{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/policy-engines"},"x-facet":{"type":"skill","slug":"policy-engines","display":"Policy engines","count":6},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ea8af178-d20"},"title":"Information Security Engineer focused on Data Loss Prevention","description":"<p>We&#39;re looking for someone who has spent years thinking adversarially about how sensitive data moves, leaks, and gets exfiltrated. As an Information Security Engineer focused on Data Loss Prevention, you&#39;ll own the security of Palantir&#39;s global data protection program.</p>\n<p>Core Responsibilities:</p>\n<ul>\n<li>Own the security posture of Palantir&#39;s DLP estate , policy architecture, classification standards, and ongoing validation that those standards hold.</li>\n</ul>\n<ul>\n<li>Reduce data exposure risk across the environment: audit and remediate misconfigured policies, coverage gaps, over-permissioned data flows, shadow IT channels, and enforcement blind spots.</li>\n</ul>\n<ul>\n<li>Evaluate, deploy, and own the configuration of data protection tooling across endpoint, network, and cloud vectors: content inspection, data classification, user activity monitoring, and enforcement controls.</li>\n</ul>\n<ul>\n<li>Build and maintain automation for data security operations , policy tuning pipelines, alert triage workflows, access reviews, and data handling hygiene.</li>\n</ul>\n<ul>\n<li>Partner with Identity, Infrastructure, and Legal teams to drive architectural improvements: data classification frameworks, acceptable use enforcement, cloud data governance, and insider threat program integration.</li>\n</ul>\n<ul>\n<li>Translate findings from assessments and incident investigations into durable fixes , policy changes, architectural improvements, and program updates that reduce recurrence.</li>\n</ul>\n<p>Data Loss Prevention:</p>\n<ul>\n<li>Deep, working knowledge of DLP architecture: endpoint agents, network inspection, cloud API integrations, policy engines, and content-aware detection across structured and unstructured data.</li>\n</ul>\n<ul>\n<li>Hands-on experience investigating and detecting data exfiltration across the full kill chain , from reconnaissance and staging through exfiltration via web, email, removable media, and cloud sync channels.</li>\n</ul>\n<ul>\n<li>Familiarity with common evasion techniques (encoding, steganography, covert channels, cloud storage abuse) and, critically, what they leave behind.</li>\n</ul>\n<ul>\n<li>Experience building and maturing DLP programs: classification taxonomies, policy tiering by data sensitivity, incident workflow design, and false-positive reduction methodologies.</li>\n</ul>\n<p>Data Security Fundamentals:</p>\n<ul>\n<li>Thorough understanding of data security architecture: content inspection techniques, regular expression and fingerprinting-based detection, optical character recognition (OCR) for image-based data, and contextual policy enforcement.</li>\n</ul>\n<ul>\n<li>Ability to assess data flows across complex environments , SaaS, IaaS, on-premises, and hybrid , and identify where controls are absent or insufficient.</li>\n</ul>\n<ul>\n<li>Proficiency with log analysis and forensic investigation tools to reconstruct data movement and user behavior across endpoints and network infrastructure.</li>\n</ul>\n<ul>\n<li>Experience building telemetry pipelines and detections on top of raw DLP event data beyond out-of-the-box vendor alerting.</li>\n</ul>\n<p>Detection &amp; Response:</p>\n<ul>\n<li>Proven track record writing high-fidelity detection logic for data exfiltration and insider threat scenarios, not just tuning vendor signatures.</li>\n</ul>\n<ul>\n<li>Experience leading complex incident response investigations involving insider threats, compromised credentials being used to stage and exfiltrate data, or sophisticated external actors.</li>\n</ul>\n<ul>\n<li>Strong forensic fundamentals across endpoint artifacts, network captures, and cloud audit logs relevant to data movement investigations.</li>\n</ul>\n<p>What We Value:</p>\n<ul>\n<li>Experience with cloud-native data security controls across major IaaS and SaaS platforms, and hybrid architectures that span on-premises and cloud data stores.</li>\n</ul>\n<ul>\n<li>Prior work in insider threat programs, adversary simulation, or offensive security research , especially focused on data exfiltration tradecraft.</li>\n</ul>\n<ul>\n<li>Public contributions: conference talks, blog posts, or open-source tooling related to data protection or insider threat detection.</li>\n</ul>\n<p>What We Require:</p>\n<ul>\n<li>5+ years of hands-on security experience, with the majority focused on data loss prevention, data protection, or insider threat programs.