{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/security-controls"},"x-facet":{"type":"skill","slug":"security-controls","display":"Security Controls","count":10},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_6c1cd36d-464"},"title":"Senior Security Operations Engineer, Detection & Response","description":"<p>About Us</p>\n<p>dbt Labs is the pioneer of analytics engineering, helping data teams transform raw data into reliable, actionable insights. As of February 2025, we’ve grown from an open source project into the leading analytics engineering platform, now used by over 90,000 teams every week, driving data transformations and AI use cases.</p>\n<p>We’re backed by top-tier investors including Andreessen Horowitz, Sequoia Capital, and Altimeter. At our core, we believe in empowering data practitioners:</p>\n<ul>\n<li>Reliable, high-quality data is the fuel that propels AI-powered data engineering.</li>\n<li>AI is changing data work, fast. dbt’s data control plane keeps data engineers ahead of that curve.</li>\n<li>We empower engineers to deliver reliable, governed data faster, cheaper, and at scale.</li>\n</ul>\n<p>About the Security Team</p>\n<p>The mission of the Security Engineering team at dbt Labs is to provide clear, opinionated security guidance and scalable, secure-by-default offerings to engineers for the purpose of securing software development and enabling pragmatic risk decisions at dbt.</p>\n<p><strong>Responsibilities</strong></p>\n<p>As a Senior Security Operations Engineer on the Detection &amp; Response team, you will strengthen and maintain the company&#39;s security posture throughout the threat detection lifecycle from telemetry collection and continuous monitoring through threat detection, incident response, and security event management. You will serve as a subject matter expert for security operations across the dbt Labs&#39; teams and technology infrastructure, including multi-cloud production environments, identity, endpoints, and SaaS technologies.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Participate in a 24/7 on-call rotation providing coverage for active security incidents, investigations, and security events across our global infrastructure.</li>\n<li>Lead investigation and remediation of security incidents, coordinating cross-functional response efforts to minimize impact and recovery time.</li>\n<li>Play a major role in bootstrapping an end to end D&amp;R alert and investigation pipeline.</li>\n<li>Triage and investigate security alerts from detection tools including Wiz Defend, Crowdstrike, and cloud security platforms to identify genuine threats and reduce false positives.</li>\n<li>Develop and maintain detection rules, runbooks, and response procedures mapped to the company&#39;s threat model.</li>\n<li>Automate alert triage workflows and improve mean time to detection and response through tooling and process enhancements, including leveraging AI enrichment and processing.</li>\n<li>Collaborate with Infrastructure and Application Security teams to implement secure-by-design principles and remediate identified security issues.</li>\n<li>Conduct security event analysis to identify policy violations, misconfigurations, and potential attack vectors before they become incidents.</li>\n<li>Partner with our Enterprise Security &amp; Technology team to enhance endpoint security controls and monitoring across endpoints (MacOS laptops &amp; some Windows and Linux-based development environments).</li>\n<li>Design and facilitate tabletop exercises and game days to test detection, response, recovery, and remediation capabilities.</li>\n<li>Contribute to the maturation of the security incident response program through documentation, training, and process improvements.</li>\n<li>Mentor junior security engineers and cross-functional team members on incident handling best practices.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>Demonstrated ability to excel in high-pressure situations; we need someone who can make sound decisions during active security incidents and can calmly serve as incident commander with confidence.</li>\n</ul>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li>Have 8+ years of professional experience in security-related domains, including at least 4 years in security operations, incident response, threat hunting, or threat detection roles.</li>\n<li>Have demonstrable experience leading security incident investigations and coordinating cross-team response efforts.</li>\n</ul>\n<p><strong>What We Offer</strong></p>\n<ul>\n<li>Competitive compensation packages commensurate with experience, including salary, equity, and where applicable, performance-based pay.</li>\n<li>Opportunity to work with a leading analytics engineering platform and contribute to the growth and success of the company.</li>\n<li>Collaborative and dynamic work environment with a team of experienced professionals.</li>\n<li>Opportunities for professional growth and development.</li>\n</ul>\n<p><strong>How to Apply</strong></p>\n<p>If you are a motivated and experienced security professional looking for a new challenge, please submit your resume and cover letter to [insert contact information]. We look forward to hearing from you!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_6c1cd36d-464","directApply":true,"hiringOrganization":{"@type":"Organization","name":"dbt Labs","sameAs":"https://www.getdbt.com/","logo":"https://logos.yubhub.co/getdbt.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/dbtlabsinc/jobs/4674498005","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Security Operations","Incident Response","Threat Hunting","Threat Detection","Cloud Security","Endpoint Security","Security Event Analysis","Security Incident Response","Tabletop Exercises","Game Days","Documentation","Training","Process Improvements","Mentoring","Security Engineering","Data Control Plane","Analytics Engineering","AI-Powered Data Engineering","Reliable High-Quality Data","Secure-By-Default Offerings","Pragmatic Risk Decisions","Multi-Cloud Production Environments","Identity","Endpoints","SaaS Technologies","Wiz Defend","Crowdstrike","Cloud Security Platforms","Detection Rules","Runbooks","Response Procedures","Mean Time to Detection","Mean Time to Response","AI Enrichment","AI Processing","Secure-By-Design Principles","Infrastructure Security","Application Security","Endpoint Security Controls","Monitoring"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:52:43.496Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"US - Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security Operations, Incident Response, Threat Hunting, Threat Detection, Cloud Security, Endpoint Security, Security Event Analysis, Security Incident Response, Tabletop Exercises, Game Days, Documentation, Training, Process Improvements, Mentoring, Security Engineering, Data Control Plane, Analytics Engineering, AI-Powered Data Engineering, Reliable High-Quality Data, Secure-By-Default Offerings, Pragmatic Risk Decisions, Multi-Cloud Production Environments, Identity, Endpoints, SaaS Technologies, Wiz Defend, Crowdstrike, Cloud Security Platforms, Detection Rules, Runbooks, Response Procedures, Mean Time to Detection, Mean Time to Response, AI Enrichment, AI Processing, Secure-By-Design Principles, Infrastructure Security, Application Security, Endpoint Security Controls, Monitoring"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_09d2b729-96d"},"title":"Senior Software Security Engineer","description":"<p>About Anthropic</p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole.