{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/security-operations"},"x-facet":{"type":"skill","slug":"security-operations","display":"Security Operations","count":37},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_740da2af-174"},"title":"Security Engineer, Detection & Response","description":"<p>We are seeking a Senior Security Engineer with a specialty in Detection and Incident Response to join our Security Engineering team. This role sits at the intersection of security operations and software engineering, requiring you to investigate incidents and build the systems that detect, contain, and prevent them.</p>\n<p>You will design and ship high-precision detections across cloud services and enterprise SaaS, develop automation that shortens response timelines, and mature the telemetry pipelines that make it all possible. Your ability to write production-quality code is just as important as your ability to triage an alert.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Engineer, test, and deploy detection logic across cloud and enterprise environments, treating detections as software with version control, peer review, and measurable performance.</li>\n</ul>\n<ul>\n<li>Build and maintain incident response automation, runbooks, and tooling that reduce containment timelines without sacrificing developer velocity.</li>\n</ul>\n<ul>\n<li>Mature telemetry pipelines through improved schema design, normalization, enrichment, and quality checks that reduce false positives and increase signal fidelity.</li>\n</ul>\n<ul>\n<li>Perform digital incident investigations to identify and contain potential security breaches.</li>\n</ul>\n<ul>\n<li>Conduct digital forensics and malware analysis to understand attack vectors and adversary methodologies.</li>\n</ul>\n<ul>\n<li>Integrate alerting with messaging and ticketing systems to enable fast, traceable response workflows.</li>\n</ul>\n<ul>\n<li>Partner cross-functionally with IT, security, and engineering teams to harden identity and access patterns, close logging and forensics gaps, and implement maintainable guardrails that scale with the organisation.</li>\n</ul>\n<ul>\n<li>Utilize threat intelligence platforms to improve hunting, detection, and response workflows.</li>\n</ul>\n<ul>\n<li>Clearly explain the significance and impact of incidents, providing actionable recommendations to both technical and non-technical stakeholders.</li>\n</ul>\n<p>Ideal Candidate:</p>\n<ul>\n<li>5+ years of experience in Detection Engineering, Incident Response, or Security Operations, with a strong emphasis on building and shipping security tooling and automation.</li>\n</ul>\n<ul>\n<li>Proficiency in at least one programming language (e.g., Python, Go) and comfort writing production-grade code , not just scripts.</li>\n</ul>\n<ul>\n<li>Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments.</li>\n</ul>\n<ul>\n<li>Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically.</li>\n</ul>\n<ul>\n<li>Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs.</li>\n</ul>\n<ul>\n<li>Familiarity with digital forensics tools and malware analysis techniques.</li>\n</ul>\n<ul>\n<li>Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate.</li>\n</ul>\n<ul>\n<li>Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows.</li>\n</ul>\n<ul>\n<li>Strong communication skills, with the ability to translate complex security findings into clear business impact.</li>\n</ul>\n<ul>\n<li>Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus.</li>\n</ul>\n<p>Compensation packages at Scale for eligible roles include base salary, equity, and benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position, determined by work location and additional factors, including job-related skills, experience, interview performance, and relevant education or training. Scale employees in eligible roles are also granted equity based compensation, subject to Board of Director approval. Your recruiter can share more about the specific salary range for your preferred location during the hiring process, and confirm whether the hired role will be eligible for equity grant. You’ll also receive benefits including, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits, a learning and development stipend, and generous PTO. Additionally, this role may be eligible for additional benefits such as a commuter stipend.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_740da2af-174","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Scale","sameAs":"https://scale.com/","logo":"https://logos.yubhub.co/scale.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/scaleai/jobs/4684073005","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$237,600-$297,000 USD","x-skills-required":["Detection Engineering","Incident Response","Security Operations","Cloud Services","Enterprise SaaS","Automation","Telemetry Pipelines","Digital Forensics","Malware Analysis","Threat Intelligence Platforms","SIEM","EDR","SOAR","Cloud-Native Environments","Programming Languages","Python","Go"],"x-skills-preferred":["Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments","Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically","Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs","Familiarity with digital forensics tools and malware analysis techniques","Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate","Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows","Strong communication skills, with the ability to translate complex security findings into clear business impact","Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)"],"datePosted":"2026-04-18T16:00:14.303Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, NY; San Francisco, CA; Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Detection Engineering, Incident Response, Security Operations, Cloud Services, Enterprise SaaS, Automation, Telemetry Pipelines, Digital Forensics, Malware Analysis, Threat Intelligence Platforms, SIEM, EDR, SOAR, Cloud-Native Environments, Programming Languages, Python, Go, Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments, Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically, Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs, Familiarity with digital forensics tools and malware analysis techniques, Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate, Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows, Strong communication skills, with the ability to translate complex security findings into clear business impact, Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":237600,"maxValue":297000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3ba73370-831"},"title":"Internal Audit IT Manager","description":"<p>Ready to be pushed beyond what you think you’re capable of?</p>\n<p>At Coinbase, our mission is to increase economic freedom in the world.</p>\n<p>We’re seeking a very specific candidate who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system.</p>\n<p>As an Internal Audit IT Manager, you will own end-to-end delivery of complex IT and security audits across our cloud infrastructure, security operations, and crypto-native systems.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning end-to-end delivery of IT and security audits, from risk assessment and scoping through planning, fieldwork, testing, reporting, and issue validation,covering cloud infrastructure (AWS, GCP), security operations, identity and access management, data protection, IT asset management, vendor/third-party risk, and key in-scope products and services including blockchain infrastructure, centralized and self-hosted wallets, and cold storage.</li>\n</ul>\n<ul>\n<li>Driving AI-enabled audit execution, designing and implementing data analytics, automation, and Generative AI solutions to modernize how we audit (e.g., continuous monitoring, anomaly detection, automated evidence retrieval, AI-assisted workpaper drafting),while maintaining rigorous human-in-the-loop validation to ensure accuracy and audit-quality conclusions.</li>\n</ul>\n<ul>\n<li>Executing audits aligned with the multi-year IT and security audit roadmap, coordinating coverage with co-sourced partners and cross-functional risk initiatives while ensuring alignment with Coinbase&#39;s enterprise risk profile, technology strategy, and regulatory expectations across regions (US, EMEA, APAC).</li>\n</ul>\n<ul>\n<li>Driving high-quality, risk-based findings and executive-level reporting, distilling key themes, emerging risks, and root causes into clear, concise materials for senior management and the Chief Audit Executive,ensuring findings are appropriately documented and supported by evidence.</li>\n</ul>\n<ul>\n<li>Partnering with technology and security leadership across Engineering, Security, Infrastructure, Product, and Operations to build trusted relationships, challenge control design, and advise on pragmatic, risk-based, scalable remediation while maintaining third-line independence.</li>\n</ul>\n<ul>\n<li>Driving disciplined issue management, ensuring timely, risk-based remediation by management, high-quality root cause analysis, and validation of remediation activities,escalating delays or thematic concerns to senior leadership as needed.</li>\n</ul>\n<ul>\n<li>Evaluating and developing talent, assessing candidates and helping build a high-performing, technically credible audit team.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>7+ years of experience in IT/security internal audit, technology risk, or first-line security/engineering roles with significant controls exposure.</li>\n</ul>\n<ul>\n<li>Experience working in a fast-paced, cloud-native, or engineering-driven environment where technology and security practices evolve rapidly.</li>\n</ul>\n<ul>\n<li>Hands-on audit experience with cloud platforms (AWS, GCP), including IAM policies, security configurations, logging/monitoring, and CI/CD pipelines.</li>\n</ul>\n<ul>\n<li>AI-forward mindset with demonstrated experience applying Python, SQL, or AI tools to audit or security work, building workflows rather than just prompting.</li>\n</ul>\n<ul>\n<li>Relevant professional certifications (e.g., CISA, CISSP, CIA, CISM) required; CPA or CFE a plus.</li>\n</ul>\n<ul>\n<li>Working knowledge of key frameworks such as NIST CSF, COBIT, SOC 2, and ITIL.</li>\n</ul>\n<ul>\n<li>High EQ and collaborative style.</li>\n</ul>\n<ul>\n<li>Proven ability to translate complex technical findings into clear, executive-ready narratives for both technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Ability to manage multiple audits and initiatives across time zones (EMEA, APAC) with minimal oversight.</li>\n</ul>\n<ul>\n<li>Demonstrated leadership and team-development experience, including mentoring, coaching, and managing direct reports.</li>\n</ul>\n<ul>\n<li>Demonstrates the ability to responsibly use generative AI tools and copilots (e.g., LibreChat, Gemini, Glean) in daily workflows, continuously learn as tools evolve, and apply human-in-the-loop practices to deliver business-ready outputs and drive measurable improvements in efficiency, cost, and quality.</li>\n</ul>\n<p>Nice to have:</p>\n<ul>\n<li>Experience auditing or building blockchain infrastructure, crypto custody, or wallet systems (hot/cold storage).</li>\n</ul>\n<ul>\n<li>Background in a high-growth or rapidly scaling environment with complex, evolving technology stacks.</li>\n</ul>\n<ul>\n<li>Experience with GRC platforms (Workiva, Archer, AuditBoard) or building custom audit automation tooling.</li>\n</ul>\n<ul>\n<li>Familiarity with DORA, MiCA, or crypto-specific regulatory frameworks.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3ba73370-831","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Coinbase","sameAs":"https://www.coinbase.com/","logo":"https://logos.yubhub.co/coinbase.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coinbase/jobs/7755116","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$166,345-$195,700 USD","x-skills-required":["IT security","Cloud infrastructure","Security operations","Identity and access management","Data protection","IT asset management","Vendor/third-party risk","Blockchain infrastructure","Centralized and self-hosted wallets","Cold storage","AI-enabled audit execution","Data analytics","Automation","Generative AI","Continuous monitoring","Anomaly detection","Automated evidence retrieval","AI-assisted workpaper drafting","Cloud platforms","IAM policies","Security configurations","Logging/monitoring","CI/CD pipelines","Python","SQL","AI tools","NIST CSF","COBIT","SOC 2","ITIL","CISA","CISSP","CIA","CISM","CPA","CFE"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:58:31.708Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - USA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Finance","skills":"IT security, Cloud infrastructure, Security operations, Identity and access management, Data protection, IT asset management, Vendor/third-party risk, Blockchain infrastructure, Centralized and self-hosted wallets, Cold storage, AI-enabled audit execution, Data analytics, Automation, Generative AI, Continuous monitoring, Anomaly detection, Automated evidence retrieval, AI-assisted workpaper drafting, Cloud platforms, IAM policies, Security configurations, Logging/monitoring, CI/CD pipelines, Python, SQL, AI tools, NIST CSF, COBIT, SOC 2, ITIL, CISA, CISSP, CIA, CISM, CPA, CFE","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":166345,"maxValue":195700,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_53024247-9d6"},"title":"Senior Solutions Architect - Lakewatch","description":"<p>We are seeking a Senior Solutions Architect to join our Lakewatch team in London. As a Senior Solutions Architect, you will provide technical leadership to guide strategic customers to successful implementations on big data projects, ranging from architectural design to data engineering to model deployment.</p>\n<p>Collaborate with GTM leadership and account teams to design and execute high-impact engagement strategies across your territory, driving Lakewatch adoption from initial data offload through full SIEM augmentation or replacement.</p>\n<p>As a trusted advisor, serve as an expert Solutions Architect building technical credibility with CISOs, security architects, SOC leadership, and security analysts to drive product adoption and vision.</p>\n<p>Enable clients at scale through workshops, POC execution, and developing customer-facing collateral that increases technical knowledge and demonstrates the value of an open agentic SIEM architecture.</p>\n<p>Influence product roadmap by translating field-derived, data-driven insights into strategic recommendations for Product and Engineering teams.</p>\n<p>Handle the most complex technical challenges in this product line by acting as the tier-3 escalation point for the field, ensuring customer success in mission-critical security environments.</p>\n<p>Establish and refine the sales qualification and POC intake process, ensuring well-scoped engagements that maximize customer success and minimize friction for R&amp;D.</p>\n<p>The ideal candidate will have 5+ years of experience in a customer-facing, pre-sales or consulting role influencing technical executives, driving high-level security strategy and product adoption.</p>\n<p>Experience with design and implementation of data and AI applications in cybersecurity, including anomaly detection, behavioral analytics, and agentic AI workflows for triage and investigation.</p>\n<p>Proficient in programming, debugging, and problem-solving using SQL and Python and with AI tools.</p>\n<p>Experience collaborating with Global System Integrators (GSIs) and third-party consulting organizations to drive customer outcomes in cybersecurity.</p>\n<p>Hands-on experience building solutions within major public cloud environments (AWS, Azure, or GCP), with an understanding of cloud-native security logging and monitoring.</p>\n<p>Deep experience in security operations, with broad familiarity across one or more of the following: data engineering, data warehousing, AI/ML for security, data governance, and streaming.</p>\n<p>Undergraduate degree (or higher) in a technical field such as Computer Science, Cybersecurity, Applied Mathematics, Engineering or similar.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_53024247-9d6","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Databricks","sameAs":"https://databricks.com","logo":"https://logos.yubhub.co/databricks.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/databricks/jobs/8493140002","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity engineering","security operations","security architecture","design and implementation of data and AI applications","anomaly detection","behavioral analytics","agentic AI workflows","SQL","Python","AI tools","cloud-native security logging and monitoring","data engineering","data warehousing","AI/ML for security","data governance","streaming"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:56:50.383Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, United Kingdom"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity engineering, security operations, security architecture, design and implementation of data and AI applications, anomaly detection, behavioral analytics, agentic AI workflows, SQL, Python, AI tools, cloud-native security logging and monitoring, data engineering, data warehousing, AI/ML for security, data governance, streaming"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_cef90895-c6d"},"title":"Technical Program Manager, Security (Coordinated Vulnerability Disclosure)","description":"<p>As a Technical Program Manager for Security, Coordinated Vulnerability Disclosure (CVD), you will build and lead the programs that govern how Anthropic responsibly discloses software vulnerabilities discovered by our AI-powered tools.</p>\n<p>These tools have already found real zero-days in Firefox, the Linux kernel, and other critical software. The challenge is no longer just finding vulnerabilities; it is managing the consequences of finding them at unprecedented scale and speed.</p>\n<p>Traditional coordinated disclosure frameworks were designed for a world where a researcher might find one serious vulnerability every few weeks. AI-powered discovery has changed that equation entirely; Claude can surface hundreds of findings in a single codebase in a single day.</p>\n<p>This role exists to ensure that every finding reaches the right maintainer, at the right pace, with the right context, and that Anthropic meets its Responsible Scaling Policy (RSP) commitments in the process.</p>\n<p>You will own the end-to-end CVD lifecycle: from internal triage and human validation of AI-generated findings, through tiered disclosure timelines, to external coordination with vendors, open-source maintainers, and organizations.</p>\n<p>This role requires deep collaboration across Security Engineering, Legal, Communications, Product, and Frontier Red Team to ensure Anthropic operates as a responsible steward of the vulnerabilities its tools discover.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Own end-to-end CVD program strategy and execution: Define and drive the roadmap for coordinated vulnerability disclosure, from AI-generated finding through maintainer notification, remediation tracking, and public disclosure.</li>\n</ul>\n<ul>\n<li>Lead internal triage and quality assurance: Establish and manage the human review process that validates all AI-generated findings before external disclosure.</li>\n</ul>\n<ul>\n<li>Design and operate tiered disclosure timelines: Implement severity-based disclosure windows with appropriate extension policies.</li>\n</ul>\n<ul>\n<li>Build and manage pacing and submission models: Develop rate-limiting frameworks that govern how many findings are submitted to each project, scaled to maintainer capacity and project size.</li>\n</ul>\n<ul>\n<li>Lead external coordination and partner engagement: Manage relationships with open-source maintainers and closed-source vendors.</li>\n</ul>\n<ul>\n<li>Establish program metrics and reporting: Define and track the metrics that determine program health, including fix rates, false-positive rates, median time-to-patch, and qualitative maintainer feedback.</li>\n</ul>\n<ul>\n<li>Drive response category classification: Manage the process for classifying findings into response categories (latent vulnerability, active exploitation, ecosystem-level pattern) and ensure the appropriate response protocol is triggered for each category.</li>\n</ul>\n<ul>\n<li>Lead cross-functional coordination: Manage stakeholder relationships across Security Engineering, Legal, Communications, Product, and Frontier Red Team to drive alignment and execution on disclosure initiatives.</li>\n</ul>\n<ul>\n<li>Collaborate with senior leadership and executives: Communicate program vision, risks, and progress with executive presence.</li>\n</ul>\n<p>You May Be a Good Fit If You Have:</p>\n<ul>\n<li>10+ years of experience in cybersecurity, vulnerability management, or security operations, with at least 4+ years leading vulnerability disclosure, vulnerability management, or coordinated response programs.</li>\n</ul>\n<ul>\n<li>Deep understanding of coordinated vulnerability disclosure processes, including experience working with CERT/CC, MITRE CVE, or similar coordination bodies.</li>\n</ul>\n<ul>\n<li>Technical familiarity with vulnerability discovery tooling, static analysis, fuzzing infrastructure (e.g., OSS-Fuzz, CodeQL), and the triage workflows that turn raw findings into actionable reports.</li>\n</ul>\n<ul>\n<li>Experience engaging directly with open-source maintainers and understanding the dynamics of open-source project governance, contributor capacity, and maintainer burnout.</li>\n</ul>\n<ul>\n<li>Proven experience as a Technical Program Manager or similar role in a cybersecurity or technology-focused environment, with a track record of leading complex, cross-organizational programs to successful completion.</li>\n</ul>\n<ul>\n<li>Executive communication skills with demonstrated ability to influence decisions at the senior leadership and C-suite level.</li>\n</ul>\n<p>Ability to manage highly ambiguous problems and navigate challenges to achieve program objectives in a fast-paced, evolving environment.</p>\n<p>Strong collaboration skills with proven ability to partner across diverse technical and non-technical stakeholders including Security Engineering, Legal, Communications, and Product teams.</p>\n<p>Strong Candidates May Also Have:</p>\n<ul>\n<li>Experience building vulnerability disclosure or coordinated response programs from the ground up in high-growth technology companies.</li>\n</ul>\n<ul>\n<li>Background as a CVE Numbering Authority (CNA) operator, or experience managing the operational requirements of CVE issuance, embargo coordination, and formal vulnerability tracking.</li>\n</ul>\n<ul>\n<li>Familiarity with AI/ML-powered security tooling and the unique challenges of managing AI-generated vulnerability reports at scale, including false-positive filtering and quality assurance.</li>\n</ul>\n<ul>\n<li>Experience with vulnerability management platforms and tracking systems (e.g., HackerOne, Bugcrowd, or custom internal tooling).</li>\n</ul>\n<ul>\n<li>Prior work in security research, penetration testing, or red teaming that provides firsthand understanding of the vulnerability lifecycle from discovery through remediation.</li>\n</ul>\n<ul>\n<li>Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP) and their intersection with vulnerability disclosure requirements.</li>\n</ul>\n<p>Experience managing multi-stakeholder disclosure scenarios involving ecosystem-level vulnerabilities that affect multiple projects simultaneously.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_cef90895-c6d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5123769008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$290,000-$405,000 USD","x-skills-required":["cybersecurity","vulnerability management","security operations","coordinated vulnerability disclosure","AI-powered tooling","static analysis","fuzzing infrastructure","open-source maintainers","compliance frameworks","vulnerability management platforms","tracking systems"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:56:16.224Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, vulnerability management, security operations, coordinated vulnerability disclosure, AI-powered tooling, static analysis, fuzzing infrastructure, open-source maintainers, compliance frameworks, vulnerability management platforms, tracking systems","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":290000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3f48b4f4-789"},"title":"Manager, Detection & Incident Response","description":"<p>We&#39;re seeking a skilled and detail-oriented technical leader to own the day-to-day operations of our Detection and Incident Response team. You&#39;ll be responsible for driving our SIEM and SOAR capabilities and incident response program, partnering with teams throughout Squarespace to improve how we spot and respond to threats.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Contributing to define, collect, and analyze security KPIs and KRIs for the security organization.</li>\n<li>Developing and implementing a comprehensive detection and response strategy and roadmap aligned with Squarespace&#39;s overall business objectives and risk appetite.</li>\n<li>Overseeing the Security Operations Center (SOC) activities, including threat detection, monitoring, analysis, and proactive hunting.</li>\n<li>Owning the health and effectiveness of the SIEM and SOAR platforms, ensuring high-quality data ingestion, alert tuning, and automated response logic.</li>\n<li>Establishing and maintaining a robust incident response program, including defining incident playbooks, leading major incident investigations, and conducting post-incident reviews to drive continuous improvement.