</li>\n</ul>\n<ul>\n<li>Proficiency in Python or a scripting language of your choice for detection development, policy automation, and forensic tooling.</li>\n</ul>\n<ul>\n<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>\n</ul>\n<ul>\n<li>A portfolio of real work: policies you&#39;ve designed, detections you&#39;ve written, investigations you&#39;ve led, or programs you&#39;ve built.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ea8af178-d20","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Palantir","sameAs":"https://www.palantir.com/","logo":"https://logos.yubhub.co/palantir.com.png"},"x-apply-url":"https://jobs.lever.co/palantir/fde4cd4c-f6fd-4656-a1ce-3ca27bb1878f?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$145,000 - $200,000/year","x-skills-required":["DLP architecture","endpoint agents","network inspection","cloud API integrations","policy engines","content-aware detection","data exfiltration","common evasion techniques","cloud storage abuse","data security architecture","content inspection techniques","regular expression and fingerprinting-based detection","optical character recognition","contextual policy enforcement","log analysis and forensic investigation tools","telemetry pipelines and detections","raw DLP event data","high-fidelity detection logic","insider threat scenarios","incident response investigations","endpoint artifacts","network captures","cloud audit logs","cloud-native data security controls","IaaS and SaaS platforms","hybrid architectures","insider threat programs","adversary simulation","offensive security research","data exfiltration tradecraft","public contributions","conference talks","blog posts","open-source tooling","Python","scripting language","detection development","policy automation","forensic tooling"],"x-skills-preferred":[],"datePosted":"2026-04-25T20:54:27.832Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"DLP architecture, endpoint agents, network inspection, cloud API integrations, policy engines, content-aware detection, data exfiltration, common evasion techniques, cloud storage abuse, data security architecture, content inspection techniques, regular expression and fingerprinting-based detection, optical character recognition, contextual policy enforcement, log analysis and forensic investigation tools, telemetry pipelines and detections, raw DLP event data, high-fidelity detection logic, insider threat scenarios, incident response investigations, endpoint artifacts, network captures, cloud audit logs, cloud-native data security controls, IaaS and SaaS platforms, hybrid architectures, insider threat programs, adversary simulation, offensive security research, data exfiltration tradecraft, public contributions, conference talks, blog posts, open-source tooling, Python, scripting language, detection development, policy automation, forensic tooling","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":145000,"maxValue":200000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_74fda95b-69c"},"title":"Information Security Engineer focused on Data Loss Prevention","description":"<p><strong>JOB DESCRIPTION</strong></p>\n<p>A World-Changing Company</p>\n<p>Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.</p>\n<p><strong>The Role</strong></p>\n<p>We&#39;re looking for someone who has spent years thinking adversarially about how sensitive data moves, leaks, and gets exfiltrated , not just enforcing policies, but understanding every layer of how data can be abused, detected, and protected. If you&#39;ve built content inspection pipelines, tuned classification policies against real insider threat cases, or reverse-engineered an exfiltration channel that bypassed existing controls, this is the team you want to be on.</p>\n<p>As an Information Security Engineer focused on Data Loss Prevention, you&#39;ll own the security of Palantir&#39;s global data protection program. Your team runs 24/7 prevention, detection, and investigation of data security events across our entire environment. The adversaries we face are sophisticated. We need someone who is more so.</p>\n<p><strong>Core Responsibilities</strong></p>\n<ul>\n<li>Own the security posture of Palantir&#39;s DLP estate , policy architecture, classification standards, and ongoing validation that those standards hold.</li>\n</ul>\n<ul>\n<li>Reduce data exposure risk across the environment: audit and remediate misconfigured policies, coverage gaps, over-permissioned data flows, shadow IT channels, and enforcement blind spots.</li>\n</ul>\n<ul>\n<li>Evaluate, deploy, and own the configuration of data protection tooling across endpoint, network, and cloud vectors: content inspection, data classification, user activity monitoring, and enforcement controls.