</p>\n<p>The Security Engineering team protects Anthropic&#39;s AI systems and maintains the trust of our users and society. We define the authentication architecture for our training infrastructure, design the cryptographic foundations that protect model weights and training data, and drive the developer security program that shapes how engineers build and ship software.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Build and maintain identity and secrets management systems, including credential issuance, rotation, and workload authentication across our multi-cloud environments</li>\n<li>Contribute to cluster security controls including RBAC policies, namespace isolation, workload identity, and pod security</li>\n<li>Implement and maintain cloud security controls including IAM, network segmentation, VPC architecture, and encryption across our multi-cloud and on-prem environments</li>\n<li>Design and implement secure development frameworks and libraries that make secure coding the path of least resistance for our engineering teams, including service to service authentication, serialization libraries, and tool proxies.</li>\n<li>Harden CI/CD pipelines against supply chain attacks through isolated build environments, signed attestations, dependency verification, and automated policy enforcement</li>\n<li>Identify and remediate security gaps through code review, threat modeling, and hands-on debugging</li>\n<li>Contribute to continuous cloud security posture management using infrastructure-as-code scanning, misconfiguration detection, and automated remediation</li>\n</ul>\n<p>Requirements:</p>\n<ul>\n<li>At least 5 years of software engineering experience implementing and maintaining security-relevant systems in production</li>\n<li>Bachelor&#39;s degree in Computer Science or equivalent industry experience</li>\n<li>Strong programming skills in Python or at least one systems language such as Go or Rust</li>\n<li>Experience contributing to cloud security controls</li>\n<li>A track record of taking ownership of problems end to end, from identifying the issue to shipping and monitoring the fix</li>\n<li>Clear communication skills and the ability to work collaboratively across engineering teams</li>\n<li>Low ego and high empathy, with a genuine interest in helping teammates succeed</li>\n<li>Passion for AI safety and the role security engineering plays in building trustworthy AI systems</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Contributions to developer security tooling including SAST, dependency scanning, or secure build infrastructure</li>\n<li>Familiarity with Kubernetes security primitives including RBAC, namespaces, network policies, and admission controllers</li>\n<li>Experience with cloud security posture management tooling, infrastructure-as-code security scanning, or automated remediation</li>\n<li>Experience with network security and isolation techniques including east-west controls, traffic inspection, and cloud network policy</li>\n<li>Experience with eBPF for security monitoring and enforcement, or developing kernel security policies</li>\n<li>Experience building secrets management or workload authentication systems, including familiarity with protocols such as OAuth 2.0, OIDC, SAML, or SPIFFE/SPIRE</li>\n<li>Background building or operating security systems in environments that support research workflows and rapid iteration</li>\n</ul>\n<p>Benefits:</p>\n<ul>\n<li>Competitive compensation and benefits</li>\n<li>Optional equity donation matching</li>\n<li>Generous vacation and parental leave</li>\n<li>Flexible working hours</li>\n<li>Lovely office space in which to collaborate with colleagues</li>\n</ul>\n<p>How to Apply:</p>\n<p>If you&#39;re interested in this role, please submit your application through our website. We look forward to hearing from you!</p>\n<p>Note: Anthropic is an equal opportunity employer and welcomes applications from diverse candidates.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_09d2b729-96d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4887959008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000-$405,000 USD","x-skills-required":["Python","Go","Rust","Cloud security controls","Kubernetes","Infrastructure-as-code","Security scanning","Automated remediation"],"x-skills-preferred":["Developer security tooling","SAST","Dependency scanning","Secure build infrastructure","Network security","Isolation techniques","East-west controls","Traffic inspection","Cloud network policy","eBPF","Kernel security policies","Secrets management","Workload authentication","OAuth 2.0","OIDC","SAML","SPIFFE/SPIRE"],"datePosted":"2026-04-18T15:51:54.658Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Rust, Cloud security controls, Kubernetes, Infrastructure-as-code, Security scanning, Automated remediation, Developer security tooling, SAST, Dependency scanning, Secure build infrastructure, Network security, Isolation techniques, East-west controls, Traffic inspection, Cloud network policy, eBPF, Kernel security policies, Secrets management, Workload authentication, OAuth 2.0, OIDC, SAML, SPIFFE/SPIRE","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a3a1df2f-184"},"title":"Principal Engineer, Software Supply Chain Security","description":"<p>As the Principal Engineer, Software Supply Chain Security, you&#39;ll own the technical strategy that secures how software is built and delivered on GitLab&#39;s DevSecOps platform. You&#39;ll provide architectural leadership across multiple engineering teams.</p>\n<p>Your work will shape GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market. You&#39;ll focus on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture.</p>\n<p>Some examples of our projects:</p>\n<ul>\n<li>SLSA Level 3 compliance and provenance attestation across GitLab&#39;s CI/CD platform</li>\n<li>Integrated secrets management and runner security for container-isolated, secure pipelines</li>\n</ul>\n<p>You&#39;ll lead the end-to-end software supply chain security architecture for GitLab&#39;s CI/CD platform, including SLSA Level 3 implementation and CI infrastructure hardening. You&#39;ll drive cross-team technical strategy and decisions across our Software Supply Chain Security (SSCS) stage teams, aligning engineering work to SSCS strategic plans.</p>\n<p>You&#39;ll collaborate with infrastructure and CI/CD teams to design and land long-term initiatives for secure, scalable runner architecture, container isolation, and pipeline security at scale. You&#39;ll propose and validate technical implementations that support architectural changes to improve CI/CD scaling and performance on critical paths.