<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>302e1ed9-79d</externalid>
      <Title>Cyber Security Specialist</Title>
      <Description><![CDATA[<p>You will be designing, implementing, and optimizing SOC architectures with a focus on SIEM, XDR, and Detection Engineering. You will support tool transitions, agent rollouts, and operational stabilization of security platforms. Additionally, you will support proposal processes, customer workshops, and presentations. Your responsibilities will also include analyzing security incidents and deriving technical and organizational improvement measures. Furthermore, you will develop and implement detection logics, use cases, and monitoring strategies, including log source onboarding and tool integration.</p>
<p>To succeed in this role, you will need to have completed a degree or comparable education, plus at least 4–5 years of experience in Cyber Security, with a focus on SOC, SIEM, or Detection Engineering. You should have experience with common security technologies, such as SIEM, XDR, EDR, and vulnerability management tools, as well as a solid understanding of incident response processes. Ideally, you will have experience with Microsoft Sentinel, Microsoft Defender, CrowdStrike, or Palo Alto Cortex SOAR.</p>
<p>As a Cyber Security Specialist at MHP, you will be part of a dynamic team that values diversity, creativity, and unconventional thinking patterns. You will have the opportunity to grow with your projects and objectives in an innovative and supportive environment. MHP offers a competitive salary and benefits package, as well as opportunities for professional development and career growth.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, XDR, Detection Engineering, Microsoft Sentinel, Microsoft Defender, CrowdStrike, Palo Alto Cortex SOAR</Skills>
      <Category>IT</Category>
      <Industry>Consulting</Industry>
      <Employername>MHP</Employername>
      <Employerlogo>https://logos.yubhub.co/mhp.com.png</Employerlogo>
      <Employerdescription>MHP is a technology and business partner that digitizes its customers&apos; processes and products, supporting them in their IT transformations along the entire value chain. It serves over 300 customers worldwide, employing more than 4,000 people.</Employerdescription>
      <Employerwebsite>http://www.mhp.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.porsche.com/index.php?ac=jobad&amp;id=20270</Applyto>
      <Location></Location>
      <Country></Country>
      <Postedate>2026-04-22</Postedate>
    </job>
    <job>
      <externalid>740da2af-174</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>We are seeking a Senior Security Engineer with a specialty in Detection and Incident Response to join our Security Engineering team. This role sits at the intersection of security operations and software engineering, requiring you to investigate incidents and build the systems that detect, contain, and prevent them.</p>
<p>You will design and ship high-precision detections across cloud services and enterprise SaaS, develop automation that shortens response timelines, and mature the telemetry pipelines that make it all possible. Your ability to write production-quality code is just as important as your ability to triage an alert.</p>
<p>Responsibilities:</p>
<ul>
<li>Engineer, test, and deploy detection logic across cloud and enterprise environments, treating detections as software with version control, peer review, and measurable performance.</li>
</ul>
<ul>
<li>Build and maintain incident response automation, runbooks, and tooling that reduce containment timelines without sacrificing developer velocity.</li>
</ul>
<ul>
<li>Mature telemetry pipelines through improved schema design, normalization, enrichment, and quality checks that reduce false positives and increase signal fidelity.</li>
</ul>
<ul>
<li>Perform digital incident investigations to identify and contain potential security breaches.</li>
</ul>
<ul>
<li>Conduct digital forensics and malware analysis to understand attack vectors and adversary methodologies.</li>
</ul>
<ul>
<li>Integrate alerting with messaging and ticketing systems to enable fast, traceable response workflows.</li>
</ul>
<ul>
<li>Partner cross-functionally with IT, security, and engineering teams to harden identity and access patterns, close logging and forensics gaps, and implement maintainable guardrails that scale with the organisation.</li>
</ul>
<ul>
<li>Utilize threat intelligence platforms to improve hunting, detection, and response workflows.</li>
</ul>
<ul>
<li>Clearly explain the significance and impact of incidents, providing actionable recommendations to both technical and non-technical stakeholders.</li>
</ul>
<p>Ideal Candidate:</p>
<ul>
<li>5+ years of experience in Detection Engineering, Incident Response, or Security Operations, with a strong emphasis on building and shipping security tooling and automation.</li>
</ul>
<ul>
<li>Proficiency in at least one programming language (e.g., Python, Go) and comfort writing production-grade code , not just scripts.</li>
</ul>
<ul>
<li>Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments.</li>
</ul>
<ul>
<li>Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically.</li>
</ul>
<ul>
<li>Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs.</li>
</ul>
<ul>
<li>Familiarity with digital forensics tools and malware analysis techniques.</li>
</ul>
<ul>
<li>Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate.</li>
</ul>
<ul>
<li>Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows.</li>
</ul>
<ul>
<li>Strong communication skills, with the ability to translate complex security findings into clear business impact.</li>
</ul>
<ul>
<li>Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus.</li>
</ul>
<p>Compensation packages at Scale for eligible roles include base salary, equity, and benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position, determined by work location and additional factors, including job-related skills, experience, interview performance, and relevant education or training. Scale employees in eligible roles are also granted equity based compensation, subject to Board of Director approval. Your recruiter can share more about the specific salary range for your preferred location during the hiring process, and confirm whether the hired role will be eligible for equity grant. You’ll also receive benefits including, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits, a learning and development stipend, and generous PTO. Additionally, this role may be eligible for additional benefits such as a commuter stipend.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$237,600-$297,000 USD</Salaryrange>
      <Skills>Detection Engineering, Incident Response, Security Operations, Cloud Services, Enterprise SaaS, Automation, Telemetry Pipelines, Digital Forensics, Malware Analysis, Threat Intelligence Platforms, SIEM, EDR, SOAR, Cloud-Native Environments, Programming Languages, Python, Go, Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments, Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically, Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs, Familiarity with digital forensics tools and malware analysis techniques, Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate, Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows, Strong communication skills, with the ability to translate complex security findings into clear business impact, Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Scale</Employername>
      <Employerlogo>https://logos.yubhub.co/scale.com.png</Employerlogo>
      <Employerdescription>Scale develops reliable AI systems for the world&apos;s most important decisions, providing high-quality data and full-stack technologies.</Employerdescription>
      <Employerwebsite>https://scale.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/scaleai/jobs/4684073005</Applyto>
      <Location>New York, NY; San Francisco, CA; Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>90c9e919-aa7</externalid>
      <Title>Sr. Manager, Product Marketing - IT Operations and Security</Title>
      <Description><![CDATA[<p>As a Senior Product Marketing Manager, you will be a key enabler for all facets of our go-to-market strategy as it pertains to our AI and Endpoint Management for IT Operations portfolio.</p>
<p>You’ll play a critical role on a fast-growing team with the opportunity to make a significant impact in a short period of time. You will be responsible for product messaging, positioning, sales and partner enablement, new product launches, revenue planning, and collaboration with the demand generation team.</p>
<p>You will be the “voice to our customers” in the way we present our products and solutions to the world. Our ideal candidate will be creative, analytical, and extremely well organized, with a high-level of attention to detail.</p>
<p>Responsibilities:</p>
<ul>
<li>Be the voice to our customers and assist with the marketing of the AI and Endpoint Management capabilities in the Tanium AEM Platform.</li>
</ul>
<ul>
<li>Support the product &amp; solutions go-to-market plan that aligns with the revenue goals and develop marketing assets and overall execution plan in support of major launches.</li>
</ul>
<ul>
<li>Analyze the market, buyers, trends, industry-specific problems, and competitors to create strategic positioning that differentiates Tanium in the Autonomous Endpoint Management market.</li>
</ul>
<ul>
<li>Support the development of solutions-based sales plays.</li>
</ul>
<ul>
<li>Identify target personas, understand their key business problems, and pain points, and articulate Tanium’s value proposition to drive desired outcomes.</li>
</ul>
<ul>
<li>Work closely with product management, sales leadership, enablement, customer success, and marketing teams across all activities.</li>
</ul>
<ul>
<li>Leverage strong content creation background to develop content, including sales tools, whitepapers, custom one-sheets, event collateral, and thought-leadership content.</li>
</ul>
<ul>
<li>Collaborate with demand generation teams to execute targeted campaigns that drive pipeline.</li>
</ul>
<ul>
<li>Partner with sales, product etc. to facilitate feedback and drive continuous improvement of the product positioning, sales enablement tools etc.</li>
</ul>
<ul>
<li>Conduct market research, including buyer interviews to inform marketing content and create actionable insights.</li>
</ul>
<ul>
<li>Present to customers, partners, and sales teams.</li>
</ul>
<p>Requirements:</p>
<ul>
<li>7+ years minimum experience in product marketing, solutions marketing, or outbound product management required.</li>
</ul>
<ul>
<li>Experience supporting go-to-market plans including messaging, content, and sales enablement.</li>
</ul>
<ul>
<li>Basic knowledge of endpoint management and security.</li>
</ul>
<ul>
<li>A good knowledge of generative and agentic AI and how it is used to transform business processes.</li>
</ul>
<ul>
<li>Familiarity with ITSM, SIEM, SOAR, EDR solutions a plus.</li>
</ul>
<ul>
<li>Experience understanding technology at a deep level and ability translate to business needs concisely is required.</li>
</ul>
<ul>
<li>Experience developing presentations to customers, sales teams, and partners preferred.</li>
</ul>
<ul>
<li>Solid experience in positioning work and writing marketing content for complex products and/or market dynamics.</li>
</ul>
<p>Preferred Skills:</p>
<ul>
<li>Strong presentation skills are required. Must be comfortable speaking in front of various audience levels.</li>
</ul>
<ul>
<li>You are a team player, knowing how to work well cross-functionally to rally teams around team strategy and plans.</li>
</ul>
<ul>
<li>You can balance both the art and science of marketing – having great creative intuition and an insatiable appetite for data and insights.</li>
</ul>
<ul>
<li>Understanding of basic branding principles: brand identity, building equity, brand voice, etc. a plus.</li>
</ul>
<ul>
<li>You possess excellent business judgment; ability to prioritize independently, overcome blockers, create clarity, and move forward even in ambiguous circumstances.</li>
</ul>
<ul>
<li>A profound sense of ownership and accountability is required along with the ability to influence (and inspire) and sometimes skeptical audiences.</li>
</ul>
<p>What you’ll get:</p>