</li>\n</ul>\n<ul>\n<li>Build and maintain automation for data security operations , policy tuning pipelines, alert triage workflows, access reviews, and data handling hygiene.</li>\n</ul>\n<ul>\n<li>Partner with Identity, Infrastructure, and Legal teams to drive architectural improvements: data classification frameworks, acceptable use enforcement, cloud data governance, and insider threat program integration.</li>\n</ul>\n<ul>\n<li>Translate findings from assessments and incident investigations into durable fixes , policy changes, architectural improvements, and program updates that reduce recurrence.</li>\n</ul>\n<p><strong>What We&#39;re Looking For</strong></p>\n<p>Data Loss Prevention</p>\n<ul>\n<li>Deep, working knowledge of DLP architecture: endpoint agents, network inspection, cloud API integrations, policy engines, and content-aware detection across structured and unstructured data.</li>\n</ul>\n<ul>\n<li>Hands-on experience investigating and detecting data exfiltration across the full kill chain , from reconnaissance and staging through exfiltration via web, email, removable media, and cloud sync channels.</li>\n</ul>\n<ul>\n<li>Familiarity with common evasion techniques (encoding, steganography, covert channels, cloud storage abuse) and, critically, what they leave behind.</li>\n</ul>\n<ul>\n<li>Experience building and maturing DLP programs: classification taxonomies, policy tiering by data sensitivity, incident workflow design, and false-positive reduction methodologies.</li>\n</ul>\n<p>Data Security Fundamentals</p>\n<ul>\n<li>Thorough understanding of data security architecture: content inspection techniques, regular expression and fingerprinting-based detection, optical character recognition (OCR) for image-based data, and contextual policy enforcement.</li>\n</ul>\n<ul>\n<li>Ability to assess data flows across complex environments , SaaS, IaaS, on-premises, and hybrid , and identify where controls are absent or insufficient.</li>\n</ul>\n<ul>\n<li>Proficiency with log analysis and forensic investigation tools to reconstruct data movement and user behavior across endpoints and network infrastructure.</li>\n</ul>\n<ul>\n<li>Experience building telemetry pipelines and detections on top of raw DLP event data beyond out-of-the-box vendor alerting.</li>\n</ul>\n<p>Detection &amp; Response</p>\n<ul>\n<li>Proven track record writing high-fidelity detection logic for data exfiltration and insider threat scenarios, not just tuning vendor signatures.</li>\n</ul>\n<ul>\n<li>Experience leading complex incident response investigations involving insider threats, compromised credentials being used to stage and exfiltrate data, or sophisticated external actors.</li>\n</ul>\n<ul>\n<li>Strong forensic fundamentals across endpoint artifacts, network captures, and cloud audit logs relevant to data movement investigations.</li>\n</ul>\n<p><strong>What We Value</strong></p>\n<ul>\n<li>Experience with cloud-native data security controls across major IaaS and SaaS platforms, and hybrid architectures that span on-premises and cloud data stores.</li>\n</ul>\n<ul>\n<li>Prior work in insider threat programs, adversary simulation, or offensive security research , especially focused on data exfiltration tradecraft.</li>\n</ul>\n<ul>\n<li>Public contributions: conference talks, blog posts, or open-source tooling related to data protection or insider threat detection.</li>\n</ul>\n<p><strong>What We Require</strong></p>\n<ul>\n<li>5+ years of hands-on security experience, with the majority focused on data loss prevention, data protection, or insider threat programs.</li>\n</ul>\n<ul>\n<li>Proficiency in Python or a scripting language of your choice for detection development, policy automation, and forensic tooling.</li>\n</ul>\n<ul>\n<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>\n</ul>\n<ul>\n<li>A portfolio of real work: policies you&#39;ve designed, detections you&#39;ve written, investigations you&#39;ve led, or programs you&#39;ve built.</li>\n</ul>\n<p><strong>Additional Information</strong></p>\n<p><strong>Salary</strong></p>\n<p>The estimated salary range for this position is estimated to be $145,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individual’s relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_74fda95b-69c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Palantir","sameAs":"https://www.palantir.com/","logo":"https://logos.yubhub.co/palantir.com.png"},"x-apply-url":"https://jobs.lever.co/palantir/3c788579-eec7-4897-b446-4afc944e79be?