</p>\n<p>You&#39;ll teach, mentor, and coach Staff Engineers and individual contributors, raising the bar on supply chain threat modeling, secrets management, artifact signing, and SBOM lifecycle practices.</p>\n<p>You&#39;ll partner with Engineering Managers and senior leadership to define roadmaps, break down complex initiatives, and enable Staff Engineers to lead sub-department-wide efforts.</p>\n<p>You&#39;ll engage with customers and external stakeholders as a technical consultant and spokesperson for GitLab&#39;s software supply chain security capabilities and roadmap.</p>\n<p>You&#39;ll collaborate with product, security, and compliance stakeholders to ensure features meet enterprise security, governance, and regulatory expectations in the software supply chain security market.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Providing architectural leadership across multiple engineering teams</li>\n<li>Shaping GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market</li>\n<li>Focusing on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture</li>\n</ul>\n<p>Key requirements include:</p>\n<ul>\n<li>Deep expertise in software supply chain security, including threat modeling for supply chain attack vectors, SLSA implementation and attestation systems, and SBOM generation and lifecycle management</li>\n<li>Strong knowledge of artifact signing and verification using the Sigstore ecosystem, including Cosign, Fulcio, Rekor, and in-toto attestations</li>\n<li>Experience designing and hardening CI/CD security, such as runner isolation, pipeline security controls, and secrets management in large-scale environments</li>\n</ul>\n<p>Preferred qualifications include:</p>\n<ul>\n<li>Background in distributed systems and infrastructure, including building resilient CI/CD platforms that process high pipeline volumes and optimizing performance for critical paths</li>\n<li>Practical experience with container security and Kubernetes security, including admission controllers, policy controllers, workload isolation, and registry hardening</li>\n<li>Proficiency in Go or Rust in a production environment, combined with expert-level understanding of CI/CD workflows and DevSecOps best practices</li>\n<li>Experience operating as a Principal or Staff Engineer across multiple development teams, providing architectural leadership and partnering with Engineering Managers and senior leaders</li>\n<li>Demonstrated capacity to clearly communicate complex problems and solutions</li>\n</ul>\n<p>Our Software Supply Chain Security stage engineering teams are responsible for authentication and access within GitLab. We also build features that help customers manage vulnerabilities, dependencies, security policies, and compliance frameworks across their organizations.</p>\n<p>The base salary range for this role&#39;s listed level is currently for residents of the United States only. This range is intended to reflect the role&#39;s base salary rate in locations throughout the US. Grade level and salary ranges are determined through interviews and a review of education, experience, knowledge, skills, abilities of the applicant, equity with other team members, alignment with market data, and geographic location. The base salary range does not include any bonuses, equity, or benefits.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a3a1df2f-184","directApply":true,"hiringOrganization":{"@type":"Organization","name":"GitLab","sameAs":"https://about.gitlab.com/","logo":"https://logos.yubhub.co/about.gitlab.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/gitlab/jobs/8373553002","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$157,900-$338,400 USD","x-skills-required":["software supply chain security","threat modeling","SLSA implementation","attestation systems","SBOM generation","lifecycle management","artifact signing","verification","Sigstore ecosystem","Cosign","Fulcio","Rekor","in-toto attestations","CI/CD security","runner isolation","pipeline security controls","secrets management","distributed systems","infrastructure","container security","Kubernetes security","admission controllers","policy controllers","workload isolation","registry hardening","Go","Rust","CI/CD workflows","DevSecOps best practices"],"x-skills-preferred":["background in distributed systems and infrastructure","practical experience with container security and Kubernetes security","proficiency in Go or Rust in a production environment","expert-level understanding of CI/CD workflows and DevSecOps best practices","experience operating as a Principal or Staff Engineer across multiple development teams"],"datePosted":"2026-04-18T15:45:22.426Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote, Canada; Remote, Israel; Remote, Netherlands; Remote, United Kingdom; Remote, US"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software supply chain security, threat modeling, SLSA implementation, attestation systems, SBOM generation, lifecycle management, artifact signing, verification, Sigstore ecosystem, Cosign, Fulcio, Rekor, in-toto attestations, CI/CD security, runner isolation, pipeline security controls, secrets management, distributed systems, infrastructure, container security, Kubernetes security, admission controllers, policy controllers, workload isolation, registry hardening, Go, Rust, CI/CD workflows, DevSecOps best practices, background in distributed systems and infrastructure, practical experience with container security and Kubernetes security, proficiency in Go or Rust in a production environment, expert-level understanding of CI/CD workflows and DevSecOps best practices, experience operating as a Principal or Staff Engineer across multiple development teams","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":157900,"maxValue":338400,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1c9924df-8d3"},"title":"Product Manager, Multi-Cloud Growth - Google","description":"<p>About the Role</p>\n<p>The Anthropic Platform Org&#39;s mission is to help builders build. Our vision is to be the premier platform for businesses to transform themselves and their products with AI. This org is responsible for our APIs, self-serve developer experience, multi-cloud integrations, and agentic infrastructure. We serve a wide array of users from startups to large scale enterprises.