<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>c2aaf7ac-804</externalid>
      <Title>Security Engineer - Threat Detection</Title>
      <Description><![CDATA[<p><strong>Job Description</strong></p>
<p>You will design, build, and maintain detections that identify malicious activity across Stripe&#39;s infrastructure, applications, and cloud environments.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle</li>
<li>Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry</li>
<li>Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls</li>
<li>Perform malware analysis and reverse engineering to extract indicators and inform detection strategies</li>
<li>Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS</li>
<li>Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic</li>
<li>Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises</li>
<li>Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment</li>
<li>Map detection coverage to MITRE ATT&amp;CK, identifying and prioritizing gaps across key attack surfaces</li>
<li>Lead projects, mentor teammates, and champion quality standards within the team</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>5+ years of experience in detection engineering, threat hunting, or security operations</li>
<li>Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)</li>
<li>Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration</li>
<li>Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities</li>
<li>Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)</li>
<li>Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources</li>
<li>Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)</li>
<li>Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences</li>
<li>Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments</li>
<li>Background in malware analysis, reverse engineering, or threat research</li>
<li>Experience with purple team operations , collaborating with offensive security to validate detections</li>
<li>Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis</li>
<li>Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows</li>
<li>Interest in agentic automation , using LLMs to augment hunting, tuning, or triage</li>
<li>Experience with detection validation tools (Atomic Red Team, ATT&amp;CK Evaluations)</li>
<li>Contributions to open-source detection content, research, or conference presentations</li>
<li>Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, threat hunting, security operations, SIEM platforms, adversary tradecraft, network-based detections, endpoint-based detections, telemetry analysis, detection/query languages, programming, communication skills, fintech, financial services, malware analysis, reverse engineering, purple team operations, big data platforms, AI/LLM-assisted development tools, agentic automation, detection validation tools, open-source detection content, relevant certifications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses, used by millions of companies worldwide.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7827230</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f5d87e3c-d74</externalid>
      <Title>Offensive Security Engineer</Title>
      <Description><![CDATA[<p>As an Offensive Security Engineer at CoreWeave, you will lead efforts to identify and mitigate security risks across internal and external systems.</p>
<p>You&#39;ll perform penetration testing, conduct threat modeling, and provide guidance to engineering teams on secure design and best practices. This role also involves developing security tooling, researching emerging threats, and contributing to the continuous improvement of CoreWeave&#39;s overall security posture.</p>
<p>Some of what you&#39;ll work on:</p>
<ul>
<li>Perform penetration testing as well as purple and red team exercises.</li>
<li>Conduct threat modeling, code reviews, and design reviews for development teams.</li>
<li>Research new attack techniques and develop strategies to counter them.</li>
<li>Develop and enforce security best practices and standards, maintaining internal compliance.</li>
<li>Provide solutions to complex security issues, manage multiple tasks, and prioritize effectively in a fast-paced environment.</li>
<li>Present technical security information to both technical and non-technical audiences.</li>
<li>Maintain technical documentation, reports, and security tooling with attention to detail.</li>
<li>Participate in other security-related initiatives as assigned.</li>
</ul>
<p>Who You Are:</p>
<ul>
<li>5+ years of experience in offensive information security roles.</li>
<li>Proficiency in at least one programming or scripting language (e.g., Go, Python, C/C++) for automation, code reviews, and tooling.</li>
<li>Hands-on penetration testing experience and familiarity with offensive security tools.</li>
<li>Strong technical knowledge of Linux operating systems and containerized environments.</li>
<li>Experience securing Kubernetes and understanding related security practices.</li>
<li>Able to navigate ambiguity, identify root causes, and solve complex security problems.</li>
<li>Excellent written and verbal communication skills with strong technical documentation abilities.</li>
<li>Capable of working independently while managing multiple priorities in a fast-paced environment.</li>
<li>Strong desire to continuously learn and adopt new technologies and security techniques.</li>
</ul>
<p>Preferred:</p>
<ul>
<li>Experience with firmware reverse engineering, analyzing binaries, bootloaders, and embedded systems for vulnerabilities.</li>
<li>Relevant certifications such as Sec+, Net+, OSCP, or equivalent.</li>
<li>Experience with EDR tuning, detections-as-code, or threat hunting as part of a Blue Team.</li>