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$145,000 - $200,000/year","x-skills-required":["DLP architecture","endpoint agents","network inspection","cloud API integrations","policy engines","content-aware detection","structured and unstructured data","data exfiltration","kill chain","web","email","removable media","cloud sync channels","common evasion techniques","encoding","steganography","covert channels","cloud storage abuse","DLP programs","classification taxonomies","policy tiering","incident workflow design","false-positive reduction methodologies","data security architecture","content inspection techniques","regular expression","fingerprinting-based detection","optical character recognition","contextual policy enforcement","log analysis","forensic investigation tools","telemetry pipelines","detections","vendor alerting","high-fidelity detection logic","insider threat scenarios","tuning vendor signatures","incident response investigations","insider threats","compromised credentials","sophisticated external actors","endpoint artifacts","network captures","cloud audit logs","data movement investigations","cloud-native data security controls","IaaS and SaaS platforms","hybrid architectures","on-premises and cloud data stores","insider threat programs","adversary simulation","offensive security research","data exfiltration tradecraft","conference talks","blog posts","open-source tooling","data protection","insider threat detection","Python","scripting language","detection development","policy automation","forensic tooling","TS/SCI security clearance","portfolio of real work","policies","investigations","programs"],"x-skills-preferred":[],"datePosted":"2026-04-25T20:53:57.397Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"DLP architecture, endpoint agents, network inspection, cloud API integrations, policy engines, content-aware detection, structured and unstructured data, data exfiltration, kill chain, web, email, removable media, cloud sync channels, common evasion techniques, encoding, steganography, covert channels, cloud storage abuse, DLP programs, classification taxonomies, policy tiering, incident workflow design, false-positive reduction methodologies, data security architecture, content inspection techniques, regular expression, fingerprinting-based detection, optical character recognition, contextual policy enforcement, log analysis, forensic investigation tools, telemetry pipelines, detections, vendor alerting, high-fidelity detection logic, insider threat scenarios, tuning vendor signatures, incident response investigations, insider threats, compromised credentials, sophisticated external actors, endpoint artifacts, network captures, cloud audit logs, data movement investigations, cloud-native data security controls, IaaS and SaaS platforms, hybrid architectures, on-premises and cloud data stores, insider threat programs, adversary simulation, offensive security research, data exfiltration tradecraft, conference talks, blog posts, open-source tooling, data protection, insider threat detection, Python, scripting language, detection development, policy automation, forensic tooling, TS/SCI security clearance, portfolio of real work, policies, investigations, programs","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":145000,"maxValue":200000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_14d11a18-f14"},"title":"Engineering Manager, Fraud & Abuse","description":"<p><strong>About the role</strong></p>\n<p>We’re hiring an Engineering Manager, Fraud &amp; Abuse to build the systems that protect Cursor from fraud, abuse, and misuse as we scale.</p>\n<p>This is a hands-on role: you will set direction, write code, and build the platform, tooling, and decisioning systems we use to detect, prevent, and respond to fraud and abuse.</p>\n<p>You will work cross-functionality to understand our current risks and workflows across the company. This role is specifically about mitigating known vectors while building strong defenses that are accurate, scalable, and practical to operate.</p>\n<p><strong>What you’ll do</strong></p>\n<ul>\n<li>Improve fraud and abuse systems end-to-end, from detection and risk scoring to enforcement and reporting. Enhancing existing fraud prevention systems provided by vendors.</li>\n</ul>\n<ul>\n<li>Write and ship code directly in the codebase, unblock critical work, and set a high bar for engineering quality, reliability, and execution. This will involve making product enhancements to assist with mitigating fraud.</li>\n</ul>\n<ul>\n<li>Build tooling and guidance that operations teams will use handle high-risk accounts.</li>\n</ul>\n<ul>\n<li>Hire and grow the team by recruiting, interviewing, closing, and onboarding engineers, and by establishing strong operating rhythms and engineering standards.</li>\n</ul>\n<ul>\n<li>Design and ship a centralized platform that incrementally delivers value to known fraud then scales as vectors diversify and our product evolves.