</p>\n<p>Responsibilities:</p>\n<p><strong>Customer Understanding &amp; Advocacy</strong></p>\n<ul>\n<li>Deeply engage with enterprise developers and technical leaders to understand their integration needs and pain points</li>\n<li>Run regular feedback sessions and technical reviews with key enterprise customers</li>\n<li>Build strong relationships with enterprise development teams to understand their workflows and challenges</li>\n<li>Transform customer insights into actionable product requirements and priorities</li>\n</ul>\n<p><strong>Product Strategy &amp; Vision</strong></p>\n<ul>\n<li>Define and execute the enterprise API strategy, balancing security requirements with developer experience</li>\n<li>Develop a clear roadmap for enterprise API features including authentication, rate limiting, and compliance capabilities</li>\n<li>Identify and prioritize key enterprise integration patterns that drive organisational value</li>\n</ul>\n<p><strong>Enterprise API Development</strong></p>\n<ul>\n<li>Partner with engineering to build enterprise-grade API features, security controls, and deployment tools</li>\n<li>Design and implement enterprise integration frameworks and SDKs for common enterprise systems</li>\n<li>Drive development of industry-specific API features and compliance capabilities</li>\n</ul>\n<p><strong>Cross-functional Leadership</strong></p>\n<ul>\n<li>Partner with sales and customer success to understand enterprise requirements and support technical evaluations</li>\n<li>Work closely with security and compliance teams to meet enterprise standards</li>\n<li>Collaborate with platform teams on API architecture and scalability</li>\n<li>Engage with marketing to develop enterprise API positioning and technical materials</li>\n</ul>\n<p>You may be a good fit if you:</p>\n<ul>\n<li>Have 10+ years of experience in high-scale, high-reliability developer-facing software.</li>\n<li>Have 5+ years of product management experience.</li>\n<li>Have built or shipped products with a hyperscaler as a partner , you know how to align goals and deliver impact across that boundary.</li>\n<li>Have owned a revenue number, a margin target, or a channel P&amp;L , not just a product roadmap.</li>\n<li>Operate with high autonomy in ambiguous, fast-moving environments.</li>\n<li>Are an excellent written communicator and able to drive clarity out of complexity.</li>\n<li>Excel at cross-company stakeholder management and can build trusted relationships at every layer of an organisation.</li>\n</ul>\n<p>Strong candidates may also have:</p>\n<ul>\n<li>Experience as a founder, GM, or early-stage operator where you owned commercial outcomes, not just product outputs.</li>\n<li>Direct experience as a PM at AWS, GCP, or Azure , or at an ISV that ships through one of their marketplaces.</li>\n</ul>\n<p>The annual compensation range for this role is $305,000-$385,000 USD.</p>\n<p>Logistics</p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>\n<p>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links,visit anthropic.com/careers directly for confirmed position openings.</p>\n<p>How we&#39;re different</p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>\n<p>Come work with us!</p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1c9924df-8d3","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5153924008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$305,000-$385,000 USD","x-skills-required":["high-scale, high-reliability developer-facing software","product management","hyperscaler","API strategy","API development","security controls","deployment tools","integration frameworks","SDKs","industry-specific API features","compliance capabilities"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:42:48.690Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"high-scale, high-reliability developer-facing software, product management, hyperscaler, API strategy, API development, security controls, deployment tools, integration frameworks, SDKs, industry-specific API features, compliance capabilities","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":305000,"maxValue":385000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_78b2d996-0b7"},"title":"Technical Project Manager","description":"<p>Saronic Technologies is seeking a driven and execution-focused Technical Project Manager to lead high-impact, cross-functional initiatives across Enterprise Technology and business operations.</p>\n<p>This role requires a proactive, go-getter mindset with the ability to drive alignment, manage risk, and deliver results in complex, highly coordinated environments. The ideal candidate thrives in high-visibility, high-risk programs that span multiple systems, stakeholders, and business domains.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Lead end-to-end delivery of complex, cross-functional technical programs</li>\n<li>Own project scope, timelines, milestones, budgets, and success metrics</li>\n<li>Drive structured planning, execution, and reporting across multiple workstreams</li>\n<li>Ensure alignment between business objectives and technical implementation</li>\n<li>Serve as the connective layer between Engineering, Enterprise Systems, Finance, HR, Manufacturing, and Security teams</li>\n<li>Facilitate stakeholder workshops, requirement sessions, and executive updates</li>\n<li>Manage dependencies across systems and functional teams</li>\n<li>Drive clarity where ambiguity exists and ensure accountability across owners</li>\n<li>Identify and mitigate risks early, especially in high-risk or highly integrated initiatives</li>\n<li>Proactively manage integration touchpoints and cross-system impacts</li>\n<li>Escalate appropriately while presenting solution-oriented options</li>\n<li>Maintain disciplined governance and decision documentation</li>\n<li>Support initiatives involving enterprise platforms such as ERP, CRM, HCM, middleware, analytics, and collaboration systems</li>\n<li>Partner with architects and system owners to ensure solutions align with enterprise standards</li>\n<li>Ensure adherence to change management, release governance, and security controls</li>\n<li>Provide concise and structured reporting to senior leadership</li>\n<li>Translate technical challenges into clear business impact</li>\n<li>Maintain transparency across stakeholders throughout the project lifecycle</li>\n</ul>\n<p>Qualifications:</p>\n<ul>\n<li>7+ years of experience managing technical or enterprise system projects</li>\n<li>Proven experience delivering complex, cross-functional initiatives</li>\n<li>Strong understanding of enterprise application ecosystems and system integrations</li>\n<li>Experience operating in high-growth, fast-scaling environments</li>\n<li>Demonstrated ability to manage high-risk, high-coordination programs</li>\n<li>Strong knowledge of project management methodologies (Agile, hybrid, or structured delivery models)</li>\n<li>Experience working in regulated or compliance-driven environments preferred</li>\n<li>Bachelor’s degree in Business, Information Systems, Engineering, or related discipline</li>\n</ul>\n<p>Keys to Success in This Role:</p>\n<ul>\n<li>Go-getter mentality with strong ownership and accountability</li>\n<li>Exceptional ability to drive execution without waiting for direction</li>\n<li>Strong cross-functional collaboration and influence skills</li>\n<li>Structured thinker who brings order to complex, ambiguous environments</li>\n<li>Comfortable operating in high-pressure, high-visibility programs</li>\n<li>Strong executive presence and communication skills</li>\n<li>Results-oriented with a bias toward action</li>\n</ul>\n<p>Physical Demands:</p>\n<ul>\n<li>Prolonged periods of sitting at a desk and working on a computer.</li>\n<li>Occasional standing and walking within the office.</li>\n<li>Manual dexterity to operate a computer keyboard, mouse, and other office equipment.</li>\n<li>Visual acuity to read screens, documents, and reports.