</li>\n<li>Designing and leading regular tabletop exercises to test the organization&#39;s readiness for various incident scenarios.</li>\n<li>Serving as the Incident Commander for major security events, coordinating with teams such as Legal, Communications, and HR to ensure clear internal communication and regulatory compliance.</li>\n<li>Identifying, evaluating, and implementing new security technologies and tools to enhance detection, prevention, and response capabilities.</li>\n<li>Driving continuous improvement of security operations processes through automation, tooling, and best practices.</li>\n<li>Staying abreast of emerging security threats, vulnerabilities, and industry trends and proactively advising leadership on necessary adjustments to strengthen Squarespace&#39;s security posture.</li>\n<li>Building, mentoring, and leading a high-performing team of security professionals, fostering a culture of continuous learning, collaboration, and accountability.</li>\n<li>Acting as a key liaison and trusted advisor to internal stakeholders on security-related matters.</li>\n<li>Managing relationships with external security vendors and partners, ensuring effective service delivery and technology adoption.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>A bachelor&#39;s degree in Computer Science, Information Security, or a related field (or equivalent experience).</li>\n<li>7+ years of experience in cybersecurity, with at least 2 years in a leadership or team-lead role.</li>\n<li>Deep expertise in Incident Response and Detection Engineering.</li>\n<li>Strong knowledge of cloud security operations, specifically within AWS or GCP environments.</li>\n<li>Hands-on experience managing and tuning SIEM and SOAR platforms.</li>\n<li>Experience automating security workflows and incident response playbooks to reduce manual effort.</li>\n<li>Familiarity with security frameworks such as MITRE ATT&amp;CK and NIST.</li>\n<li>Excellent communication skills with the ability to lead technical teams during high-pressure incidents and explain complex threats to non-technical stakeholders.</li>\n<li>Knowledge of software development, design, and technical operations.</li>\n</ul>\n<p>Benefits include:</p>\n<ul>\n<li>Health insurance with 100% covered premiums for you, your spouse or partner, and your dependent children.</li>\n<li>Life and income protection.</li>\n<li>Fertility and adoption benefits.</li>\n<li>Headspace mindfulness app subscription.</li>\n<li>Global Employee Assistance Program.</li>\n<li>Pension benefits with employer match.</li>\n<li>Flexible paid time off.</li>\n<li>26 weeks paid maternity leave and 12 weeks paid paternity leave.</li>\n<li>2 weeks paid family care leave.</li>\n<li>Education reimbursement.</li>\n<li>Employee donation match to community organizations.</li>\n<li>7 Global Employee Resource Groups (ERGs).</li>\n<li>Free lunch and snacks.</li>\n<li>Close proximity to cultural landmarks such as Dublin Castle and St. Patrick&#39;s Cathedral.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3f48b4f4-789","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Squarespace","sameAs":"https://www.squarespace.com/about/careers","logo":"https://logos.yubhub.co/squarespace.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/squarespace/jobs/7773251","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["SIEM","SOAR","Incident Response","Cloud Security Operations","AWS","GCP","Security Frameworks","MITRE ATT&CK","NIST","Software Development","Design","Technical Operations"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:55:55.055Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Dublin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SIEM, SOAR, Incident Response, Cloud Security Operations, AWS, GCP, Security Frameworks, MITRE ATT&CK, NIST, Software Development, Design, Technical Operations"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f2970275-8b3"},"title":"Incident Manager - Detection & Response","description":"<p><strong>About the Role</strong></p>\n<p>The Detection &amp; Response (D&amp;R) team plays a critical role in protecting our systems, users, and data from security threats. We’re looking for an experienced Technical Program Manager to own and evolve incident management within D&amp;R.</p>\n<p>You’ll be the driving force behind maturing and scaling our incident response lifecycle,from detection and triage through containment, remediation, and post-incident review. Critically, some of the highest-impact work in this role happens after the immediate response: gathering data on incident trends, reporting on patterns and root causes, and working cross-functionally across engineering, security, infrastructure, and product teams to ensure that broad fixes and systemic improvements are actually implemented.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Own the end-to-end D&amp;R incident management program: detection workflows, response processes, escalation paths, communication standards, and remediation tracking.</li>\n</ul>\n<ul>\n<li>Serve as incident commander for security incidents, driving clear coordination across executive, engineering, security, legal, and other appropriate stakeholders.</li>\n</ul>\n<ul>\n<li>Establish and run incident commander rotations within D&amp;R, ensuring clear ownership and effective coordination during incidents of varying severity.</li>\n</ul>\n<ul>\n<li>Drive post-incident accountability by defining how action items are captured, assigned, tracked, and completed across teams,ensuring follow-through on both tactical fixes and strategic improvements.</li>\n</ul>\n<ul>\n<li>Gather, analyse, and report on incident trends and patterns to surface systemic risks, recurring root causes, and areas where the organisation is most vulnerable.</li>\n</ul>\n<ul>\n<li>Translate trend analysis into actionable cross-functional initiatives: partner with engineering, infrastructure, security, and product teams to prioritise and implement broad fixes and preventive improvements that address root causes rather than symptoms.</li>\n</ul>\n<ul>\n<li>Lead incident review forums (post-mortems, retrospectives) and ensure learnings are captured, socialised, and acted upon across the organisation.</li>\n</ul>\n<ul>\n<li>Develop and maintain D&amp;R incident response documentation, playbooks, runbooks, and training materials; keep them current as the threat landscape and our systems evolve.</li>\n</ul>\n<ul>\n<li>Partner with detection engineering to improve alert fidelity, reduce noise, and shorten time-to-detection for security events.</li>\n</ul>\n<ul>\n<li>Define, develop, and track incident management KPIs and report regularly to D&amp;R and Security leadership.</li>\n</ul>\n<ul>\n<li>Support broad cross-functional training and initiatives to uplevel security awareness across the company (e.g. Tabletop exercises, training, talks).</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have 7+ years of experience in technical program management, incident management, or security operations, with significant time spent in a detection &amp; response or security incident response context.</li>\n</ul>\n<ul>\n<li>Have led or built incident response programs at a technology company, ideally in a high-growth or security-intensive environment.</li>\n</ul>\n<ul>\n<li>Have a demonstrated track record of turning incident data into organisational improvements,not just writing post-mortems, but driving the cross-functional work to implement systemic fixes.</li>\n</ul>\n<ul>\n<li>Are comfortable participating in on-call responsibilities and leading incident response during high-severity security events, including off-hours.</li>\n</ul>\n<ul>\n<li>Have experience building and scaling operational processes from the ground up in environments where structure didn’t previously exist.</li>\n</ul>\n<ul>\n<li>Excel at driving accountability and follow-through across multiple teams without direct authority,you know how to influence, track, and close the loop.</li>\n</ul>\n<ul>\n<li>Have strong analytical skills and experience with incident trend analysis, metrics reporting, and data-driven prioritisation.</li>\n</ul>\n<ul>\n<li>Are highly organised with a knack for bringing structure to ambiguous, fast-moving situations.</li>\n</ul>\n<ul>\n<li>Have excellent communication skills, especially under pressure and when coordinating across technical and non-technical stakeholders, including executive leadership.</li>\n</ul>\n<ul>\n<li>Thrive in fast-paced environments where priorities shift and you’re often working with incomplete information.</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</p>\n<p>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</p>\n<p>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</p>\n<p>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p>Visa sponsorship: We do sponsor visas! However, we aren’t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>How we’re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We’re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f2970275-8b3","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5176570008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Technical Program Management","Incident Management","Security Operations","Detection & Response","Security Incident Response","Cross-functional collaboration","Data analysis","Metrics reporting","Communication","Leadership"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:54:24.369Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich, CH"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Technical Program Management, Incident Management, Security Operations, Detection & Response, Security Incident Response, Cross-functional collaboration, Data analysis, Metrics reporting, Communication, Leadership"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7ad63033-e7e"},"title":"Senior Security Engineer I, Vulnerability Management","description":"<p>We are seeking a Senior Security Engineer I to join our Vulnerability Management team. This is an execution-focused role where you will perform hands-on triage, drive remediation follow-through, and improve day-to-day operational quality across cloud and specialized infrastructure environments.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Performing hands-on vulnerability triage and risk assessment using team-defined standards and playbooks</li>\n<li>Tracking remediation progress with owner teams, escalating blockers, and ensuring clean issue closure</li>\n<li>Supporting automated triage workflows by validating outputs and improving signal quality</li>\n<li>Contributing to automated remediation campaigns (e.g., EOL cleanup, vulnerable software upgrades, and fix verification)</li>\n<li>Supporting zero-day and embargo response by helping inventory affected assets and tracking owner-team deployment status</li>\n<li>Participating in incident investigations by gathering technical evidence and supporting impact analysis</li>\n<li>Participating in on-call rotation for critical vulnerability events</li>\n<li>Maintaining high-quality documentation, runbooks, and operational updates</li>\n</ul>\n<p>The ideal candidate will have 3+ years of relevant experience in vulnerability management, security operations, application security, or related security engineering. Key skills include a strong understanding of vulnerability assessment fundamentals, hands-on experience with vulnerability management platforms, proficiency in scripting/automation for workflow support, and familiarity with cloud security concepts.</p>\n<p>In addition to a competitive salary, we offer a variety of benefits to support your needs, including medical, dental, and vision insurance, 100% paid for by CoreWeave, company-paid life insurance, and flexible PTO.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7ad63033-e7e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4654263006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$139,000 to $204,000","x-skills-required":["vulnerability management","security operations","application security","vulnerability assessment fundamentals","vulnerability management platforms","scripting/automation for workflow support","cloud security concepts"],"x-skills-preferred":["security automation/SOAR platforms","container/Kubernetes vulnerability workflows","hardware-adjacent vulnerability domains","compliance evidence collection"],"datePosted":"2026-04-18T15:53:49.171Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"vulnerability management, security operations, application security, vulnerability assessment fundamentals, vulnerability management platforms, scripting/automation for workflow support, cloud security concepts, security automation/SOAR platforms, container/Kubernetes vulnerability workflows, hardware-adjacent vulnerability domains, compliance evidence collection","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":139000,"maxValue":204000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c2aaf7ac-804"},"title":"Security Engineer - Threat Detection","description":"<p><strong>Job Description</strong></p>\n<p>You will design, build, and maintain detections that identify malicious activity across Stripe&#39;s infrastructure, applications, and cloud environments.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle</li>\n<li>Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry</li>\n<li>Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls</li>\n<li>Perform malware analysis and reverse engineering to extract indicators and inform detection strategies</li>\n<li>Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS</li>\n<li>Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic</li>\n<li>Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises</li>\n<li>Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment</li>\n<li>Map detection coverage to MITRE ATT&amp;CK, identifying and prioritizing gaps across key attack surfaces</li>\n<li>Lead projects, mentor teammates, and champion quality standards within the team</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>5+ years of experience in detection engineering, threat hunting, or security operations</li>\n<li>Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)</li>\n<li>Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration</li>\n<li>Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities</li>\n<li>Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)</li>\n<li>Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources</li>\n<li>Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)</li>\n<li>Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences</li>\n<li>Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats</li>\n</ul>\n<p><strong>Preferred Qualifications</strong></p>\n<ul>\n<li>Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments</li>\n<li>Background in malware analysis, reverse engineering, or threat research</li>\n<li>Experience with purple team operations , collaborating with offensive security to validate detections</li>\n<li>Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis</li>\n<li>Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows</li>\n<li>Interest in agentic automation , using LLMs to augment hunting, tuning, or triage</li>\n<li>Experience with detection validation tools (Atomic Red Team, ATT&amp;CK Evaluations)</li>\n<li>Contributions to open-source detection content, research, or conference presentations</li>\n<li>Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c2aaf7ac-804","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Stripe","sameAs":"https://stripe.com/","logo":"https://logos.yubhub.co/stripe.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/stripe/jobs/7827230","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["detection engineering","threat hunting","security operations","SIEM platforms","adversary tradecraft","network-based detections","endpoint-based detections","telemetry analysis","detection/query languages","programming","communication skills"],"x-skills-preferred":["fintech","financial services","malware analysis","reverse engineering","purple team operations","big data platforms","AI/LLM-assisted development tools","agentic automation","detection validation tools","open-source detection content","relevant certifications"],"datePosted":"2026-04-18T15:53:27.161Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Ireland"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"detection engineering, threat hunting, security operations, SIEM platforms, adversary tradecraft, network-based detections, endpoint-based detections, telemetry analysis, detection/query languages, programming, communication skills, fintech, financial services, malware analysis, reverse engineering, purple team operations, big data platforms, AI/LLM-assisted development tools, agentic automation, detection validation tools, open-source detection content, relevant certifications"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_86fc5e64-9f1"},"title":"Incident Manager - Detection & Response","description":"<p>We&#39;re looking for an experienced Technical Program Manager to own and evolve incident management within the Detection &amp; Response (D&amp;R) team. The role involves maturing and scaling our incident response lifecycle, from detection and triage through containment, remediation, and post-incident review. You&#39;ll be responsible for driving clear coordination across executive, engineering, security, legal, and other appropriate stakeholders. Your goal will be to ensure that we get meaningfully better after each incident.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Own the end-to-end D&amp;R incident management program: detection workflows, response processes, escalation paths, communication standards, and remediation tracking.</li>\n<li>Serve as incident commander for security incidents, driving clear coordination across executive, engineering, security, legal, and other appropriate stakeholders.</li>\n<li>Establish and run incident commander rotations within D&amp;R, ensuring clear ownership and effective coordination during incidents of varying severity.</li>\n<li>Drive post-incident accountability by defining how action items are captured, assigned, tracked, and completed across teams,ensuring follow-through on both tactical fixes and strategic improvements.</li>\n<li>Gather, analyse, and report on incident trends and patterns to surface systemic risks, recurring root causes, and areas where the organisation is most vulnerable.</li>\n<li>Translate trend analysis into actionable cross-functional initiatives: partner with engineering, infrastructure, security, and product teams to prioritise and implement broad fixes and preventive improvements that address root causes rather than symptoms.</li>\n<li>Lead incident review forums (post-mortems, retrospectives) and ensure learnings are captured, socialised, and acted upon across the organisation.</li>\n<li>Develop and maintain D&amp;R incident response documentation, playbooks, runbooks, and training materials; keep them current as the threat landscape and our systems evolve.</li>\n<li>Partner with detection engineering to improve alert fidelity, reduce noise, and shorten time-to-detection for security events.</li>\n<li>Define, develop, and track incident management KPIs and report regularly to D&amp;R and Security leadership.</li>\n<li>Support broad cross-functional training and initiatives to uplevel security awareness across the company (e.g. Tabletop exercises, training, talks).</li>\n</ul>\n<p>You may be a good fit if you:</p>\n<ul>\n<li>Have 7+ years of experience in technical program management, incident management, or security operations, with significant time spent in a detection &amp; response or security incident response context.</li>\n<li>Have led or built incident response programs at a technology company, ideally in a high-growth or security-intensive environment.</li>\n<li>Have a demonstrated track record of turning incident data into organisational improvements,not just writing post-mortems, but driving the cross-functional work to implement systemic fixes.</li>\n<li>Are comfortable participating in on-call responsibilities and leading incident response during high-severity security events, including off-hours.</li>\n<li>Have experience building and scaling operational processes from the ground up in environments where structure didn’t previously exist.</li>\n<li>Excel at driving accountability and follow-through across multiple teams without direct authority,you know how to influence, track, and close the loop.</li>\n<li>Have strong analytical skills and experience with incident trend analysis, metrics reporting, and data-driven prioritisation.</li>\n<li>Are highly organised with a knack for bringing structure to ambiguous, fast-moving situations.</li>\n<li>Have excellent communication skills, especially under pressure and when coordinating across technical and non-technical stakeholders, including executive leadership.</li>\n<li>Thrive in fast-paced environments where priorities shift and you’re often working with incomplete information.</li>\n</ul>\n<p>The annual compensation range for this role is $320,000-$405,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_86fc5e64-9f1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5176481008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000-$405,000 USD","x-skills-required":["Technical Program Management","Incident Management","Security Operations","Detection & Response","Cross-functional Team Leadership","Communication","Analytical Skills","Data-driven Prioritisation","Incident Trend Analysis","Metrics Reporting"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:53:23.634Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Technical Program Management, Incident Management, Security Operations, Detection & Response, Cross-functional Team Leadership, Communication, Analytical Skills, Data-driven Prioritisation, Incident Trend Analysis, Metrics Reporting","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_6c1cd36d-464"},"title":"Senior Security Operations Engineer, Detection & Response","description":"<p>About Us</p>\n<p>dbt Labs is the pioneer of analytics engineering, helping data teams transform raw data into reliable, actionable insights. As of February 2025, we’ve grown from an open source project into the leading analytics engineering platform, now used by over 90,000 teams every week, driving data transformations and AI use cases.</p>\n<p>We’re backed by top-tier investors including Andreessen Horowitz, Sequoia Capital, and Altimeter. At our core, we believe in empowering data practitioners:</p>\n<ul>\n<li>Reliable, high-quality data is the fuel that propels AI-powered data engineering.</li>\n<li>AI is changing data work, fast. dbt’s data control plane keeps data engineers ahead of that curve.</li>\n<li>We empower engineers to deliver reliable, governed data faster, cheaper, and at scale.</li>\n</ul>\n<p>About the Security Team</p>\n<p>The mission of the Security Engineering team at dbt Labs is to provide clear, opinionated security guidance and scalable, secure-by-default offerings to engineers for the purpose of securing software development and enabling pragmatic risk decisions at dbt.</p>\n<p><strong>Responsibilities</strong></p>\n<p>As a Senior Security Operations Engineer on the Detection &amp; Response team, you will strengthen and maintain the company&#39;s security posture throughout the threat detection lifecycle from telemetry collection and continuous monitoring through threat detection, incident response, and security event management. You will serve as a subject matter expert for security operations across the dbt Labs&#39; teams and technology infrastructure, including multi-cloud production environments, identity, endpoints, and SaaS technologies.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Participate in a 24/7 on-call rotation providing coverage for active security incidents, investigations, and security events across our global infrastructure.</li>\n<li>Lead investigation and remediation of security incidents, coordinating cross-functional response efforts to minimize impact and recovery time.</li>\n<li>Play a major role in bootstrapping an end to end D&amp;R alert and investigation pipeline.</li>\n<li>Triage and investigate security alerts from detection tools including Wiz Defend, Crowdstrike, and cloud security platforms to identify genuine threats and reduce false positives.</li>\n<li>Develop and maintain detection rules, runbooks, and response procedures mapped to the company&#39;s threat model.</li>\n<li>Automate alert triage workflows and improve mean time to detection and response through tooling and process enhancements, including leveraging AI enrichment and processing.</li>\n<li>Collaborate with Infrastructure and Application Security teams to implement secure-by-design principles and remediate identified security issues.</li>\n<li>Conduct security event analysis to identify policy violations, misconfigurations, and potential attack vectors before they become incidents.</li>\n<li>Partner with our Enterprise Security &amp; Technology team to enhance endpoint security controls and monitoring across endpoints (MacOS laptops &amp; some Windows and Linux-based development environments).</li>\n<li>Design and facilitate tabletop exercises and game days to test detection, response, recovery, and remediation capabilities.</li>\n<li>Contribute to the maturation of the security incident response program through documentation, training, and process improvements.</li>\n<li>Mentor junior security engineers and cross-functional team members on incident handling best practices.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>Demonstrated ability to excel in high-pressure situations; we need someone who can make sound decisions during active security incidents and can calmly serve as incident commander with confidence.