<li>Deep understanding of business-wide security best practices and implementation strategies.</li>
</ul>
<p>Wondering if you&#39;re a good fit?</p>
<p>We believe in investing in our people, and value candidates who can bring their own diversified experiences to our teams – even if you aren&#39;t a 100% skill or experience match.</p>
<p>Here are a few qualities we&#39;ve found compatible with our team.</p>
<p>If some of this describes you, we&#39;d love to talk.</p>
<ul>
<li>You love hunting vulnerabilities and proactively improving security.</li>
<li>You&#39;re curious about evolving attack vectors and defense strategies.</li>
<li>You&#39;re an expert in offensive security techniques and tooling, with a passion for safeguarding systems.</li>
</ul>
<p>Why CoreWeave?</p>
<p>At CoreWeave, we work hard, have fun, and move fast!</p>
<p>We&#39;re in an exciting stage of hyper-growth that you will not want to miss out on.</p>
<p>We&#39;re not afraid of a little chaos, and we&#39;re constantly learning.</p>
<p>Our team cares deeply about how we build our product and how we work together, which is represented through our core values:</p>
<ul>
<li>Be Curious at Your Core</li>
<li>Act Like an Owner</li>
<li>Empower Employees</li>
<li>Deliver Best-in-Class Client Experiences</li>
<li>Achieve More Together</li>
</ul>
<p>We support and encourage an entrepreneurial outlook and independent thinking.</p>
<p>We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems.</p>
<p>As we get set for takeoff, the organization&#39;s growth opportunities are constantly expanding.</p>
<p>You will be surrounded by some of the best talent in the industry, who will want to learn from you, too.</p>
<p>Come join us!</p>
<p>The base salary range for this role is $165,000 to $242,000.</p>
<p>The starting salary will be determined based on job-related knowledge, skills, experience, and market location.</p>
<p>We strive for both market alignment and internal equity when determining compensation.</p>
<p>In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>
<p>What We Offer</p>
<p>The range we&#39;ve posted represents the typical compensation range for this role.</p>
<p>To determine actual compensation, we review the market rate for each candidate which can include a variety of factors.</p>
<p>These include qualifications, experience, interview performance, and location.</p>
<p>In addition to a competitive salary, we offer a variety of benefits to support your needs, including:</p>
<ul>
<li>Medical, dental, and vision insurance</li>
<li>100% paid for by CoreWeave</li>
<li>Company-paid Life Insurance</li>
<li>Voluntary supplemental life insurance</li>
<li>Short and long-term disability insurance</li>
<li>Flexible Spending Account</li>
<li>Health Savings Account</li>
<li>Tuition Reimbursement</li>
<li>Ability to Participate in Employee Stock Purchase Program (ESPP)</li>
<li>Mental Wellness Benefits through Spring Health</li>
<li>Family-Forming support provided by Carrot</li>
<li>Paid Parental Leave</li>
<li>Flexible, full-service childcare support with Kinside</li>
<li>401(k) with a generous employer match</li>
<li>Flexible PTO</li>
<li>Catered lunch each day in our office and data center locations</li>
<li>A casual work environment</li>
<li>A work culture focused on innovative disruption</li>
</ul>
<p>Our Workplace</p>
<p>While we prioritize a hybrid work environment, remote work may be considered for candidates located more than 30 miles from an office, based on role requirements for specialized skill sets.</p>
<p>New hires will be invited to attend onboarding at one of our hubs within their first month.</p>
<p>Teams also gather quarterly to support collaboration.</p>
<p>California Consumer Privacy Act - California applicants only</p>
<p>CoreWeave is an equal opportunity employer, committed to fostering an inclusive and supportive workplace.</p>
<p>All qualified applicants and candidates will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information.</p>
<p>As part of this commitment and consistent with the Americans with Disabilities Act (ADA), CoreWeave will ensure that qualified applicants and candidates with disabilities are provided reasonable accommodations for the hiring process, unless such accommodation would cause an undue hardship.</p>
<p>If reasonable accommodation is needed, please contact: careers@coreweave.com.</p>
<p>Export Control Compliance</p>
<p>This position requires access to export controlled information.</p>
<p>To conform to U.S. Government export regulations applicable to that information, applicant must either be (A) a U.S. person, defined as a (i) U.S. citizen or national, (ii) U.S. lawful permanent resident (green card holder), (iii) refugee under 8 U.S.C. § 1157, or (iv) asylee under 8 U.S.C. § 1158, (B) eligible to access the information under an appropriate export license, or (C) otherwise exempt from the regulations.</p>
<p>Applicant must also comply with all applicable laws and regulations related to the handling and transfer of export-controlled information.</p>
<p>By applying for this position, applicant acknowledges that they have read, understand, and will comply with these requirements.</p>
<p>Failure to comply with these requirements may result in termination of employment, revocation of any security clearances, or other disciplinary action.</p>
<p>Applicant must also agree to undergo a background investigation and obtain any necessary security clearances prior to commencing employment.</p>
<p>Please note that this position is subject to U.S. Government export regulations and may require applicant to sign a non-disclosure agreement (NDA) prior to commencing employment.</p>
<p>Applicant must also agree to comply with all applicable laws and regulations related to the handling and transfer of export-controlled information.</p>