<p>The annual base salary range for this full-time position is $95,000 to $290,000.</p>
<p>This range is an estimate for what Tanium will pay a new hire. The actual annual base salary offered may be adjusted based on a variety of factors, including but not limited to, location, education, skills, training, and experience.</p>
<p>In addition to an annual base salary, team members will receive equity awards and a generous benefits package consisting of medical, dental and vision plan, family planning benefits, health savings account, flexible spending account, transportation savings account, 401(k) retirement savings plan with company match, life, accident and disability coverage, business travel accident insurance, employee assistance programs, disability insurance, and other well-being benefits.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$95,000 to $290,000</Salaryrange>
      <Skills>Product marketing, Solutions marketing, Outbound product management, Endpoint management, Security, Generative and agentic AI, ITSM, SIEM, SOAR, EDR, Presentation skills, Team player, Creative intuition, Data analysis, Branding principles, Business judgment</Skills>
      <Category>Marketing</Category>
      <Industry>Technology</Industry>
      <Employername>Tanium</Employername>
      <Employerlogo>https://logos.yubhub.co/tanium.com.png</Employerlogo>
      <Employerdescription>Tanium is a software company that provides a unified platform for endpoint management and security.</Employerdescription>
      <Employerwebsite>https://www.tanium.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/tanium/jobs/7623766</Applyto>
      <Location>Addison, TX (Hybrid); Bellevue, WA (Hybrid); Durham, NC (Hybrid); Emeryville, CA (Hybrid); Reston, VA (Hybrid)</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>e6dcbc35-379</externalid>
      <Title>Insider Risk Investigator - Technical &amp; Human Intelligence</Title>
      <Description><![CDATA[<p>We are seeking an exceptional Insider Risk Investigator with expertise in both human and technical investigations to support and protect Anthropic&#39;s mission.</p>
<p>The Insider Risk Team works cross-functionally to deter, identify, investigate and mitigate risks to Anthropic&#39;s most critical assets,our people, our data, and our infrastructure.</p>
<p>Responsibilities:</p>
<ul>
<li>Triage custom technical detection alerts</li>
<li>Independently conduct end-to-end insider risk investigations while working closely with IT, Detection and Response, Legal, HR and other cross-functional teams</li>
<li>Monitor and triage external threats targeting employees</li>
<li>Conduct sensitive interviews of employees or other involved parties</li>
<li>Perform technical analysis of logs from SIEM, DLP, UEBA systems</li>
<li>Leverage AI tools (Claude, Claude Code) to accelerate investigation workflows and data analysis</li>
<li>Build and maintain investigation documentation</li>
<li>Assist in iterating and improving on processes, procedures and systems to detect, mitigate and investigate insider risks</li>
<li>Work cross-functionally to develop, refine and operationalize insider risk indicators, scenarios and mitigation strategies</li>
<li>Provide rapid-turnaround security assessments to support business operations</li>
<li>Support education and awareness programs to promote a robust security culture</li>
<li>Serve as the subject matter expert for insider risk and provide training to team members as needed</li>
</ul>
<p>You may be a good fit if you have:</p>
<ul>
<li>Bachelor&#39;s degree and/or higher education in a related field</li>
<li>5-8 years of experience in insider risk, corporate investigations or a related domain</li>
<li>3-5 years experience in conducting investigative interviews</li>
<li>Experience conducting OSINT for threat assessment, or counterintelligence</li>
<li>Experience leveraging DLP, UEBA, SIEM, SOAR and other insider risk security tooling for detections and investigations</li>
<li>Broad understanding of internal and external investigations, cybersecurity, interview techniques, risk assessment and managing strong cross-functional relationships</li>
<li>Ability to communicate complex security findings clearly and concisely to non-technical stakeholders (written and verbal)</li>
<li>Track record of rapid response to time-sensitive security requests</li>
<li>Comfort operating across organizational boundaries (Security, People, Legal, IT)</li>
<li>Exceptional communication, collaboration skills and the ability to lead projects with little guidance</li>
<li>Demonstrated ability to operate independently with minimal oversight while managing sensitive cases</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Experience working in the technology industry or at/with AI/ML companies</li>
<li>Experience with counterintelligence investigations and nation-state threat actor TTPs</li>
<li>Background in open-source intelligence collection and analysis</li>
<li>Track record of AI/LLM adoption for productivity gains in investigative work</li>
<li>Experience contributing to a high growth startup environment</li>
<li>Specialized knowledge of risks unique to the AI sector</li>
<li>Experience with data exfiltration investigations across multiple vectors (email, cloud, removable media)</li>
<li>Experience working in government, defense, or high-security environments</li>
</ul>
<p>What makes you successful here:</p>
<ul>
<li>Entrepreneurial mindset: You see gaps and fill them without being asked</li>
<li>Technical + human balance: Equal comfort analyzing log data and conducting sensitive interviews</li>
<li>AI-native approach: You leverage LLMs to work smarter, not just harder</li>
<li>Mission alignment: You understand AI safety stakes and insider risk&#39;s role in protecting that mission</li>
<li>Judgment under uncertainty: You make sound decisions with incomplete information</li>
<li>Clear communicator: You distill complex findings into actionable insights for diverse audiences</li>
<li>Cross-functional navigator: You build relationships and collaborate effectively across teams</li>
</ul>
<p>Annual compensation range for this role is $245,000-$305,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$245,000-$305,000 USD</Salaryrange>
      <Skills>Technical investigation, Human investigation, Insider risk, Cybersecurity, Interview techniques, Risk assessment, Communication, Collaboration, Leadership, Data analysis, Log analysis, SIEM, DLP, UEBA, SOAR, AI tools, LLMs, Counterintelligence, Open-source intelligence, AI/ML, High growth startup, Data exfiltration, Government, Defense, High-security environments</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5182430008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>3f48b4f4-789</externalid>
      <Title>Manager, Detection &amp; Incident Response</Title>
      <Description><![CDATA[<p>We&#39;re seeking a skilled and detail-oriented technical leader to own the day-to-day operations of our Detection and Incident Response team. You&#39;ll be responsible for driving our SIEM and SOAR capabilities and incident response program, partnering with teams throughout Squarespace to improve how we spot and respond to threats.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Contributing to define, collect, and analyze security KPIs and KRIs for the security organization.</li>
<li>Developing and implementing a comprehensive detection and response strategy and roadmap aligned with Squarespace&#39;s overall business objectives and risk appetite.</li>
<li>Overseeing the Security Operations Center (SOC) activities, including threat detection, monitoring, analysis, and proactive hunting.</li>
<li>Owning the health and effectiveness of the SIEM and SOAR platforms, ensuring high-quality data ingestion, alert tuning, and automated response logic.</li>
<li>Establishing and maintaining a robust incident response program, including defining incident playbooks, leading major incident investigations, and conducting post-incident reviews to drive continuous improvement.</li>
<li>Designing and leading regular tabletop exercises to test the organization&#39;s readiness for various incident scenarios.</li>
<li>Serving as the Incident Commander for major security events, coordinating with teams such as Legal, Communications, and HR to ensure clear internal communication and regulatory compliance.</li>
<li>Identifying, evaluating, and implementing new security technologies and tools to enhance detection, prevention, and response capabilities.</li>
<li>Driving continuous improvement of security operations processes through automation, tooling, and best practices.</li>
<li>Staying abreast of emerging security threats, vulnerabilities, and industry trends and proactively advising leadership on necessary adjustments to strengthen Squarespace&#39;s security posture.</li>
<li>Building, mentoring, and leading a high-performing team of security professionals, fostering a culture of continuous learning, collaboration, and accountability.</li>
<li>Acting as a key liaison and trusted advisor to internal stakeholders on security-related matters.</li>
<li>Managing relationships with external security vendors and partners, ensuring effective service delivery and technology adoption.</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>A bachelor&#39;s degree in Computer Science, Information Security, or a related field (or equivalent experience).</li>
<li>7+ years of experience in cybersecurity, with at least 2 years in a leadership or team-lead role.</li>
<li>Deep expertise in Incident Response and Detection Engineering.</li>
<li>Strong knowledge of cloud security operations, specifically within AWS or GCP environments.</li>
<li>Hands-on experience managing and tuning SIEM and SOAR platforms.</li>
<li>Experience automating security workflows and incident response playbooks to reduce manual effort.</li>
<li>Familiarity with security frameworks such as MITRE ATT&amp;CK and NIST.</li>
<li>Excellent communication skills with the ability to lead technical teams during high-pressure incidents and explain complex threats to non-technical stakeholders.</li>
<li>Knowledge of software development, design, and technical operations.</li>
</ul>
<p>Benefits include:</p>
<ul>
<li>Health insurance with 100% covered premiums for you, your spouse or partner, and your dependent children.</li>
<li>Life and income protection.</li>
<li>Fertility and adoption benefits.</li>
<li>Headspace mindfulness app subscription.</li>
<li>Global Employee Assistance Program.</li>
<li>Pension benefits with employer match.</li>
<li>Flexible paid time off.</li>
<li>26 weeks paid maternity leave and 12 weeks paid paternity leave.</li>
<li>2 weeks paid family care leave.</li>
<li>Education reimbursement.</li>
<li>Employee donation match to community organizations.</li>
<li>7 Global Employee Resource Groups (ERGs).</li>
<li>Free lunch and snacks.</li>
<li>Close proximity to cultural landmarks such as Dublin Castle and St. Patrick&#39;s Cathedral.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, SOAR, Incident Response, Cloud Security Operations, AWS, GCP, Security Frameworks, MITRE ATT&amp;CK, NIST, Software Development, Design, Technical Operations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Squarespace</Employername>
      <Employerlogo>https://logos.yubhub.co/squarespace.com.png</Employerlogo>
      <Employerdescription>Squarespace is a design-driven platform helping entrepreneurs build brands and businesses online. It has a team of over 1,700 employees and is headquartered in New York City, with offices in Dublin, Ireland, and Aveiro, Portugal.</Employerdescription>
      <Employerwebsite>https://www.squarespace.com/about/careers</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/squarespace/jobs/7773251</Applyto>
      <Location>Dublin</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>7ad63033-e7e</externalid>
      <Title>Senior Security Engineer I, Vulnerability Management</Title>
      <Description><![CDATA[<p>We are seeking a Senior Security Engineer I to join our Vulnerability Management team. This is an execution-focused role where you will perform hands-on triage, drive remediation follow-through, and improve day-to-day operational quality across cloud and specialized infrastructure environments.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Performing hands-on vulnerability triage and risk assessment using team-defined standards and playbooks</li>