</li>\n</ul>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li>Have 8+ years of professional experience in security-related domains, including at least 4 years in security operations, incident response, threat hunting, or threat detection roles.</li>\n<li>Have demonstrable experience leading security incident investigations and coordinating cross-team response efforts.</li>\n</ul>\n<p><strong>What We Offer</strong></p>\n<ul>\n<li>Competitive compensation packages commensurate with experience, including salary, equity, and where applicable, performance-based pay.</li>\n<li>Opportunity to work with a leading analytics engineering platform and contribute to the growth and success of the company.</li>\n<li>Collaborative and dynamic work environment with a team of experienced professionals.</li>\n<li>Opportunities for professional growth and development.</li>\n</ul>\n<p><strong>How to Apply</strong></p>\n<p>If you are a motivated and experienced security professional looking for a new challenge, please submit your resume and cover letter to [insert contact information]. We look forward to hearing from you!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_6c1cd36d-464","directApply":true,"hiringOrganization":{"@type":"Organization","name":"dbt Labs","sameAs":"https://www.getdbt.com/","logo":"https://logos.yubhub.co/getdbt.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/dbtlabsinc/jobs/4674498005","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Security Operations","Incident Response","Threat Hunting","Threat Detection","Cloud Security","Endpoint Security","Security Event Analysis","Security Incident Response","Tabletop Exercises","Game Days","Documentation","Training","Process Improvements","Mentoring","Security Engineering","Data Control Plane","Analytics Engineering","AI-Powered Data Engineering","Reliable High-Quality Data","Secure-By-Default Offerings","Pragmatic Risk Decisions","Multi-Cloud Production Environments","Identity","Endpoints","SaaS Technologies","Wiz Defend","Crowdstrike","Cloud Security Platforms","Detection Rules","Runbooks","Response Procedures","Mean Time to Detection","Mean Time to Response","AI Enrichment","AI Processing","Secure-By-Design Principles","Infrastructure Security","Application Security","Endpoint Security Controls","Monitoring"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:52:43.496Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"US - Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security Operations, Incident Response, Threat Hunting, Threat Detection, Cloud Security, Endpoint Security, Security Event Analysis, Security Incident Response, Tabletop Exercises, Game Days, Documentation, Training, Process Improvements, Mentoring, Security Engineering, Data Control Plane, Analytics Engineering, AI-Powered Data Engineering, Reliable High-Quality Data, Secure-By-Default Offerings, Pragmatic Risk Decisions, Multi-Cloud Production Environments, Identity, Endpoints, SaaS Technologies, Wiz Defend, Crowdstrike, Cloud Security Platforms, Detection Rules, Runbooks, Response Procedures, Mean Time to Detection, Mean Time to Response, AI Enrichment, AI Processing, Secure-By-Design Principles, Infrastructure Security, Application Security, Endpoint Security Controls, Monitoring"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b3a08e4a-8c1"},"title":"Senior Security Operations Engineer","description":"<p>Join Brex, the intelligent finance platform that enables companies to spend smarter and move faster in over 200 markets. As a Senior Security Operations Engineer, you will focus on preventing, detecting, and responding to security threats across Brex&#39;s corporate and cloud environments. You will use existing systems and develop tools to improve our security capabilities.</p>\n<p>Our team is responsible for functions across corporate security, detection &amp; response, and infrastructure security domains. We perform systems engineering and automation to support those functions. Security Operations is part of our wider Trust &amp; IT organization, which means you will have the opportunity to work closely with Application Security, Corporate Engineering, GRC, and IT.</p>\n<p>You will also help build and maintain our team&#39;s open-source project Substation and have the opportunity to contribute to the Brex Tech Blog. You&#39;ll be part of a team that actively contributes to the wider security community and has a commitment to mentorship and engineering excellence.</p>\n<p>We&#39;re looking for individuals with a strong background and interest in detecting, responding to, and resolving security incidents and security challenges. You should be comfortable dealing with lots of moving pieces, changing priorities, and new technologies, while having a keen eye for detail.</p>\n<p>Most importantly, you should be enthusiastic about working with a variety of backgrounds, roles, and people across Brex. Building a world-class financial service requires world-class security.</p>\n<p>As a Senior Security Operations Engineer, you will:</p>\n<ul>\n<li>Work on a highly cross-functional team to prevent, detect, and respond to security threats across Brex&#39;s corporate and cloud environments</li>\n<li>Perform security incident response, investigation, remediation, and documentation, participate in periodic threat hunting and security exercises</li>\n<li>Leading, scoping, and building features, participate in designing, and maintaining tools and systems which support the team&#39;s domains – corporate security, detection &amp; response, and infrastructure security</li>\n<li>Collaborating and partnering with engineering and operations teams to drive remediation of security issues, while balancing prioritization of those security issues within SLA and teams&#39; respective backlogs</li>\n<li>Caring about secure system design, valuing building things correctly, an understanding of a MVP approach, and an empathetic mindset when working with others</li>\n</ul>\n<p>Requirements:</p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Engineering, or related field OR equivalent training/fellowship OR 5+ years work experience</li>\n<li>Experience working in a corporate security, detection &amp; response, or infrastructure security role with responsibilities for security alert triage and security incident response</li>\n<li>Familiarity with CI/CD systems and DevOps workflows (e.g., Buildkite, Flux, Git, Terraform) in cloud environments (e.g., AWS, Azure, GCP)</li>\n<li>Experience with deploying and maintaining some of the security services and tools owned by the team (e.g., SIEM, data pipelines, SOAR, domain monitoring, endpoint tooling, email protection tooling, cloud security tools)</li>\n<li>While not primarily a development role, the team develops and maintains tools written in Go and Python, so experience with coding is required</li>\n<li>You thrive in a collaborative environment filled with a diverse group of people with different expertise and backgrounds</li>\n</ul>\n<p>Bonus points:</p>\n<ul>\n<li>Proficiency with Go and other programming languages</li>\n<li>Experience with securing distributed systems in AWS, cloud, and Kubernetes environments</li>\n<li>Contributions to the wider technical community (open source, public research, mentorship, community organizing, blogging, presentations, etc.)</li>\n</ul>\n<p>Compensation:</p>\n<p>The expected salary range for this role is $192,000 - $240,000. However, the starting base pay will depend on a number of factors including the candidate&#39;s location, skills, experience, market demands, and internal pay parity. Depending on the position offered, equity and other forms of compensation may be provided as part of a total compensation package.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b3a08e4a-8c1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Brex","sameAs":"https://brex.com/","logo":"https://logos.yubhub.co/brex.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/brex/jobs/8339252002","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$192,000 - $240,000","x-skills-required":["Security Operations","Cloud Security","CI/CD Systems","DevOps Workflows","Go","Python","Security Incident Response","Threat Hunting","Secure System Design"],"x-skills-preferred":["Open Source Development","Community Organizing","Blogging","Presentations"],"datePosted":"2026-04-18T15:51:48.916Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, California, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"Security Operations, Cloud Security, CI/CD Systems, DevOps Workflows, Go, Python, Security Incident Response, Threat Hunting, Secure System Design, Open Source Development, Community Organizing, Blogging, Presentations","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":192000,"maxValue":240000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_78eb6171-ae5"},"title":"Staff Technical Program Manager, Security","description":"<p>Secure Every Identity, from AI to Human Identity is the key to unlocking the potential of AI. Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes. We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk. The Okta Security team’s mission is to strengthen Okta’s position as the leading Identity-as-a-Service solution through identifying and resolving risks to the employees, product, and most importantly, our customers. With the ever-increasing pace of cloud application adoption, companies are struggling to find ways to accurately assess risk and act at the speed of their business. As a Staff Technical Program Manager supporting the Cyber Defense team, you will play a critical role in driving large-scale security projects. You will partner with our global Cyber Defense Operations and Engineering teams to design, build, and enhance the capabilities we use to protect Okta and our customers. This role requires exceptional leadership skills, demonstrated by an ability to influence and align stakeholders at all levels - from individual engineers to leadership. You’ll drive effective teamwork, resolve conflict, negotiate priorities, and foster a culture of shared commitment to a common goal. The ideal candidate has extensive experience in cybersecurity and a proven track record of managing technical programs in a fast-paced, cloud-native environment. This position requires strong leadership, ownership and autonomy, and executive communication skills, with the ability to translate complex technical challenges into clear, actionable plans. Job Duties and Responsibilities: Manage large scale, complex initiatives across multiple teams; taking a hands-on and proactive approach to manage dependencies, unblock progress, define timelines, communicate commitments, and introduce efficiencies Operate with a high degree of autonomy and discretion, defining the path forward for complex technical and operational challenges with minimal guidance Unify and drive effective teamwork, communication, collaboration, and commitments across multiple disparate groups with competing priorities Anticipate and mitigate risks by having close involvement with team goals and challenges, applying past experience, and keeping the big picture in mind Lead the introduction of new processes and improvements to mature Cyber Defense capabilities and improve operational efficiency Develop and maintain metrics and dashboards to report on program status using Jira and other tools Collaborate across Okta to drive transparency of security programs Minimum REQUIRED Knowledge, Skills, and Abilities: Bachelor’s degree or higher in Computer Science or Management Information Systems, or equivalent experience 5+ years of experience in technical program management, with at least 3 years focused on cybersecurity Demonstrated ability to create structure and clarity from ambiguous, high-level directives, translating them into concrete and actionable roadmaps Extensive working experience with security or engineering teams Working knowledge of technical terms and concepts used in information security, privacy, risk and contingency planning Exceptional communication and collaboration skills with the ability to influence and align stakeholders across all levels Experience working with Atlassian products, specifically Jira and Confluence Strong analytical and problem-solving skills and the ability to “think-out-of-the-box” Strong oral and written communication skills Able to work independently and as part of a distributed, global team Helpful Certifications / Skills: Certified ScrumMaster (CSM) Program Management Professional (PMP) Security certifications such as CISSP, CISM, or other relevant credentials Technical background in security engineering, security operations, or incident response Familiarity with Okta’s products and services #LI-HYBRID #LI-SH1 P17983_3404596 Below is the annual salary range for candidates located in Canada. Your actual salary will depend on factors such as your skills, qualifications, and experience. In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental, and vision insurance, RRSP with a match, healthcare spending, telemedicine, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. To learn more about our Total Rewards program, please visit: https://rewards.okta.com/can. The annual base salary range for this position for candidates located in Canada is between:$131,000-$180,400 CAD The Okta Experience - Supporting Your Well-Being - Driving Social Impact - Developing Talent and Fostering Connection + Community We are intentional about connection. Our global community, spanning over 20 offices worldwide, is united by a drive to innovate. Your journey begins with an immersive, in-person onboarding experience designed to accelerate your impact and connect you to our mission and team from day one. Okta is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, marital status, age, physical or mental disability, or status as a protected veteran. We also consider for employment qualified applicants with arrest and convictions records, consistent with applicable laws. If reasonable accommodation is needed to complete any part of the job application, interview process, or onboarding please use this Form to request an accommodation. Notice for New York City Applicants &amp; Employees: Okta may use Automated Employment Decision Tools (AEDT), as defined by New York City Local Law 144, that use artificial intelligence, machine learning, or other automated processes to assist in our recruitment and hiring process. In accordance with NYC Local Law 144, if you are an applicant or employee residing in New York City, please click here to view our full NYC AEDT Notice. Okta is committed to complying with applicable data privacy and security laws and regulations. For more information, please see our Personnel and Job Candidate Privacy Notice at https://www.okta.com/legal/personnel-policy.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_78eb6171-ae5","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7775832","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$131,000-$180,400 CAD","x-skills-required":["technical program management","cybersecurity","Jira","Confluence","Atlassian products","security or engineering teams","information security","privacy","risk and contingency planning","communication and collaboration skills","influence and align stakeholders","cloud-native environment","security engineering","security operations","incident response"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:50:48.574Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Toronto, Ontario, Canada; Vancouver, Canada"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"technical program management, cybersecurity, Jira, Confluence, Atlassian products, security or engineering teams, information security, privacy, risk and contingency planning, communication and collaboration skills, influence and align stakeholders, cloud-native environment, security engineering, security operations, incident response","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":131000,"maxValue":180400,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a585fcb5-07b"},"title":"Senior Security Engineer, Enterprise Security","description":"<p>As a Senior Security Engineer, Enterprise Security, you will design and ship the security controls that underpin CoreWeave&#39;s workforce and enterprise stack. You will lead initiatives across identity, access management, device and endpoint security, and SaaS security,partnering closely with IT Engineering, Endpoint, Network, and other security teams.</p>\n<p>Your day-to-day will blend hands-on engineering (writing code, building integrations, tuning controls) with architecture and program ownership (setting standards, defining patterns, and driving adoption across teams). You will be responsible for turning high-level objectives,like “implement zero trust for workforce access” or “deploy phishing-resistant MFA at scale”,into concrete designs, automation, and measurable risk reduction.</p>\n<p>In this role, you will:</p>\n<ul>\n<li>Engineer modern identity and access controls</li>\n<li>Design, implement, and operate workforce identity solutions (e.g., Okta/Entra and other IdPs) including SSO, MFA, conditional access, and lifecycle automation via SCIM.</li>\n<li>Develop and roll out phishing-resistant MFA for high-value accounts and critical access paths (e.g., FIDO2/WebAuthn, hardware keys, device-bound authenticators).</li>\n<li>Define and maintain RBAC/IAM patterns for enterprise applications (role models, groups, entitlements, JIT access, and approvals).</li>\n</ul>\n<ul>\n<li>Implement zero trust for workforce and enterprise access</li>\n<li>Design and deploy controls that combine user identity, device posture, network context, and application sensitivity to enforce least-privilege access.</li>\n<li>Partner with Network and Infrastructure teams to integrate mTLS, service identity, and policy-based access into internal services and admin interfaces.</li>\n<li>Help transition from legacy perimeter models to zero trust network access (ZTNA) patterns for employees, contractors, and third parties.</li>\n</ul>\n<ul>\n<li>Secure SaaS and collaboration platforms</li>\n<li>Evaluate, onboard, and harden SaaS applications (Google Workspace, Microsoft 365, Slack, HRIS, ticketing, and other business apps) to align with enterprise security policies.</li>\n<li>Implement and tune controls such as SCIM provisioning, data access policies, DLP, sharing controls, and audit logging across the SaaS estate.</li>\n<li>Partner with business and IT owners to ensure new SaaS applications meet baseline security standards before adoption.</li>\n</ul>\n<ul>\n<li>Harden endpoints and the extended workforce</li>\n<li>Collaborate with Endpoint/IT teams to define and enforce baseline configurations for laptops, workstations, and other managed devices via MDM and EDR.</li>\n<li>Design secure patterns for contractor and vendor access, including device requirements, identity separation, and time-bound access.</li>\n<li>Support investigations and incident response related to identity, endpoint, and SaaS domains.</li>\n</ul>\n<ul>\n<li>Automate and instrument everything you can</li>\n<li>Build automation and self-service experiences for access requests, approvals, access reviews, and break-glass workflows.</li>\n<li>Develop integrations between IdPs, HRIS, ticketing, and other systems to minimize manual toil and reduce identity-related error rates.</li>\n<li>Define and instrument metrics for enterprise security (e.g., MFA coverage, zero trust policy enforcement, joiner/mover/leaver SLA adherence, SaaS posture).</li>\n</ul>\n<ul>\n<li>Partner on detection, response, and governance</li>\n<li>Work with Security Operations and SIEM teams to ensure robust visibility into identity, device, and SaaS activity, and to build high-signal detections.</li>\n<li>Contribute to policies, standards, and reference architectures that encode enterprise security expectations.</li>\n<li>Author clear documentation and runbooks that make it easy for teams to consume and operate the controls you build.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a585fcb5-07b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4653764006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Identity and Access Management","Security Engineering","Zero Trust Architecture","Phishing-Resistant MFA","RBAC/IAM Patterns","SCIM Provisioning","Data Access Policies","DLP","Sharing Controls","Audit Logging","Endpoint Security","MDM","EDR","Automation","Self-Service Experiences","Integrations","Metrics","Enterprise Security","Security Operations","SIEM","Policies","Standards","Reference Architectures"],"x-skills-preferred":["Cloud Computing","AI Applications","Containerization","Kubernetes","DevOps","CI/CD Pipelines","Agile Methodologies","Scrum","Kanban","Project Management","Leadership","Communication","Collaboration"],"datePosted":"2026-04-18T15:49:47.000Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, NY / Sunnyvale, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Identity and Access Management, Security Engineering, Zero Trust Architecture, Phishing-Resistant MFA, RBAC/IAM Patterns, SCIM Provisioning, Data Access Policies, DLP, Sharing Controls, Audit Logging, Endpoint Security, MDM, EDR, Automation, Self-Service Experiences, Integrations, Metrics, Enterprise Security, Security Operations, SIEM, Policies, Standards, Reference Architectures, Cloud Computing, AI Applications, Containerization, Kubernetes, DevOps, CI/CD Pipelines, Agile Methodologies, Scrum, Kanban, Project Management, Leadership, Communication, Collaboration"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_753e9465-6a0"},"title":"Senior Security Software Engineer, eBPF & Security Sensors","description":"<p>We&#39;re seeking an exceptional engineer to join our Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Build an AI-powered platform responsible for all aspects of detection and response capabilities, from detection development to incident response</li>\n<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>\n<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>\n<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>\n<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>\n<li>Mentor engineers and contribute to hiring and growth of the Security team</li>\n<li>Participate in on-call rotations</li>\n</ul>\n<p>You may be a good fit if you</p>\n<ul>\n<li>Have 7+ years of experience in software engineering with a focus on security, infrastructure, or data pipelines</li>\n<li>Have a track record of building and maintaining internal developer tools or security platforms</li>\n<li>Have a strong understanding of data processing pipelines and experience working with large-scale logging systems</li>\n<li>Have experience with test-driven software development or CI/CD (a plus for direct experience with detection-as-code workflows)</li>\n<li>Have experience with infrastructure-as-code (Terraform, CloudFormation)</li>\n<li>Have experience with query optimization for large datasets</li>\n<li>Have experience building stable and scalable services on cloud infrastructure and serverless architectures</li>\n<li>Can write maintainable and secure code in Python</li>\n<li>Have experience working with security teams and translating requirements into technical solutions</li>\n<li>Can lead technical projects with minimal guidance</li>\n<li>Have a track record of driving engineering excellence through high standards, constructive code reviews, and mentorship</li>\n<li>Can lead cross-functional security initiatives and navigate complex organizational dynamics</li>\n<li>Have strong communication skills with the ability to translate technical concepts effectively across all organizational levels</li>\n<li>Have demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>\n<li>Have strong systems thinking with the ability to identify and mitigate risks in complex environments</li>\n</ul>\n<p>Strong candidates may also have experience with</p>\n<ul>\n<li>Building security tooling from the ground up</li>\n<li>Implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>\n<li>Detection engineering or security operations</li>\n<li>SOAR platform or automation development</li>\n<li>Data lake or database architecture</li>\n<li>API design and internal platform creation</li>\n<li>Applying ML/AI to security problems</li>\n<li>Scaling security operations in a high-growth environment</li>\n</ul>\n<p>Logistics</p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_753e9465-6a0","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5108521008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["software engineering","security","infrastructure","data pipelines","ML-powered detection systems","Claude","Python","test-driven software development","CI/CD","infrastructure-as-code","query optimization","cloud infrastructure","serverless architectures"],"x-skills-preferred":["building security tooling","implementing security monitoring solutions","detection engineering","SOAR platform","automation development","data lake","database architecture","API design","internal platform creation","applying ML/AI to security problems","scaling security operations"],"datePosted":"2026-04-18T15:49:05.488Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich, CH"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, security, infrastructure, data pipelines, ML-powered detection systems, Claude, Python, test-driven software development, CI/CD, infrastructure-as-code, query optimization, cloud infrastructure, serverless architectures, building security tooling, implementing security monitoring solutions, detection engineering, SOAR platform, automation development, data lake, database architecture, API design, internal platform creation, applying ML/AI to security problems, scaling security operations"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_dcc14ac2-f76"},"title":"Security Software Engineer, Detection & Response Platform","description":"<p>weeted job ad in markdown with  line breaks</p>\n<p><strong>About the role</strong></p>\n<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build AI-powered platform responsible for all aspects of D&amp;R capabilities from detection development to incident response</li>\n<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>\n<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>\n<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>\n<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>\n<li>Mentor engineers and contribute to hiring and growth of the Security team</li>\n<li>Participate in on-call shifts</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>7+ years of experience in software engineering with a focus on security, infrastructure and/or data pipelines</li>\n<li>Track record of building and maintaining internal developer tools or security platforms</li>\n<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>\n</ul>\n<p><strong>Strong candidates may also have experience with:</strong></p>\n<ul>\n<li>Experience building security tooling from the ground up</li>\n<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>\n<li>Background in detection engineering or security operations</li>\n<li>SOAR platform/automation development</li>\n<li>Data lake / Database architecture</li>\n<li>API design and internal platform creation</li>\n<li>Track record of applying ML/AI to security problems</li>\n<li>Experience scaling security operations in a high-growth environment</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_dcc14ac2-f76","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4595463008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000-$405,000 USD","x-skills-required":["Python","Data pipelines","ML-powered detection systems","Security telemetry","Claude","Security operations","Incident response"],"x-skills-preferred":["Experience building security tooling from the ground up","Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)","Background in detection engineering or security operations","SOAR platform/automation development","Data lake / Database architecture","API design and internal platform creation","Track record of applying ML/AI to security problems","Experience scaling security operations in a high-growth environment"],"datePosted":"2026-04-18T15:47:49.797Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Data pipelines, ML-powered detection systems, Security telemetry, Claude, Security operations, Incident response, Experience building security tooling from the ground up, Background in implementing security monitoring solutions (SIEM, log aggregation, EDR), Background in detection engineering or security operations, SOAR platform/automation development, Data lake / Database architecture, API design and internal platform creation, Track record of applying ML/AI to security problems, Experience scaling security operations in a high-growth environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0962c409-5f6"},"title":"Incident Manager - Detection & Response","description":"<p>We&#39;re looking for an experienced Technical Program Manager to own and evolve incident management within the Detection &amp; Response (D&amp;R) team. This is a senior-level specialization on the Technical Program Manager ladder, focused on how we detect, respond to, and learn from security and operational incidents.