</li>\n<li>Occasional reaching, bending, or stooping to access file drawers, cabinets, or office supplies.</li>\n<li>Lifting and carrying items up to 20 pounds occasionally (e.g., office supplies, packages).</li>\n</ul>\n<p>Additional Information:</p>\n<p>Benefits:</p>\n<ul>\n<li>Medical Insurance: Comprehensive health insurance plans covering a range of services</li>\n<li>Saronic pays 100% of the premium for employees and 80% for dependents</li>\n<li>Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care</li>\n<li>Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents</li>\n<li>Time Off: Generous PTO and Holidays</li>\n<li>Parental Leave: Paid maternity and paternity leave to support new parents</li>\n<li>Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses</li>\n<li>Retirement Plan: 401(k) plan with company match</li>\n<li>Stock Options: Equity options to give employees a stake in the company’s success</li>\n<li>Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage</li>\n<li>Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline</li>\n<li>Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_78b2d996-0b7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Saronic Technologies","sameAs":"https://www.saronictechnologies.com/","logo":"https://logos.yubhub.co/saronictechnologies.com.png"},"x-apply-url":"https://jobs.lever.co/saronic/15df420e-b4f0-4f9e-9fef-7e4c3e35ed0e","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Project Management","Technical Leadership","Cross-Functional Collaboration","Risk Management","Structured Planning","Reporting","Enterprise Platforms","ERP","CRM","HCM","Middleware","Analytics","Collaboration Systems","Change Management","Release Governance","Security Controls"],"x-skills-preferred":[],"datePosted":"2026-04-17T12:57:34.957Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Project Management, Technical Leadership, Cross-Functional Collaboration, Risk Management, Structured Planning, Reporting, Enterprise Platforms, ERP, CRM, HCM, Middleware, Analytics, Collaboration Systems, Change Management, Release Governance, Security Controls"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_71e12a1d-46a"},"title":"IT Security, Sr Staff","description":"<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>\n<p>You are an accomplished IT security professional with a passion for architecting robust identity and access management solutions at scale. You thrive in complex enterprise environments, bringing deep expertise in directory services, identity security, and cloud-integrated platforms. Your strategic mindset enables you to drive modernization initiatives, unify disparate systems, and introduce cutting-edge security practices.</p>\n<p>You have a deep understanding of regulatory frameworks and can translate compliance mandates into actionable security controls. You are comfortable navigating the intersection of technology and business, adept at collaborating with diverse stakeholders, and effective in communicating complex technical concepts to both technical and non-technical audiences. Your leadership inspires cross-functional teams, and you are committed to continuous improvement, staying current on emerging trends in IAM and cybersecurity.</p>\n<p>You will develop and maintain the organisation&#39;s enterprise IAM architecture, encompassing identity lifecycle management, access control models, and integrations with both cloud and on-premises applications. You will also oversee and guide IAM, ensuring alignment with business needs, security best practices, and regulatory compliance requirements.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Developing and maintaining the organisation&#39;s enterprise IAM architecture</li>\n<li>Architecting and driving the adoption of IAM solutions</li>\n<li>Overseeing and guiding IAM</li>\n<li>Evaluating, selecting, and implementing IAM technologies and tools</li>\n<li>Collaborating closely with IT, security, and business stakeholders</li>\n<li>Supporting incident response activities related to identity and access</li>\n<li>Monitoring industry trends and emerging technologies</li>\n<li>Mentoring and providing guidance to junior team members</li>\n</ul>\n<p>The impact you will have is elevating Synopsys&#39; global identity security posture through strategic architecture and modernization initiatives, enabling secure, seamless collaboration across diverse platforms and geographies, reducing risk and enhancing compliance, and driving adoption of Zero Trust principles and advanced threat detection strategies.</p>\n<p>You will need a Bachelor&#39;s degree in computer science, Information Security, or a related field, 8+ years of experience in IT security, with at least 5 years focused on IAM architecture and solutions, relevant certifications, deep expertise in IAM concepts and protocols, hands-on experience with leading IAM technologies, strong working knowledge of cloud platforms, and experience with DevOps, automation, and identity-as-code practices.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_71e12a1d-46a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/hyderabad/it-security-sr-staff/44408/93537149136","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["IAM architecture","directory services","identity security","cloud-integrated platforms","regulatory frameworks","compliance mandates","security controls","technology and business","stakeholder collaboration","complex technical concepts","leadership","continuous improvement","emerging trends in IAM and cybersecurity","DevOps","automation","identity-as-code practices"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:15:28.431Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Hyderabad"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Technology","skills":"IAM architecture, directory services, identity security, cloud-integrated platforms, regulatory frameworks, compliance mandates, security controls, technology and business, stakeholder collaboration, complex technical concepts, leadership, continuous improvement, emerging trends in IAM and cybersecurity, DevOps, automation, identity-as-code practices"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f95a801d-05e"},"title":"Backend Software Engineer - Security Compliance Engineering Team","description":"<p>We are looking for an experienced backend software engineer to join our security compliance engineering team. As a security engineer at Spotify, you will protect the security of our platform and users.</p>\n<p>Your primary responsibility will be to design products, services, and infrastructure that support and strengthen our technical security Governance, Risk, and Compliance (GRC) strategy. You will build infrastructure and tooling that apply regulatory requirements and security framework controls across our distributed environment. Additionally, you will help drive scalable and consistent engineering practices that address security, risk, and compliance requirements.