fellows received a full-time offer, and we’ve supported many more to go on to do great work on safety at other organisations.</p>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Contributed to open-source projects in LLM- or security-adjacent repositories</li>\n<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>\n<li>Experience with pentesting, vulnerability research, or other offensive security</li>\n<li>A history demonstrating desire to do the &#39;dirty work&#39; that results in high-quality outputs</li>\n<li>Reported CVEs, or been awarded for bug bounty vulnerabilities</li>\n<li>Experience with empirical ML research projects</li>\n<li>Experience with deep learning frameworks and experiment management</li>\n</ul>\n<p><strong>Candidates must be:</strong></p>\n<ul>\n<li>Fluent in Python programming</li>\n<li>Available to work full-time on the Fellows program for 4 months</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong></p>\n<p>Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>\n<p><strong>Interview process</strong></p>\n<p>The interview process will include an initial application &amp; references check, technical assessments &amp; interviews, and a research discussion.</p>\n<p><strong>Compensation</strong></p>\n<p>The expected base stipend for this role is 3,850 USD / 2,310 GBP / 4,300 CAD per week, with an expectation of 40 hours per week, for 4 months (with possible extension).</p>\n<p><strong>Logistics</strong></p>\n<p>Logistics Requirements: To participate in the Fellows program, you must have work authorization in the US, UK, or Canada and be located in that country during the program.</p>\n<p>Workspace Locations: We have designated shared workspaces in London and Berkeley where fellows will work from and mentors will visit. We are also open to remote fellows in the UK, US, or Canada. We will ask you about your availability to work from Berkeley or London (full- or part-time) during the program.</p>\n<p>Visa Sponsorship: We are not currently able to sponsor visas for fellows. To participate in the Fellows program, you must have work authorization in the US, UK, or Canada and be located in that country during the program.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_5fba9d7d-674","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5030244008","x-work-arrangement":"remote","x-experience-level":"entry","x-job-type":"full-time","x-salary-range":"3,850 USD / 2,310 GBP / 4,300 CAD per week","x-skills-required":["Python programming","AI security","Cybersecurity","Empirical research","Machine learning","Deep learning","Experiment management"],"x-skills-preferred":["Open-source projects","Pentesting","Vulnerability research","Offensive security","CVEs","Bug bounty vulnerabilities","Empirical ML research projects","Deep learning frameworks"],"datePosted":"2026-03-08T13:52:43.813Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, UK; Ontario, CAN; Remote-Friendly, United States; San Francisco, CA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python programming, AI security, Cybersecurity, Empirical research, Machine learning, Deep learning, Experiment management, Open-source projects, Pentesting, Vulnerability research, Offensive security, CVEs, Bug bounty vulnerabilities, Empirical ML research projects, Deep learning frameworks","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":2310,"maxValue":4300,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b0cdccea-4ed"},"title":"Offensive Security Research Engineer, Safeguards","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Role</strong></p>\n<p>We are looking for vulnerability researchers to help mitigate the risks that come with building AI systems. One of these risks is the potential for LLMs to enable adversaries to cause harm by automating the attacks that today are carried out by human cybercrime groups, but in the future may be easily carried out by humans misusing LLMs. We are hiring security specialists who are experienced at exploitation and remediation, and are interested in understanding how LLMs could cause harm in the future, so that we can better prepare for this future and mitigate these risks before they arise.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Triage any vulnerabilities discovered, coordinate and assist the external and open-source community in remediation</li>\n<li>Write scaffolds designed to automate typical traditional attack techniques to help clarify our defensive problem selection</li>\n<li>Research how adversaries might misuse LLMs to identify and exploit vulnerabilities at scale in the future</li>\n<li>Develop promising defensive strategies that could mitigate the ability of adversaries to misuse models in harmful ways</li>\n<li>Work with a small, senior team of engineers and researchers to enact a forward-looking security plan</li>\n</ul>\n<p><strong>You may be a good fit if you have:</strong></p>\n<ul>\n<li>3+ years experience with pentesting, vulnerability research, or other offensive security experience</li>\n<li>Senior-level knowledge in at least one related topic area (reverse engineering, network security, exploitation, physical security)</li>\n<li>A history demonstrating desire to do the &#39;dirty work&#39; that results in high-quality outputs</li>\n<li>Software engineering experience</li>\n<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>\n<li>Proven ability to lead cross-functional security initiatives and navigate complex organisational dynamics</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Published research papers on computer security, language modeling, or related topics; or given talks at Defcon, Blackhat, CCC, or related venues</li>\n<li>Familiarity with large language models and how they work; for example, you may have written agent scaffolds</li>\n<li>Reported CVEs, or been awarded for bug bounty vulnerabilities</li>\n<li>Contributed to open-source projects in LLM- or security-adjacent repositories</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b0cdccea-4ed","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5123011008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000 - $405,000 USD","x-skills-required":["pentesting","vulnerability research","offensive security","reverse engineering","network security","exploitation","physical security","software engineering","communication skills"],"x-skills-preferred":["large language models","agent scaffolds","CVEs","bug bounty vulnerabilities","open-source projects"],"datePosted":"2026-03-08T13:46:30.278Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"pentesting, vulnerability research, offensive security, reverse engineering, network security, exploitation, physical security, software engineering, communication skills, large language models, agent scaffolds, CVEs, bug bounty vulnerabilities, open-source projects","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ccb6abb1-684"},"title":"Product Security Engineer (PSIRT - Product Security Incident Response Team)","description":"<p>We are looking for a highly skilled PSIRT Engineer to lead the vulnerability response program for Replit&#39;s cloud-native AI platform. You will own the lifecycle of security vulnerabilities affecting our products and services—from intake to validation, remediation coordination, and public disclosure.