</p>\n<p>You&#39;ll be the driving force behind maturing and scaling our incident response lifecycle,from detection and triage through containment, remediation, and post-incident review. Critically, some of the highest-impact work in this role happens after the immediate response: gathering data on incident trends, reporting on patterns and root causes, and working cross-functionally across engineering, security, infrastructure, and product teams to ensure that broad fixes and systemic improvements are actually implemented.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Own the end-to-end D&amp;R incident management program: detection workflows, response processes, escalation paths, communication standards, and remediation tracking.</li>\n<li>Serve as incident commander for security incidents, driving clear coordination across executive, engineering, security, legal, and other appropriate stakeholders.</li>\n<li>Establish and run incident commander rotations within D&amp;R, ensuring clear ownership and effective coordination during incidents of varying severity.</li>\n<li>Drive post-incident accountability by defining how action items are captured, assigned, tracked, and completed across teams,ensuring follow-through on both tactical fixes and strategic improvements.</li>\n<li>Gather, analyze, and report on incident trends and patterns to surface systemic risks, recurring root causes, and areas where the organization is most vulnerable.</li>\n<li>Translate trend analysis into actionable cross-functional initiatives: partner with engineering, infrastructure, security, and product teams to prioritize and implement broad fixes and preventive improvements that address root causes rather than symptoms.</li>\n<li>Lead incident review forums (post-mortems, retrospectives) and ensure learnings are captured, socialized, and acted upon across the organization.</li>\n<li>Develop and maintain D&amp;R incident response documentation, playbooks, runbooks, and training materials; keep them current as the threat landscape and our systems evolve.</li>\n<li>Partner with detection engineering to improve alert fidelity, reduce noise, and shorten time-to-detection for security events.</li>\n<li>Define, develop, and track incident management KPIs and report regularly to D&amp;R and Security leadership.</li>\n<li>Support broad cross-functional training and initiatives to uplevel security awareness across the company (e.g. Tabletop exercises, training, talks).</li>\n</ul>\n<p>You may be a good fit if you:</p>\n<ul>\n<li>Have 7+ years of experience in technical program management, incident management, or security operations, with significant time spent in a detection &amp; response or security incident response context.</li>\n<li>Have led or built incident response programs at a technology company, ideally in a high-growth or security-intensive environment.</li>\n<li>Have a demonstrated track record of turning incident data into organizational improvements,not just writing post-mortems, but driving the cross-functional work to implement systemic fixes.</li>\n<li>Are comfortable participating in on-call responsibilities and leading incident response during high-severity security events, including off-hours.</li>\n<li>Have experience building and scaling operational processes from the ground up in environments where structure didn’t previously exist.</li>\n<li>Excel at driving accountability and follow-through across multiple teams without direct authority,you know how to influence, track, and close the loop.</li>\n<li>Have strong analytical skills and experience with incident trend analysis, metrics reporting, and data-driven prioritization.</li>\n<li>Are highly organized with a knack for bringing structure to ambiguous, fast-moving situations.</li>\n<li>Have excellent communication skills, especially under pressure and when coordinating across technical and non-technical stakeholders, including executive leadership.</li>\n<li>Thrive in fast-paced environments where priorities shift and you’re often working with incomplete information.</li>\n</ul>\n<p>The annual compensation range for this role is $320,000-$405,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0962c409-5f6","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5176481008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000-$405,000 USD","x-skills-required":["Technical Program Management","Incident Management","Security Operations","Detection & Response","Cross-functional Team Leadership","Communication","Analytical Skills","Data-driven Prioritization","Incident Trend Analysis","Metrics Reporting"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:39:59.642Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Technical Program Management, Incident Management, Security Operations, Detection & Response, Cross-functional Team Leadership, Communication, Analytical Skills, Data-driven Prioritization, Incident Trend Analysis, Metrics Reporting","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_55b94055-301"},"title":"Incident Manager - Detection & Response","description":"<p><strong>About the Role</strong></p>\n<p>The Detection &amp; Response (D&amp;R) team plays a critical role in protecting our systems, users, and data from security threats. We’re looking for an experienced Technical Program Manager to own and evolve incident management within D&amp;R.</p>\n<p>You’ll be the driving force behind maturing and scaling our incident response lifecycle,from detection and triage through containment, remediation, and post-incident review. Critically, some of the highest-impact work in this role happens after the immediate response: gathering data on incident trends, reporting on patterns and root causes, and working cross-functionally across engineering, security, infrastructure, and product teams to ensure that broad fixes and systemic improvements are actually implemented.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Own the end-to-end D&amp;R incident management program: detection workflows, response processes, escalation paths, communication standards, and remediation tracking.</li>\n</ul>\n<ul>\n<li>Serve as incident commander for security incidents, driving clear coordination across executive, engineering, security, legal, and other appropriate stakeholders.</li>\n</ul>\n<ul>\n<li>Establish and run incident commander rotations within D&amp;R, ensuring clear ownership and effective coordination during incidents of varying severity.</li>\n</ul>\n<ul>\n<li>Drive post-incident accountability by defining how action items are captured, assigned, tracked, and completed across teams,ensuring follow-through on both tactical fixes and strategic improvements.</li>\n</ul>\n<ul>\n<li>Gather, analyse, and report on incident trends and patterns to surface systemic risks, recurring root causes, and areas where the organisation is most vulnerable.</li>\n</ul>\n<ul>\n<li>Translate trend analysis into actionable cross-functional initiatives: partner with engineering, infrastructure, security, and product teams to prioritise and implement broad fixes and preventive improvements that address root causes rather than symptoms.</li>\n</ul>\n<ul>\n<li>Lead incident review forums (post-mortems, retrospectives) and ensure learnings are captured, socialised, and acted upon across the organisation.</li>\n</ul>\n<ul>\n<li>Develop and maintain D&amp;R incident response documentation, playbooks, runbooks, and training materials; keep them current as the threat landscape and our systems evolve.</li>\n</ul>\n<ul>\n<li>Partner with detection engineering to improve alert fidelity, reduce noise, and shorten time-to-detection for security events.</li>\n</ul>\n<ul>\n<li>Define, develop, and track incident management KPIs and report regularly to D&amp;R and Security leadership.</li>\n</ul>\n<ul>\n<li>Support broad cross-functional training and initiatives to uplevel security awareness across the company (e.g. Tabletop exercises, training, talks).</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have 7+ years of experience in technical program management, incident management, or security operations, with significant time spent in a detection &amp; response or security incident response context.</li>\n</ul>\n<ul>\n<li>Have led or built incident response programs at a technology company, ideally in a high-growth or security-intensive environment.</li>\n</ul>\n<ul>\n<li>Have a demonstrated track record of turning incident data into organisational improvements,not just writing post-mortems, but driving the cross-functional work to implement systemic fixes.</li>\n</ul>\n<ul>\n<li>Are comfortable participating in on-call responsibilities and leading incident response during high-severity security events, including off-hours.</li>\n</ul>\n<ul>\n<li>Have experience building and scaling operational processes from the ground up in environments where structure didn’t previously exist.</li>\n</ul>\n<ul>\n<li>Excel at driving accountability and follow-through across multiple teams without direct authority,you know how to influence, track, and close the loop.</li>\n</ul>\n<ul>\n<li>Have strong analytical skills and experience with incident trend analysis, metrics reporting, and data-driven prioritisation.</li>\n</ul>\n<ul>\n<li>Are highly organised with a knack for bringing structure to ambiguous, fast-moving situations.</li>\n</ul>\n<ul>\n<li>Have excellent communication skills, especially under pressure and when coordinating across technical and non-technical stakeholders, including executive leadership.</li>\n</ul>\n<ul>\n<li>Thrive in fast-paced environments where priorities shift and you’re often working with incomplete information.</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>\n</ul>\n<ul>\n<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>\n</ul>\n<ul>\n<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>\n</ul>\n<ul>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n</ul>\n<ul>\n<li>Visa sponsorship: We do sponsor visas! However, we aren’t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>How we’re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We’re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p>The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI &amp; Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.</p>\n<p><strong>Come work with us!</strong></p>\n<p>Anthropic is a public benefit corporation</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_55b94055-301","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5176570008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Technical Program Management","Incident Management","Security Operations","Detection & Response","Cross-functional Teamwork","Communication","Analytical Skills","Data-driven Prioritisation","Influence and Close Loop","Strong Organisational Skills"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:39:51.436Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich, CH"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Technical Program Management, Incident Management, Security Operations, Detection & Response, Cross-functional Teamwork, Communication, Analytical Skills, Data-driven Prioritisation, Influence and Close Loop, Strong Organisational Skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_8afc2442-71c"},"title":"Campus Security Manager","description":"<p>As part of Anthropic&#39;s Global Safety, Intelligence, and Security (GSIS) team, the NYC Campus Security Manager serves as the operational security leader for Anthropic&#39;s New York City campuses. This position offers the opportunity to lead comprehensive security operations protecting cutting-edge AI research while building trust and security culture with Anthropic personnel.</p>\n<p>Key responsibilities include leading campus security operations, building security culture and trust, developing and implementing security strategies, team leadership, emergency response, community relations, access control, security technology, and security project management.</p>\n<p>Ideal candidates will have a passion for creating safe, secure environments, strong leadership skills, experience coordinating security teams and vendors, excellent crisis management skills, and knowledge of physical security technologies.</p>\n<p>The annual compensation range for this role is $175,000-$220,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_8afc2442-71c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5099202008","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$175,000-$220,000 USD","x-skills-required":["security operations leadership","campus security management","physical security technologies","crisis management","team leadership"],"x-skills-preferred":["security certifications","technology company security operations","R&D facility security management"],"datePosted":"2026-04-18T15:39:30.262Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Security","industry":"Technology","skills":"security operations leadership, campus security management, physical security technologies, crisis management, team leadership, security certifications, technology company security operations, R&D facility security management","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":175000,"maxValue":220000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_85f1ada0-78d"},"title":"Security Engineer","description":"<p>We&#39;re seeking a Security Engineer at the senior-level or above on our Security Operations team with strong detection engineering experience. You&#39;ll design and develop high-fidelity detection content, build and operate the data pipelines that power our security operations, develop automation playbooks that accelerate response, and work across a uniquely diverse telemetry landscape spanning cloud infrastructure, embedded vessel platforms, corporate systems, and operational technology.</p>\n<p>This role is heavily weighted toward detection engineering. You should think in terms of adversary behaviour and telemetry coverage, not just alert triage. You&#39;ll own detections end-to-end: from identifying gaps in coverage, through designing and testing detection logic, to tuning and validating in production.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li><p>Design, build, test, and tune high-fidelity detection rules and analytic queries across endpoint, cloud, network, identity, and DLP telemetry sources</p>\n</li>\n<li><p>Develop and maintain detection content using detection-as-code practices including version-controlled logic, automated testing, and CI/CD deployment</p>\n</li>\n<li><p>Map detection coverage to MITRE ATT&amp;CK, identify gaps, and prioritise new detection development based on threat intelligence and business risk</p>\n</li>\n<li><p>Engineer correlation rules, behavioural analytics, and anomaly-based detections that minimise false positives while surfacing real adversary tradecraft</p>\n</li>\n<li><p>Own the detection lifecycle from initial development through production tuning, performance monitoring, and retirement</p>\n</li>\n<li><p>Build and operate pipelines to ingest, normalise, enrich, and manage security telemetry at scale across diverse data sources, using Terraform and infrastructure-as-code practices to deploy and maintain logging and detection infrastructure</p>\n</li>\n<li><p>Design and maintain log collection, parsing, and enrichment configurations that ensure the right telemetry is available at the right fidelity for detection and investigation</p>\n</li>\n<li><p>Evaluate and onboard new telemetry sources as Saronic&#39;s infrastructure and threat landscape evolve</p>\n</li>\n<li><p>Monitor pipeline health, data quality, and ingestion reliability to ensure detections operate on complete and accurate data</p>\n</li>\n<li><p>Develop and manage automated response playbooks in SOAR platforms to accelerate containment and reduce analyst toil</p>\n</li>\n<li><p>Build automation that enriches alerts with contextual data, reducing investigation time and improving analyst decision-making</p>\n</li>\n<li><p>Support incident response efforts and translate lessons learned into improved detections and playbooks</p>\n</li>\n<li><p>Partner with SOC analysts, Cloud Security, Product Security, and IT teams to close visibility and detection gaps across environments</p>\n</li>\n<li><p>Collaborate with threat intelligence to ensure detection engineering is informed by current adversary TTPs relevant to defence, maritime, and autonomous systems</p>\n</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li><p>3+ years of hands-on experience in detection engineering, security operations, security automation, or a closely related security engineering role</p>\n</li>\n<li><p>Demonstrated experience designing, testing, and tuning detection rules and analytic queries across production security telemetry (endpoint, cloud, network, identity, or DLP)</p>\n</li>\n<li><p>Hands-on experience with SIEM platforms and proficiency with query languages such as SPL, KQL, or equivalent</p>\n</li>\n<li><p>Experience building and operating security data pipelines, including log ingestion, normalisation, enrichment, and data quality management</p>\n</li>\n<li><p>Understanding of data engineering concepts including ETL pipelines, data modelling, schema design, and indexing as applied to security telemetry</p>\n</li>\n<li><p>Hands-on coding experience in Python, PowerShell, Go, or Rust for security automation, detection tooling, or pipeline development, and familiarity with Terraform for managing detection and logging infrastructure as code</p>\n</li>\n<li><p>Understanding of MITRE ATT&amp;CK framework and its application to detection coverage and gap analysis</p>\n</li>\n<li><p>Ability to obtain and maintain a security clearance</p>\n</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li><p>Experience in defence, aerospace, robotics, autonomy, or other high-assurance environments</p>\n</li>\n<li><p>Experience with EDR platforms including custom detection rule creation and telemetry analysis</p>\n</li>\n<li><p>Experience with cloud-native detection in AWS and Microsoft 365/Azure</p>\n</li>\n<li><p>Experience using Terraform to deploy and manage security monitoring infrastructure, log pipeline components, or cloud-native security service configurations</p>\n</li>\n<li><p>Hands-on experience with incident response, threat hunting, or adversary emulation</p>\n</li>\n<li><p>Exposure to embedded Linux, operational technology, or ICS telemetry and detection</p>\n</li>\n<li><p>Familiarity with NIST SP 800-171, NIST SP 800-53, or CMMC and their logging and monitoring requirements</p>\n</li>\n<li><p>Relevant certifications such as GCIH, GCIA, GCDA, GSOM, OSDA, or OSCP</p>\n</li>\n</ul>\n<p>Additional Information:</p>\n<ul>\n<li><p>Benefits: Medical Insurance, Dental and Vision Insurance, Time Off, Parental Leave, Competitive Salary, Retirement Plan, Stock Options, Life and Disability Insurance, Pet Insurance</p>\n</li>\n<li><p>This role requires access to export-controlled information or items that require &#39;U.S. Person&#39; status.</p>\n</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_85f1ada0-78d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Saronic Technologies","sameAs":"https://www.saronictechnologies.com/","logo":"https://logos.yubhub.co/saronictechnologies.com.png"},"x-apply-url":"https://jobs.lever.co/saronic/79424778-76c1-41c6-8385-cba5f6ddc50e","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["detection engineering","security operations","security automation","SIEM platforms","query languages","data engineering","ETL pipelines","data modelling","schema design","indexing","Python","PowerShell","Go","Rust","Terraform","MITRE ATT&CK framework","security clearance"],"x-skills-preferred":["EDR platforms","cloud-native detection","incident response","threat hunting","adversary emulation","embedded Linux","operational technology","ICS telemetry","NIST SP 800-171","NIST SP 800-53","CMMC","GCIH","GCIA","GCDA","GSOM","OSDA","OSCP"],"datePosted":"2026-04-17T12:56:57.672Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"detection engineering, security operations, security automation, SIEM platforms, query languages, data engineering, ETL pipelines, data modelling, schema design, indexing, Python, PowerShell, Go, Rust, Terraform, MITRE ATT&CK framework, security clearance, EDR platforms, cloud-native detection, incident response, threat hunting, adversary emulation, embedded Linux, operational technology, ICS telemetry, NIST SP 800-171, NIST SP 800-53, CMMC, GCIH, GCIA, GCDA, GSOM, OSDA, OSCP"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_68e291fb-412"},"title":"Senior Security Engineer","description":"<p>Talent Wanted. For hazardous journey. Small wages, bitter cold, long months of complete darkness, constant danger, safe return doubtful. Honour and recognition in case of success.</p>\n<p>Fridtjof Nansen crossed the Arctic, going places no human had ever been. Together with our users, we&#39;re doing the same onchain , and someone needs to make sure we don&#39;t get killed on the way there.</p>\n<p>We&#39;re building the single best platform for onchain investing , agentic trading, staking infrastructure, AI-powered analytics , and we&#39;re scaling fast. Fast enough that security can&#39;t be an afterthought bolted on later. It has to be built in, from the start, by someone who knows what they&#39;re doing.</p>\n<p><strong>Our mission:</strong></p>\n<p>Surface the signal and create winners.</p>\n<p><strong>What you&#39;ll do at Nansen</strong></p>\n<p>You&#39;ll be the person who makes sure we can move fast without breaking things that matter. That means embedding security into everything we build , cloud infrastructure, applications, CI/CD pipelines, AI systems, staking operations , across a generalist role that spans the full surface area.