<li>Tracking remediation progress with owner teams, escalating blockers, and ensuring clean issue closure</li>
<li>Supporting automated triage workflows by validating outputs and improving signal quality</li>
<li>Contributing to automated remediation campaigns (e.g., EOL cleanup, vulnerable software upgrades, and fix verification)</li>
<li>Supporting zero-day and embargo response by helping inventory affected assets and tracking owner-team deployment status</li>
<li>Participating in incident investigations by gathering technical evidence and supporting impact analysis</li>
<li>Participating in on-call rotation for critical vulnerability events</li>
<li>Maintaining high-quality documentation, runbooks, and operational updates</li>
</ul>
<p>The ideal candidate will have 3+ years of relevant experience in vulnerability management, security operations, application security, or related security engineering. Key skills include a strong understanding of vulnerability assessment fundamentals, hands-on experience with vulnerability management platforms, proficiency in scripting/automation for workflow support, and familiarity with cloud security concepts.</p>
<p>In addition to a competitive salary, we offer a variety of benefits to support your needs, including medical, dental, and vision insurance, 100% paid for by CoreWeave, company-paid life insurance, and flexible PTO.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$139,000 to $204,000</Salaryrange>
      <Skills>vulnerability management, security operations, application security, vulnerability assessment fundamentals, vulnerability management platforms, scripting/automation for workflow support, cloud security concepts, security automation/SOAR platforms, container/Kubernetes vulnerability workflows, hardware-adjacent vulnerability domains, compliance evidence collection</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4654263006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f5ba9866-259</externalid>
      <Title>Senior GRC Lead</Title>
      <Description><![CDATA[<p>Join Brex, the intelligent finance platform that enables companies to spend smarter and move faster in more than 200 markets. As a Senior GRC Lead, you will drive critical GRC processes that mitigate risk, keep us compliant, and build trust with our customers and partners.</p>
<p>You&#39;ll evolve the technical foundation of our Trust program by automating security controls, building integrations between security tools and GRC platforms, and creating scalable processes that enable Brex to maintain compliance efficiently as we expand into new markets.</p>
<p>You&#39;ll work at the intersection of security, engineering, and compliance , translating regulatory requirements into technical solutions and building automation that eliminates manual toil.</p>
<p>You&#39;ll leverage your deep understanding of SOC 2, PCI DSS, ISO 27001, AI governance frameworks, and others to both design controls for emerging compliance requirements and mature existing programs through automation and continuous monitoring.</p>
<p>You’ll support Trust Assurance, Third Party Risk Management, and other Security Risk Management initiatives.</p>
<p>Working with our Engineering, Infrastructure, and Product teams, you&#39;ll translate compliance frameworks into technical controls and build automated systems that help us achieve world-class security as Brex expands.</p>
<p>Your contributions will directly accelerate Brex&#39;s maturity.</p>
<p>You&#39;ll design workflows using Tines, build integrations between security and GRC systems, and create dashboards for security metrics.</p>
<p>You&#39;ll implement controls across the technology stack, support multiple audits (SOC 2, PCI DSS, SOX/ITGC, FINRA, ISO), and contribute to AI governance framework implementation (ISO 42001, NIST AI RMF, EU AI Act).</p>
<p>You&#39;ll have autonomy to build innovative solutions, collaborating cross-functionally to implement controls that enable growth while communicating technical concepts effectively across the organization.</p>
<p>This role will be based in our San Francisco office. We are a hybrid environment that combines the energy and connections of being in the office with the benefits and flexibility of working from home.</p>
<p>Responsibilities:</p>
<p>Manage and scale IT infrastructure, services and tooling</p>
<p>Work with a diverse group of IT partners to optimize our provided services</p>
<p>Implement new services in support of Information Technologies vision</p>
<p>Scale our services by implementing configuration as code via Terraform providers or APIs</p>
<p>Operationalize and upskill IT and its partners by producing documentation and leading training sessions</p>
<p>Evangelize best practices both internally and externally facing</p>
<p>Requirements:</p>
<p>5+ years of experience in GRC, IT Governance, or Security Engineering with a strong track record of automating manual compliance workflows.</p>
<p>Deep experience with security frameworks such as SOC 2, PCI DSS, ISO 27001, and NIST CSF, specifically within cloud-native environments.</p>
<p>Technical proficiency in Python (or similar scripting languages) and experience building integrations using APIs to connect security tools with GRC systems.</p>
<p>Builder mindset with the ability to design and implement automated control testing, continuous monitoring, and data-driven security metrics.</p>
<p>Exceptional cross-functional collaboration and communication skills.</p>
<p>Strong systems thinking.</p>
<p>Bias for action.</p>
<p>Bonus points:</p>
<p>Previous experience in Fintech or banking environments navigating complex regulatory landscapes.</p>
<p>Hands-on experience with Tines or other SOAR platforms to automate security operations.</p>
<p>Familiarity with AI/ML governance frameworks (NIST AI RMF, ISO 42001) or securing agentic systems.</p>
<p>Deep knowledge of Cloud Security (AWS/GCP), infrastructure-as-code (Terraform), or DevSecOps practices.</p>
<p>Relevant industry certifications such as CISSP, CISA, or CCSP.</p>
<p>Experience building metrics dashboards for security visualization and reporting.</p>
<p>Active contributions to the GRC or Security community through open-source projects or public research.</p>
<p>Compensation: The expected salary range for this role is $153,600 - $192,000.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$153,600 - $192,000</Salaryrange>
      <Skills>GRC, IT Governance, Security Engineering, Python, APIs, Tines, SOAR, Cloud Security, Infrastructure-as-code, DevSecOps</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Brex</Employername>
      <Employerlogo>https://logos.yubhub.co/brex.com.png</Employerlogo>
      <Employerdescription>Brex is a fintech company that provides an intelligent finance platform for businesses.</Employerdescription>
      <Employerwebsite>https://brex.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/brex/jobs/8378792002</Applyto>
      <Location>San Francisco, California, United States</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>ee84f5eb-f18</externalid>
      <Title>Senior Solutions Specialist</Title>
      <Description><![CDATA[<p>As a Senior Solutions Specialist at Okta, you will be part of the presales team that delivers sales presentations and product demonstrations to educate customers on the best ways to implement Okta identity and access management solutions.</p>
<p>You will report to the Senior Manager in the OFCTO organization.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Strategic Customer Engagement: Support strategic customer conversations aligning with technical and engineering leaders and stakeholders. Deliver on emerging trends, industry best practices, and identity-driven digital transformation. Assist in preparing executive-level messaging and participate in strategic discussions to align Okta&#39;s solutions with customer business outcomes.</li>
</ul>
<ul>
<li>Technical Leadership: Provide strategic and technical guidance to Solutions Engineering teams across both the Okta and Auth0 identity platforms. Collaborate with the Global Office of Field CTO office team to deliver actionable insights from the field, validate customer needs, and identify recurring trends for the Okta Product &amp; Engineering teams.</li>
</ul>
<ul>
<li>Field Enablement and Collaboration: Contribute to frameworks, tools, and content to support Solutions Engineering teams in executing effectively. Partner with sales leadership to identify and address critical business opportunities and challenges. Drive cross-functional collaboration to ensure seamless execution of global initiatives.</li>
</ul>
<ul>
<li>Market Influence: Represent Okta as a thought leader in the identity and security space. Influence industry standards and participate in relevant technical advisory boards.</li>
</ul>
<ul>
<li>Innovation and Strategy: Partner closely with OFCTO teams as an advocate for customer-driven innovation, market trends, and GTM insights to provide input to influence product teams. Support, derive, and champion strategic initiatives that enhance Okta&#39;s differentiation and business impact.</li>
</ul>
<p>Position Requirements:</p>
<ul>
<li>Identity &amp; Directory Services Mastery: Deep Infrastructure Knowledge: Expert-level understanding of Active Directory (AD) and Azure AD (Entra ID) or similar, including Group Policy Objects (GPOs), Kerberos, and OIDC/SAML protocols.</li>
</ul>
<ul>
<li>Multi-IdP Ecosystems: Proficiency in managing and securing diverse Identity Providers (IdPs) like Okta, Ping Identity, and Google Workspace.</li>
</ul>
<ul>
<li>Hybrid Identity: Experience managing the complexities of identity synchronization between on-premises environments and the cloud.</li>
</ul>
<ul>
<li>Device Identity &amp; Access Management Mastery: Passwordless Expertise: Deep, hands-on knowledge of FIDO2/WebAuthn, Passkeys, and implementing passwordless authentication strategies using solutions like Okta FastPass.</li>
</ul>
<ul>
<li>Endpoint &amp; Device Context: Strong understanding of Desktop MFA, device registration, and leveraging device posture signals from MDM/UEM (e.g., Jamf, Intune, Workspace ONE) and EDR (e.g., CrowdStrike) platforms to enforce risk-based access policies.</li>
</ul>
<ul>
<li>PKI &amp; Certificate Management: Familiarity with certificate-based authentication and its role in establishing device trust.</li>
</ul>
<ul>
<li>Identity Threat Detection &amp; Response (ITDR): Threat Landscape Knowledge: A thorough understanding of modern identity attack vectors, including phishing, token theft, MFA bypass techniques, and lateral movement.</li>
</ul>
<ul>
<li>Behavioral Analysis: Experience with User and Entity Behavior Analytics (UEBA) and the ability to interpret threat signals to detect and respond to suspicious activity.</li>
</ul>
<ul>
<li>Security Ecosystem Integration: Proficiency in designing solutions that integrate identity platforms with SIEM (e.g., Splunk, Sentinel) and SOAR tools for automated threat response.</li>
</ul>
<ul>
<li>Strong communication and presentation skills, with experience contributing to technical events.</li>
</ul>
<p>Travel expectation: up to 40% for customer meetings, industry events, and internal off-sites.</p>
<p>This is a remote position.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$215,000-$323,000 USD (OTE range for candidates located in the San Francisco Bay area)</Salaryrange>
      <Skills>Active Directory (AD), Azure AD (Entra ID), Group Policy Objects (GPOs), Kerberos, OIDC/SAML protocols, FIDO2/WebAuthn, Passkeys, Okta FastPass, Desktop MFA, Device registration, MDM/UEM (e.g., Jamf, Intune, Workspace ONE), EDR (e.g., CrowdStrike), Certificate-based authentication, PKI &amp; Certificate Management, Identity Threat Detection &amp; Response (ITDR), User and Entity Behavior Analytics (UEBA), SIEM (e.g., Splunk, Sentinel), SOAR tools</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Okta</Employername>
      <Employerlogo>https://logos.yubhub.co/okta.com.png</Employerlogo>
      <Employerdescription>Okta is a US-based technology company that provides identity and access management solutions.</Employerdescription>
      <Employerwebsite>https://www.okta.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/okta/jobs/7769595</Applyto>
      <Location>Chicago, Illinois; Los Angeles, California; New York, New York; San Francisco, California; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f509d407-0b5</externalid>