<p>By applying for this position, applicant acknowledges that they have read, understand, and will comply with these requirements.</p>
<p>Failure to comply with these requirements may result in termination of employment, revocation of any security clearances, or other disciplinary action.</p>
<p>Applicant must also agree to undergo a background investigation and obtain any necessary security clearances prior to commencing employment.</p>
<p>Please note that this position is subject to U.S. Government export regulations and may require applicant to sign a non-disclosure agreement (NDA) prior to commencing employment.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$165,000 to $242,000</Salaryrange>
      <Skills>programming or scripting language, penetration testing, threat modeling, code reviews, design reviews, security best practices, Linux operating systems, containerized environments, Kubernetes, security practices, firmware reverse engineering, analyzing binaries, bootloaders, embedded systems, EDR tuning, detections-as-code, threat hunting, business-wide security best practices</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4657803006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>82828d53-b1d</externalid>
      <Title>Product Security Engineer, Programs</Title>
      <Description><![CDATA[<p>We&#39;re seeking a mid-senior level product security engineer to own security for assigned products in your technical domain, provide expert consultation on security architectures, guide implementation of security features, develop solutions engineering for complex security challenges, and ultimately secure our suite of advanced technologies.</p>
<p>The ideal candidate has a background in electrical or software engineering, with a focus on platform security, or has pivoted to a product or application security role. They will be able to conduct complex security architecture reviews, research and mitigate exploits against hardware and software, and work with other engineering teams to build resiliency into our products.</p>
<p>As a product security engineer, you will:</p>
<ul>
<li>Own the development and maturation of security features for Anduril&#39;s products</li>
<li>Collaborate and build solutions with engineering teams to meet and exceed industry-standard security goals</li>
<li>Collaborate with security assessment teams to assess Anduril&#39;s products and integrated components to uncover potential weaknesses</li>
<li>Collaborate with manufacturing and operations teams to develop secure handling and operational processes</li>
<li>Engage with teams to remediate uncovered weaknesses in designs, implementations, integrations, and processes</li>
</ul>
<p>Required qualifications include:</p>
<ul>
<li>Experience with one or more programming languages (e.g. C/C++, Golang, Rust, Python)</li>
<li>Experience assessing security of firmware, applications, network, IoT, or embedded systems</li>
<li>Experience developing features for and improving security of firmware, applications, network, or embedded systems</li>
<li>Experience building, testing, and delivering production-ready systems, especially for embedded and/or Linux systems</li>
<li>Familiarity with anti-tamper and reverse engineering mechanisms</li>
<li>Strong and professional communication skills (written and verbal)</li>
<li>Strong understanding of the &#39;why&#39; behind product, systems, and security design</li>
<li>A sincere commitment to a positive, inclusive, and collaborative culture</li>
<li>Must be eligible to obtain and maintain a U.S. TS clearance</li>
</ul>
<p>Preferred qualifications include:</p>
<ul>
<li>Excels at the above-listed requirements</li>
<li>Possesses and able to maintain an active U.S. TS Security clearance with SCI and/or SAP eligibility</li>
<li>Familiarity with security architectures of embedded, aerospace, or cyber-physical systems</li>
<li>Fluency in modern USG cyber methodologies, including Cyber Survivability guidance and related policy (JSIG, ICD 503, CSEIG, SSECG, NIST SP 800-160, Cyber T&amp;E Guidebook, CMMC, etc.)</li>
<li>Experience with programmable logic devices and their development tools</li>
<li>Regularly builds, tests, and delivers production-ready systems, especially for embedded and/or Linux systems</li>
</ul>
<p>US Salary Range: $156,000-$253,000 USD</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid-senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$156,000-$253,000 USD</Salaryrange>
      <Skills>C/C++, Golang, Rust, Python, firmware security, application security, network security, IoT security, embedded systems security, anti-tamper mechanisms, reverse engineering, security architectures, Cyber Survivability guidance, programmable logic devices, development tools</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anduril</Employername>
      <Employerlogo>https://logos.yubhub.co/anduril.com.png</Employerlogo>
      <Employerdescription>Anduril is a technology company that develops advanced technologies, including artificial intelligence systems, command and control platforms, aerospace vehicles, and long-range sensors.</Employerdescription>
      <Employerwebsite>https://www.anduril.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/andurilindustries/jobs/5042718007</Applyto>
      <Location>Costa Mesa, California, United States</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>de3eafc7-e74</externalid>
      <Title>Cloudforce One REACT Principal Consultant</Title>
      <Description><![CDATA[<p>About Us</p>
<p>At Cloudflare, we are on a mission to help build a better Internet. We run one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>
<p>Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>
<p>About the Team</p>
<p>Cloudforce One is Cloudflare&#39;s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs).</p>