</p>\n<ul>\n<li>Run security assessments across systems, architectures, and code , find the vulnerabilities before someone else does</li>\n<li>Advise engineering teams on secure design decisions. You&#39;re a partner, not a blocker</li>\n<li>Deploy and maintain security infrastructure: SIEM, vulnerability scanning, endpoint protection, logging , the things that let us sleep at night</li>\n<li>Secure our CI/CD pipelines and deployment workflows end-to-end</li>\n<li>Own secrets management, key management, and access controls. No shortcuts</li>\n<li>Address LLM security head-on: API key management, prompt injection prevention, and the risks that come with shipping AI-powered products at speed</li>\n<li>Coordinate penetration tests and security audits with external vendors</li>\n<li>Create and maintain secure coding guidelines and code review processes that engineers actually follow</li>\n<li>Represent the Security Team in the incident response process</li>\n<li>Drive compliance readiness , SOC 2, ISO 27001 , pragmatically, not bureaucratically</li>\n</ul>\n<p><strong>What we&#39;re looking for</strong></p>\n<ul>\n<li>You&#39;ve built and hardened production security at scale , you know the difference between a policy document and an actually secure system</li>\n<li>Strong cloud security knowledge (AWS, GCP or equivalent). Container security and network security fundamentals</li>\n<li>Hands-on experience implementing security tooling, not just evaluating it</li>\n<li>Secrets and key management expertise , you&#39;ve managed this at a company where it actually mattered</li>\n<li>You understand the security implications of AI/LLM and agent-based systems. This is new territory and we need someone thinking about it seriously</li>\n<li>CI/CD pipeline security is second nature</li>\n<li>Pragmatic about compliance , you can get us to SOC 2 without drowning the engineering team in process</li>\n<li>You don&#39;t just use AI as a tool. You think with it. AI-first isn&#39;t a checkbox , it&#39;s how you work</li>\n<li>Strong async communication skills , we&#39;re remote-first, Slack-and-docs-heavy, and EMEA hours are preferred for team overlap</li>\n<li>Bonus: blockchain, smart contract, or staking infrastructure security experience. Kubernetes and Terraform security. Incident response or security operations background</li>\n</ul>\n<p><strong>What we offer our crew</strong></p>\n<ul>\n<li>Competitive salary. Meaningful equity. Real ownership in what you build</li>\n<li>Fully remote with two no-meeting days a week , because deep work doesn&#39;t happen in a Google Meet</li>\n<li>Annual company retreat and team off-sites in one of our offices: Singapore, Bangkok, London, and Oslo , flights and accommodation covered</li>\n<li>Unlimited AI tokens , Claude, OpenAI, whatever helps you move fast</li>\n<li>Your own OpenClaw for work</li>\n<li>Nansen Pro account: giving you full access to the most detailed onchain data in the market</li>\n<li>A team that started as data engineers and data scientists that has grown to over 80 builders. Your craft is respected here.</li>\n<li>Speed, ownership, curiosity, courage. These aren&#39;t values on a wall , they&#39;re how we run.</li>\n<li>A front-row seat (and a hand in building) the next chapter of finance</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_68e291fb-412","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Nansen","sameAs":"https://nansen.ai/","logo":"https://logos.yubhub.co/nansen.ai.png"},"x-apply-url":"https://job-boards.greenhouse.io/nansen/jobs/5811520004","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cloud security","container security","network security","security tooling","secrets management","key management","access controls","API key management","prompt injection prevention","LLM security","CI/CD pipeline security","compliance","SOC 2","ISO 27001"],"x-skills-preferred":["blockchain security","smart contract security","staking infrastructure security","Kubernetes security","Terraform security","incident response","security operations"],"datePosted":"2026-04-17T12:47:56.366Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote Europe | Remote Asia"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cloud security, container security, network security, security tooling, secrets management, key management, access controls, API key management, prompt injection prevention, LLM security, CI/CD pipeline security, compliance, SOC 2, ISO 27001, blockchain security, smart contract security, staking infrastructure security, Kubernetes security, Terraform security, incident response, security operations"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_55d2bc34-fc1"},"title":"CyberSecurity Engineer, SOC Analyst","description":"<p>About Mistral AI\nAt Mistral AI, we believe in the power of AI to simplify tasks, save time, and enhance learning and creativity. Our technology is designed to integrate seamlessly into daily working life.</p>\n<p>Role Summary\nMistral AI is looking for a Security Operations Center (SOC) Analyst to monitor, defend and respond to threats across our rapidly evolving AI ecosystem. You will treat security telemetry as the core of our active defense. Your objective is to ensure the continuous security of our diverse environment, spanning IT, Engineering, Science, Compute and Infrastructure by building robust detection mechanisms and moving swiftly from alert to automated response.</p>\n<p>Responsibilities\n• Partner with engineering and platform teams to ensure the comprehensive centralization of security logs across all Mistral environments.\n• Design, test, and continuously tune high-fidelity alert scenarios and correlation rules to detect anomalous behavior while minimizing alert fatigue.\n• Operationalize Cyber Threat Intelligence (CTI), monitoring the landscape for threats specific to AI and cloud infrastructure, and integrating actionable intel directly into our detection pipelines.\n• Conduct rigorous, deep-dive investigations into security alerts, tracking root causes, identifying potential lateral movement, and determining impact.\n• Drive the lifecycle of security incidents from containment to remediation, and coordinate cross-functional crisis management during high-severity events.</p>\n<p>About You\n• 3+ years of experience in a Security Operations Center (SOC), Incident Response, or Threat Hunting role, ideally within a cloud-native or fast-paced tech environment.\n• Deep understanding of the threat landscape, the MITRE ATT&amp;CK framework, and the methodologies required to protect high-value infrastructure and intellectual property.\n• Strong experience writing complex queries (e.g., KQL, Splunk SPL, or similar) and leveraging SIEM platforms to build out correlation rules and detection logic.\n• Ability to write practical automation scripts in Python or Go to interact with security APIs, enrich alert context, and streamline response workflows.\n• Proven experience participating in or leading incident response efforts, demonstrating a calm, methodical approach to high-pressure crisis management.</p>\n<p>Hiring Process\n• Introduction call - 30 min\n• Hiring Manager interview - 30 min\n• Technical Rounds - Dee-Dive interview - 55 min - Panel interview - 1h15\n• Culture-fit discussion - 30 min\n• References</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_55d2bc34-fc1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Mistral AI","sameAs":"https://mistral.ai","logo":"https://logos.yubhub.co/mistral.ai.png"},"x-apply-url":"https://jobs.lever.co/mistral/f9782b09-ca3c-4bfc-ba7a-349551ef9a82","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Security Operations Center (SOC)","Incident Response","Threat Hunting","KQL","Splunk SPL","SIEM platforms","Python","Go","security APIs","alert context","response workflows"],"x-skills-preferred":[],"datePosted":"2026-04-17T12:46:59.040Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Paris"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security Operations Center (SOC), Incident Response, Threat Hunting, KQL, Splunk SPL, SIEM platforms, Python, Go, security APIs, alert context, response workflows"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d890a652-74d"},"title":"Senior Security Engineer, SecOps","description":"<p>At Greenlight, we believe every child should have the opportunity to become financially healthy and happy. Our Security Operations team safeguards our mission-critical fintech infrastructure through advanced threat detection, innovative internally built AI tooling, comprehensive incident response, and strategic security architecture.</p>\n<p>As a Senior Security Engineer, you will be a hands-on practitioner responsible for detecting, investigating, and responding to security threats across our cloud-native platform. You&#39;ll play a critical role in our day-to-day security operations triaging alerts, leading incident investigations, managing vulnerabilities, and continuously improving our detection capabilities.</p>\n<p>This role is ideal for someone with strong security analyst fundamentals who is eager to grow their engineering skills and contribute to building and improving security tooling over time. You will collaborate closely with engineering, infrastructure, and product teams to ensure security is woven into everything we build.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Serve as a frontline responder for security incidents , triage alerts, lead investigations, coordinate cross-functional response efforts, and drive post-incident reviews and remediation</li>\n<li>Monitor and tune security tooling and detection rules to identify threats across our cloud infrastructure and applications; reduce false positives and improve signal quality</li>\n<li>Perform proactive threat hunting to identify attack patterns, anomalous behavior, and gaps in detection coverage</li>\n<li>Support and maintain security controls across our AWS environment, including monitoring for misconfigurations, access issues, and infrastructure risks</li>\n<li>Contribute to building and improving security automation, scripts, and internal tooling to reduce manual overhead and enhance operational efficiency; grow into deeper engineering contributions over time</li>\n<li>Own the enterprise vulnerability management program, establishing risk-based prioritization frameworks and driving organization-wide remediation strategies</li>\n<li>Spearhead AI/ML integration and automation initiatives to transform security operations, reduce manual overhead, and enhance detection capabilities</li>\n<li>Assist with and contribute to AI-driven security initiatives and automation efforts within the team</li>\n<li>Support ongoing security compliance, audit, and certification programs (e.g., PCI, SOC2)</li>\n<li>Work closely with engineering, infrastructure, and product teams to provide security guidance and support security-by-design practices</li>\n<li>Participate in team knowledge sharing, document runbooks and playbooks, and contribute to continuous improvement of SecOps processes</li>\n<li>Participate in on-call rotation and serve as a first responder to security event escalations</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>6+ years of experience in security operations, incident response, or a security analyst role, preferably in cloud-centric environments</li>\n<li>Strong hands-on experience with incident response and investigation alert triage, forensic analysis, root cause determination, and remediation</li>\n<li>Solid understanding of common attack vectors, threat intelligence fundamentals, and attacker tactics, techniques, and procedures (TTPs)</li>\n<li>Working knowledge of cloud security fundamentals (AWS) IAM, VPC, CloudTrail, GuardDuty, Security Hub, or equivalent services</li>\n<li>Familiarity with TCP/IP protocols, network analysis, and common network/security tooling (SIEM, EDR, IDS/IPS)</li>\n<li>Demonstrated ability to identify exploits, vulnerabilities, and misconfigurations and drive remediation in cloud and server environments</li>\n<li>Growth mindset genuine interest in developing engineering skills (scripting, automation, tooling) and growing beyond a pure analyst role</li>\n<li>Ability to participate in an on-call rotation and respond to security event escalations</li>\n<li>Team player comfortable collaborating across India and US teams (primarily PST timezone)</li>\n</ul>\n<p><strong>Nice to Have</strong></p>\n<ul>\n<li>Experience with scripting languages (Python, PowerShell, etc.)</li>\n<li>Experience with public cloud security (AWS, Azure, GCP)</li>\n<li>Red/Blue team experience</li>\n<li>Security certifications (e.g., CISSP, Security+, CEH, GIAC)</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d890a652-74d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Greenlight","sameAs":"https://www.greenlight.com/","logo":"https://logos.yubhub.co/greenlight.com.png"},"x-apply-url":"https://jobs.lever.co/greenlight/fb069667-f056-4648-9fc7-0f20c6ace815","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["security operations","incident response","cloud security","AWS","TCP/IP protocols","network analysis","SIEM","EDR","IDS/IPS"],"x-skills-preferred":["scripting languages","public cloud security","Red/Blue team experience","security certifications"],"datePosted":"2026-04-17T12:37:29.351Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Bengaluru"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"security operations, incident response, cloud security, AWS, TCP/IP protocols, network analysis, SIEM, EDR, IDS/IPS, scripting languages, public cloud security, Red/Blue team experience, security certifications"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_819052bd-778"},"title":"Member of Technical Staff, Security Operations","description":"<p>We&#39;re looking for a Member of Technical Staff, Security Operations to join our Security Engineering team. As a key member of our team, you will be responsible for developing and maintaining security automation and tooling to detect vulnerabilities through static and dynamic analysis across code and live systems. You will conduct application security assessments, penetration tests, and code reviews to identify high-risk security issues and provide secure development guidance. You will also develop and operate vulnerability management workflows, partnering with engineering teams to prioritize and remediate findings.</p>\n<p>In this role, you will establish and test security guardrails for code, cloud resources, and infrastructure components throughout the Anchorage platform. You will monitor and respond to security events and configuration anomalies across the organization, leading investigation and containment efforts. You will manage the full vulnerability lifecycle from discovery through remediation, tracking progress and ensuring timely closure of findings.</p>\n<p>You will lead or substantially contribute to Security Operations initiatives with minimal oversight, coordinating across team boundaries to drive projects to completion. You will break complex security problems into manageable workstreams with accurate scope and time estimates. Present options clearly and provide well-reasoned priority recommendations.</p>\n<p>Deliver assurance artifacts and evidence for regulated entity requirements, supporting audit and compliance efforts. Balance speed of response with thoroughness of investigation, adapting approach based on risk and business impact.</p>\n<p>You will understand and help implement the company&#39;s security strategy by participating in planning and defining Security Operations goals in alignment with Anchorage Digital&#39;s overall objectives. Stay alert to emerging threats, vulnerabilities, and industry trends that could affect organizational security posture.</p>\n<p>Consider security holistically across the product ecosystem,applications, infrastructure, and third-party integrations,while fostering a security-first culture. Collaborate cross-functionally with Engineering, Infrastructure, and Compliance teams to embed security into development and operational processes.</p>\n<p>Share knowledge broadly across the team through documentation, runbooks, and post-incident reviews, preventing single points of failure. Partner with engineering teams to explain security risks and remediation approaches, translating technical findings into actionable guidance.</p>\n<p>Collaborate across teams to review security configurations, triage findings, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes. Demonstrate empathy by understanding others&#39; context, priorities, and constraints,adapting communication style to maximize effectiveness with both technical and non-technical audiences.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_819052bd-778","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anchorage Digital","sameAs":"https://www.anchorage.com/","logo":"https://logos.yubhub.co/anchorage.com.png"},"x-apply-url":"https://jobs.lever.co/anchorage/74fb5f60-d964-416e-90a0-7f89f3b07676","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Security Operations","AppSec experience","Security tooling and automation","Vulnerability assessment","Static and dynamic analysis","Cloud security","Incident response","Computer science fundamentals"],"x-skills-preferred":["Experience running or participating in bug bounty programs","Regulated financial services, fintech, or crypto environment","Blockchain security, smart contract auditing, or Web3 technologies","Open-source security tools","Relevant certifications"],"datePosted":"2026-04-17T12:24:17.194Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"Security Operations, AppSec experience, Security tooling and automation, Vulnerability assessment, Static and dynamic analysis, Cloud security, Incident response, Computer science fundamentals, Experience running or participating in bug bounty programs, Regulated financial services, fintech, or crypto environment, Blockchain security, smart contract auditing, or Web3 technologies, Open-source security tools, Relevant certifications"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_10ab61a1-14e"},"title":"Cyber Security Engineering, Sr Engineer","description":"<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>\n<p>You are a passionate and experienced cybersecurity professional with a keen eye for detail and a deep understanding of threat detection and mitigation. You thrive in fast-paced, collaborative environments and are energized by the challenge of staying ahead of evolving cyber threats. Your technical expertise spans across log aggregation platforms like Elastic, scripting languages such as Python, and enterprise SIEMs. You have a strong grasp of threat actor techniques, vulnerabilities, and exploits, and you leverage frameworks like Mitre ATT&amp;CK to inform your detection strategies.</p>\n<p>You are committed to continuous learning, regularly updating your knowledge to remain at the forefront of cybersecurity advancements. Your analytical mindset enables you to dissect complex security incidents and identify patterns that others might miss. You value clear documentation and process consistency, ensuring that your work can be easily understood and replicated by your peers.</p>\n<p>You are a natural communicator, able to articulate security concepts to both technical and non-technical stakeholders. Your collaborative spirit drives cross-functional engagement, enhancing the organization’s security posture. With a high tolerance for autonomy, you are comfortable taking initiative and leading projects to completion. Certifications such as CISSP, GCIH, GCFE, GCFA, or GMON are a testament to your dedication, but your practical experience is what truly sets you apart.</p>\n<p>You will be responsible for building detection logics using log aggregation platforms like Elastic in large enterprise environments, maintaining and improving existing detection tools and systems to ensure optimal performance and reliability, creating and maintaining documentation for detection processes and procedures to ensure clarity and consistency, utilizing your knowledge of threat actor techniques, vulnerabilities, and exploits to identify and help mitigate potential security risks, collaborating with cross-functional teams to enhance overall security posture and response strategies, staying up-to-date with the latest advancements in cybersecurity to continuously improve detection capabilities.</p>\n<p>By joining our team, you will enhance the security posture of Synopsys by identifying and mitigating potential threats, contribute to the development and maintenance of robust detection tools and systems, improve the efficiency and effectiveness of security operations through automation and scripting, provide valuable insights and recommendations to enhance overall security strategies, support the continuous improvement of detection processes and procedures, and elevate the organization&#39;s resilience and readiness against emerging cyber threats.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_10ab61a1-14e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/austin/cyber-security-engineering-sr-engineer-16007/44408/92616533008","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$101000-$152000","x-skills-required":["ci/cd methodology","elastic","python","enterprise siems","mitre att&ck framework","threat detection","incident response","security operations"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:22:41.630Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"ci/cd methodology, elastic, python, enterprise siems, mitre att&ck framework, threat detection, incident response, security operations","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":101000,"maxValue":152000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a2183a2d-c20"},"title":"Cyber Security Engineer, Staff Engineer","description":"<p>At Synopsys, we&#39;re seeking a dedicated and detail-oriented Cyber Security Engineer to join our team. As a Cyber Security Engineer, you will play a pivotal role in sustaining long-term CMMC compliance and advancing our cybersecurity maturity. You will own and coordinate CMMC Level 2 documentation, review and validate Standard Operating Procedures (SOPs), and verify implementation and effectiveness of CMMC security controls and practices. You will also support mock audits, readiness reviews, and official CMMC assessments, including evidence preparation and assessor interaction support.</p>\n<p>You will collaborate with IT and engineering teams to establish and track patching and remediation priorities, focusing on CMMC scoring impact. You will maintain ownership of all Plans of Action and Milestones (POA&amp;Ms), validating remediation closure evidence, and ensuring alignment with DoD and CMMC requirements. You will also support continuous control monitoring activities for ongoing compliance between assessments.</p>\n<p>As a Cyber Security Engineer, you will communicate compliance posture, risks, and remediation status to both technical and non-technical audiences, and support user and stakeholder education. You will also escalate unresolved compliance or remediation risks to cybersecurity and audit leadership as appropriate.</p>\n<p>This is an exciting opportunity to join a driven and collaborative Cybersecurity team at Synopsys, working alongside experts in IT, Engineering, and Business Operations. You will report to the Executive Director of Cybersecurity and play a central role in audit readiness, evidence management, and cross-functional collaboration.</p>\n<p>To be successful in this role, you will need:</p>\n<ul>\n<li>Security+ (SEC+) or equivalent industry-recognized cybersecurity certification</li>\n<li>4+ years of experience performing Information Assurance, ISSO, ISSE, or equivalent cybersecurity assurance functions</li>\n<li>2+ years supporting cybersecurity operations in a DoD or defense-adjacent enterprise environment</li>\n<li>Experience supporting NIST SP 800-171, RMF-aligned, or CMMC-related compliance activities</li>\n<li>Ability to obtain and maintain a U.S. DoD, FBI, or DHS security clearance</li>\n<li>Strong technical understanding of modern hardware, software, and enterprise infrastructure environments</li>\n<li>Familiarity with vulnerability management platforms, compliance evidence repositories, and security monitoring outputs</li>\n<li>Excellent organizational, prioritization, and time-management skills</li>\n<li>Strong analytical and problem-solving abilities with attention to detail</li>\n<li>Ability to work effectively across technical and non-technical teams to resolve complex compliance issues</li>\n<li>Strong written and verbal communication skills, including the ability to present information to leadership and stakeholder groups</li>\n<li>Demonstrated ability to manage multiple competing priorities in a high-assurance environment</li>\n</ul>\n<p>If you are a collaborative team player who thrives in cross-functional environments, detail-oriented and diligent, proactive and resourceful, clear communicator who can translate technical concepts to non-technical audiences, analytical thinker with strong problem-solving skills, adaptable and resilient, and ethical and trustworthy, committed to maintaining high standards of integrity and confidentiality, then we encourage you to apply for this exciting opportunity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a2183a2d-c20","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/morrisville/cyber-security-engineer-staff-engineer-15964/44408/93005893632","x-work-arrangement":"onsite","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$129000-$193000","x-skills-required":["Security+ (SEC+) or equivalent industry-recognized cybersecurity certification","4+ years of experience performing Information Assurance, ISSO, ISSE, or equivalent cybersecurity assurance functions","2+ years supporting cybersecurity operations in a DoD or defense-adjacent enterprise environment","Experience supporting NIST SP 800-171, RMF-aligned, or CMMC-related compliance activities","Ability to obtain and maintain a U.S. DoD, FBI, or DHS security clearance","Strong technical understanding of modern hardware, software, and enterprise infrastructure environments","Familiarity with vulnerability management platforms, compliance evidence repositories, and security monitoring outputs","Excellent organizational, prioritization, and time-management skills","Strong analytical and problem-solving abilities with attention to detail","Ability to work effectively across technical and non-technical teams to resolve complex compliance issues","Strong written and verbal communication skills, including the ability to present information to leadership and stakeholder groups","Demonstrated ability to manage multiple competing priorities in a high-assurance environment"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:21:04.730Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Morrisville"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security+ (SEC+) or equivalent industry-recognized cybersecurity certification, 4+ years of experience performing Information Assurance, ISSO, ISSE, or equivalent cybersecurity assurance functions, 2+ years supporting cybersecurity operations in a DoD or defense-adjacent enterprise environment, Experience supporting NIST SP 800-171, RMF-aligned, or CMMC-related compliance activities, Ability to obtain and maintain a U.S. DoD, FBI, or DHS security clearance, Strong technical understanding of modern hardware, software, and enterprise infrastructure environments, Familiarity with vulnerability management platforms, compliance evidence repositories, and security monitoring outputs, Excellent organizational, prioritization, and time-management skills, Strong analytical and problem-solving abilities with attention to detail, Ability to work effectively across technical and non-technical teams to resolve complex compliance issues, Strong written and verbal communication skills, including the ability to present information to leadership and stakeholder groups, Demonstrated ability to manage multiple competing priorities in a high-assurance environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":129000,"maxValue":193000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b313e462-e65"},"title":"Security Operations Engineer - Engine by Starling","description":"<p>At Engine by Starling, we are on a mission to find and work with leading banks all around the world who have the ambition to build rapid growth businesses, on our technology.