</li>\n</ul>\n<ul>\n<li>Partner deeply with Billing, Growth, Finance, Security, Operations, and Legal to identify major fraud and abuse risks, improve signal quality, and build defenses that are effective without creating unnecessary friction or complexity.</li>\n</ul>\n<ul>\n<li>Own outcomes such as fraud loss, detection latency, enforcement quality, and investigation time.</li>\n</ul>\n<p><strong>You may be a fit if</strong></p>\n<ul>\n<li>You have built fraud detection and abuse prevention for usage-based services in the past.</li>\n</ul>\n<ul>\n<li>You have implemented risk scoring, policy engines, enforcement pipelines, case management, payments or subscriptions systems, and human-in-the-loop review workflows.</li>\n</ul>\n<ul>\n<li>You have experience mitigating social engineering attempts.</li>\n</ul>\n<ul>\n<li>You’ve leveraged Stripe, WorkOS, and other third-party vendors creatively with success.</li>\n</ul>\n<ul>\n<li>You have experience working cross-functionally with non-engineering teams.</li>\n</ul>\n<ul>\n<li>You have led incident response for fraud/abuse incidents.</li>\n</ul>\n<ul>\n<li>You are excited and capable to be hands-on writing and debugging Typescript on day 1.</li>\n</ul>\n<ul>\n<li>You have significant experience managing and developing engineering teams, including hiring and performance coaching.</li>\n</ul>\n<ul>\n<li>You have experience in LLM Safety &amp; Integrity.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_14d11a18-f14","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Cursor","sameAs":"https://cursor.com","logo":"https://logos.yubhub.co/cursor.com.png"},"x-apply-url":"https://cursor.com/careers/engineering-manager-fraud?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Typescript","Fraud detection","Abuse prevention","Risk scoring","Policy engines","Enforcement pipelines","Case management","Payments or subscriptions systems","Human-in-the-loop review workflows","Stripe","WorkOS","Third-party vendors"],"x-skills-preferred":[],"datePosted":"2026-04-24T14:19:41.942Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Typescript, Fraud detection, Abuse prevention, Risk scoring, Policy engines, Enforcement pipelines, Case management, Payments or subscriptions systems, Human-in-the-loop review workflows, Stripe, WorkOS, Third-party vendors"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ec3989dd-2dd"},"title":"Director, Engineering Governance- Mountain View, CA","description":"<p>We are seeking a highly technical and influential Director of Engineering, Governance Foundation to define how security, privacy, and responsible data practices are built into the core of Databricks&#39; products and infrastructure.</p>\n<p>This role is not simply about running programs,it is about designing and scaling the engineering platforms, guardrails, and operating models that make secure and compliant product development the default across a rapidly growing, multi-cloud ecosystem.</p>\n<p>As a Director of Engineering, Governance Foundation, you will lead a team of senior security engineers, partner with product and infrastructure leaders, and shape the foundational governance systems that enable Databricks to innovate quickly while maintaining world-class security and customer trust.</p>\n<p>Your responsibilities will include:</p>\n<ul>\n<li>Defining the company-wide strategy for embedding security, privacy, and responsible data use across engineering workflows and platform components.</li>\n</ul>\n<ul>\n<li>Building scalable governance frameworks that help engineering teams design secure systems from the start, not after the fact.</li>\n</ul>\n<ul>\n<li>Establishing and leading a Security &amp; Privacy Postmortem Review process that drives learning, accountability, and long-term resilience.</li>\n</ul>\n<ul>\n<li>Ensuring insights from incidents translate into systemic improvements across tools, infrastructure, and engineering culture.</li>\n</ul>\n<ul>\n<li>Rebuilding and scaling a Security Champions Network that brings security and governance expertise directly into product and infrastructure teams.</li>\n</ul>\n<ul>\n<li>Creating centralized enablement, tooling, and shared learning systems that allow thousands of engineers to integrate security seamlessly.</li>\n</ul>\n<ul>\n<li>Leading efforts to ensure responsible data use across AI/ML systems, SaaS environments, and internal workspaces.</li>\n</ul>\n<ul>\n<li>Defining and enforcing policies that uphold privacy, integrity, auditability, and proper data lifecycle management.</li>\n</ul>\n<ul>\n<li>Transforming security into a key enabler for engineering velocity.</li>\n</ul>\n<ul>\n<li>Delivering automation, self-service tools, and intelligent guardrails that reduce developer friction while increasing safety and compliance.