<p>About the Role</p>
<p>We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors.</p>
<p>Responsibilities</p>
<p>As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.</p>
<p>The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.</p>
<p>Requirements</p>
<p>Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms.</p>
<p>You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang.</p>
<p>Examples of desirable skills, knowledge and experience include:</p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience</li>
<li>3+ years of previous experience in cyber security</li>
<li>2+ years of Incident Response experience</li>
<li>1+ years of customer-facing role</li>
<li>Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists</li>
<li>Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise</li>
<li>Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs</li>
<li>Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis</li>
<li>Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations</li>
<li>Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations</li>
<li>Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies</li>
<li>Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams</li>
<li>Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups</li>
<li>Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS</li>
<li>Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)</li>
<li>Understanding of MITRE ATT&amp;CK and NIST Cyber Security Frameworks standards and requirements</li>
<li>In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems</li>
</ul>
<p>Bonus Points:</p>
<ul>
<li>Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system</li>
<li>Proficient with Yara and writing rules to detect similar malware samples</li>
<li>Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs</li>
<li>Practical malware analysis experience with static, dynamic, and automated malware analysis techniques</li>
<li>Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples</li>
<li>Reverse engineering experience with APT malware with an understanding of common infection vectors</li>
<li>Knowledgeable of current malware techniques to evade detection and obstruct analysis</li>
<li>Experience writing malware reports on unique and interesting aspects of malware</li>
<li>Experience with malware attribution</li>
<li>Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration</li>
<li>Familiarity with bash command line executables to conduct static analysis and investigate IOCs</li>
</ul>
<p>Travel requirements</p>
<p>Ability to travel up to 20% of the time</p>
<p>Position may require foreign and domestic travel, passport will be required</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Digital Forensics, Incident Response, Cybersecurity, Network Forensic Analysis, Reverse Engineering, Malware Analysis, Cloud Incident Response, Communication, Network Protocols, Cloud Environments, MITRE ATT&amp;CK, NIST Cyber Security Frameworks, Windows Operating Systems, Unix, Linux, Mac Operating Systems, Python, Golang, Yara, Source Code, Hex, Binary, Regular Expression, Data Correlation, Network Flow, System Logs, Static Analysis, Dynamic Analysis, Automated Malware Analysis, Malware Attribution, Indicator of Compromise, Infrastructure Enumeration, Bash Command Line Executables</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Cloudflare</Employername>
      <Employerlogo>https://logos.yubhub.co/cloudflare.com.png</Employerlogo>
      <Employerdescription>Cloudflare is a system spanning the globe, providing a network that powers millions of websites and other Internet properties.</Employerdescription>
      <Employerwebsite>https://www.cloudflare.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/cloudflare/jobs/7389902</Applyto>
      <Location>Hybrid</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>be9836be-cee</externalid>
      <Title>Software Engineer, Cybersecurity Products</Title>
      <Description><![CDATA[<p>We&#39;re looking for engineers to join a new effort building AI-powered products and capabilities for cybersecurity. You&#39;ll work across the stack to prototype new ideas and build from the ground up.</p>
<p>This role sits at the intersection of research, product, and go-to-market. You&#39;ll work closely with research teams to develop new model capabilities for security applications, prototype and iterate quickly to validate ideas, and engage directly with customers and partners to inform what we build.</p>
<p>Responsibilities:</p>
<ul>
<li>Prototype and build new AI-powered products for cybersecurity</li>
<li>Iterate quickly based on customer feedback and what you learn</li>
<li>Collaborate with research teams to identify and develop new model capabilities for security applications</li>
<li>Engage directly with customers and partners to understand workflows and inform product direction</li>
</ul>
<p>You may be a good fit if you:</p>
<ul>
<li>Have 7+ years of experience as a software engineer</li>
<li>Experience developing cybersecurity products</li>
<li>Enjoy fast iteration and are energized by prototyping new ideas</li>
<li>Have strong product instincts and enjoy defining what to build, not just how to build it</li>
<li>Are comfortable working closely with research and go-to-market teams</li>
<li>Have strong communication skills and can work effectively across functions</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Experience in incident response, reverse engineering, network analysis, penetration testing, or similar fields</li>
<li>Experience working with AI/ML models and building products on top of them</li>
<li>Experience building agentic applications</li>
</ul>