</p>\n<p>Engine is Starling&#39;s software-as-a-service (SaaS) business, the technology that was built to power Starling, and two years ago we split out as a separate business. Starling has seen exceptional growth and success, and a large part of that is down to the fact that we have built our own modern technology from the ground up.</p>\n<p>This SaaS technology platform is now available to banks and financial institutions all around the world, enabling them to benefit from the innovative digital features, and efficient back-office processes that has helped achieve Starling&#39;s success.</p>\n<p>As a company, everyone is expected to roll up their sleeves to help deliver great outcomes for our clients. We are an engineering led company and we’re looking for people who are will be excited by the potential for Engine’s technology to transform banking in different markets around the world.</p>\n<p>Our purpose is underpinned by five values: Listen, Keep It Simple, Do The Right Thing, Own It, and Aim For Greatness.</p>\n<p>Hybrid Working We have a Hybrid approach to working here at Engine - our preference is that you&#39;re located within a commutable distance of one of our offices so that we&#39;re able to interact and collaborate in person.</p>\n<p>About the Role To support our growth, we are looking for talented and motivated SOC engineers to join our foundational in-house SOC team.</p>\n<p>In this pivotal role, you will be instrumental in supporting the development, implementation, and operating of our security monitoring, detection, and response capabilities, with a particular focus on our cloud environments.</p>\n<p>You&#39;ll be at the forefront of responding to incidents and alerts, and helping shape the future of our security operations capabilities.</p>\n<p>What you&#39;ll get to do:</p>\n<p>Security Monitoring &amp; Alert Triage: Monitor security alerts and events generated by various security tools, perform triage and analysis of security incidents and anomalies, distinguishing between true positives and false positives.</p>\n<p>Prioritise alerts based on severity, potential impact, and business criticality.</p>\n<p>Incident Detection &amp; Response: Investigate security incidents thoroughly, leveraging logs from platforms, endpoints, applications, and other security tools.</p>\n<p>Create and follow incident response playbooks and contribute to their continuous improvement.</p>\n<p>Collaborate with Technology, Product and Engineering Teams to contain, eradicate, and recover from security incidents.</p>\n<p>Document incident details, findings, and remediation steps accurately and comprehensively.</p>\n<p>Additionally:</p>\n<p>Stay informed about the latest cyber threats, attack techniques, and vulnerabilities, especially those targeting cloud environments.</p>\n<p>Participate in proactive threat hunting activities using available tools and data sources.</p>\n<p>Contribute to the optimisation, tuning, and maintenance of SOC tools.</p>\n<p>Identify opportunities for automation to streamline security operations and enhance detection capabilities.</p>\n<p>Maintain detailed records of security incidents, investigations, and remediation actions.</p>\n<p>Requirements:</p>\n<p>3+ years of hands-on experience in a Security Operations Center (SOC) or similar cybersecurity role.</p>\n<p>Demonstrable experience with cloud security monitoring and incident response.</p>\n<p>Familiarity with various attack vectors, threat intelligence frameworks (e.g., MITRE ATT&amp;CK).</p>\n<p>A cyber/information security related degree and/or relevant cybersecurity qualifications would be beneficial e.g. CompTIA Security+, (ISC)² SSCP or CySA+</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b313e462-e65","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Engine by Starling","sameAs":"https://www.starlingbank.com/engine/","logo":"https://logos.yubhub.co/starlingbank.com.png"},"x-apply-url":"https://apply.workable.com/j/BDF61CB32E","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cloud security monitoring","Incident response","Threat intelligence","Attack vectors","Cybersecurity","Security operations center","SOC"],"x-skills-preferred":[],"datePosted":"2026-03-20T16:16:20.527Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Cardiff"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"Cloud security monitoring, Incident response, Threat intelligence, Attack vectors, Cybersecurity, Security operations center, SOC"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_4474c998-9c7"},"title":"Cyber Security Engineer","description":"<p><strong>Cyber Security Engineer</strong></p>\n<p><strong>What we&#39;re all about</strong></p>\n<p>At Quantexa, we&#39;re a team of innovators and problem solvers who are passionate about creating real change for our clients and their industries. We&#39;re driven by a desire to do things better than the last time, and we&#39;re always looking for talented individuals to join our team.</p>\n<p><strong>The opportunity</strong></p>\n<p>We&#39;re seeking a highly skilled Cyber Security Engineer to join our Security Operations team. As a Cyber Security Engineer, you will play a key part in protecting Quantexa&#39;s systems and data from cyber threats. You will be responsible for the day-to-day operation, optimisation, and monitoring of core security platforms, with a particular focus on Zscaler, Cloud monitoring through Wiz, and Endpoint Detection and Response through CrowdStrike.</p>\n<p><strong>Responsibilities</strong></p>\n<p><strong>Wiz (Cloud Security Posture Management)</strong></p>\n<ul>\n<li>Monitor and triage Wiz findings daily, validating alerts and determining operational impact.</li>\n<li>Perform tuning and threat hunting within Wiz and other tooling.</li>\n<li>Identify misconfigurations, excessive permissions, and exposed assets, escalating where required.</li>\n<li>Track remediation progress with engineering owners and ensure closure of high-priority issues.</li>\n</ul>\n<p><strong>Zscaler (Web Security Tunnel 2.0)</strong></p>\n<ul>\n<li>Review and triage Zscaler alerts and policy violations, following documented response procedures.</li>\n<li>Investigate suspicious traffic, access attempts, and user activity to determine legitimacy and risk.</li>\n<li>Support enforcement actions by validating policy alignment and working with IT and Cloud teams to remediate issues.</li>\n<li>Monitor coverage and configuration across users and locations, identifying gaps or misconfigurations.</li>\n<li>Support policy tuning by analysing false positives and recommending rule or policy adjustments.</li>\n<li>Contribute to playbook development, operational maturity, and ongoing service readiness.</li>\n</ul>\n<p><strong>CrowdStrike (Endpoint Detection and Response)</strong></p>\n<ul>\n<li>Review and triage endpoint detections, applying documented response steps.</li>\n<li>Execute containment actions, including network isolation and sensor troubleshooting.</li>\n<li>Validate full sensor coverage across the estate and address gaps in coordination with IT.</li>\n<li>Support tuning activities by analysing false positives and proposing rule refinements.</li>\n<li>Contribute to playbook improvements and operational readiness tasks.</li>\n</ul>\n<p><strong>Security Operations</strong></p>\n<ul>\n<li>Conduct initial investigation of security incidents, collect evidence, and escalate based on severity with a keen eye on the quality of the output.</li>\n<li>Perform daily review of alerts across our SIEM, Wiz, CrowdStrike, and other platforms.</li>\n<li>Validate vulnerabilities and configuration weaknesses raised by scanning tools.</li>\n<li>Ability to interpret and operationalise threat intelligence, understand how it informs detection, prioritisation, and response activities, and clearly communicate technical threat intelligence to non-technical stakeholders.</li>\n<li>Support cloud security controls, identity hygiene checks, and network policy reviews.</li>\n<li>Contribute to the ongoing maturity and documentation of operational processes.</li>\n</ul>\n<p><strong>Collaboration and Ways of Working</strong></p>\n<ul>\n<li>Act as a trusted operational partner to the Cyber Security Manager and the wider Information Security team, providing proactive support and consistent engagement.</li>\n<li>Partner closely with DevOps, IT, and Engineering teams to drive timely and effective remediation actions.</li>\n<li>Deliver clear and concise updates on incidents and operational activities proactively, without the need for prompting.</li>\n<li>Actively participate in team stand ups, contributing constructively to continuous improvement and operational maturity.</li>\n<li>Support senior engineers with platform enhancements, integrations, and controlled change activities.</li>\n</ul>\n<p><strong>What you&#39;ll bring</strong></p>\n<ul>\n<li>Demonstrated hands-on experience with security operations, incident triage, or vulnerability management.</li>\n<li>Familiarity with EDR platforms (ideally CrowdStrike) and security telemetry analysis.</li>\n<li>Knowledge of cloud environments, particularly Azure including Entra and Conditional Access, and a good understanding of cloud security concepts.</li>\n<li>Ability to understand alert context, assess impact, and follow structured response processes.</li>\n<li>Strong attention to detail, disciplined documentation, and good communication skills.</li>\n</ul>\n<p><strong>Benefits</strong></p>\n<ul>\n<li>Competitive salary</li>\n<li>Company bonus</li>\n<li>Hybrid workplace &amp; free access to global WeWork locations &amp; events</li>\n<li>Pension Scheme with a company contribution of 6% (if you contribute 4% or more)</li>\n<li>25 days annual leave</li>\n<li>Flexible working hours</li>\n<li>Professional development opportunities</li>\n<li>Access to a range of employee benefits, including health insurance, gym membership, and more</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_4474c998-9c7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Quantexa","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/5jNMqMFg7cJnLPEDaozihW/hybrid-cyber-security-engineer-in-london-at-quantexa","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cloud Security Posture Management","Endpoint Detection and Response","Web Security","Security Operations","Threat Intelligence","Cloud Security","Azure","Conditional Access","Entra","CrowdStrike","Wiz","Zscaler","SIEM","Vulnerability Management","Incident Triage","EDR Platforms","Security Telemetry Analysis"],"x-skills-preferred":["Cloud Security Posture Management","Endpoint Detection and Response","Web Security","Security Operations","Threat Intelligence","Cloud Security","Azure","Conditional Access","Entra","CrowdStrike","Wiz","Zscaler","SIEM","Vulnerability Management","Incident Triage","EDR Platforms","Security Telemetry Analysis"],"datePosted":"2026-03-09T16:56:37.142Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Cloud Security Posture Management, Endpoint Detection and Response, Web Security, Security Operations, Threat Intelligence, Cloud Security, Azure, Conditional Access, Entra, CrowdStrike, Wiz, Zscaler, SIEM, Vulnerability Management, Incident Triage, EDR Platforms, Security Telemetry Analysis, Cloud Security Posture Management, Endpoint Detection and Response, Web Security, Security Operations, Threat Intelligence, Cloud Security, Azure, Conditional Access, Entra, CrowdStrike, Wiz, Zscaler, SIEM, Vulnerability Management, Incident Triage, EDR Platforms, Security Telemetry Analysis"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d2955c92-774"},"title":"Network Security Engineering Enterprise Architect (GSR8)","description":"<p>As a Network Security Engineering Enterprise Architect (GSR8), you will be a technical lead supporting Ford&#39;s complete Enterprise Network &amp; Security architecture transformation. You will be taking care of dynamics for Network Security Engineering Products (Security Firewalls, Proxy, ISE, SDN Networks, Wireless) team to a centre of technical excellence and customer Advocacy.</p>\n<p>You will identify, analyse, and resolve existing network security design weaknesses and vulnerabilities which could possess risk to existing infrastructure. Expert in closing zero-day security vulnerabilities taking along all infrastructure domain teams which could impact Ford&#39;s reputation across globe.</p>\n<p>As a Network Security Engineering enterprise architect, you would lead future network security product development by contributing to the network Design (architecture) and Automation used across multiple Engineering Branches, Data Centres, Manufacturing Plants and Remote users.</p>\n<p>This Role requires defining road map for ZTNA/SASE deployment using Prisma Access/Cloud, setup support model, automation to accelerate end user experience. The Global Network Security Engineering enterprise architect is responsible for successful setup of the products by working closely with Software developers from Ford and OEMs in consultation with Ford&#39;s Network and Security Operations Team.</p>\n<p>This position will be part of Ford&#39;s Enterprise Tech department and will report to the Regional Network Delivery Manager, based in same or another region. The lead needs to ensure &#39;Always On&#39; (24 x 7) availability of Ford Global Network Product offerings, working with Network &amp; Security Peers from other regions.</p>\n<p><strong>Responsibilities</strong></p>\n<p>This role will also be driving towards supporting full observability and Monitoring, process response, and technical capability to ensure customer up time of 99.999%+. This position requires a wide range of skills and experience,</p>\n<ul>\n<li>This role involves collaborating closely with the network operations team to identify continuous improvement opportunities and working with the network engineering team and OEMs to devise and implement solutions. The implementation will be driven through automation in partnership with Ford&#39;s developers.</li>\n<li>Design and implement robust security architectures and frameworks to protect against threats and vulnerabilities.</li>\n<li>Ensure timely proactive identification and reporting of security gaps and vulnerabilities to the critical business information, systems and network infrastructure.</li>\n<li>Plan for End-to-end Network &amp; Security projects implementation.</li>\n</ul>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li>Support the Major technical Incident Management Calls and Change Controls through STRONG Technical Network Knowledge, Operational capability, and strong communication skills.</li>\n<li>Perform configuration updates, such as modifying configurations, signature definitions or implementing new policies on various network security tools, as directed.</li>\n<li>Demonstrate technical excellence through technical knowledge.</li>\n<li>Collaborate with global leaders to support 24/7 network availability on a worldwide scale.</li>\n<li>Advocate and ensure that high quality Follow the Sun (FTS) is delivered to receiving teams. As well as support on-call schedule and shifts are available.</li>\n<li>Support continuous improvement in service management for Network Services leveraging enterprise tools and processes (Incident, Problem &amp; Change) and focusing on customer value optimization.</li>\n<li>Supports implement best practices and processes for Network &amp; Security Operations services to maintain availability, reliability, scalability, and security.</li>\n<li>Support for effective SRE Monitoring and FSO (Full Stack Observability) on system performance and overall health, troubleshoot issues, and implement corrective actions.</li>\n<li>Collaborate with the Network LAN/WAN &amp; security Engineering/development teams to optimize infrastructure for application performance and scalability.</li>\n<li>Support team members to achieve technical network excellence thru experience, and network Certifications and support training requirements.</li>\n<li>Able to support the team to develop continued improvements leading to an &#39;always on network capability.</li>\n<li>Be able to leverage other network management tools used by the NOC in the identification and response to security connectivity incidents and faults.</li>\n<li>Develop security policies, standards, and procedures.</li>\n<li>Assist with security compliance audits to verify completeness of required configurations and verify system hardening.</li>\n<li>Participate in the problem investigation connectivity incidents related to security devices, provide recommendations to improve reliability and availability, or reduce recovery time.</li>\n<li>Support assurance of up-to-date SW releases, targeted LDOS, and PSIRTS (security updates).</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d2955c92-774","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Ford","sameAs":"https://efds.fa.em5.oraclecloud.com"},"x-apply-url":"https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/56878","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Network Security Engineering","Enterprise Architecture","Security Firewalls","Proxy","ISE","SDN Networks","Wireless","Prisma Access/Cloud","ZTNA/SASE","Automation","Network Design","Network Security","Security Operations","Incident Management","Change Controls","Technical Knowledge","Global Leadership","Follow the Sun","SRE Monitoring","FSO","Full Stack Observability","System Performance","Network Certifications","Training Requirements"],"x-skills-preferred":[],"datePosted":"2026-03-09T10:59:07.843Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Chennai, Tamil Nadu, India"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Automotive","skills":"Network Security Engineering, Enterprise Architecture, Security Firewalls, Proxy, ISE, SDN Networks, Wireless, Prisma Access/Cloud, ZTNA/SASE, Automation, Network Design, Network Security, Security Operations, Incident Management, Change Controls, Technical Knowledge, Global Leadership, Follow the Sun, SRE Monitoring, FSO, Full Stack Observability, System Performance, Network Certifications, Training Requirements"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ebf5cbaa-e0f"},"title":"Campus Security Manager","description":"<p><strong>About the Role:</strong></p>\n<p>As part of Anthropic&#39;s Global Safety, Intelligence, and Security (GSIS) team, the NYC Campus Security Manager serves as the operational security leader for Anthropic&#39;s New York City campuses. This position offers the opportunity to lead comprehensive security operations protecting cutting-edge AI research while building trust and security culture with Anthropic personnel.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li><strong>Campus Security Operations:</strong> Lead comprehensive security operations for NYC-based campuses, ensuring safety, security, and well-being of all employees, visitors, and assets</li>\n<li><strong>Security Culture &amp; Trust Building:</strong> Serve as approachable security partner who builds trust with Anthropic personnel, fostering open communication and integrating security practices into daily operations without creating barriers to productivity</li>\n<li><strong>Strategic Planning:</strong> Develop and implement security strategies for NYC campus that align with Anthropic&#39;s growth and evolving threat landscape</li>\n<li><strong>Team Leadership:</strong> Train and coordinate security personnel and vendors, fostering culture of professionalism and continuous improvement</li>\n<li><strong>Emergency Response:</strong> Lead and coordinate emergency response efforts for NYC campus, ensuring rapid and effective reactions to fires, medical emergencies, or security breaches</li>\n<li><strong>Community Relations:</strong> Build strong relationships with New York City Police Department, local emergency services, and community leaders to enhance campus security</li>\n<li><strong>Access Control:</strong> Partner with Access Risk Management on administration of access control systems, managing permissions and auditing access logs</li>\n<li><strong>Security Technology:</strong> Work with IT and cross-functional teams to integrate and optimize campus security technologies</li>\n<li><strong>Security Project Management:</strong> Manage security aspects of office remediations, process improvements, and new real estate needs, contributing strategic security requirements for NYC campus development</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have a passion for creating safe, secure environments that foster productivity and well-being</li>\n<li>Possess strong leadership skills and have experience coordinating security teams and vendors</li>\n<li>Are adept at building relationships with various stakeholders, including law enforcement and community leaders</li>\n<li>Have excellent crisis management skills and can lead effectively under pressure</li>\n<li>Are knowledgeable about physical security technologies and their applications in campus settings</li>\n<li>Are an effective communicator, able to convey security concepts to a wide audience</li>\n<li>Have 8+ years of progressive experience in security operations leadership or campus security management</li>\n<li>Based in or willing to relocate to New York City with ability to work on-site full-time</li>\n<li>Comfortable supporting operations that may require a flexible schedule including 24/7 on-call rotation and after-hours response</li>\n</ul>\n<p><strong>Strong candidates may have:</strong></p>\n<ul>\n<li>Experience securing high-profile or high-risk campus environments in technology or research sectors</li>\n<li>Professional security certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional)</li>\n<li>Bachelor&#39;s degree in Security Management, Criminal Justice, Emergency Management, or related fields</li>\n<li>Background in technology company security operations or R&amp;D facility security management</li>\n<li>Previous experience in law enforcement, military, or executive protection with transition to corporate security</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed.  Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important,</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ebf5cbaa-e0f","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5099202008","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$175,000 - $220,000USD","x-skills-required":["security operations leadership","campus security management","physical security technologies","access control systems","security project management"],"x-skills-preferred":["security certifications","emergency management","technology company security operations","R&D facility security management","law enforcement","military","executive protection"],"datePosted":"2026-03-08T13:59:10.414Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York City"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"security operations leadership, campus security management, physical security technologies, access control systems, security project management, security certifications, emergency management, technology company security operations, R&D facility security management, law enforcement, military, executive protection","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":175000,"maxValue":220000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_18528dac-ae1"},"title":"Threat Collections Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Role</strong></p>\n<p>We are looking for a Threat Collections Engineer to join our Threat Intelligence team. In this role, you will build the infrastructure that powers our threat discovery capabilities—integrating external data sources, developing detection systems for automated lead generation, and creating internal tooling that scales our investigators&#39; impact.</p>\n<p>This is a foundational engineering role on a small, high-impact team. You will take projects from proof-of-concept to production, work closely with investigators to understand their needs, and help scale what may become a multi-person collections function.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build automated detection systems that use disparate signals to identify abusive behaviour.