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Designing products, services, and infrastructure that support and strengthen our technical security GRC strategy</li>\n<li>Building infrastructure and tooling that apply regulatory requirements and security framework controls across our distributed environment</li>\n<li>Helping drive scalable and consistent engineering practices that address security, risk, and compliance requirements</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>Experience as a software engineer with development experience in an object-oriented programming language such as Java</li>\n<li>Comfortable with data engineering</li>\n<li>Experience writing distributed, high-volume services and deploying and operating them in production</li>\n<li>Deep understanding of system design, data structures, and algorithms</li>\n<li>Hands-on experience implementing security controls and safeguards in software systems, working within cybersecurity and security GRC frameworks</li>\n<li>Excellent written and verbal communication skills, including experience meeting and presenting to senior leaders and non-technical stakeholders</li>\n</ul>\n<p>This role is based in London or Stockholm, with flexibility to work from home. We offer a competitive salary and benefits package.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f95a801d-05e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Spotify","sameAs":"https://www.spotify.com","logo":"https://logos.yubhub.co/spotify.com.png"},"x-apply-url":"https://jobs.lever.co/spotify/b1f7eac7-40bd-47a9-8564-d2d4e4bf1062","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Java","data engineering","distributed systems","security controls","cybersecurity","GRC frameworks"],"x-skills-preferred":[],"datePosted":"2026-03-31T18:23:23.509Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Java, data engineering, distributed systems, security controls, cybersecurity, GRC frameworks"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7732e8ed-b24"},"title":"Cyber Security Engineer","description":"<p><strong>Job Description</strong></p>\n<p>You are a forward-thinking cybersecurity professional with a passion for defending critical infrastructure and sensitive data. As a Cyber Security Engineer at Synopsys, you will be responsible for configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</li>\n<li>Developing, updating, and documenting Standard Operating Procedures (SOPs) for security tools and maintaining accurate network diagrams.</li>\n<li>Creating and deploying host and network countermeasures based on open source intelligence (OSINT), behavioral analysis, and evolving threat landscapes.</li>\n<li>Monitoring, tuning, and implementing security controls in tools such as McAfee ePO and Palo Alto to ensure optimal protection.</li>\n<li>Managing and troubleshooting Security Information and Event Management (SIEM) feeds, ensuring timely detection and response to security events.</li>\n<li>Designing and implementing custom QRadar dashboards to visualize and analyze critical security datasets.</li>\n<li>Leading incident response efforts, ensuring chain of custody is maintained and investigations are thoroughly documented.</li>\n<li>Characterizing and analyzing network and host traffic to identify anomalous activity and mitigate potential threats.</li>\n<li>Developing and deploying custom Data Loss Prevention (DLP) signatures within Microsoft O365, Palo Alto, and McAfee environments.</li>\n</ul>\n<p><strong>Impact</strong></p>\n<ul>\n<li>Strengthening the security posture of Ansys Government Initiatives (AGI) by proactively defending against emerging threats.</li>\n<li>Ensuring compliance with rigorous federal and organizational security standards, supporting government and commercial initiatives.</li>\n<li>Reducing risk of data breaches and operational disruptions through robust countermeasure development and incident response.</li>\n<li>Enhancing operational readiness by keeping security documentation, SOPs, and network diagrams current and actionable.</li>\n<li>Empowering internal teams and stakeholders by providing clear security guidance, training, and technical leadership.</li>\n<li>Contributing to a culture of continuous improvement, innovation, and collaboration within the security team and broader organization.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>Minimum two (2) years performing system administrator duties for Windows and/or Linux environments.</li>\n<li>This position requires a government security clearance. You must be a U.S. citizen for consideration.</li>\n<li>SEC+ or equivalent industry-recognized certification.</li>\n<li>At least two (2) years of experience in an Enterprise Security Operation Center (SOC) or similar response team.</li>\n<li>Minimum two (2) years supporting the Federal Government—either directly or as a contractor—in a security-related field.</li>\n<li>Strong technical understanding of current hardware and software technologies, including security tools and platforms.</li>\n</ul>\n<p><strong>Who You Are</strong></p>\n<ul>\n<li>Analytical thinker with excellent problem-solving and decision-making skills.</li>\n<li>Organized, self-motivated, and able to prioritize competing requests in a dynamic environment.</li>\n<li>Exceptional communicator, able to translate complex technical concepts for diverse audiences and present information to groups.</li>\n<li>Collaborative team player, eager to support and learn from colleagues while driving collective success.</li>\n<li>Customer-focused, with strong relationship management skills and a commitment to user education and support.</li>\n<li>Adaptable and resilient, ready to respond to urgent issues and evolving security challenges.</li>\n</ul>\n<p><strong>The Team You’ll Be A Part Of</strong></p>\n<p>You’ll join the Ansys Government Initiatives (AGI) Cybersecurity team, a specialized group dedicated to protecting sensitive government and commercial assets. The team collaborates closely with internal stakeholders, federal partners, and industry experts to safeguard critical infrastructure and ensure compliance with the highest security standards. Together, you’ll drive innovation, share knowledge, and foster a culture of trust and resilience.</p>\n<p><strong>Rewards and Benefits</strong></p>\n<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7732e8ed-b24","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/exton/cyber-security-engineer-agi-ansys-government-initiatives/44408/92312998208","x-work-arrangement":"onsite","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$101000-$152000","x-skills-required":["host-based firewalls","intrusion prevention systems (IPS)","anti-virus software","SELinux","network firewalls","SIEMs","proxies","Security Information and Event Management (SIEM) feeds","Data Loss Prevention (DLP) signatures","Microsoft O365","Palo Alto","McAfee ePO","QRadar","custom dashboards","incident response","chain of custody","investigations","network and host traffic","anomalous activity","threat mitigation"],"x-skills-preferred":["open source intelligence (OSINT)","behavioral analysis","evolving threat landscapes","security controls","security tools","platforms","technical leadership","user education","relationship management"],"datePosted":"2026-03-08T22:20:01.199Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Exton, Pennsylvania"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, proxies, Security Information and Event Management (SIEM) feeds, Data Loss Prevention (DLP) signatures, Microsoft O365, Palo Alto, McAfee ePO, QRadar, custom dashboards, incident response, chain of custody, investigations, network and host traffic, anomalous activity, threat mitigation, open source intelligence (OSINT), behavioral analysis, evolving threat landscapes, security controls, security tools, platforms, technical leadership, user education, relationship management","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":101000,"maxValue":152000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f243c658-703"},"title":"Senior Cybersecurity Engineer","description":"<p><strong>Why Valvoline Global Operations?