</p>\n<p>This role requires strong technical ability to reproduce vulnerabilities, deep understanding of web/app/cloud exploit classes, and experience operating bug bounty and coordinated disclosure programs. You will work closely with Engineering, Cloud Security, SecOps, SRE, and IT teams to ensure vulnerabilities are fixed quickly and communicated responsibly.</p>\n<p><strong>Vulnerability Intake, Triage &amp; Validation</strong></p>\n<ul>\n<li>Manage intake from bug bounty platforms (HackerOne preferred), customer reports, automated scanners, pentest reports, and coordinated disclosure channels.</li>\n<li>Independently validate, reproduce, severity-score, and document findings.</li>\n<li>Identify duplicates and maintain a clean vulnerability records pipeline.</li>\n<li>Assess relevance and exploitability using OWASP, cloud misconfiguration patterns, and identity/authentication/authorisation risks (Oauth, OIDC).</li>\n</ul>\n<p><strong>Remediation Coordination &amp; SLA Management</strong></p>\n<ul>\n<li>Work with Engineering, SecOps, IT, SRE, and Cloud Security to confirm product impact and drive remediation.</li>\n<li>Provide detailed reproduction steps, proof-of-concepts, and technical analyses.</li>\n<li>Track SLAs, remediation progress, regression testing, and systemic improvements.</li>\n<li>Support SOC 2, ISO 27001, and pentest evidence needs as part of vulnerability lifecycle governance.</li>\n</ul>\n<p><strong>Bug Bounty &amp; Vulnerability Disclosure Program Management</strong></p>\n<ul>\n<li>Design and evolve the bug bounty program, including scope, rules, and reward structures.</li>\n<li>Manage platform selection, private vs. public launches, and community engagement.</li>\n<li>Communicate clearly with researchers, provide clarifications, and handle feedback or disputes.</li>\n<li>Determine reward payouts, bonus decisions, and recognition for top contributors.</li>\n</ul>\n<p><strong>Coordinated Disclosure &amp; CVE Management</strong></p>\n<ul>\n<li>Lead the coordinated vulnerability disclosure process for internal and external findings.</li>\n<li>Negotiate disclosure timelines with researchers and partners.</li>\n<li>Coordinate CVE assignments and publications, and prepare customer/public advisories.</li>\n</ul>\n<p><strong>Required Skills</strong></p>\n<ul>\n<li>Experience running or triaging for bug bounty programs (HackerOne ideally).</li>\n<li>Strong ability to triage, validate, and reproduce vulnerabilities independently.</li>\n<li>Deep understanding of web/app/cloud vulnerability classes, OWASP Top 10, misconfigurations, authN/Z issues, etc.</li>\n<li>Familiarity with cloud platforms (GCP preferred) and SaaS architectures.</li>\n<li>Strong understanding of CI/CD workflows, code structure, and software engineering fundamentals.</li>\n</ul>\n<p><strong>Nice to Have</strong></p>\n<ul>\n<li>Scripting or automation experience (Python, Go, Bash).</li>\n<li>Pentesting background or exposure to offensive security work.</li>\n<li>Familiarity with compliance frameworks such as SOC 2 and ISO 27001.</li>\n<li>Experience authoring public advisories or CVE writeups.</li>\n<li>Hands-on experience with SIEM, Cloud Logging, and investigative tooling.</li>\n</ul>\n<p>This is a full-time role that can be held from our Foster City, CA office. The role has an in-office requirement of Monday, Wednesday, and Friday.</p>\n<p><strong>Full-Time Employee Benefits Include:</strong></p>\n<ul>\n<li>Competitive Salary &amp; Equity</li>\n<li>401(k) Program with a 4% match</li>\n<li>Health, Dental, Vision and Life Insurance</li>\n<li>Short Term and Long Term Disability</li>\n<li>Paid Parental, Medical, Caregiver Leave</li>\n<li>Commuter Benefits</li>\n<li>Monthly Wellness Stipend</li>\n<li>Autonomous Work Environment</li>\n<li>In Office Set-Up Reimbursement</li>\n<li>Flexible Time Off (FTO) + Holidays</li>\n<li>Quarterly Team Gatherings</li>\n<li>In Office Amenities</li>\n</ul>\n<p><strong>Want to learn more about what we are up to?</strong></p>\n<ul>\n<li>Meet the Replit Agent</li>\n<li>Replit: Make an app for that</li>\n<li>Replit Blog</li>\n<li>Amjad TED Talk</li>\n</ul>\n<p><strong>Interviewing + Culture at Replit</strong></p>\n<ul>\n<li>Operating Principles</li>\n<li>Reasons not to work at Replit</li>\n</ul>\n<p>To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world. We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially candidates from underrepresented and non-traditional backgrounds.</p>\n<p>Compensation Range: $180K - $325K</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ccb6abb1-684","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Replit","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/replit.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/replit/1e26fd62-af75-46b8-bb4e-3e702caa600a","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$180K - $325K","x-skills-required":["bug bounty","vulnerability management","cloud security","CI/CD workflows","software engineering fundamentals"],"x-skills-preferred":["scripting","automation","pentesting","compliance frameworks","SIEM","Cloud Logging"],"datePosted":"2026-03-07T15:20:00.330Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Foster City, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"bug bounty, vulnerability management, cloud security, CI/CD workflows, software engineering fundamentals, scripting, automation, pentesting, compliance frameworks, SIEM, Cloud Logging","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":180000,"maxValue":325000,"unitText":"YEAR"}}}]}