</li>\n</ul>\n<ul>\n<li>Building JIT (Just-In-Time) security education and systems that proactively surface risky behaviour before it becomes an incident.</li>\n</ul>\n<ul>\n<li>Identifying and elevating Databricks&#39; security posture to exceed DB50 customer expectations, including areas such as audit logging, controlled access workflows, secure asset import/export, behaviour monitoring and lineage.</li>\n</ul>\n<ul>\n<li>Partnering with security, IT, and compliance teams to ensure readiness for the most demanding enterprise and regulated environments.</li>\n</ul>\n<p>To be successful in this role, you will need:</p>\n<ul>\n<li>10+ years of experience in large-scale software engineering, with at least several years leading engineering managers and senior ICs.</li>\n</ul>\n<ul>\n<li>Strong technical grounding in backend systems, distributed systems, identity/security, or enterprise cloud platforms.</li>\n</ul>\n<ul>\n<li>Experience defining governance, security, or enterprise-grade platform capabilities.</li>\n</ul>\n<ul>\n<li>A background as a senior IC (e.g., Staff/Principal Engineer) at some point,this role requires deep technical credibility.</li>\n</ul>\n<ul>\n<li>Proven success hiring, developing, and retaining senior engineering talent.</li>\n</ul>\n<ul>\n<li>Expertise driving cross-functional technical programs with senior stakeholders.</li>\n</ul>\n<ul>\n<li>Experience building cloud-agnostic or multi-cloud services.</li>\n</ul>\n<ul>\n<li>Background in enterprise features such as access control, policy engines, compliance, or identity systems.</li>\n</ul>\n<ul>\n<li>Experience leading organisations through scaling phases in high-growth environments.</li>\n</ul>\n<p>You will be rewarded with a competitive salary range of $255,900-$305,350 USD, plus eligibility for annual performance bonus, equity, and comprehensive benefits.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ec3989dd-2dd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Databricks","sameAs":"https://www.databricks.com","logo":"https://logos.yubhub.co/databricks.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/databricks/jobs/8295622002?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"onsite","x-experience-level":"executive","x-job-type":"full-time","x-salary-range":"$255,900-$305,350 USD","x-skills-required":["backend systems","distributed systems","identity/security","enterprise cloud platforms","governance","security","platform capabilities","engineering management","senior IC","cross-functional technical programs"],"x-skills-preferred":["cloud-agnostic or multi-cloud services","access control","policy engines","compliance","identity systems","organisational scaling"],"datePosted":"2026-04-18T15:48:42.342Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Mountain View, California"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"backend systems, distributed systems, identity/security, enterprise cloud platforms, governance, security, platform capabilities, engineering management, senior IC, cross-functional technical programs, cloud-agnostic or multi-cloud services, access control, policy engines, compliance, identity systems, organisational scaling","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":255900,"maxValue":305350,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_45c6b017-56a"},"title":"Director, Engineering Governance- Bellevue, WA","description":"<p><strong>Job Description</strong></p>\n<p>We are seeking a highly technical and influential Director of Engineering, Governance Foundation to define how security, privacy, and responsible data practices are built into the core of Databricks&#39; products and infrastructure.</p>\n<p>This role is not simply about running programs,it is about designing and scaling the engineering platforms, guardrails, and operating models that make secure and compliant product development the default across a rapidly growing, multi-cloud ecosystem.</p>\n<p><strong>Responsibilities</strong></p>\n<p><strong>Security &amp; Privacy Governance Architecture</strong></p>\n<ul>\n<li>Define the company-wide strategy for embedding security, privacy, and responsible data use across engineering workflows and platform components.</li>\n</ul>\n<ul>\n<li>Build scalable governance frameworks that help engineering teams design secure systems from the start, not after the fact.</li>\n</ul>\n<p><strong>Incident Learning &amp; Prevention</strong></p>\n<ul>\n<li>Establish and lead a Security &amp; Privacy Postmortem Review process that drives learning, accountability, and long-term resilience.</li>\n</ul>\n<ul>\n<li>Ensure insights from incidents translate into systemic improvements across tools, infrastructure, and engineering culture.