</strong></p>\n<p>At Valvoline Global Operations, we&#39;re proud to be The Original Motor Oil, but we&#39;ve never rested on being first. Founded in 1866, we introduced the world&#39;s first branded motor oil, staking our claim as a pioneer in the automotive and industrial solutions industry. Today, as an affiliate of Aramco, one of the world&#39;s largest integrated energy and chemicals companies, we are driven by innovation and committed to creating sustainable solutions for a better future.</p>\n<p>With a global presence, we develop future-ready products and provide best-in-class services for our partners around the world. For us, originality isn&#39;t just about where we began; it&#39;s about where we&#39;re headed and how we&#39;ll lead the way. We are originality in motion.</p>\n<p>Our corporate values—Care, Integrity, Passion, Unity, and Excellence—are at the heart of everything we do. These values define how we operate, how we treat one another, and how we engage with our partners, customers, and the communities we serve. At Valvoline Global, we are united in our commitment to:</p>\n<ul>\n<li>Treating everyone with care.</li>\n<li>Acting with unwavering integrity.</li>\n<li>Striving for excellence in all endeavors.</li>\n<li>Delivering on our commitments with passion.</li>\n<li>Collaborating as one unified team.</li>\n</ul>\n<p><strong>Job Purpose</strong></p>\n<p>The Senior Information Security Engineer leads the design, implementation, and continuous refinement of the organization&#39;s cybersecurity capabilities. This advanced role requires a deep technical expertise in security technologies and a strategic approach to protecting the organization&#39;s information assets. The Senior Engineer is pivotal in conducting complex security assessments, identifying vulnerabilities, and developing robust solutions to enhance the security posture of the organization.</p>\n<p>With a strong focus on technical leadership, this individual collaborates closely with the IT department and cybersecurity team to develop secure systems, networks, and applications. Additionally, the Senior Information Security Engineer works hand-in-hand with the IT Governance, Risk Management, and Compliance (GRC) teams to ensure cybersecurity strategies align with organizational policies and regulatory requirements. This involves a strategic partnership to assess risks, manage cybersecurity compliance across systems, and integrate security best practices into GRC frameworks.</p>\n<p>The Senior Information Security Engineer is also responsible for researching and integrating new security technologies and best practices into the existing infrastructure to address evolving threats. This role involves critical thinking, problem-solving, and a proactive attitude towards cybersecurity challenges.</p>\n<p><strong>How You Make an Impact (Job Accountabilities)</strong></p>\n<ol>\n<li>Work alongside project leads and IT teams to facilitate a smooth integration of new solutions into the organization&#39;s cyber security framework. Provide support during the implementation phase of cyber security tools, ensuring that deployment tasks are completed timely.</li>\n<li>Actively mentor Information Security Engineering team members, sharing insights on best practices and the latest trends in cyber security tool deployment and management. Foster a culture of continuous improvement and innovation within the cyber security team, encouraging the adoption of emerging technologies and methodologies to enhance the organization’s cyber security posture.</li>\n<li>Lead the initial configuration of newly implemented tools, applying in-depth knowledge of security standards and operational procedures to create a robust foundation for tool effectiveness. Collaborate with cyber security and IT teams to adjust settings and configurations based on operational feedback and evolving security threats, enhancing the organization&#39;s cyber security posture.</li>\n<li>Provide strategic oversight for the monitoring and management of cyber security tools and systems, ensuring they operate at peak efficiency and are fully aligned with the organization’s cyber security strategies.</li>\n<li>Act as an escalation point for operational issues in cyber security tools and systems, providing specialized knowledge to resolve more complex problems. Leverage external support resources and serve as the primary point of contact for troubleshooting issues.</li>\n<li>Participate in the assessment of new cyber security tools, focusing on evaluating their potential operational impact and alignment with the organization’s security needs. Aid in the selection process by contributing insights on tool effectiveness and compatibility with existing systems.</li>\n</ol>\n<p><strong>What You Bring to the Role (Job Qualifications / Education / Skills / Requirements / Capabilities)</strong></p>\n<p><strong>Education</strong></p>\n<ul>\n<li>Bachelor&#39;s degree in information systems, engineering, management, or related field, or equivalent work experience.</li>\n</ul>\n<p><strong>Work Experience</strong></p>\n<ul>\n<li>5+ years of experience in information technology or information security</li>\n<li>Industry certifications such as CISSP, CISM, CCSP, GIAC (GSEC, GCED, GCIA, etc.)</li>\n<li>Vendor-specific certifications (Netskope, Palo Alto, Zscaler, Microsoft purview, Code42 etc.)</li>\n</ul>\n<p><strong>Competencies Desired</strong></p>\n<ul>\n<li>Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.</li>\n<li>Technical proficiency with security-related systems and applications.</li>\n<li>Experience in developing, documenting and maintaining security procedures.</li>\n<li>Strong knowledge of TCP/IP and network administration/protocols, zero trust principles.</li>\n<li>Hands-on experience with AWS/Azure/GCP security controls</li>\n<li>Proficient knowledge in scripting (Like Python, PowerShell)</li>\n<li>Experience performing security reviews for new systems</li>\n<li>Strong analytical and problem-solving skills to enable effective security incident and problem resolution.</li>\n<li>Excellent documentation skills.</li>\n<li>Proven ability to work under stress in emergencies, with the flexibility to handle multiple high-pressure situations simultaneously.</li>\n<li>Ability to work well under minimal supervision.