<p>The annual compensation range for this role is $320,000-$405,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>software engineering, cybersecurity, AI/ML, product development, research collaboration, incident response, reverse engineering, network analysis, penetration testing, agentic applications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5063007008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f509d407-0b5</externalid>
      <Title>Senior Security Engineer, Incident Response</Title>
      <Description><![CDATA[<p>You will be an individual contributor on the security Incident Response (IR) team at Databricks, reporting to the regional IR manager. Your responsibilities will include conducting security analysis and forensics, responding to high-priority alerts, and contributing to automations and agentic capabilities. You will be a security multiplier and help the team scale security incident response at Databricks.</p>
<p>Responsibilities:</p>
<ul>
<li>Respond to incidents as part of a distributed 24x7 operations and on-call schedule.</li>
<li>Triage and respond to security events and alerts, ensuring quick and effective containment.</li>
<li>Contribute to security investigations, conducting analysis and forensics across a range of data sources to determine the timeline and impact of security events.</li>
<li>Build automations, including leveraging AI and agentic platforms, to deliver autonomous capabilities, expedite your work, and scale the impact of the team.</li>
<li>Communicate technical decisions through design docs and tech talks, and mentor junior security responders via security guidance, design reviews, and code reviews.</li>
</ul>
<p>What we look for:</p>
<ul>
<li>Bachelor&#39;s Degree AND 4+ years experience in Incident Response work OR Master&#39;s Degree AND 2+ years experience.</li>
<li>Strong cloud security background in at least 1 of AWS, GCP, or Azure, and working knowledge of the others.</li>
<li>Knowledge of AI/LLM and agentic capabilities, including effective prompting and use of MCP, agents, and agent skills.</li>
<li>Broad security subject matter expertise.</li>
<li>Expertise in few core IR skills (DFIR, Reverse Engineering, Traditional Network Security, Storage and access security, Sandboxing, Compute security, etc.).</li>
<li>Experience with Enterprise Security and SaaS applications.</li>
<li>Working knowledge of a SIEM and SOAR.</li>
<li>Experience building Incident Response Tooling and scripting language skills.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>cloud security, AWS, GCP, Azure, AI/LLM, agentic capabilities, security subject matter expertise, DFIR, Reverse Engineering, Traditional Network Security, Storage and access security, Sandboxing, Compute security, Enterprise Security, SaaS applications, SIEM, SOAR, Incident Response Tooling, scripting language skills</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Databricks</Employername>
      <Employerlogo>https://logos.yubhub.co/databricks.com.png</Employerlogo>
      <Employerdescription>Databricks is a data and AI company that provides a unified and democratized data, analytics, and AI platform to over 10,000 organizations worldwide.</Employerdescription>
      <Employerwebsite>https://databricks.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/databricks/jobs/8026632002</Applyto>
      <Location>Amsterdam, Netherlands; Berlin, Germany; London, United Kingdom; Remote - Denmark; Remote - France; Remote - Germany; Remote - Italy; Remote - Spain; Remote - Sweden</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>28f97bd7-3d7</externalid>
      <Title>Offensive Security Research Engineer, Safeguards</Title>
      <Description><![CDATA[<p>We are looking for vulnerability researchers to help mitigate the risks that come with building AI systems. One of these risks is the potential for LLMs to enable adversaries to cause harm by automating the attacks that today are carried out by human cybercrime groups, but in the future may be easily carried out by humans misusing LLMs.</p>
<p>Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>
<p>We are hiring security specialists who are experienced at exploitation and remediation, and are interested in understanding how LLMs could cause harm in the future, so that we can better prepare for this future and mitigate these risks before they arise.</p>
<p>Responsibilities:</p>
<ul>
<li>Triage any vulnerabilities discovered, coordinate and assist the external and open-source community in remediation</li>
<li>Write scaffolds designed to automate typical traditional attack techniques to help clarify our defensive problem selection</li>
<li>Research how adversaries might misuse LLMs to identify and exploit vulnerabilities at scale in the future</li>
<li>Develop promising defensive strategies that could mitigate the ability of adversaries to misuse models in harmful ways</li>
<li>Work with a small, senior team of engineers and researchers to enact a forward-looking security plan</li>
</ul>
<p>You may be a good fit if you have:</p>
<ul>
<li>3+ years experience with pentesting, vulnerability research, or other offensive security experience</li>
<li>Senior-level knowledge in at least one related topic area (reverse engineering, network security, exploitation, physical security)</li>
<li>A history demonstrating desire to do the &#39;dirty work&#39; that results in high-quality outputs</li>
<li>Software engineering experience</li>
<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>
<li>Proven ability to lead cross-functional security initiatives and navigate complex organisational dynamics</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Published research papers on computer security, language modeling, or related topics; or given talks at Defcon, Blackhat, CCC, or related venues</li>
<li>Familiarity with large language models and how they work; for example, you may have written agent scaffolds</li>