      <Title>Senior Security Engineer, Incident Response</Title>
      <Description><![CDATA[<p>You will be an individual contributor on the security Incident Response (IR) team at Databricks, reporting to the regional IR manager. Your responsibilities will include conducting security analysis and forensics, responding to high-priority alerts, and contributing to automations and agentic capabilities. You will be a security multiplier and help the team scale security incident response at Databricks.</p>
<p>Responsibilities:</p>
<ul>
<li>Respond to incidents as part of a distributed 24x7 operations and on-call schedule.</li>
<li>Triage and respond to security events and alerts, ensuring quick and effective containment.</li>
<li>Contribute to security investigations, conducting analysis and forensics across a range of data sources to determine the timeline and impact of security events.</li>
<li>Build automations, including leveraging AI and agentic platforms, to deliver autonomous capabilities, expedite your work, and scale the impact of the team.</li>
<li>Communicate technical decisions through design docs and tech talks, and mentor junior security responders via security guidance, design reviews, and code reviews.</li>
</ul>
<p>What we look for:</p>
<ul>
<li>Bachelor&#39;s Degree AND 4+ years experience in Incident Response work OR Master&#39;s Degree AND 2+ years experience.</li>
<li>Strong cloud security background in at least 1 of AWS, GCP, or Azure, and working knowledge of the others.</li>
<li>Knowledge of AI/LLM and agentic capabilities, including effective prompting and use of MCP, agents, and agent skills.</li>
<li>Broad security subject matter expertise.</li>
<li>Expertise in few core IR skills (DFIR, Reverse Engineering, Traditional Network Security, Storage and access security, Sandboxing, Compute security, etc.).</li>
<li>Experience with Enterprise Security and SaaS applications.</li>
<li>Working knowledge of a SIEM and SOAR.</li>
<li>Experience building Incident Response Tooling and scripting language skills.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>cloud security, AWS, GCP, Azure, AI/LLM, agentic capabilities, security subject matter expertise, DFIR, Reverse Engineering, Traditional Network Security, Storage and access security, Sandboxing, Compute security, Enterprise Security, SaaS applications, SIEM, SOAR, Incident Response Tooling, scripting language skills</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Databricks</Employername>
      <Employerlogo>https://logos.yubhub.co/databricks.com.png</Employerlogo>
      <Employerdescription>Databricks is a data and AI company that provides a unified and democratized data, analytics, and AI platform to over 10,000 organizations worldwide.</Employerdescription>
      <Employerwebsite>https://databricks.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/databricks/jobs/8026632002</Applyto>
      <Location>Amsterdam, Netherlands; Berlin, Germany; London, United Kingdom; Remote - Denmark; Remote - France; Remote - Germany; Remote - Italy; Remote - Spain; Remote - Sweden</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>753e9465-6a0</externalid>
      <Title>Senior Security Software Engineer, eBPF &amp; Security Sensors</Title>
      <Description><![CDATA[<p>We&#39;re seeking an exceptional engineer to join our Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>
<p>Responsibilities:</p>
<ul>
<li>Build an AI-powered platform responsible for all aspects of detection and response capabilities, from detection development to incident response</li>
<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>
<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>
<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>
<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>
<li>Mentor engineers and contribute to hiring and growth of the Security team</li>
<li>Participate in on-call rotations</li>
</ul>
<p>You may be a good fit if you</p>
<ul>
<li>Have 7+ years of experience in software engineering with a focus on security, infrastructure, or data pipelines</li>
<li>Have a track record of building and maintaining internal developer tools or security platforms</li>
<li>Have a strong understanding of data processing pipelines and experience working with large-scale logging systems</li>
<li>Have experience with test-driven software development or CI/CD (a plus for direct experience with detection-as-code workflows)</li>
<li>Have experience with infrastructure-as-code (Terraform, CloudFormation)</li>
<li>Have experience with query optimization for large datasets</li>
<li>Have experience building stable and scalable services on cloud infrastructure and serverless architectures</li>
<li>Can write maintainable and secure code in Python</li>
<li>Have experience working with security teams and translating requirements into technical solutions</li>
<li>Can lead technical projects with minimal guidance</li>
<li>Have a track record of driving engineering excellence through high standards, constructive code reviews, and mentorship</li>
<li>Can lead cross-functional security initiatives and navigate complex organizational dynamics</li>
<li>Have strong communication skills with the ability to translate technical concepts effectively across all organizational levels</li>
<li>Have demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>
<li>Have strong systems thinking with the ability to identify and mitigate risks in complex environments</li>
</ul>
<p>Strong candidates may also have experience with</p>
<ul>
<li>Building security tooling from the ground up</li>
<li>Implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>
<li>Detection engineering or security operations</li>
<li>SOAR platform or automation development</li>
<li>Data lake or database architecture</li>
<li>API design and internal platform creation</li>
<li>Applying ML/AI to security problems</li>
<li>Scaling security operations in a high-growth environment</li>
</ul>
<p>Logistics</p>
<ul>
<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>
<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>
<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>software engineering, security, infrastructure, data pipelines, ML-powered detection systems, Claude, Python, test-driven software development, CI/CD, infrastructure-as-code, query optimization, cloud infrastructure, serverless architectures, building security tooling, implementing security monitoring solutions, detection engineering, SOAR platform, automation development, data lake, database architecture, API design, internal platform creation, applying ML/AI to security problems, scaling security operations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5108521008</Applyto>
      <Location>Zürich, CH</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>e22d9fde-ad7</externalid>
      <Title>Software Engineer (Security)</Title>
      <Description><![CDATA[<p>About Us</p>
<p>At Cloudflare, we&#39;re on a mission to help build a better Internet. We protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code.</p>
<p>As a Senior Security AI Engineer, you will be the technical architect for our Agentic AI roadmap. Your mission is to move beyond simple automation scripts and build a fleet of &#39;AI Team Members&#39;,intelligent helper agents that execute complex security algorithms, process flows, and assessment logic.</p>
<p>Responsibilities</p>
<ul>
<li>Agent Architecture: Design and deploy multi-agent systems that follow complex security algorithms and assessment flows to automate manual SOC and Assurance tasks.</li>
</ul>
<ul>
<li>Skill Engineering: Standardize agent capabilities by creating and maintaining skills.md files and specialized Markdown documentation that define agentic personas and execution boundaries.</li>
</ul>
<ul>
<li>Workflow Training: Train and fine-tune LLMs to function as &#39;helper agents&#39; capable of executing autonomous AI workflows as integral members of the Security Engineering team.</li>
</ul>
<ul>
<li>Infrastructure as Agents: Utilize Cloudflare Workers, Vectorize, and AI Gateway to build serverless, low-latency agentic architectures for real-time traffic analysis and remediation.</li>
</ul>
<ul>
<li>Autonomous Assessment: Build and scale the engine for autonomous vendor security reviews and M&amp;A assessments, transforming qualitative data into quantitative risk insights.</li>
</ul>
<p>Requirements</p>
<ul>
<li>Experience: 4+ years in Information Security or Software Engineering, with at least 1+ years focused on AI Engineering, Agentic AI, or Advanced Automation using Opencode</li>
</ul>
<ul>
<li>AI Expertise: Deep understanding of LLM orchestration, prompt engineering, and building agentic loops (e.g., LangChain, AutoGen, or custom frameworks).</li>
</ul>
<ul>
<li>Agent Development: Proven ability to create agents from structured definitions (skills.md) and automate tasks that follow strict process/algorithmic flows.</li>
</ul>
<ul>
<li>Cloudflare Ecosystem: Expert knowledge of Cloudflare Workers, KV, Durable Objects, and R2. Experience with Cloudflare AI tools is a significant plus.</li>
</ul>
<ul>
<li>Languages: Mastery of Windsurf, Opencode or Rust.</li>
</ul>
<ul>
<li>Security Domain: Strong grasp of Cyber Security fundamentals, including SIEM/SOAR logic, UEBA, and risk assessment frameworks.</li>
</ul>
<p>Preferred Qualifications</p>
<ul>
<li>Experience building custom Agentic AI solutions that have replaced enterprise-grade 3rd party security software.</li>
</ul>
<ul>
<li>Background in M&amp;A Security Due Diligence or Vendor Risk Management automation.</li>
</ul>
<ul>
<li>Prior experience building edge-based security products or AI-driven log-push integrations.</li>
</ul>
<ul>
<li>Certifications: CISSP or specialized AI/Machine Learning certifications.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>LLM orchestration, prompt engineering, agentic loops, Cloudflare Workers, KV, Durable Objects, R2, Windsurf, Opencode, Rust, SIEM/SOAR logic, UEBA, risk assessment frameworks, custom Agentic AI solutions, M&amp;A Security Due Diligence, Vendor Risk Management automation, edge-based security products, AI-driven log-push integrations, CISSP, specialized AI/Machine Learning certifications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Cloudflare</Employername>
      <Employerlogo>https://logos.yubhub.co/cloudflare.com.png</Employerlogo>
      <Employerdescription>Cloudflare runs one of the world&apos;s largest networks powering millions of websites and other Internet properties.</Employerdescription>
      <Employerwebsite>https://www.cloudflare.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/cloudflare/jobs/7667832</Applyto>
      <Location>In-Office</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>9e667b9c-eb8</externalid>
      <Title>Senior Security Engineer II, Vulnerability Management</Title>
      <Description><![CDATA[<p>We are seeking a Senior Security Engineer to build the Vulnerability Management program protecting CoreWeave&#39;s AI infrastructure. You will architect intelligent automation systems that defend the GPU clusters powering breakthrough AI research and enterprise AI applications.</p>
<p>This role combines technical depth, strategic thinking, and the autonomy to design workflows that will protect infrastructure driving the future of AI.</p>
<p><strong>Key Responsibilities:</strong></p>
<ul>
<li>Build and scale AI-powered triage workflows: evaluate tools (LLM integration, TINES orchestration), architect solutions, and deploy to production</li>
<li>Drive intelligent, risk-based vulnerability prioritization while simultaneously training AI models,your assessments become the foundation for automation</li>
<li>Influence automation priorities: recommend which areas of the vulnerability pipeline would most benefit from automation to improve team efficiency</li>
<li>Design and implement automated detection-to-ticket pipelines: build workflows that generate vulnerability detections, test them, scale across the environment, and auto-create Jira tickets</li>
<li>Execute remediation campaigns: build automated workflows for EOL product removal, vulnerable software upgrades, and OS migrations at scale</li>
<li>Manage embargoed vendor disclosures from hardware partners, including embargo verification and zero-day response coordination</li>