</li>\n</ul>\n<p><strong>Security Champions &amp; Distributed Expertise</strong></p>\n<ul>\n<li>Rebuild and scale a Security Champions Network that brings security and governance expertise directly into product and infrastructure teams.</li>\n</ul>\n<ul>\n<li>Create centralized enablement, tooling, and shared learning systems that allow thousands of engineers to integrate security seamlessly.</li>\n</ul>\n<p><strong>Data Governance for Products &amp; AI</strong></p>\n<ul>\n<li>Lead efforts to ensure responsible data use across AI/ML systems, SaaS environments, and internal workspaces.</li>\n</ul>\n<ul>\n<li>Define and enforce policies that uphold privacy, integrity, auditability, and proper data lifecycle management.</li>\n</ul>\n<p><strong>Developer-Centric Security Enablement</strong></p>\n<ul>\n<li>Transform security into a key enabler for engineering velocity.</li>\n</ul>\n<ul>\n<li>Deliver automation, self-service tools, and intelligent guardrails that reduce developer friction while increasing safety and compliance.</li>\n</ul>\n<ul>\n<li>Build JIT (Just-In-Time) security education and systems that proactively surface risky behaviour before it becomes an incident.</li>\n</ul>\n<p><strong>Security Maturity &amp; Customer Trust</strong></p>\n<ul>\n<li>Identify and elevate Databricks&#39; security posture to exceed DB50 customer expectations, including areas such as:</li>\n</ul>\n<ul>\n<li>audit logging</li>\n</ul>\n<ul>\n<li>controlled access workflows</li>\n</ul>\n<ul>\n<li>secure asset import/export</li>\n</ul>\n<ul>\n<li>behaviour monitoring and lineage</li>\n</ul>\n<ul>\n<li>Partner with security, IT, and compliance teams to ensure readiness for the most demanding enterprise and regulated environments.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>10+ years of experience in large-scale software engineering, with at least several years leading engineering managers and senior ICs.</li>\n</ul>\n<ul>\n<li>Strong technical grounding in backend systems, distributed systems, identity/security, or enterprise cloud platforms.</li>\n</ul>\n<ul>\n<li>Experience defining governance, security, or enterprise-grade platform capabilities.</li>\n</ul>\n<ul>\n<li>A background as a senior IC (e.g., Staff/Principal Engineer) at some point,this role requires deep technical credibility.</li>\n</ul>\n<ul>\n<li>Proven success hiring, developing, and retaining senior engineering talent.</li>\n</ul>\n<p><strong>Preferred Qualifications</strong></p>\n<ul>\n<li>Experience building cloud-agnostic or multi-cloud services.</li>\n</ul>\n<ul>\n<li>Background in enterprise features such as access control, policy engines, compliance, or identity systems.</li>\n</ul>\n<ul>\n<li>Experience leading organisations through scaling phases in high-growth environments.</li>\n</ul>\n<p><strong>Pay Range Transparency</strong></p>\n<p>Databricks is committed to fair and equitable compensation practices. The pay range(s) for this role is listed below and represents the expected salary range for non-commissionable roles or on-target earnings for commissionable roles. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to job-related skills, depth of experience, relevant certifications and training, and specific work location. Based on the factors above, Databricks anticipates utilising the full width of the range. The total compensation package for this position may also include eligibility for annual performance bonus, equity, and the benefits listed above. For more information regarding which range your location is in visit our page here.</p>\n<p>Local Pay Range $243,100-$290,100 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_45c6b017-56a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Databricks","sameAs":"https://www.databricks.com","logo":"https://logos.yubhub.co/databricks.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/databricks/jobs/8295772002?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"onsite","x-experience-level":"executive","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["backend systems","distributed systems","identity/security","enterprise cloud platforms","governance","security","platform capabilities","large-scale software engineering","engineering managers","senior ICs"],"x-skills-preferred":["cloud-agnostic or multi-cloud services","access control","policy engines","compliance","identity systems","leading organisations through scaling phases"],"datePosted":"2026-04-18T15:47:10.528Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Mountain View, California"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"backend systems, distributed systems, identity/security, enterprise cloud platforms, governance, security, platform capabilities, large-scale software engineering, engineering managers, senior