<li>Reported CVEs, or been awarded for bug bounty vulnerabilities</li>
<li>Contributed to open-source projects in LLM- or security-adjacent repositories</li>
</ul>
<p>The annual compensation range for this role is $320,000-$405,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>pentesting, vulnerability research, offensive security, reverse engineering, network security, exploitation, physical security, software engineering, large language models, agent scaffolds, CVEs, bug bounty vulnerabilities, open-source projects</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5123011008</Applyto>
      <Location>San Francisco, CA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>6aa46bac-783</externalid>
      <Title>Software Engineer, Cybersecurity Products</Title>
      <Description><![CDATA[<p><strong>About Anthropic</strong></p>
<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>
<p><strong>About the Role</strong></p>
<p>We&#39;re looking for engineers to join a new effort building AI-powered products and capabilities for cybersecurity. You&#39;ll work across the stack to prototype new ideas and build from the ground up.</p>
<p>This role sits at the intersection of research, product, and go-to-market. You&#39;ll work closely with research teams to develop new model capabilities for security applications, prototype and iterate quickly to validate ideas, and engage directly with customers and partners to inform what we build. The right candidate has the technical depth to engage with research, the product instincts to know what&#39;s worth building, and the drive to move fast.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Prototype and build new AI-powered products for cybersecurity</li>
</ul>
<ul>
<li>Iterate quickly based on customer feedback and what you learn</li>
</ul>
<ul>
<li>Collaborate with research teams to identify and develop new model capabilities for security applications</li>
</ul>
<ul>
<li>Engage directly with customers and partners to understand workflows and inform product direction</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>Have 7+ years of experience as a software engineer</li>
</ul>
<ul>
<li>Experience developing cybersecurity products</li>
</ul>
<ul>
<li>Enjoy fast iteration and are energized by prototyping new ideas</li>
</ul>
<ul>
<li>Have strong product instincts and enjoy defining what to build, not just how to build it</li>
</ul>
<ul>
<li>Are comfortable working closely with research and go-to-market teams</li>
</ul>
<ul>
<li>Have strong communication skills and can work effectively across functions</li>
</ul>
<p><strong>Strong candidates may also have:</strong></p>
<ul>
<li>Experience in incident response, reverse engineering, network analysis, penetration testing, or similar fields</li>
</ul>
<ul>
<li>Experience working with AI/ML models and building products on top of them</li>
</ul>
<ul>
<li>Experience building agentic applications</li>
</ul>
<p><strong>Deadline to apply:</strong></p>
<p>None. Applications will be reviewed on a rolling basis.</p>
<p><strong>Logistics</strong></p>
<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>
<p><strong>Come work with us!</strong></p>
<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. <strong>Guidance on Candidates&#39; AI Usage:</strong> Learn about our policy for using AI in our application process</p>
<p>Interested in building your career at Anthropic? Get future opportunities by following us on LinkedIn and Twitter.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000 - $405,000 USD</Salaryrange>
      <Skills>software engineer, cybersecurity products, AI/ML models, incident response, reverse engineering, network analysis, penetration testing, agentic applications, circuit-based interpretability, multimodal neurons, scaling laws, AI &amp; compute, concrete problems in AI safety, learning from human preferences</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation headquartered in San Francisco, with a mission to create reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5063007008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>20e650c2-d9c</externalid>
      <Title>Research Scientist, Interpretability</Title>
      <Description><![CDATA[<p><strong>About the role:</strong></p>
<p>When you see what modern language models are capable of, do you wonder, &#39;How do these things work? How can we trust them?&#39;</p>
<p>The Interpretability team at Anthropic is working to reverse-engineer how trained models work because we believe that a mechanistic understanding is the most robust way to make advanced systems safe. We’re looking for researchers and engineers to join our efforts.</p>
<p>People mean many different things by &#39;interpretability&#39;. We&#39;re focused on mechanistic interpretability, which aims to discover how neural network parameters map to meaningful algorithms. Some useful analogies might be to think of us as trying to do &#39;biology&#39; or &#39;neuroscience&#39; of neural networks using “microscopes” we build, or as treating neural networks as binary computer programs we&#39;re trying to &#39;reverse engineer&#39;.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Develop methods for understanding LLMs by reverse engineering algorithms learned in their weights</li>
</ul>
<ul>
<li>Design and run robust experiments, both quickly in toy scenarios and at scale in large models</li>
</ul>
<ul>
<li>Create and analyse new interpretability features and circuits to better understand how models work.</li>
</ul>
<ul>
<li>Build infrastructure for running experiments and visualising results</li>
</ul>
<ul>
<li>Work with colleagues to communicate results internally and publicly</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>Have a strong track record of scientific research (in any field), and have done _some_ work on Interpretability</li>