</li>\n<li>Take systems from idea to proof-of-concept to production-grade with appropriate monitoring, documentation, and maintenance processes</li>\n<li>Develop and maintain YARA rule infrastructure, including tools for writing, validating, and testing rules against real data</li>\n<li>Create integrations with external threat intelligence platforms (e.g. VirusTotal, Censys, Urlscan) via MCP servers to enable multi-source correlation during investigations</li>\n<li>Build data pipelines that ingest intelligence from RSS feeds, CTI news sources, and partner sharing, using Claude to extract TTPs and generate targeted hunting queries</li>\n<li>Develop behavioural analytics capabilities using DBT-based frameworks and create searchable audit logging infrastructure</li>\n<li>Establish feedback loops with investigators to tune detection systems and reduce false positives</li>\n<li>Scrape and normalise data from external sources to feed threat detection and enrichment workflows</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have strong coding proficiency in Python and SQL for building detection logic, data pipelines, and automation</li>\n<li>Have experience with data pipeline orchestration tools (Airflow, DBT, or similar)</li>\n<li>Have familiarity with threat intelligence concepts including IOCs, YARA rules, and threat correlation techniques</li>\n<li>Have experience integrating external APIs and building data ingestion systems</li>\n<li>Can translate investigator needs and workflows into technical requirements</li>\n<li>Are comfortable building v0 systems and iterating based on user feedback</li>\n<li>Have strong communication skills for working closely with non-engineering stakeholders</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Experience with threat intelligence sharing frameworks (e.g. MISP, STIX/TAXII)</li>\n<li>Background in cyber threat intelligence, security operations, or abuse detection</li>\n<li>Experience building MCP servers or similar tool integrations for AI systems</li>\n<li>Familiarity with web scraping and data extraction at scale</li>\n<li>Experience with behavioural analytics or anomaly detection systems</li>\n<li>Understanding of LLM capabilities and how to leverage them for automation</li>\n<li>A Top Secret Clearance</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.** Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</strong></p>\n<p><strong>Your safety matters to us.** To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics as it does with computer science.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_18528dac-ae1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5074937008","x-work-arrangement":"remote","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$300,000 - $320,000 USD","x-skills-required":["Python","SQL","Airflow","DBT","YARA rules","Threat intelligence","API integration","Data ingestion","Web scraping","Data extraction"],"x-skills-preferred":["MISP","STIX/TAXII","Cyber threat intelligence","Security operations","Abuse detection","LLM capabilities","Automation"],"datePosted":"2026-03-08T13:53:41.541Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, SQL, Airflow, DBT, YARA rules, Threat intelligence, API integration, Data ingestion, Web scraping, Data extraction, MISP, STIX/TAXII, Cyber threat intelligence, Security operations, Abuse detection, LLM capabilities, Automation","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":320000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c4307896-981"},"title":"Security Software Engineer, Detection & Response Platform","description":"<p><strong>About the role</strong></p>\n<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build AI-powered platform responsible for all aspects of D&amp;R capabilities from detection development to incident response</li>\n<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>\n<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>\n<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>\n<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>\n<li>Mentor engineers and contribute to hiring and growth of the Security team</li>\n<li>Participate in on-call shifts</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>7+ years of experience in software engineering with a focus on security, infrastructure and/or data pipelines</li>\n<li>Track record of building and maintaining internal developer tools or security platforms</li>\n<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>\n</ul>\n<p><strong>Strong candidates may also have experience with:</strong></p>\n<ul>\n<li>Experience building security tooling from the ground up</li>\n<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>\n<li>Background in detection engineering or security operations</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c4307896-981","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4595463008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$320,000 - $405,000USD","x-skills-required":["Test-driven software development","CI/CD","Infrastructure-as-code","Query optimization for large datasets","Cloud infrastructure","Serverless architectures","Python","Security teams","Translation of requirements into technical solutions"],"x-skills-preferred":["SOAR platform/automation development","Data lake / Database architecture","API design and internal platform creation","ML/AI to security problems","Scaling security operations in a high-growth environment"],"datePosted":"2026-03-08T13:53:20.136Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Test-driven software development, CI/CD, Infrastructure-as-code, Query optimization for large datasets, Cloud infrastructure, Serverless architectures, Python, Security teams, Translation of requirements into technical solutions, SOAR platform/automation development, Data lake / Database architecture, API design and internal platform creation, ML/AI to security problems, Scaling security operations in a high-growth environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":320000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_bca7b9c2-2e3"},"title":"Senior Security Software Engineer, eBPF & Security Sensors","description":"<p><strong>About the Role</strong></p>\n<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Build an AI-powered platform responsible for all aspects of detection and response capabilities, from detection development to incident response</li>\n<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>\n<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>\n<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>\n<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>\n<li>Mentor engineers and contribute to hiring and growth of the Security team</li>\n<li>Participate in on-call rotations</li>\n</ul>\n<p><strong>You may be a good fit if you</strong></p>\n<ul>\n<li>7+ years of experience in software engineering with a focus on security, infrastructure, or data pipelines</li>\n<li>Track record of building and maintaining internal developer tools or security platforms</li>\n<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>\n<li>Experience with test-driven software development or CI/CD (a plus for direct experience with detection-as-code workflows)</li>\n<li>Experience with infrastructure-as-code (Terraform, CloudFormation)</li>\n<li>Experience with query optimization for large datasets</li>\n<li>Experience building stable and scalable services on cloud infrastructure and serverless architectures</li>\n<li>Ability to write maintainable and secure code in Python</li>\n<li>Experience working with security teams and translating requirements into technical solutions</li>\n<li>Ability to lead technical projects with minimal guidance</li>\n<li>Track record of driving engineering excellence through high standards, constructive code reviews, and mentorship</li>\n<li>Ability to lead cross-functional security initiatives and navigate complex organizational dynamics</li>\n<li>Strong communication skills with the ability to translate technical concepts effectively across all organizational levels</li>\n<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>\n<li>Strong systems thinking with ability to identify and mitigate risks in complex environments</li>\n</ul>\n<p><strong>Strong candidates may also have experience with</strong></p>\n<ul>\n<li>Experience building security tooling from the ground up</li>\n<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>\n<li>Background in detection engineering or security operations</li>\n<li>Experience with SOAR platform or automation development</li>\n<li>Experience with data lake or database architecture</li>\n<li>Experience with API design and internal platform creation</li>\n<li>Track record of applying ML/AI to security problems</li>\n<li>Experience scaling security operations in a high-growth environment</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>\n<p><strong>Your safety matters to us.</strong> To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_bca7b9c2-2e3","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5108521008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["software engineering","security","infrastructure","data pipelines","ML-powered detection systems","Claude","Python","Terraform","CloudFormation","query optimization","альную services","cloud infrastructure","serverless architectures"],"x-skills-preferred":["security tooling","SIEM","log aggregation","EDR","SOAR platform","automation development","data lake","database architecture","API design","internal platform creation","ML/AI to security problems","scaling security operations"],"datePosted":"2026-03-08T13:44:48.991Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, security, infrastructure, data pipelines, ML-powered detection systems, Claude, Python, Terraform, CloudFormation, query optimization, альную services, cloud infrastructure, serverless architectures, security tooling, SIEM, log aggregation, EDR, SOAR platform, automation development, data lake, database architecture, API design, internal platform creation, ML/AI to security problems, scaling security operations"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_dddefc35-d98"},"title":"Product Manager, Codex","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Product Manager, Codex</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Location Type</strong></p>\n<p>On-site</p>\n<p><strong>Department</strong></p>\n<p>Product Management</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$255K – $325K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>With Codex we’re building an AI software engineer. One that you can pair with, delegate to, or even ask to take on future tasks proactively. Our team is a fast-moving group within OpenAI, bringing together research, engineering, design, and product. We iteratively build the Codex agent harness and product to get the most out of the model, and we iteratively train the model to be great in the Codex.</p>\n<p><strong>About the Role</strong></p>\n<p>As the product manager on Codex, you will lead the development of a highly technical product designed for a technical audience. Much of the work is 0–1, requiring you to shape product direction amid ambiguity and shape what the future of agents will look like. You’ll partner closely with world-class engineers and researchers to bring cutting-edge capabilities into the hands of developers, and you’ll shape how our AI tools support software development workflows.</p>\n<p>This role is based in San Francisco, CA. We use a hybrid work model of 3 days in the office per week and offer relocation assistance to new employees.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Shape product strategy for Codex, from early concepts through launch and iteration.</li>\n</ul>\n<ul>\n<li>Collaborate with engineering and research to translate breakthroughs into usable, high-value developer experiences.</li>\n</ul>\n<ul>\n<li>Deeply understand developer workflows and identify opportunities where AI can make them faster, more intuitive, and more powerful.</li>\n</ul>\n<ul>\n<li>Navigate ambiguity and make thoughtful trade-offs in 0–1 product environments.</li>\n</ul>\n<ul>\n<li>Partner with cross-functional teams to deliver quickly while maintaining a high bar for technical quality and user experience.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Bring a strong technical background and have recently shipped code to production</li>\n</ul>\n<ul>\n<li>Have a deep intuition for developer workflows and a passion for building tools that make coding more productive and enjoyable.</li>\n</ul>\n<ul>\n<li>Can define product direction in ambiguous, 0–1 environments and rally teams around it.</li>\n</ul>\n<ul>\n<li>Demonstrate strong product intuition, making thoughtful prioritization and sequencing decisions.</li>\n</ul>\n<ul>\n<li>Have experience driving execution across engineering, design, and research.</li>\n</ul>\n<ul>\n<li>Bring an entrepreneurial mindset and adaptability, whether from startup or high-growth company environments.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_dddefc35-d98","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/14adce00-7414-40cf-bec2-3871c289a54d","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$255K – $325K • Offers Equity","x-skills-required":["Product Management","Technical Product Management","Product Development","Product Strategy","Product Launch","Product Iteration","Engineering","Research","Design","Developer Experience","Software Development Workflows","AI","Machine Learning","Deep Learning","Natural Language Processing","Computer Vision","Robotics","Data Science","Data Analysis","Data Visualization","Statistics","Probability","Mathematics","Programming","Coding","Software Development","DevOps","Cloud Computing","Containerization","Orchestration","Kubernetes","Docker","AWS","Azure","Google Cloud","GCP","Cloud Security","Cloud Compliance","Cloud Governance","Cloud Cost Optimization","Cloud Performance Optimization","Cloud Scalability Optimization","Cloud Reliability Optimization","Cloud Resilience Optimization","Cloud Recovery Optimization","Cloud Backup Optimization","Cloud Disaster Recovery Optimization","Cloud Business Continuity Optimization","Cloud Security Architecture","Cloud Compliance Architecture","Cloud Governance Architecture","Cloud Cost Optimization Architecture","Cloud Performance Optimization Architecture","Cloud Scalability Optimization Architecture","Cloud Reliability Optimization Architecture","Cloud Resilience Optimization Architecture","Cloud Recovery Optimization Architecture","Cloud Backup Optimization Architecture","Cloud Disaster Recovery Optimization Architecture","Cloud Business Continuity Optimization Architecture","Cloud Security Engineering","Cloud Compliance Engineering","Cloud Governance Engineering","Cloud Cost Optimization Engineering","Cloud Performance Optimization Engineering","Cloud Scalability Optimization Engineering","Cloud Reliability Optimization Engineering","Cloud Resilience Optimization Engineering","Cloud Recovery Optimization Engineering","Cloud Backup Optimization Engineering","Cloud Disaster Recovery Optimization Engineering","Cloud Business Continuity Optimization Engineering","Cloud Security Operations","Cloud Compliance Operations","Cloud Governance Operations","Cloud Cost Optimization Operations","Cloud Performance Optimization Operations","Cloud Scalability Optimization Operations","Cloud Reliability Optimization Operations","Cloud Resilience Optimization Operations","Cloud Recovery Optimization Operations","Cloud Backup Optimization Operations","Cloud Disaster Recovery Optimization Operations","Cloud Business Continuity Optimization Operations","Cloud Security Management","Cloud Compliance Management","Cloud Governance Management","Cloud Cost Optimization Management","Cloud Performance Optimization Management","Cloud Scalability Optimization Management","Cloud Reliability Optimization Management","Cloud Resilience Optimization Management","Cloud Recovery Optimization Management","Cloud Backup Optimization Management","Cloud Disaster Recovery Optimization Management","Cloud Business Continuity Optimization Management","Cloud Security Architecture","Cloud Compliance Architecture","Cloud Governance Architecture","Cloud Cost Optimization Architecture","Cloud Performance Optimization Architecture","Cloud Scalability Optimization Architecture","Cloud Reliability Optimization Architecture","Cloud Resilience Optimization Architecture","Cloud Recovery Optimization Architecture","Cloud Backup Optimization Architecture","Cloud Disaster Recovery Optimization Architecture","Cloud Business Continuity Optimization Architecture","Cloud Security Engineering","Cloud Compliance Engineering","Cloud Governance Engineering","Cloud Cost Optimization Engineering","Cloud Performance Optimization Engineering","Cloud Scalability Optimization Engineering","Cloud Reliability Optimization Engineering","Cloud Resilience Optimization Engineering","Cloud Recovery Optimization Engineering","Cloud Backup Optimization Engineering","Cloud Disaster Recovery Optimization Engineering","Cloud Business Continuity Optimization Engineering","Cloud Security Operations","Cloud Compliance Operations","Cloud Governance Operations","Cloud Cost Optimization Operations","Cloud Performance Optimization Operations","Cloud Scalability Optimization Operations","Cloud Reliability Optimization Operations","Cloud Resilience Optimization Operations","Cloud Recovery Optimization Operations","Cloud Backup Optimization Operations","Cloud Disaster Recovery Optimization Operations","Cloud Business Continuity Optimization Operations","Cloud Security Management","Cloud Compliance Management","Cloud Governance Management","Cloud Cost Optimization Management","Cloud Performance Optimization Management","Cloud Scalability Optimization Management","Cloud Reliability Optimization Management","Cloud Resilience Optimization Management","Cloud Recovery Optimization Management","Cloud Backup Optimization Management","Cloud Disaster Recovery Optimization Management","Cloud Business Continuity Optimization Management"],"x-skills-preferred":["Product Management","Technical Product Management","Product Development","Product Strategy","Product Launch","Product Iteration","Engineering","Research","Design","Developer Experience","Software Development Workflows","AI","Machine Learning","Deep Learning","Natural Language Processing","Computer Vision","Robotics","Data Science","Data Analysis","Data Visualization","Statistics","Probability","Mathematics","Programming","Coding","Software Development","DevOps","Cloud Computing","Containerization","Orchestration","Kubernetes","Docker","AWS","Azure","Google Cloud","GCP","Cloud Security","Cloud Compliance","Cloud Governance","Cloud Cost Optimization","Cloud Performance Optimization","Cloud Scalability Optimization","Cloud Reliability Optimization","Cloud Resilience Optimization","Cloud Recovery Optimization","Cloud Backup Optimization","Cloud Disaster Recovery Optimization","Cloud Business Continuity Optimization","Cloud Security Architecture","Cloud Compliance Architecture","Cloud Governance Architecture","Cloud Cost Optimization Architecture","Cloud Performance Optimization Architecture","Cloud Scalability Optimization Architecture","Cloud Reliability Optimization Architecture","Cloud Resilience Optimization Architecture","Cloud Recovery Optimization Architecture","Cloud Backup Optimization Architecture","Cloud Disaster Recovery Optimization Architecture","Cloud Business Continuity Optimization Architecture","Cloud Security Engineering","Cloud Compliance Engineering","Cloud Governance Engineering","Cloud Cost Optimization Engineering","Cloud Performance Optimization Engineering","Cloud Scalability Optimization Engineering","Cloud Reliability Optimization Engineering","Cloud Resilience Optimization Engineering","Cloud Recovery Optimization Engineering","Cloud Backup Optimization Engineering","Cloud Disaster Recovery Optimization Engineering","Cloud Business Continuity Optimization Engineering","Cloud Security Operations","Cloud Compliance Operations","Cloud Governance Operations","Cloud Cost Optimization Operations","Cloud Performance Optimization Operations","Cloud Scalability Optimization Operations","Cloud Reliability Optimization Operations","Cloud Resilience Optimization Operations","Cloud Recovery Optimization Operations","Cloud Backup Optimization Operations","Cloud Disaster Recovery Optimization Operations","Cloud Business Continuity Optimization Operations","Cloud Security Management","Cloud Compliance Management","Cloud Governance Management","Cloud Cost Optimization Management","Cloud Performance Optimization Management","Cloud Scalability Optimization Management","Cloud Reliability Optimization Management","Cloud Resilience Optimization Management","Cloud Recovery Optimization Management","Cloud Backup Optimization Management","Cloud Disaster Recovery Optimization Management","Cloud Business Continuity Optimization Management"],"datePosted":"2026-03-06T18:36:25.772Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Product Management, Technical Product Management, Product Development, Product Strategy, Product Launch, Product Iteration, Engineering, Research, Design, Developer Experience, Software Development Workflows, AI, Machine Learning, Deep Learning, Natural Language Processing, Computer Vision, Robotics, Data Science, Data Analysis, Data Visualization, Statistics, Probability, Mathematics, Programming, Coding, Software Development, DevOps, Cloud Computing, Containerization, Orchestration, Kubernetes, Docker, AWS, Azure, Google Cloud, GCP, Cloud Security, Cloud Compliance, Cloud Governance, Cloud Cost Optimization, Cloud Performance Optimization, Cloud Scalability Optimization, Cloud Reliability Optimization, Cloud Resilience Optimization, Cloud Recovery Optimization, Cloud Backup Optimization, Cloud Disaster Recovery Optimization, Cloud Business Continuity Optimization, Cloud Security Architecture, Cloud Compliance Architecture, Cloud Governance Architecture, Cloud Cost Optimization Architecture, Cloud Performance Optimization Architecture, Cloud Scalability Optimization Architecture, Cloud Reliability Optimization Architecture, Cloud Resilience Optimization Architecture, Cloud Recovery Optimization Architecture, Cloud Backup Optimization Architecture, Cloud Disaster Recovery Optimization Architecture, Cloud Business Continuity Optimization Architecture, Cloud Security Engineering, Cloud Compliance Engineering, Cloud Governance Engineering, Cloud Cost Optimization Engineering, Cloud Performance Optimization Engineering, Cloud Scalability Optimization Engineering, Cloud Reliability Optimization Engineering, Cloud Resilience Optimization Engineering, Cloud Recovery Optimization Engineering, Cloud Backup Optimization Engineering, Cloud Disaster Recovery Optimization Engineering, Cloud Business Continuity Optimization Engineering, Cloud Security Operations, Cloud Compliance Operations, Cloud Governance Operations, Cloud Cost Optimization Operations, Cloud Performance Optimization Operations, Cloud Scalability Optimization Operations, Cloud Reliability Optimization Operations, Cloud Resilience Optimization Operations, Cloud Recovery Optimization Operations, Cloud Backup Optimization Operations, Cloud Disaster Recovery Optimization Operations, Cloud Business Continuity Optimization Operations, Cloud Security Management, Cloud Compliance Management, Cloud Governance Management, Cloud Cost Optimization Management, Cloud Performance Optimization Management, Cloud Scalability Optimization Management, Cloud Reliability Optimization Management, Cloud Resilience Optimization Management, Cloud Recovery Optimization Management, Cloud Backup Optimization Management, Cloud Disaster Recovery Optimization Management, Cloud Business Continuity Optimization Management, Cloud Security Architecture, Cloud Compliance Architecture, Cloud Governance Architecture, Cloud Cost Optimization Architecture, Cloud Performance Optimization Architecture, Cloud Scalability Optimization Architecture, Cloud Reliability Optimization Architecture, Cloud Resilience Optimization Architecture, Cloud Recovery Optimization Architecture, Cloud Backup Optimization Architecture, Cloud Disaster Recovery Optimization Architecture, Cloud Business Continuity Optimization Architecture, Cloud Security Engineering, Cloud Compliance Engineering, Cloud Governance Engineering, Cloud Cost Optimization Engineering, Cloud Performance Optimization Engineering, Cloud Scalability Optimization Engineering, Cloud Reliability Optimization Engineering, Cloud Resilience Optimization Engineering, Cloud Recovery Optimization Engineering, Cloud Backup Optimization Engineering, Cloud Disaster Recovery Optimization Engineering, Cloud Business Continuity Optimization Engineering, Cloud Security Operations, Cloud Compliance Operations, Cloud Governance Operations, Cloud Cost Optimization Operations, Cloud Performance Optimization Operations, Cloud Scalability Optimization Operations, Cloud Reliability Optimization Operations, Cloud Resilience Optimization Operations, Cloud Recovery Optimization Operations, Cloud Backup Optimization Operations, Cloud Disaster Recovery Optimization Operations, Cloud Business Continuity Optimization Operations, Cloud Security Management, Cloud Compliance Management, Cloud Governance Management, Cloud Cost Optimization Management, Cloud Performance Optimization Management, Cloud Scalability Optimization Management, Cloud Reliability Optimization Management, Cloud Resilience Optimization Management, Cloud Recovery Optimization Management, Cloud Backup Optimization Management, Cloud Disaster Recovery Optimization Management, Cloud Business Continuity Optimization Management, Product Management, Technical Product Management, Product Development, Product Strategy, Product Launch, Product Iteration, Engineering, Research, Design, Developer Experience, Software Development Workflows, AI, Machine Learning, Deep Learning, Natural Language Processing, Computer Vision, Robotics, Data Science, Data Analysis, Data Visualization, Statistics, Probability, Mathematics, Programming, Coding, Software Development, DevOps, Cloud Computing, Containerization, Orchestration, Kubernetes, Docker, AWS, Azure, Google Cloud, GCP, Cloud Security, Cloud Compliance, Cloud Governance, Cloud Cost Optimization, Cloud Performance Optimization, Cloud Scalability Optimization, Cloud Reliability Optimization, Cloud Resilience Optimization, Cloud Recovery Optimization, Cloud Backup Optimization, Cloud Disaster Recovery Optimization, Cloud Business Continuity Optimization, Cloud Security Architecture, Cloud Compliance Architecture, Cloud Governance Architecture, Cloud Cost Optimization Architecture, Cloud Performance Optimization Architecture, Cloud Scalability Optimization Architecture, Cloud Reliability Optimization Architecture, Cloud Resilience Optimization Architecture, Cloud Recovery Optimization Architecture, Cloud Backup Optimization Architecture, Cloud Disaster Recovery Optimization Architecture, Cloud Business Continuity Optimization Architecture, Cloud Security Engineering, Cloud Compliance Engineering, Cloud Governance Engineering, Cloud Cost Optimization Engineering, Cloud Performance Optimization Engineering, Cloud Scalability Optimization Engineering, Cloud Reliability Optimization Engineering, Cloud Resilience Optimization Engineering, Cloud Recovery Optimization Engineering, Cloud Backup Optimization Engineering, Cloud Disaster Recovery Optimization Engineering, Cloud Business Continuity Optimization Engineering, Cloud Security Operations, Cloud Compliance Operations, Cloud Governance Operations, Cloud Cost Optimization Operations, Cloud Performance Optimization Operations, Cloud Scalability Optimization Operations, Cloud Reliability Optimization Operations, Cloud Resilience Optimization Operations, Cloud Recovery Optimization Operations, Cloud Backup Optimization Operations, Cloud Disaster Recovery Optimization Operations, Cloud Business Continuity Optimization Operations, Cloud Security Management, Cloud Compliance Management, Cloud Governance Management, Cloud Cost Optimization Management, Cloud Performance Optimization Management, Cloud Scalability Optimization Management, Cloud Reliability Optimization Management, Cloud Resilience Optimization Management, Cloud Recovery Optimization Management, Cloud Backup Optimization Management, Cloud Disaster Recovery Optimization Management, Cloud Business Continuity Optimization Management","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":255000,"maxValue":325000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9152bb38-f8b"},"title":"Global Detection and Response Lead","description":"<p><strong>Global Detection and Response Lead</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>San Francisco $347K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>OpenAI’s Security organization exists to enable safe, responsible innovation at scale. As our systems, infrastructure, and research footprint grow, we invest deeply in world-class security capabilities that protect our people, products, and users without slowing progress.