ICs, cloud-agnostic or multi-cloud services, access control, policy engines, compliance, identity systems, leading organisations through scaling phases"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ec06a431-7fa"},"title":"Software Engineer - Privacy & Compliance","description":"<p><strong>Software Engineer - Privacy &amp; Compliance</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco; Seattle</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Applied AI</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$230K – $385K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p>We’re looking for a <strong>Software Engineer</strong> to architect and build backend systems that enforce data privacy and automate compliance at scale. You’ll work closely with product, infrastructure, security, and legal teams to embed privacy-by-design into our data and access layers.</p>\n<p>This is a hands-on, high-impact role for an experienced engineer who is passionate about protecting user data while enabling innovation.</p>\n<p><strong><strong>What You’ll Do</strong></strong></p>\n<ul>\n<li>Design, build, and operate backend services that enforce policy-driven data access, lifecycle controls, and privacy protections.</li>\n</ul>\n<ul>\n<li>Develop distributed authorization and identity-aware enforcement mechanisms integrated directly into data services and control planes.</li>\n</ul>\n<ul>\n<li>Implement auditability, policy hooks, and enforcement observability to ensure compliance is continuously verifiable.</li>\n</ul>\n<ul>\n<li>Partner with Security, Legal, and Compliance to convert privacy requirements into scalable technical designs and developer-friendly APIs.</li>\n</ul>\n<ul>\n<li>Harden data platforms and backend services through schema-level controls and data handling constraints by default.</li>\n</ul>\n<ul>\n<li>Collaborate with infrastructure teams to ensure consistent enforcement across systems while minimizing duplicated implementations.</li>\n</ul>\n<ul>\n<li>Contribute patterns, libraries, and education that elevate trustworthy data access patterns across the organization.</li>\n</ul>\n<p><strong><strong>You Might Thrive in This Role If You Have</strong></strong></p>\n<ul>\n<li><strong>5+ years of industry experience</strong> building and operating backend or infrastructure systems in production.</li>\n</ul>\n<ul>\n<li><strong>Strong software engineering fundamentals</strong>, with fluency in at least one major programming language (e.g., Python, Go, Rust, C++, Java).</li>\n</ul>\n<ul>\n<li>Experience with distributed authorization, RBAC/ACL systems, encryption-based access, or policy engines.</li>\n</ul>\n<ul>\n<li><strong>Familiarity with global privacy regulations</strong> and their architectural implications.</li>\n</ul>\n<ul>\n<li><strong>Ability to influence and collaborate</strong> with teams across legal, compliance, product, and engineering.</li>\n</ul>\n<ul>\n<li>A <strong>bias toward practical, impactful solutions</strong> that balance privacy protections with product needs.</li>\n</ul>\n<p><strong><strong>Nice to Have</strong></strong></p>\n<ul>\n<li>Experience with cloud platforms (e.g., Azure, AWS, GCP) and large-scale data systems.</li>\n</ul>\n<ul>\n<li>Background in security engineering, privacy engineering, or data governance.</li>\n</ul>\n<ul>\n<li>Experience with control-plane or metadata-driven enforcement systems.</li>\n</ul>\n<ul>\n<li>Exposure to data platforms or ML infrastructure.</li>\n</ul>\n<ul>\n<li>Prior experience in a regulated or highly sensitive data environment.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ec06a431-7fa","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/23b158fe-709e-4bf5-856c-d10953d32f60?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230K – $385K • Offers Equity","x-skills-required":["Python","Go","Rust","C++","Java","Distributed authorization","RBAC/ACL systems","Encryption-based access","Policy engines","Global privacy regulations","Cloud platforms","Large-scale data systems","Security engineering","Privacy engineering","Data governance","Control-plane or metadata-driven enforcement systems","Data platforms","ML infrastructure"],"x-skills-preferred":[],"datePosted":"2026-03-06T18:27:07.514Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, Seattle"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Rust, C++, Java, Distributed authorization, RBAC/ACL systems, Encryption-based access, Policy engines, Global privacy regulations, Cloud platforms, Large-scale data systems, Security engineering, Privacy engineering, Data governance, Control-plane or metadata-driven enforcement systems, Data platforms, ML infrastructure","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":385000,"unitText":"YEAR"}}}]}