</ul>
<ul>
<li>Enjoy team science – working collaboratively to make big discoveries</li>
</ul>
<ul>
<li>Are comfortable with messy experimental science. We&#39;re inventing the field as we work, and the first textbook is years away</li>
</ul>
<ul>
<li>You view research and engineering as two sides of the same coin. Every team member writes code, designs and runs experiments, and interprets results</li>
</ul>
<ul>
<li>You can clearly articulate and discuss the motivations behind your work, and teach us about what you&#39;ve learned. You like writing up and communicating your results, even when they&#39;re null</li>
</ul>
<p><strong>Role Specific Location Policy:</strong></p>
<ul>
<li>This role is based in San Francisco office; however, we are open to considering exceptional candidates for remote work on a case-by-case basis.</li>
</ul>
<p><strong>Logistics</strong></p>
<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$350,000 - $850,000USD</Salaryrange>
      <Skills>Python, Mechanistic Interpretability, Neural Networks, Reverse Engineering, Experimental Science, Research, Engineering, Team Science, Communication</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a company that aims to create reliable, interpretable, and steerable AI systems. It has a quickly growing team of researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4980427008</Applyto>
      <Location>San Francisco</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>b0cdccea-4ed</externalid>
      <Title>Offensive Security Research Engineer, Safeguards</Title>
      <Description><![CDATA[<p><strong>About Anthropic</strong></p>
<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>
<p><strong>About the Role</strong></p>
<p>We are looking for vulnerability researchers to help mitigate the risks that come with building AI systems. One of these risks is the potential for LLMs to enable adversaries to cause harm by automating the attacks that today are carried out by human cybercrime groups, but in the future may be easily carried out by humans misusing LLMs. We are hiring security specialists who are experienced at exploitation and remediation, and are interested in understanding how LLMs could cause harm in the future, so that we can better prepare for this future and mitigate these risks before they arise.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Triage any vulnerabilities discovered, coordinate and assist the external and open-source community in remediation</li>
<li>Write scaffolds designed to automate typical traditional attack techniques to help clarify our defensive problem selection</li>
<li>Research how adversaries might misuse LLMs to identify and exploit vulnerabilities at scale in the future</li>
<li>Develop promising defensive strategies that could mitigate the ability of adversaries to misuse models in harmful ways</li>
<li>Work with a small, senior team of engineers and researchers to enact a forward-looking security plan</li>
</ul>
<p><strong>You may be a good fit if you have:</strong></p>
<ul>
<li>3+ years experience with pentesting, vulnerability research, or other offensive security experience</li>
<li>Senior-level knowledge in at least one related topic area (reverse engineering, network security, exploitation, physical security)</li>
<li>A history demonstrating desire to do the &#39;dirty work&#39; that results in high-quality outputs</li>
<li>Software engineering experience</li>
<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>
<li>Proven ability to lead cross-functional security initiatives and navigate complex organisational dynamics</li>
</ul>
<p><strong>Strong candidates may also have:</strong></p>
<ul>
<li>Published research papers on computer security, language modeling, or related topics; or given talks at Defcon, Blackhat, CCC, or related venues</li>
<li>Familiarity with large language models and how they work; for example, you may have written agent scaffolds</li>
<li>Reported CVEs, or been awarded for bug bounty vulnerabilities</li>
<li>Contributed to open-source projects in LLM- or security-adjacent repositories</li>
</ul>
<p><strong>Logistics</strong></p>
<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>
<p><strong>Come work with us!</strong></p>
<p>Anthropic is a public benefit corporation headquartered in San Francisco.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000 - $405,000 USD</Salaryrange>
      <Skills>pentesting, vulnerability research, offensive security, reverse engineering, network security, exploitation, physical security, software engineering, communication skills, large language models, agent scaffolds, CVEs, bug bounty vulnerabilities, open-source projects</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that aims to create reliable, interpretable, and steerable AI systems. The company is headquartered in San Francisco, CA.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5123011008</Applyto>
      <Location>San Francisco, CA</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>9ad63cdd-0f4</externalid>
      <Title>Senior Software Engineer</Title>
      <Description><![CDATA[<p><strong>Summary</strong></p>
<p>Microsoft AI are looking for a talented Senior Software Engineer at their Beijing office. This role sits at the heart of driving into Microsoft Edge, providing users with a normal Internet experience, and staying away from various malware harassment. You&#39;ll work directly with the Edge team to gain a deep understanding of the various problems users encounter when using Edge, analyze their causes, and provide solutions.</p>
<p><strong>About the Role</strong></p>