</li>\n<li>Strong team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including vendors and IT-business personnel.</li>\n<li>Strong written and verbal communication skills.</li>\n<li>Strong customer/client focus, with the ability to manage expectations appropriately, provide a superior customer/client experience and build long-term relationships.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f243c658-703","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Valvoline Global Operations","sameAs":"https://jobs.valvolineglobal.com","logo":"https://logos.yubhub.co/jobs.valvolineglobal.com.png"},"x-apply-url":"https://jobs.valvolineglobal.com/job/Senior-Cybersecurity-Engineer/1370226000/","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["CISSP","CISM","CCSP","GIAC","Netskope","Palo Alto","Zscaler","Microsoft purview","Code42","TCP/IP","Network administration/protocols","Zero trust principles","AWS/Azure/GCP security controls","Python","PowerShell","Security reviews for new systems","Analytical and problem-solving skills","Documentation skills","Team-oriented interpersonal skills","Written and verbal communication skills","Customer/client focus"],"x-skills-preferred":[],"datePosted":"2026-03-08T22:12:58.875Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Automotive","skills":"CISSP, CISM, CCSP, GIAC, Netskope, Palo Alto, Zscaler, Microsoft purview, Code42, TCP/IP, Network administration/protocols, Zero trust principles, AWS/Azure/GCP security controls, Python, PowerShell, Security reviews for new systems, Analytical and problem-solving skills, Documentation skills, Team-oriented interpersonal skills, Written and verbal communication skills, Customer/client focus"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1c3b4d6a-957"},"title":"Senior Software Security Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Team</strong></p>\n<p>The Security Engineering team protects Anthropic&#39;s AI systems and maintains the trust of our users and society. We define the authentication architecture for our training infrastructure, design the cryptographic foundations that protect model weights and training data, and drive the developer security program that shapes how engineers build and ship software.</p>\n<p>The team works across several areas that collaborate closely: identity and secrets management, developer security and supply chain, infrastructure security, and secure frameworks. You will support one of these areas while contributing across others, with your focus shaped by your strengths and the team&#39;s priorities.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build and maintain identity and secrets management systems, including credential issuance, rotation, and workload authentication across our multi-cloud environments</li>\n<li>Contribute to cluster security controls including RBAC policies, namespace isolation, workload identity, and pod security</li>\n<li>Implement and maintain cloud security controls including IAM, network segmentation, VPC architecture, and encryption across our multi-cloud and on-prem environments</li>\n<li>Design and implement secure development frameworks and libraries that make secure coding the path of least resistance for our engineering teams, including service to service authentication, serialization libraries, and tool proxies.</li>\n<li>Harden CI/CD pipelines against supply chain attacks through isolated build environments, signed attestations, dependency verification, and automated policy enforcement</li>\n<li>Identify and remediate security gaps through code review, threat modeling, and hands-on debugging</li>\n<li>Contribute to continuous cloud security posture management using infrastructure-as-code scanning, misconfiguration detection, and automated remediation</li>\n</ul>\n<p><strong>You may be a good fit if you have:</strong></p>\n<ul>\n<li>At least 5 years of software engineering experience implementing and maintaining security-relevant systems in production</li>\n<li>Bachelor&#39;s degree in Computer Science or equivalent industry experience</li>\n<li>Strong programming skills in Python or at least one systems language such as Go or Rust</li>\n<li>Experience contributing to cloud security controls</li>\n<li>A track record of taking ownership of problems end to end, from identifying the issue to shipping and monitoring the fix</li>\n<li>Clear communication skills and the ability to work collaboratively across engineering teams</li>\n<li>Low ego and high empathy, with a genuine interest in helping teammates succeed</li>\n<li>Passion for AI safety and the role security engineering plays in building trustworthy AI systems</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Contributions to developer security tooling including SAST, dependency scanning, or secure build infrastructure</li>\n<li>Familiarity with Kubernetes security primitives including RBAC, namespaces, network policies, and admission controllers</li>\n<li>Experience with cloud security posture management tooling, infrastructure-as-code security scanning, or automated remediation</li>\n<li>Experience with network security and isolation techniques including east-west controls, traffic inspection, and cloud network policy</li>\n<li>Experience with eBPF for security monitoring and enforcement, or developing kernel security policies</li>\n<li>Experience building secrets management or workload authentication systems, including familiarity with protocols such as OAuth 2.0, OIDC, SAML, or SPIFFE/SPIRE</li>\n<li>Background building or operating security systems in environments that support research workflows and rapid iteration</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</p>\n<p><strong>Your safety matters to us.</strong> To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of unsolicited messages or requests for sensitive information.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1c3b4d6a-957","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4887959008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000 - $405,000 USD","x-skills-required":["Python","Go","Rust","Cloud security controls","Kubernetes security primitives","Infrastructure-as-code scanning","Automated remediation","Code review","Threat modeling","Hands-on debugging"],"x-skills-preferred":["SAST","Dependency scanning","Secure build infrastructure","Network security and isolation techniques","eBPF for security monitoring and enforcement","Kernel security policies","Secrets management or workload authentication systems","OAuth 2.0","OIDC","SAML","SPIFFE/SPIRE"],"datePosted":"2026-03-08T13:47:46.457Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Rust, Cloud security controls, Kubernetes security primitives, Infrastructure-as-code scanning, Automated remediation, Code review, Threat modeling, Hands-on debugging, SAST, Dependency scanning, Secure build infrastructure, Network security and isolation techniques, eBPF for security monitoring and enforcement, Kernel security policies, Secrets management or workload authentication systems, OAuth 2.0, OIDC, SAML, SPIFFE/SPIRE","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}}]}