<li>Lead security incident investigations related to high-profile vulnerabilities, coordinating cross-functional response and impact assessment</li>
<li>Participate in on-call rotation for rapid-response vulnerability analysis during active zero-day events or critical security incidents</li>
<li>Partner with IT, Infrastructure, and Engineering teams to drive remediation efforts, enforce SLAs, and escalate blockers strategically</li>
<li>Write daily operations reports documenting vulnerability trends, remediation velocity, and emerging threats for security leadership</li>
<li>Drive process improvements and workflow automation to improve operational efficiency and reduce manual toil</li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li>7+ years of relevant experience with demonstrated impact in vulnerability management, application security, platform security, or cloud security engineering</li>
<li>Bachelor’s or Master’s degree in Computer Science, Computer Engineering, Electrical Engineering, or equivalent practical experience</li>
<li>Proven hands-on experience building security automation (SOAR workflows, detection pipelines, or vulnerability prioritization frameworks)</li>
<li>Deep subject matter expertise with vulnerability management best practices: CVSS, EPSS, CISA KEV, exploit intelligence, and compensating controls</li>
<li>Strong development background with proficiency in Python, Go, or similar languages for building production-grade security tools</li>
<li>Experience with modern vulnerability management tooling such as Wiz, Semgrep, Rapid7, or similar platforms</li>
<li>Demonstrated ability to partner with cross-functional teams (IT, SRE, Engineering) to drive remediation without formal authority</li>
<li>Strong familiarity with common security vulnerabilities and the ability to judge their severity and business impact</li>
</ul>
<p><strong>Preferred Qualifications:</strong></p>
<ul>
<li>Practical experience building AI/ML-powered security workflows (LLM integration, automated triage, human-in-the-loop validation)</li>
<li>Experience managing hardware security vulnerabilities (GPU/DPU firmware, BMC/IPMI, specialized compute environments)</li>
<li>Production experience with security automation platforms such as TINES, Splunk SOAR, or serverless frameworks (AWS Lambda)</li>
<li>Strong DevOps, DevSecOps, or SRE background with experience in AWS/GCP/Azure cloud services and Infrastructure as Code (Terraform, CloudFormation)</li>
<li>Deep understanding of container security and Kubernetes (image scanning, admission control, runtime protection, supply chain security)</li>
<li>Experience supporting customer audits (SOC 2, ISO 27001, FedRAMP) with vulnerability evidence and control validation</li>
<li>Experience integrating vulnerability management into modern CI/CD pipelines with a &#39;shift-left&#39; mentality</li>
</ul>
<p><strong>What We Offer:</strong></p>
<p>The base salary range for this role is $165,000 to $242,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>
<p>The range we’ve posted represents the typical compensation range for this role. To determine actual compensation, we review the market rate for each candidate which can include a variety of factors. These include qualifications, experience, interview performance, and location.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$165,000 to $242,000</Salaryrange>
      <Skills>vulnerability management, application security, platform security, cloud security engineering, Python, Go, security automation, SOAR workflows, detection pipelines, vulnerability prioritization frameworks, CVSS, EPSS, CISA KEV, exploit intelligence, compensating controls, Wiz, Semgrep, Rapid7, AI/ML-powered security workflows, hardware security vulnerabilities, security automation platforms, DevOps, DevSecOps, SRE, container security, Kubernetes, customer audits, CI/CD pipelines</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for AI development and deployment.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4650290006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>dcc14ac2-f76</externalid>
      <Title>Security Software Engineer, Detection &amp; Response Platform</Title>
      <Description><![CDATA[<p>weeted job ad in markdown with  line breaks</p>
<p><strong>About the role</strong></p>
<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Build AI-powered platform responsible for all aspects of D&amp;R capabilities from detection development to incident response</li>
<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>
<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>
<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>
<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>
<li>Mentor engineers and contribute to hiring and growth of the Security team</li>
<li>Participate in on-call shifts</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>7+ years of experience in software engineering with a focus on security, infrastructure and/or data pipelines</li>
<li>Track record of building and maintaining internal developer tools or security platforms</li>
<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>
</ul>
<p><strong>Strong candidates may also have experience with:</strong></p>
<ul>
<li>Experience building security tooling from the ground up</li>
<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>
<li>Background in detection engineering or security operations</li>
<li>SOAR platform/automation development</li>
<li>Data lake / Database architecture</li>
<li>API design and internal platform creation</li>
<li>Track record of applying ML/AI to security problems</li>
<li>Experience scaling security operations in a high-growth environment</li>
</ul>
<p><strong>Logistics</strong></p>
<ul>
<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>
<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>
<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact , advancing our long-term goals of steerable, trustworthy AI , rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p><strong>Come work with us!</strong></p>
<p>Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000-$405,000 USD</Salaryrange>
      <Skills>Python, Data pipelines, ML-powered detection systems, Security telemetry, Claude, Security operations, Incident response, Experience building security tooling from the ground up, Background in implementing security monitoring solutions (SIEM, log aggregation, EDR), Background in detection engineering or security operations, SOAR platform/automation development, Data lake / Database architecture, API design and internal platform creation, Track record of applying ML/AI to security problems, Experience scaling security operations in a high-growth environment</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4595463008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>eda84ece-394</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams.</p>
<p>In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams. You will lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic&#39;s technology stack.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Developing and deploying novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>
<li>Creating and optimizing detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>
<li>Reviewing Incident Response metrics and procedures and driving continuous improvement</li>
<li>Working cross-functionally with other security and engineering teams</li>
</ul>
<p>Note: This position will require participation in an on-call rotation.</p>
<p>To be successful in this role, you will need:</p>
<ul>
<li>3+ years of software engineering experience, with security experience a plus</li>
<li>5+ years of detection engineering, incident response, or threat hunting experience</li>
<li>A solid understanding of cloud environments and operations</li>
<li>Experience working with engineering teams in a SaaS environment</li>
<li>Exceptional communication and collaboration skills</li>
<li>An ability to lead projects with little guidance</li>
<li>The ability to pick up new languages and technologies quickly</li>
<li>Experience handling security incidents and investigating anomalies as part of a team</li>
<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>
</ul>
<p>Strong candidates may also have experience with:</p>
<ul>
<li>Performing security operations or investigations involving large-scale Kubernetes environments</li>
<li>A high level of proficiency in Python and query languages such as SQL</li>
<li>Analyzing attack behavior and prototyping high-quality detections</li>
<li>Threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>
<li>Contributing to a high-growth startup environment</li>
</ul>
<p>If you&#39;re interested in this role, please submit an application, even if you don&#39;t believe you meet every single qualification. We encourage diversity and inclusion in our hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000-$405,000 USD</Salaryrange>
      <Skills>software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, EDR, SIEM, SOAR, Python, SQL, Kubernetes, Large Language Models, playbooks, workflows, continuous improvement, collaboration, leadership, new languages and technologies</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4982193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>642facec-d09</externalid>
      <Title>Senior Software Engineer (Security)</Title>
      <Description><![CDATA[<p>About Us\n\nAt Cloudflare, we&#39;re on a mission to help build a better Internet. Today the company runs one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.\n\nAs a Senior Security AI Engineer, you will be the technical architect for our Agentic AI roadmap. Your mission is to move beyond simple automation scripts and build a fleet of &quot;AI Team Members&quot;,intelligent helper agents that execute complex security algorithms, process flows, and assessment logic.\n\nResponsibilities\n\n• Agent Architecture: Design and deploy multi-agent systems that follow complex security algorithms and assessment flows to automate manual SOC and Assurance tasks.\n\n• Skill Engineering: Standardize agent capabilities by creating and maintaining skills.md files and specialized Markdown documentation that define agentic personas and execution boundaries.\n\n• Workflow Training: Train and fine-tune LLMs to function as &quot;helper agents&quot; capable of executing autonomous AI workflows as integral members of the Security Engineering team.\n\n• Infrastructure as Agents: Utilize Cloudflare Workers, Vectorize, and AI Gateway to build serverless, low-latency agentic architectures for real-time traffic analysis and remediation.\n\n• Autonomous Assessment: Build and scale the engine for autonomous vendor security reviews and M&amp;A assessments, transforming qualitative data into quantitative risk insights.\n\n• Mentorship: Lead the transition for Developer and Automation Engineers into the AI space, fostering a culture of Agentic Security.\n\nRequirements\n\n• Experience: 12+ years in Information Security or Software Engineering, with at least 5+ years focused on AI Engineering, Agentic AI, or Advanced Automation using Opencode\n\n• AI Expertise: Deep understanding of LLM orchestration, prompt engineering, and building agentic loops (e.g., LangChain, AutoGen, or custom frameworks).\n\n• Agent Development: Proven ability to create agents from structured definitions (skills.md) and automate tasks that follow strict process/algorithmic flows.\n\n• Cloudflare Ecosystem: Expert knowledge of Cloudflare Workers, KV, Durable Objects, and R2. Experience with Cloudflare AI tools is a significant plus.\n\n• Languages: Mastery of Windsurf, Opencode or Rust.\n\n• Security Domain: Strong grasp of Cyber Security fundamentals, including SIEM/SOAR logic, UEBA, and risk assessment frameworks.\n\n• Technical Writing: Ability to document complex AI logic and &quot;agent skills&quot; in clear, executable Markdown files.\n\nPreferred Qualifications\n\n• Experience building custom Agentic AI solutions that have replaced enterprise-grade 3rd party security software.\n\n• Background in M&amp;A Security Due Diligence or Vendor Risk Management automation.\n\n• Prior experience building edge-based security products or AI-driven log-push integrations.\n\n• Certifications: CISSP or specialized AI/Machine Learning certifications.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Cloudflare Workers, KV, Durable Objects, R2, Windsurf, Opencode, Rust, LLM orchestration, prompt engineering, LangChain, AutoGen, custom frameworks, SIEM/SOAR logic, UEBA, risk assessment frameworks, Agentic AI, Advanced Automation, M&amp;A Security Due Diligence, Vendor Risk Management automation, edge-based security products, AI-driven log-push integrations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Cloudflare</Employername>