<p>As a Senior Software Engineer in Edge App Defaults, you will be joining a team passionate about driving into Microsoft Edge. This team is keen to protect users from using Edge normally, provide users with a normal Internet experience, and stay away from various malware harassment. In this team, you will have the opportunity to work with other teams, not only within Edge, but also with the Windows team to provide users with good Internet experience. You can also dig into the OS code and gain a deeper understanding of Windows. You will analyze Edge online usage data to identify emerging attack behaviors targeting Edge, and drive feasible mitigation solutions end-to-end. You will leverage advanced AI technology to shorten the detection latency for new attack behaviors. You will leverage advanced AI solutions to build sustainable, iterative, and long-term effective defense strategies.</p>
<p><strong>Accountabilities</strong></p>
<ul>
<li>Conduct in-depth market research across cinema and simulation sectors, identifying emerging trends, competitive threats, and partnership opportunities that directly inform the company&#39;s quarterly strategic planning sessions</li>
</ul>
<p><strong>The Candidate we&#39;re looking for</strong></p>
<p><strong>Experience:</strong></p>
<ul>
<li>4+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python</li>
</ul>
<p><strong>Technical skills:</strong></p>
<ul>
<li>Proficient on English reading and writing</li>
</ul>
<p><strong>Personal attributes:</strong></p>
<ul>
<li>Average verbal smooth English communication ability</li>
</ul>
<p><strong>Benefits</strong></p>
<ul>
<li>Work from the office at least four days per week</li>
<li>Health and wellbeing benefits</li>
<li>Professional development opportunities</li>
<li>Financial benefits (bonus, equity, pension, etc.)</li>
<li>Cultural perks (team events, office amenities, etc.)</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>C, C++, C#, Java, JavaScript, Python, Win32 API program development, Chromium based work experience, Familiarity with assembly and reverse engineering</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Microsoft AI</Employername>
      <Employerlogo>https://logos.yubhub.co/microsoft.ai.png</Employerlogo>
      <Employerdescription>Microsoft&apos;s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals.</Employerdescription>
      <Employerwebsite>https://microsoft.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://microsoft.ai/job/senior-software-engineer-73/</Applyto>
      <Location>Beijing</Location>
      <Country></Country>
      <Postedate>2026-03-06</Postedate>
    </job>
    <job>
      <externalid>33d2298e-5c9</externalid>
      <Title>Senior Software Engineer</Title>
      <Description><![CDATA[<p><strong>Summary</strong></p>
<p>Microsoft AI are looking for a talented Senior Software Engineer at their Suzhou office. This role sits at the heart of driving into Microsoft Edge, providing users with a normal Internet experience, and staying away from various malware harassment. You&#39;ll work directly with the Edge team to provide users with good Internet experience.</p>
<p><strong>About the Role</strong></p>
<p>As a Senior Software Engineer in Edge App Defaults, you will be joining a team passionate about driving into Microsoft Edge. This team is keen to protect users from using Edge normally, provide users with a normal Internet experience, and stay away from various malware harassment. In this team, you will have the opportunity to work with other teams, not only within Edge, but also with the Windows team to provide users with good Internet experience. You can also dig into the OS code and gain a deeper understanding of Windows.</p>
<p><strong>Accountabilities</strong></p>
<ul>
<li>Analyze Edge online usage data to identify emerging attack behaviors targeting Edge, and drive feasible mitigation solutions end-to-end.</li>
<li>Leverage advanced AI technology to shorten the detection latency for new attack behaviors.</li>
<li>Leverage advanced AI solutions to build sustainable, iterative, and long-term effective defense strategies.</li>
</ul>
<p><strong>The Candidate we&#39;re looking for</strong></p>
<p><strong>Experience:</strong></p>
<ul>
<li>Bachelor’s Degree in Computer Science or related technical field AND 4+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR equivalent experience.</li>
</ul>
<p><strong>Technical skills:</strong></p>
<ul>
<li>Proficient on English reading and writing.</li>
<li>Familiarity with Win32 API program development.</li>
<li>Chromium based work experience.</li>
<li>Familiarity with assembly and reverse engineering.</li>
</ul>
<p><strong>Personal attributes:</strong></p>
<ul>
<li>Average verbal smooth English communication ability.</li>
</ul>
<p><strong>Benefits</strong></p>
<ul>
<li>Starting January 26, 2026, Microsoft AI employees who live within a 50-mile commute of a designated Microsoft office in the U.S. or 25-mile commute of a non-U.S., country-specific location are expected to work from the office at least four days per week.</li>
<li>Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>C, C++, C#, Java, JavaScript, Python, Win32 API, Chromium, assembly, reverse engineering, English reading and writing, average verbal smooth English communication ability</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Microsoft AI</Employername>
      <Employerlogo>https://logos.yubhub.co/microsoft.ai.png</Employerlogo>
      <Employerdescription>Microsoft&apos;s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals.</Employerdescription>
      <Employerwebsite>https://microsoft.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://microsoft.ai/job/senior-software-engineer-74/</Applyto>
      <Location>Suzhou</Location>
      <Country></Country>
      <Postedate>2026-03-06</Postedate>
    </job>
  </jobs>
</source>