</p>\n<p>This organization safeguards OpenAI’s environments by building advanced detection systems, driving real-time response capabilities, scaling telemetry and logging infrastructure, and delivering actionable threat intelligence to stay ahead of adversaries.</p>\n<p><strong>About the Role</strong></p>\n<p>We are seeking a <strong>Global Detection and Response Lead</strong> to own and scale OpenAI’s cybersecurity detection and response operations. In this role, you will set the strategy and drive execution for security monitoring, incident response, recovery, and post-incident improvements across our global infrastructure.</p>\n<p>You will be a hands-on leader with deep technical credibility and strong operational instincts. You will build and mentor high-performing teams, partner closely with Infrastructure, Research, Product Security, Enterprise Security, IT, and Engineering, and ensure that detection and response capabilities are embedded by design into the systems that power OpenAI.</p>\n<p>This is a strategic and practical leadership role requiring deep technical credibility, operational rigor, and the ability to build high-performing teams in a fast-moving environment.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Oversee global detection and response operations, including continuous monitoring, triage, investigation, containment, and remediation of security events across a diverse set of networks and infrastructure.</li>\n</ul>\n<ul>\n<li>Lead, mentor, and directly manage several small teams of senior engineers across observability, detection and response, and threat intelligence. Hire and scale these functions deliberately and proportionately as OpenAI’s compute footprint and platform ambitions grow.</li>\n</ul>\n<ul>\n<li>Ensure world-class operational rigor and readiness through management of incident playbooks, on-call and escalation paths, tabletop exercises, and continuous improvement of response quality and speed.</li>\n</ul>\n<ul>\n<li>Improve detection quality and coverage by partnering with engineering teams to ensure critical telemetry is available, reliable, and actionable across cloud, corporate, and production environments.</li>\n</ul>\n<ul>\n<li>Deeply partner across all of OpenAI to evaluate and respond to emergent security concerns in a frontier AI lab environment, such as detection and response strategies for agents operating across infrastructure at scale.</li>\n</ul>\n<ul>\n<li>Build a world-class security program capable of withstanding tier-1 adversaries by maximally embracing our own models to solve frontier security problems.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have 10+ years in cybersecurity with deep expertise in detection engineering, incident response, and security operations.</li>\n</ul>\n<ul>\n<li>Have an active U.S. Government security clearance (Top Secret) or willingness and eligibility to obtain one.</li>\n</ul>\n<ul>\n<li>Are mission-oriented, have unimpeachable integrity, and are passionate and motivated to detect and respond to adversaries in a highly complex, fast-paced environment.</li>\n</ul>\n<ul>\n<li>Have deep experience building and leading detection and response, instrumentation/observability, and threat intelligence teams across a global footprint, including airgapped and sovereign environments.</li>\n</ul>\n<ul>\n<li>Have stellar leadership skills, and a demonstrated history of driving durable, and continuous improvements to programs, processes, and people.</li>\n</ul>\n<ul>\n<li>Have exceptional written and verbal communication skills, can remain calm under pressure, and can effectively run command of security incidents involving numerous stakeholders across a diverse gamut of teams, expertise, and seniority.</li>\n</ul>\n<ul>\n<li>Have deep expertise in modern observability stacks (e.g., SIEM, data lakes, EDR, cloud telemetry, logging) and detection primi</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9152bb38-f8b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/c8855563-e744-4fa0-a497-34c8d25d2d76","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$347K – $490K","x-skills-required":["cybersecurity","detection engineering","incident response","security operations","observability","threat intelligence","cloud telemetry","logging","SIEM","data lakes","EDR"],"x-skills-preferred":[],"datePosted":"2026-03-06T18:32:16.205Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, detection engineering, incident response, security operations, observability, threat intelligence, cloud telemetry, logging, SIEM, data lakes, EDR","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":347000,"maxValue":490000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3469e687-cba"},"title":"Offensive Security Engineer, Agent Security","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Offensive Security Engineer, Agent Security</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco; New York City; Remote - US; Seattle; Washington, DC</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>San Francisco, Seattle, New York$347K – $490K • Offers Equity</li>\n<li>Zone A$312.3K – $490K • Offers Equity</li>\n<li>Zone B$277.6K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI’s technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.</p>\n<p><strong>About the Role</strong></p>\n<p>We&#39;re seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI&#39;s security posture. This role isn&#39;t your typical red team job - it&#39;s an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization.</p>\n<p>You&#39;ll have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy.</p>\n<p>This role will be primarily focused on continuously testing our agent powered products like codex and operator. These systems are uniquely valuable targets because they’re rapidly evolving, have access to perform sensitive actions on behalf of users, and have large, diverse attack surfaces. You will play a crucial role in securing our agents by hunting for realistic vulnerabilities that emerge from the interactions between the applications, infrastructure, and models that power them.</p>\n<p><strong>In this role you will:</strong></p>\n<ul>\n<li>Continuously hunt for vulnerabilities in the interactions between the applications, infrastructure, and models that power our agentic products.</li>\n</ul>\n<ul>\n<li>Conduct open-scope red and purple team operations, simulating realistic attack scenarios.</li>\n</ul>\n<ul>\n<li>Collaborate proactively with defensive security teams to enhance detection, response, and mitigation capabilities.</li>\n</ul>\n<ul>\n<li>Perform comprehensive penetration testing on our diverse suite of products.</li>\n</ul>\n<ul>\n<li>Leverage advanced automation and OpenAI technologies to optimize your offensive security work.</li>\n</ul>\n<ul>\n<li>Present insightful, actionable findings clearly and compellingly to inspire impactful change.</li>\n</ul>\n<ul>\n<li>Influence security strategy by providing attacker-driven insights into risk and threat modeling.</li>\n</ul>\n<p><strong>You might thrive in this role if you have:</strong></p>\n<ul>\n<li>7+ years of hands-on red team experience or exceptional accomplishments demonstrating equivalent expertise.</li>\n</ul>\n<ul>\n<li>Deep expertise conducting offensive security operations within modern technology companies.</li>\n</ul>\n<ul>\n<li>Experience designing, developing, or testing assessing the security of AI-powered systems.</li>\n</ul>\n<ul>\n<li>Experience working finding, exploiting and mitigating common vulnerabilities in AI systems like prompt injection, leaking sensitive data, confused deputies, and dynamically generated UI components.</li>\n</ul>\n<ul>\n<li>Exceptional skill in code review, identifying novel and subtle vulnerabilities.</li>\n</ul>\n<ul>\n<li>Proven experience performing offensive security assessments in at least one hyperscaler cloud environment (Azure preferred).</li>\n</ul>\n<ul>\n<li>Demonstrated mastery assessing complex technology stacks, including:</li>\n</ul>\n<ul>\n<li>Highly customized Kubernetes clusters</li>\n</ul>\n<ul>\n<li>Container environments</li>\n</ul>\n<ul>\n<li>CI/CD pipelines</li>\n</ul>\n<ul>\n<li>GitHub security</li>\n</ul>\n<ul>\n<li>macOS and Linux operating systems</li>\n</ul>\n<ul>\n<li>Data science tooling and environments</li>\n</ul>\n<ul>\n<li>Python-based web services</li>\n</ul>\n<ul>\n<li>React-based frontend applications</li>\n<li>Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts.</li>\n</ul>\n<ul>\n<li>Excellent coding skills, capable of writing robust tools and automation for offensive operations.</li>\n</ul>\n<ul>\n<li>Ability to communicate complex technical concepts to both technical and non-technical stakeholders.</li>\n</ul>\n<p><strong>Experience Level</strong></p>\n<p>Senior</p>\n<p><strong>Employment Type</strong></p>\n<p>Full-time</p>\n<p><strong>Workplace Type</strong></p>\n<p>Remote</p>\n<p><strong>Category</strong></p>\n<p>Engineering</p>\n<p><strong>Industry</strong></p>\n<p>Technology</p>\n<p><strong>Salary Range</strong></p>\n<p>$347K – $490K • Offers Equity</p>\n<p><strong>Required Skills</strong></p>\n<ul>\n<li>Red team experience</li>\n<li>Offensive security operations</li>\n<li>AI-powered systems security</li>\n<li>Vulnerability assessment</li>\n<li>Penetration testing</li>\n<li>Automation</li>\n<li>Code review</li>\n<li>Cloud security</li>\n<li>Kubernetes</li>\n<li>Container security</li>\n<li>CI/CD pipelines</li>\n<li>GitHub security</li>\n<li>macOS and Linux operating systems</li>\n<li>Data science tooling and environments</li>\n<li>Python-based web services</li>\n<li>React-based frontend applications</li>\n</ul>\n<p><strong>Preferred Skills</strong></p>\n<ul>\n<li>Azure cloud security</li>\n<li>Highly customized Kubernetes clusters</li>\n<li>Container environments</li>\n<li>CI/CD pipelines</li>\n<li>GitHub security</li>\n<li>macOS and Linux operating systems</li>\n<li>Data science tooling and environments</li>\n<li>Python-based web services</li>\n<li>React-based frontend applications</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3469e687-cba","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/bb97fffc-cdda-43a3-a6bc-234f9c031720","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$347K – $490K • Offers Equity","x-skills-required":["red team experience","offensive security operations","AI-powered systems security","vulnerability assessment","penetration testing","automation","code review","cloud security","kubernetes","container security","ci/cd pipelines","github security","macos and linux operating systems","data science tooling and environments","python-based web services","react-based frontend applications"],"x-skills-preferred":["azure cloud security","highly customized kubernetes clusters","container environments","ci/cd pipelines","github security","macos and linux operating systems","data science tooling and environments","python-based web services","react-based frontend applications"],"datePosted":"2026-03-06T18:27:44.474Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco; New York City; Remote - US; Seattle; Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"engineering","industry":"technology","skills":"red team experience, offensive security operations, AI-powered systems security, vulnerability assessment, penetration testing, automation, code review, cloud security, kubernetes, container security, ci/cd pipelines, github security, macos and linux operating systems, data science tooling and environments, python-based web services, react-based frontend applications, azure cloud security, highly customized kubernetes clusters, container environments, ci/cd pipelines, github security, macos and linux operating systems, data science tooling and environments, python-based web services, react-based frontend applications","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":347000,"maxValue":490000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_90e977bf-164"},"title":"Head of Operations, Corporate Security","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Head of Operations, Corporate Security</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Corporate Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$295K – $327K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>The Corporate Security team is responsible for the security and protection of all OpenAI employees and executives. We are committed to creating and maintaining a secure environment that allows our team members to focus on their work without fear of harm or disruption.</p>\n<p><strong>About the Role</strong></p>\n<p>As Director of Operations, Corporate Security — San Francisco, you will lead physical security operations at OpenAI’s headquarters and across the Bay Area footprint. This is the senior operational security leader for SF and a critical partner to Corporate Security leadership.</p>\n<p>You will own day-to-day security execution at HQ, including guard force oversight, Global Security Operations Center performance, access control standards, and incident response. You will design systems that scale, build strong cross-functional partnerships, and ensure OpenAI employees can work in a secure, welcoming environment.</p>\n<p>This role reports directly to the VP of Corporate Security and requires strong judgment, executive presence, and the ability to operate effectively in ambiguity while maintaining a high bar for operational excellence.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Own day to day physical security operations for OpenAI San Francisco and the Bay Area footprint, including guard force oversight, access control, and site hardening.</li>\n</ul>\n<ul>\n<li>Lead the SF Global Security Operations Center and incident response playbooks to ensure rapid, measured action during incidents.</li>\n</ul>\n<ul>\n<li>Manage vendor relationships, contracts, and budgets for uniformed services and security technology, and hold vendors to measurable SLAs.</li>\n</ul>\n<ul>\n<li>Build and maintain access control and visitor management policies that protect people while supporting a welcoming workplace.</li>\n</ul>\n<ul>\n<li>Coordinate protective intelligence and law enforcement engagement for SF leadership and critical events.</li>\n</ul>\n<ul>\n<li>Design and run emergency preparedness, crisis response, and continuity planning for SF sites.</li>\n</ul>\n<ul>\n<li>Mentor and develop security operations staff and lines of work to create reliable, repeatable systems.</li>\n</ul>\n<ul>\n<li>Serve as the primary SF security partner to Workplace, Real Estate, Executive Protection, Legal, and People teams.</li>\n</ul>\n<ul>\n<li>Represent SF CorpSec to senior leadership and the broader company, advising on risk and operational trade offs with clarity and empathy.</li>\n</ul>\n<p><strong>You may be a fit for this role if you have:</strong></p>\n<ul>\n<li>15+ years of progressive security leadership experience across corporate, public sector, military, or similarly complex environments, including oversight of large, multi-site operations. Law enforcement experience is a plus.</li>\n</ul>\n<ul>\n<li>Proven experience leading physical security programs at a large HQ or multi office campus, including guard force and access control.</li>\n</ul>\n<ul>\n<li>Track record of building scalable systems and playbooks from ambiguous starting points.</li>\n</ul>\n<ul>\n<li>Experience leveraging technology to drive automation and scale, with experience designing and implementing enterprise access control, CCTV, visitor management, and AI-enabled security platforms, while utilizing internal tools and data systems to improve operational efficiency and visibility.</li>\n</ul>\n<ul>\n<li>Strong vendor and contract management skills with experience driving measurable service delivery.</li>\n</ul>\n<ul>\n<li>Experience working with executive stakeholders and external partners, including law enforcement and local authorities.</li>\n</ul>\n<ul>\n<li>Excellent written and verbal communication, with the ability to translate operational trade offs for senior leaders.</li>\n</ul>\n<ul>\n<li>Comfort operating in ambiguity and making decisions under time pressure while prioritizing employee care and legal compliance.</li>\n</ul>\n<ul>\n<li>Familiarity with Google Workspace, emergency notification systems, and travel or risk intelligence platforms is helpful.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_90e977bf-164","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/900fa7f0-9bc5-443c-b991-38ad7da90f9c","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$295K – $327K • Offers Equity","x-skills-required":["Security leadership","Physical security operations","Access control","Incident response","Vendor management","Contract management","Emergency preparedness","Crisis response","Continuity planning","Security operations","Access control systems","CCTV systems","Visitor management systems","AI-enabled security platforms","Google Workspace","Emergency notification systems","Travel or risk intelligence platforms"],"x-skills-preferred":["Law enforcement experience","Experience working with executive stakeholders","Excellent written and verbal communication","Comfort operating in ambiguity","Decision-making under time pressure"],"datePosted":"2026-03-06T18:26:38.602Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Operations","industry":"Technology","skills":"Security leadership, Physical security operations, Access control, Incident response, Vendor management, Contract management, Emergency preparedness, Crisis response, Continuity planning, Security operations, Access control systems, CCTV systems, Visitor management systems, AI-enabled security platforms, Google Workspace, Emergency notification systems, Travel or risk intelligence platforms, Law enforcement experience, Experience working with executive stakeholders, Excellent written and verbal communication, Comfort operating in ambiguity, Decision-making under time pressure","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":295000,"maxValue":327000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0faec3dd-fe3"},"title":"Corporate Security Operations Manager, Tokyo","description":"<p><strong>Corporate Security Operations Manager, Tokyo</strong></p>\n<p><strong>Location</strong></p>\n<p>Tokyo, Japan</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Corporate Security</p>\n<p><strong>About the Team</strong></p>\n<p>The Corporate Security team is responsible for the security and protection of all OpenAI employees and executives. We are committed to creating and maintaining a secure environment that allows our team members to focus on their work without fear of harm or disruption.</p>\n<p><strong>About the Role</strong></p>\n<p>As Corporate Security Operations Manager for Tokyo, you will lead day-to-day corporate/physical security for our Tokyo office, and be responsible for delivering a safe, discreet, and professional security environment in a high-trust, high-confidentiality tech setting. Reporting up to the APAC Security Manager, you will be the primary security point of contact in Tokyo—balancing strong risk management with a calm, service-oriented presence—while delicately partnering with employees, cross-functional teams, and local external stakeholders.</p>\n<p>This role is based in Tokyo. Additionally, travel to Seoul and travel outside the region to support other CorpSec pillars may be required.</p>\n<p><strong>You’ll be responsible for:</strong></p>\n<ul>\n<li>Operationalizing the Tokyo office physical security program: access control, visitor management, incident response, and office security operations.</li>\n</ul>\n<ul>\n<li>Managing security vendors and the contract guard force (post orders, performance, coverage, KPIs/SLAs, and continuous improvement).</li>\n</ul>\n<ul>\n<li>Partnering closely with Workplace/Facilities, HR, IT/InfoSec, Legal, and office leadership to implement sensible, employee-friendly security controls.</li>\n</ul>\n<ul>\n<li>Leading local incident response and follow-through (documentation, after-action reviews, corrective actions).</li>\n</ul>\n<ul>\n<li>Supporting security planning for in-office events, leadership visits, and business travel into/out of Tokyo as needed. This may also include supporting the APAC regional manager in day to day administration of the Seoul office, as required.</li>\n</ul>\n<ul>\n<li>Driving emergency preparedness (earthquake readiness, evacuation/muster processes, tabletop exercises/drills in coordination with Workplace).</li>\n</ul>\n<p><strong>We’re looking for someone with:</strong></p>\n<ul>\n<li>8-10 years of experience in corporate security, protective services, law enforcement, military, or a combination of relevant fields, with demonstrated progression in responsibility.</li>\n</ul>\n<ul>\n<li>Proven experience leading physical security operations in a modern office environment, ideally within tech or other high-confidentiality settings.</li>\n</ul>\n<ul>\n<li>Demonstrated capability to manage security vendors and a contract guard force (performance management, post orders, SLAs/KPIs, incident standards).</li>\n</ul>\n<ul>\n<li>Strong incident management experience, including real-world response and after-action improvement.</li>\n</ul>\n<ul>\n<li>Exceptional interpersonal skills with a track record of delicately managing cross-functional stakeholders, employee concerns, and leadership expectations.</li>\n</ul>\n<ul>\n<li>Professional/Business English and Japanese fluency (written and spoken), including the ability to write clear incident reports and present risk decisions to regional/global partners.</li>\n</ul>\n<ul>\n<li>Sound judgment, discretion, and ability to handle sensitive issues with confidentiality.</li>\n</ul>\n<ul>\n<li>Comfort operating in a global environment across time zones, with a bias for collaboration and pragmatic solutions.</li>\n</ul>\n<ul>\n<li>A strong ethical foundation and a commitment to OpenAI’s mission and values.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0faec3dd-fe3","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/6640e439-1217-4075-9441-602b543c9afa","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["corporate security","physical security","incident response","security vendors","contract guard force","security planning","emergency preparedness"],"x-skills-preferred":["Japanese fluency","incident management","interpersonal skills","risk management","security operations"],"datePosted":"2026-03-06T18:25:00.603Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Tokyo, Japan"}},"employmentType":"FULL_TIME","occupationalCategory":"Operations","industry":"Technology","skills":"corporate security, physical security, incident response, security vendors, contract guard force, security planning, emergency preparedness, Japanese fluency, incident management, interpersonal skills, risk management, security operations"}]}