      <Employerlogo>https://logos.yubhub.co/cloudflare.com.png</Employerlogo>
      <Employerdescription>Cloudflare helps build a better Internet by protecting and accelerating any Internet application online without adding hardware, installing software, or changing a line of code.</Employerdescription>
      <Employerwebsite>https://www.cloudflare.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/cloudflare/jobs/7667849</Applyto>
      <Location>In-Office</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>c60fc7e5-9f1</externalid>
      <Title>Insider Risk Investigator - Technical &amp; Human Intelligence</Title>
      <Description><![CDATA[<p>We are seeking an exceptional Insider Risk Investigator with expertise in both human and technical investigations to support and protect Anthropic&#39;s mission.</p>
<p>The Insider Risk Team works cross-functionally to deter, identify, investigate and mitigate risks to Anthropic&#39;s most critical assets,our people, our data, and our infrastructure.</p>
<p>Responsibilities:</p>
<ul>
<li>Triage custom technical detection alerts</li>
<li>Independently conduct end-to-end insider risk investigations while working closely with IT, Detection and Response, Legal, HR and other cross-functional teams</li>
<li>Monitor and triage external threats targeting employees</li>
<li>Conduct sensitive interviews of employees or other involved parties</li>
<li>Perform technical analysis of logs from SIEM, DLP, UEBA systems</li>
<li>Leverage AI tools (Claude, Claude Code) to accelerate investigation workflows and data analysis</li>
<li>Build and maintain investigation documentation</li>
<li>Assist in iterating and improving on processes, procedures and systems to detect, mitigate and investigate insider risks</li>
<li>Work cross-functionally to develop, refine and operationalize insider risk indicators, scenarios and mitigation strategies</li>
<li>Provide rapid-turnaround security assessments to support business operations</li>
<li>Support education and awareness programs to promote a robust security culture</li>
<li>Serve as the subject matter expert for insider risk and provide training to team members as needed</li>
</ul>
<p>You may be a good fit if you have:</p>
<ul>
<li>Bachelor&#39;s degree and/or higher education in a related field</li>
<li>5-8 years of experience in insider risk, corporate investigations or a related domain</li>
<li>3-5 years experience in conducting investigative interviews</li>
<li>Experience conducting OSINT for threat assessment, or counterintelligence</li>
<li>Experience leveraging DLP, UEBA, SIEM, SOAR and other insider risk security tooling for detections and investigations</li>
<li>Broad understanding of internal and external investigations, cybersecurity, interview techniques, risk assessment and managing strong cross-functional relationships</li>
<li>Ability to communicate complex security findings clearly and concisely to non-technical stakeholders (written and verbal)</li>
<li>Track record of rapid response to time-sensitive security requests</li>
<li>Comfort operating across organizational boundaries (Security, People, Legal, IT)</li>
<li>Exceptional communication, collaboration skills and the ability to lead projects with little guidance</li>
<li>Demonstrated ability to operate independently with minimal oversight while managing sensitive cases</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Experience working in the technology industry or at/with AI/ML companies</li>
<li>Experience with counterintelligence investigations and nation-state threat actor TTPs</li>
<li>Background in open-source intelligence collection and analysis</li>
<li>Track record of AI/LLM adoption for productivity gains in investigative work</li>
<li>Experience contributing to a high growth startup environment</li>
<li>Specialized knowledge of risks unique to the AI sector</li>
<li>Experience with data exfiltration investigations across multiple vectors (email, cloud, removable media)</li>
<li>Experience working in government, defense, or high-security environments</li>
</ul>
<p>What makes you successful here:</p>
<ul>
<li>Entrepreneurial mindset: You see gaps and fill them without being asked</li>
<li>Technical + human balance: Equal comfort analyzing log data and conducting sensitive interviews</li>
<li>AI-native approach: You leverage LLMs to work smarter, not just harder</li>
<li>Mission alignment: You understand AI safety stakes and insider risk&#39;s role in protecting that mission</li>
<li>Judgment under uncertainty: You make sound decisions with incomplete information</li>
<li>Clear communicator: You distill complex findings into actionable insights for diverse audiences</li>
<li>Cross-functional navigator: You build relationships and collaborate effectively across teams</li>
</ul>
<p>Annual compensation range for this role is $245,000-$305,000 USD.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$245,000-$305,000 USD</Salaryrange>
      <Skills>insider risk, corporate investigations, OSINT, DLP, UEBA, SIEM, SOAR, cybersecurity, interview techniques, risk assessment, AI/ML, counterintelligence, open-source intelligence collection and analysis, AI/LLM adoption, high growth startup environment, data exfiltration investigations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5182430008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>9f15a44c-cc5</externalid>
      <Title>Team Lead, SOC (Security Operations Center)</Title>
      <Description><![CDATA[<p>We are looking for a SOC (Security Operations Center) Team Lead to build and lead our SOC function end-to-end. You will own vulnerability management, alerting and detection engineering, incident response, and the security tooling/infrastructure that enable these missions.</p>
<p>Key responsibilities include:</p>
<p>• Leading and growing the team: Manage the SOC team, shape the roadmap, delegate effectively, and mentor engineers.</p>
<p>• Driving operations: Define vulnerability management processes and coordinate stakeholders for timely remediation. Design, implement, and operate SIEM/SOAR infrastructure (ingestion, normalization, correlation, alerting, playbooks). Specify logging requirements across our main stacks and centralize telemetry in the SIEM. Develop and tune correlation rules and detections; manage CTI intake and operationalize intel. Run continuous improvement to reduce false positives and raise signal quality. Establish crisp procedures for alert triage, escalation, and incident handling &amp; investigation. Lead incident communications with stakeholders and ensure thorough documentation.</p>
<p>• Engineering and enablement: Contribute to security tooling, automation, and integrations that speed up detection/response. Produce guidance and documentation for product/infra teams; contribute to compliance in the SOC perimeter.</p>
<p>• Exercises and assurance: Coordinate red/blue exercises, post-mortems, and targeted audits to validate coverage and resilience.</p>
<p>The ideal candidate will have 8+ years of experience leading SOC/CSIRT functions, with proven leadership. Hands-on experience with SIEM (e.g., Elastic Security, Sekoia, Splunk) and SOAR platforms is required. Strong experience in vulnerability management (e.g., DefectDojo, Dependency-Track) and remediation workflows is also necessary. Solid grasp of the cyber kill chain / attack lifecycle, detection engineering, and log source coverage is essential. Excellent problem-solving and communication skills are required, as well as the ability to operate in a fast-paced startup environment.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, SOAR, vulnerability management, incident response, security tooling, automation, integrations, cyber kill chain, attack lifecycle, detection engineering, log source coverage, scripting, Python, Bash, modern infra/app stacks, EDR/IDS/IPS, compliance frameworks, security audits/pen-tests</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI provides high-performance, optimized, open-source and cutting-edge AI models, products and solutions.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/e0b55281-55c6-4143-9bf8-e4418c667f9f</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>538cc1dd-079</externalid>
      <Title>Lead Cybersecurity Automation Engineer</Title>
      <Description><![CDATA[<p>You will lead the development of end-to-end automation and orchestration strategies for Security Operations, covering detection, triage, investigation, containment, remediation, and post-incident learning.</p>
<p>As a seasoned cybersecurity professional, you will architect and implement scalable, resilient automation frameworks that seamlessly integrate SIEM, SOAR, EDR/XDR, cloud security, identity, vulnerability management, and threat intelligence platforms.</p>
<p>You will design and deploy AI/LLM-enabled workflows to enhance alert triage, enrichment, investigation summarization, decision support, and response actions.</p>
<p>You will collaborate closely with internal stakeholders and external teams to align security outcomes with business priorities.</p>
<p>You will foster a culture of engineering excellence and continuous improvement within SecOps.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Owning and defining the end-to-end automation and orchestration strategy for Security Operations</li>
<li>Architecting and implementing scalable, resilient automation frameworks</li>
<li>Designing and deploying AI/LLM-enabled workflows</li>
<li>Collaborating with internal stakeholders and external teams</li>
<li>Fostering a culture of engineering excellence and continuous improvement</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>10+ years of experience in cybersecurity</li>
<li>Expertise in designing and deploying large-scale security automation and orchestration in enterprise environments</li>
<li>Hands-on experience with SOAR platforms, SIEMs, EDR/XDR, and security telemetry pipelines</li>
<li>Proven ability to apply AI/ML, including LLM-based agentic technologies, to security workflows</li>
<li>Advanced scripting and automation skills</li>
<li>Strong data analytics skills</li>
<li>Solid systems architecture skills</li>
<li>Excellent written and verbal communication skills</li>
</ul>
<p>As a member of the Synopsys Cybersecurity team, you will work alongside experts in SOC, IR, Threat Intelligence, Detection Engineering, and more, collaborating to build resilient, scalable, and innovative security solutions.</p>
<p>Synopsys offers a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$161000-$242000</Salaryrange>
      <Skills>cybersecurity, automation, orchestration, SIEM, SOAR, EDR/XDR, cloud security, identity, vulnerability management, threat intelligence, AI/ML, LLM, agentic technologies, scripting, data analytics, systems architecture</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys develops and maintains software used in chip design, verification, and manufacturing.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/austin/lead-cybersecurity-automation-engineer/44408/92980004592</Applyto>
      <Location>Austin</Location>
      <Country></Country>
      <Postedate>2026-04-05</Postedate>
    </job>
    <job>
      <externalid>3e75d44f-c7f</externalid>
      <Title>Team Lead, SOC (Security Operations Center)</Title>
      <Description><![CDATA[<p>About this role</p>
<p>We are looking for a SOC (Security Operations Center) Team Lead to build and lead our SOC function end-to-end. You will own vulnerability management, alerting and detection engineering, incident response, and the security tooling/infrastructure that enable these missions. You’ll define processes, collaborate closely with Product, Infra and IT, and continuously improve detection quality and response time.</p>
<p>Key responsibilities</p>
<p>• Lead &amp; grow the team: Manage the SOC team, shape the roadmap, delegate effectively, and mentor engineers.</p>
<p>• Drive operations:
    - Define vulnerability management processes and coordinate stakeholders for timely remediation.
    - Design, implement, and operate SIEM/SOAR infrastructure (ingestion, normalization, correlation, alerting, playbooks).
    - Specify logging requirements across our main stacks and centralize telemetry in the SIEM.
    - Develop and tune correlation rules and detections; manage CTI intake and operationalize intel.
    - Run continuous improvement to reduce false positives and raise signal quality.
    - Establish crisp procedures for alert triage, escalation, and incident handling &amp; investigation.
    - Lead incident communications with stakeholders and ensure thorough documentation.</p>
<p>• Engineering &amp; enablement:
    - Contribute to security tooling, automation, and integrations that speed up detection/response.
    - Produce guidance and documentation for product/infra teams; contribute to compliance in the SOC perimeter.</p>
<p>• Exercises &amp; assurance:
    - Coordinate red/blue exercises, post-mortems, and targeted audits to validate coverage and resilience.</p>
<p>Requirements</p>
<p>• 8+ years of experience leading SOC/CSIRT functions, with proven leadership.</p>
<p>• Hands-on with SIEM (e.g., Elastic Security, Sekoia, Splunk) and SOAR platforms.</p>
<p>• Strong experience in vulnerability management (e.g., DefectDojo, Dependency-Track) and remediation workflows.</p>
<p>• Solid grasp of the cyber kill chain / attack lifecycle, detection engineering, and log source coverage.</p>
<p>• Excellent problem-solving and communication skills; able to operate in a fast-paced startup environment.</p>
<p>• Builder mindset: pragmatic, automation-oriented, comfortable with ambiguity and ownership.</p>
<p>Nice to have</p>
<p>• Bring scripting/automation skills (e.g., Python, Bash) for data pipelines/playbooks.</p>
<p>• Know modern infra/app stacks (Linux, containers, Kubernetes, cloud), EDR/IDS/IPS.</p>
<p>• Have exposure to compliance frameworks (ISO 27001, SOC 2) and security audits/pen-tests.</p>
<p>• Have run purple team exercises and measurable detection-coverage programs.</p>
<p>• Are comfortable partnering with Product/Platform teams and influencing roadmaps.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, SOAR, vulnerability management, remediation workflows, cyber kill chain, detection engineering, log source coverage, problem-solving, communication skills, scripting/automation skills, modern infra/app stacks, EDR/IDS/IPS, compliance frameworks, security audits/pen-tests, purple team exercises</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo></Employerlogo>
      <Employerdescription>Mistral AI provides a comprehensive AI platform for enterprise needs, integrating seamlessly into daily working life.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/e0b55281-55c6-4143-9bf8-e4418c667f9f</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-03-10</Postedate>
    </job>
    <job>
      <externalid>723d3153-72d</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p><strong>About the role</strong></p>
<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams. In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic’s technology stack</li>
<li>Develop and deploy novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>
<li>Create and optimise detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>
<li>Review Incident Response metrics and procedures and drive continuous improvement</li>
<li>Work cross functionally with other security and engineering teams</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>3+ years of software engineering experience, with security experience a plus and/or</li>
<li>5+ years of detection engineering, incident response, or threat hunting experience</li>
<li>A solid understanding of cloud environments and operations</li>
<li>Experience working with engineering teams in a SaaS environment</li>
<li>Exceptional communication and collaboration skills</li>
<li>An ability to lead projects with little guidance</li>
<li>The ability to pick up new languages and technologies quickly</li>
<li>Experience handling security incidents and investigating anomalies as part of a team</li>
<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>
</ul>
<p><strong>Strong candidates may also have experience with:</strong></p>
<ul>
<li>Experience performing security operations or investigations involving large-scale Kubernetes environments</li>
<li>A high level of proficiency in Python and query languages such as SQL</li>
<li>Experience analysing attack behaviour and prototyping high-quality detections</li>
<li>Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>
<li>Experience contributing to a high growth startup environment</li>
</ul>
<p><strong>Deadline to apply:</strong></p>
<p>None. Applications will be reviewed on a rolling basis.</p>
<p><strong>Logistics</strong></p>
<ul>
<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000 - $405,000 USD</Salaryrange>
      <Skills>software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, engineering teams, SaaS environment, communication skills, project leadership, new languages and technologies, security incidents, anomalies, EDR, SIEM, SOAR, security tools, Python, SQL, threat intelligence, malware analysis, infrastructure as code, detection engineering, forensics, Kubernetes environments, high growth startup environment</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a quickly growing organisation with a mission to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4982193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>c4307896-981</externalid>
      <Title>Security Software Engineer, Detection &amp; Response Platform</Title>
      <Description><![CDATA[<p><strong>About the role</strong></p>
<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Build AI-powered platform responsible for all aspects of D&amp;R capabilities from detection development to incident response</li>
<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>
<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>
<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>
<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>
<li>Mentor engineers and contribute to hiring and growth of the Security team</li>
<li>Participate in on-call shifts</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>7+ years of experience in software engineering with a focus on security, infrastructure and/or data pipelines</li>
<li>Track record of building and maintaining internal developer tools or security platforms</li>
<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>
</ul>
<p><strong>Strong candidates may also have experience with:</strong></p>
<ul>
<li>Experience building security tooling from the ground up</li>
<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>
<li>Background in detection engineering or security operations</li>
</ul>
<p><strong>Logistics</strong></p>
<ul>
<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000 - $405,000USD</Salaryrange>
      <Skills>Test-driven software development, CI/CD, Infrastructure-as-code, Query optimization for large datasets, Cloud infrastructure, Serverless architectures, Python, Security teams, Translation of requirements into technical solutions, SOAR platform/automation development, Data lake / Database architecture, API design and internal platform creation, ML/AI to security problems, Scaling security operations in a high-growth environment</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic&apos;s mission is to create reliable, interpretable, and steerable AI systems. It is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4595463008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>bca7b9c2-2e3</externalid>
      <Title>Senior Security Software Engineer, eBPF &amp; Security Sensors</Title>
      <Description><![CDATA[<p><strong>About the Role</strong></p>
<p>We&#39;re seeking an exceptional engineer to join Anthropic&#39;s Detection Platform team to build and scale our next-generation security analytics infrastructure. In this role, you&#39;ll architect and implement data pipelines that process massive amounts of security telemetry, develop ML-powered detection systems, and create innovative solutions that leverage Claude to transform security operations.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Build an AI-powered platform responsible for all aspects of detection and response capabilities, from detection development to incident response</li>
<li>Design and implement scalable data pipelines for ingesting and processing security telemetry across our rapidly growing infrastructure</li>
<li>Architect solutions for storing and efficiently querying large volumes of security-relevant data</li>
<li>Create rapid prototypes and proof-of-concepts for new security tooling and analytics capabilities</li>
<li>Work closely with security and infrastructure teams to understand requirements and deliver solutions</li>
<li>Mentor engineers and contribute to hiring and growth of the Security team</li>
<li>Participate in on-call rotations</li>
</ul>
<p><strong>You may be a good fit if you</strong></p>
<ul>
<li>7+ years of experience in software engineering with a focus on security, infrastructure, or data pipelines</li>
<li>Track record of building and maintaining internal developer tools or security platforms</li>
<li>Strong understanding of data processing pipelines and experience working with large-scale logging systems</li>
<li>Experience with test-driven software development or CI/CD (a plus for direct experience with detection-as-code workflows)</li>
<li>Experience with infrastructure-as-code (Terraform, CloudFormation)</li>
<li>Experience with query optimization for large datasets</li>
<li>Experience building stable and scalable services on cloud infrastructure and serverless architectures</li>
<li>Ability to write maintainable and secure code in Python</li>
<li>Experience working with security teams and translating requirements into technical solutions</li>
<li>Ability to lead technical projects with minimal guidance</li>
<li>Track record of driving engineering excellence through high standards, constructive code reviews, and mentorship</li>
<li>Ability to lead cross-functional security initiatives and navigate complex organizational dynamics</li>
<li>Strong communication skills with the ability to translate technical concepts effectively across all organizational levels</li>
<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>
<li>Strong systems thinking with ability to identify and mitigate risks in complex environments</li>
</ul>
<p><strong>Strong candidates may also have experience with</strong></p>
<ul>
<li>Experience building security tooling from the ground up</li>
<li>Background in implementing security monitoring solutions (SIEM, log aggregation, EDR)</li>
<li>Background in detection engineering or security operations</li>
<li>Experience with SOAR platform or automation development</li>
<li>Experience with data lake or database architecture</li>
<li>Experience with API design and internal platform creation</li>
<li>Track record of applying ML/AI to security problems</li>
<li>Experience scaling security operations in a high-growth environment</li>
</ul>
<p><strong>Logistics</strong></p>
<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>
<p><strong>Your safety matters to us.</strong> To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>software engineering, security, infrastructure, data pipelines, ML-powered detection systems, Claude, Python, Terraform, CloudFormation, query optimization, альную services, cloud infrastructure, serverless architectures, security tooling, SIEM, log aggregation, EDR, SOAR platform, automation development, data lake, database architecture, API design, internal platform creation, ML/AI to security problems, scaling security operations</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic&apos;s mission is to create reliable, interpretable, and steerable AI systems. The company is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/5108521008</Applyto>
      <Location>Zürich</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>bc395d84-515</externalid>
      <Title>Senior Global Security Investigator</Title>
      <Description><![CDATA[<p><strong>Senior Global Security Investigator</strong></p>
<p><strong>About the Team</strong></p>
<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity.</p>
<p>The Security team protects OpenAI’s technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.</p>
<p><strong>About the Role</strong></p>
<p>We are seeking a senior Global Security Investigator with a technical background to lead complex, long-running security investigations involving a full spectrum of threats – whether originating from internal employees, external threat actors, or supply chain partners. This role is about seeing the full chessboard and independently driving complex, multi-month cases across cyber, physical, and human domains.</p>
<p><strong>In this role you will:</strong></p>
<ul>
<li>Independently conduct comprehensive security investigations from initial detection to resolution, including cases involving insiders, external actors, and supply chain and third-party risks.</li>
</ul>
<ul>
<li>Lead proactive, data-driven threat-hunting efforts that weave together disparate signals to surface undetected insider or external threats before they escalate into incidents.</li>
</ul>
<ul>
<li>Perform comprehensive technical analysis of complex hardware, software, and supplier supply chains to identify, enumerate, and mitigate risks.</li>
</ul>
<ul>
<li>Partner closely with cross-functional teams, including Human Resources, Legal, Security, and IT, and external stakeholders or law enforcement when necessary.</li>
</ul>
<ul>
<li>Collaborate with technical counterparts to enhance detections, resolve telemetry gaps, and implement new capabilities to identify security issues involving cyber, physical, and human domains.</li>
</ul>
<ul>
<li>Collect, preserve, and analyze evidence from a variety of sources, including log data, digital forensics, subject interviews, access records, threat intelligence, and open-source intelligence (OSINT), to support investigative findings.</li>
</ul>
<ul>
<li>Continuously improve investigative procedures and security controls based on investigations and lessons learned.</li>
</ul>
<p><strong>You might thrive in this role if you have:</strong></p>
<ul>
<li>Bachelor’s degree in Criminal Justice, Cybersecurity, or a related field (or equivalent experience) and 8+ years of investigative experience in counterintelligence, insider risk, forensic investigations, cybersecurity, supply chain security, or related domains.</li>
</ul>
<ul>
<li>Unimpeachable integrity, sound judgment, and the ability to handle confidential matters with discretion.</li>
</ul>
<ul>
<li>An active US security clearance, or willingness and eligibility to obtain one.</li>
</ul>
<ul>
<li>Deep specialization in geopolitical threat domains, with hands-on experience identifying, assessing, and mitigating adversarial risks through tailored countermeasures.</li>
</ul>
<ul>
<li>Expert knowledge of common security tooling, including EDR, DLP, UEBA, SIEM, SOAR and other related platforms.</li>
</ul>
<ul>
<li>Demonstrated ability to independently write complex queries, automate data workflows, and analyze structured datasets.</li>
</ul>
<ul>
<li>Excellent written and verbal communication skills, including the ability to distill complex findings into clear, actionable reports and explain technical issues to non-technical stakeholders.</li>
</ul>
<ul>
<li>Exceptional collaboration skills with the ability to work across diverse teams (HR, Legal, IT, etc.) to lead projects and investigations with minimal guidance.</li>
</ul>
<p><strong>Compensation</strong></p>
<ul>
<li>San Francisco, Seattle or New York: $288K – $500K • Offers Equity</li>
</ul>
<ul>
<li>Zone B: $230.4K – $500K • Offers Equity</li>
</ul>
<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus for eligible employees and benefits.</p>
<p><strong>Benefits</strong></p>
<ul>
<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>
</ul>
<ul>
<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>
</ul>
<ul>
<li>401(k) retirement plan with employer match</li>
</ul>
<ul>
<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>
</ul>
<ul>
<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>
</ul>
<ul>
<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick and safe time (1 hour per 30 hours worked)</li>
</ul>
<ul>
<li>Mental health and wellness support</li>
</ul>
<ul>
<li>Employer-paid basic life and disability coverage</li>
</ul>
<ul>
<li>Annual learning and development stipend to fuel your professional growth</li>
</ul>
<ul>
<li>Daily meals in our offices, and meal delivery credits as eligible</li>
</ul>
<ul>
<li>Relocation support for eligible employees</li>
</ul>
<ul>
<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>
</ul>
<p>More details about our benefits are available to candidates during the hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$288K – $500K • Offers Equity</Salaryrange>
      <Skills>Bachelor’s degree in Criminal Justice, Cybersecurity, or a related field, 8+ years of investigative experience in counterintelligence, insider risk, forensic investigations, cybersecurity, supply chain security, or related domains, Unimpeachable integrity, sound judgment, and the ability to handle confidential matters with discretion, An active US security clearance, or willingness and eligibility to obtain one, Deep specialization in geopolitical threat domains, with hands-on experience identifying, assessing, and mitigating adversarial risks through tailored countermeasures, Expert knowledge of common security tooling, including EDR, DLP, UEBA, SIEM, SOAR and other related platforms, Demonstrated ability to independently write complex queries, automate data workflows, and analyze structured datasets, Excellent written and verbal communication skills, including the ability to distill complex findings into clear, actionable reports and explain technical issues to non-technical stakeholders, Exceptional collaboration skills with the ability to work across diverse teams (HR, Legal, IT, etc.) to lead projects and investigations with minimal guidance, EDR, DLP, UEBA, SIEM, SOAR, Cybersecurity, Supply chain security, Forensic investigations, Counterintelligence, Insider risk</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>OpenAI</Employername>
      <Employerlogo>https://logos.yubhub.co/openai.com.png</Employerlogo>
      <Employerdescription>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. The company was founded in 2015 and has since grown to become a leading player in the field of artificial intelligence.</Employerdescription>
      <Employerwebsite>https://jobs.ashbyhq.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ashbyhq.com/openai/8b2e1585-dbcc-4739-9dc5-3980697d6659</Applyto>
      <Location>San Francisco; New York City; Seattle; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-06</Postedate>
    </job>
    <job>
      <externalid>7e965433-47d</externalid>
      <Title>Manager Cyber Security – SOC &amp; Detection Engineering</Title>
      <Description><![CDATA[<p>Opening. This role is responsible for shaping the future of security operations and driving the development of modern SOC and detection services in the enterprise and public sector. analysed the following tasks:</p>
<p><strong>What you&#39;ll do</strong></p>
<p>You will be responsible for the strategic development and operational management of SOC and CDC projects with a focus on SIEM, XDR, SOAR, and vulnerability management solutions. This includes responsibility for architecture, transition, and optimization of detection and response platforms (e.g. SIEM modernization, XDR introduction, tool rollouts, detection engineering).</p>
<ul>
<li>Strategische Weiterentwicklung und operative Steuerung von SOC- und CDC-Projekten mit Fokus auf SIEM-, XDR-, SOAR- und Vulnerability-Management-Lösungen</li>
<li>Verantwortung für Architektur, Transition und Optimierung von Detection- und Response-Plattformen (z. B. SIEM-Modernisierung, XDR-Einführung, Tool-Rollouts, Detection Engineering)</li>
</ul>
<p><strong>What you need</strong></p>
<p>To be successful in this role, you will need the following skills:</p>
<ul>
<li>Abgeschlossenes Studium im MINT-Bereich oder vergleichbare Qualifikation sowie mindestens 5–7 Jahre Berufserfahrung in der Cyber Security mit Schwerpunkt SOC, SIEM, XDR oder Detection Engineering</li>
<li>Leidenschaft für Security-Architekturen, Incident Response, Detection Use Cases und idealerweise Vulnerability Management</li>
<li>Expertise im Unternehmerischen Denken sowie Erfahrung in Projektleitung, Presales oder Business Development im Beratungsumfeld und idealer Weise Erfahrung mit Microsoft Sentinel, Microsoft Defender, Crowdstrike oder PaloAlto Cortex SOAR</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Abgeschlossenes Studium im MINT-Bereich oder vergleichbare Qualifikation, mindestens 5–7 Jahre Berufserfahrung in der Cyber Security mit Schwerpunkt SOC, SIEM, XDR oder Detection Engineering, Leidenschaft für Security-Architekturen, Incident Response, Detection Use Cases und idealerweise Vulnerability Management, Expertise im Unternehmerischen Denken, Erfahrung in Projektleitung, Presales oder Business Development im Beratungsumfeld, Erfahrung mit Microsoft Sentinel, Microsoft Defender, Crowdstrike oder PaloAlto Cortex SOAR</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>MHP - A Porsche Company</Employername>
      <Employerlogo>https://logos.yubhub.co/jobs.porsche.com.png</Employerlogo>
      <Employerdescription>MHP is a technology and business partner that digitalizes processes and products for its customers and accompanies them in their IT transformations along the entire value chain. As a digitalization pioneer in the sectors of mobility and manufacturing, MHP transfers its expertise to various industries and is the premium partner for thought leaders on the way to a better tomorrow.</Employerdescription>
      <Employerwebsite>https://jobs.porsche.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.porsche.com/index.php?ac=jobad&amp;id=19859</Applyto>
      <Location>Deutschlandweit &amp; Hybrid Work</Location>
      <Country></Country>
      <Postedate>2026-03-04</Postedate>
    </job>
    <job>
      <externalid>81f97af7-71e</externalid>
      <Title>Detection Engineer</Title>
      <Description><![CDATA[<p>The Security Detections Engineer is responsible for designing, building and continuously improving EA&#39;s detection and response capabilities across our global environment.</p>
<p><strong>What you&#39;ll do</strong></p>
<p>You will work closely with Security Operations (SOC) to produce meaningful alerts that mitigate risk, and with Security Engineering to evolve the automation platforms and integrations that enable scalable content delivery, enrichment, correlation, and noise reduction across EA&#39;s security tooling.</p>
<ul>
<li>Responsibility 1: Design, build and continuously improve EA&#39;s detection and response capabilities across our global environment.</li>
<li>Responsibility 2: Work closely with Security Operations (SOC) to produce meaningful alerts that mitigate risk.</li>
</ul>
<p><strong>What you need</strong></p>
<ul>
<li>Demonstrated experience in security detection engineering in an enterprise environment.</li>
<li>Proficiency in automation development (Python preferred) and building/consuming APIs (REST, auth patterns, secrets handling).</li>
</ul>
<p><strong>Why this matters</strong></p>
<p>This role owns the end-to-end detection lifecycle-from threat-informed use case design through validation, tuning, and operational handoff, while also developing automation that reduces engineering toil and increases speed and consistency in mitigating risks as they are discovered.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>security detection engineering, automation development, APIs, Python, SOAR</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Electronic Arts</Employername>
      <Employerlogo>https://logos.yubhub.co/jobs.ea.com.png</Employerlogo>
      <Employerdescription>Electronic Arts creates next-level entertainment experiences that inspire players and fans around the world. Here, everyone is part of the story. Part of a community that connects across the globe. A place where creativity thrives, new perspectives are invited, and ideas matter.</Employerdescription>
      <Employerwebsite>https://jobs.ea.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ea.com/en_US/careers/JobDetail/Security-Detection-Engineer/212301</Applyto>
      <Location>Guildford, Surrey, United Kingdom</Location>
      <Country></Country>
      <Postedate>2026-02-10</Postedate>
    </job>
  </jobs>
</source>