<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>d69adec5-3dd</externalid>
      <Title>Head of Secure Manufacturing and Stealth</Title>
      <Description><![CDATA[<p>Job Title: Head of Secure Manufacturing and Stealth</p>
<p>Location: Seoul, South Korea; Singapore</p>
<p>Department: Security</p>
<p>Job Type: Full time</p>
<p>Work Arrangement: Hybrid</p>
<p>About the Team</p>
<p>Security is at the foundation of OpenAI&#39;s mission to ensure that artificial general intelligence benefits all of humanity. Our Security team protects OpenAI&#39;s technology, people, and products. We are technical in what we build but operational in how we do our work, and we are committed to supporting all products and research at OpenAI.</p>
<p>As part of this, our Secure Manufacturing &amp; Stealth is a dedicated function that partners closely with supply chain and operations teams to protect OpenAI&#39;s most sensitive projects. We design and enforce safeguards that ensure our innovations remain confidential until launch, while enabling our engineers and partners to move quickly and effectively. Our team&#39;s tenets include: prioritizing for impact, preparing for future transformative technologies, building trust with cross-functional partners, and fostering a robust culture of security and confidentiality.</p>
<p>About the Role</p>
<p>We are seeking a Head of Secure Manufacturing and Stealth (SMS) - APAC to lead OpenAI&#39;s efforts protecting sensitive product development and production operations in the APAC supply chain. You will design and drive the program that safeguards our most advanced projects and systems, working at the intersection of physical security, supply chain assurance, and insider risk.</p>
<p>This role focuses on securing OpenAI&#39;s global supply chain and manufacturing ecosystem, driving complex, multi-month security initiatives across vendors, manufacturing partners, and internal operations teams. You will work closely with the Head of Secure Manufacturing &amp; Stealth to identify risks across production environments and ensure that appropriate safeguards are implemented throughout the hardware lifecycle. In this role, you will serve as the primary security partner to supply chain and operations teams, coordinating with engineering, legal, and external vendors to protect sensitive projects while enabling efficient manufacturing and product development.</p>
<p>This role is based in the Asia-Pacific region. This position requires travel up to ~25% to international vendor and partner locations.</p>
<p>In this role, you will:</p>
<ul>
<li>Own the strategy and execution of supply chain programs that protect OpenAI&#39;s most advanced projects and systems.</li>
</ul>
<ul>
<li>Lead cross-functional initiatives with Engineering, Operations, Legal, and Security to establish controls for preventing leaks, data loss, and supply chain compromise.</li>
</ul>
<ul>
<li>Conduct proactive risk assessments and investigations across production and partner environments, including third-party and vendor ecosystems.</li>
</ul>
<ul>
<li>Develop, enforce, and audit policies and practices to protect confidentiality and control access at production and integration sites.</li>
</ul>
<ul>
<li>Collaborate with technical and operational teams to close detection gaps, strengthen monitoring capabilities, and implement tailored countermeasures across cyber, physical, and human domains.</li>
</ul>
<ul>
<li>Partner with external suppliers, vendors, and law enforcement to ensure global consistency in security practices and incident response.</li>
</ul>
<ul>
<li>Continuously refine processes and security controls based on lessons learned and the evolving threat landscape.</li>
</ul>
<p>You might thrive in this role if you:</p>
<ul>
<li>Have 8+ years of experience in global production, supply chain security, product secrecy, counterintelligence, insider risk, or related investigative/operational domains.</li>
</ul>
<ul>
<li>Bring a deep understanding of production environments, hardware lifecycle, and supply chain risks, with hands-on experience implementing safeguards in global operations.</li>
</ul>
<ul>
<li>Demonstrate unimpeachable integrity, sound judgment, and the ability to handle confidential matters with discretion.</li>
</ul>
<ul>
<li>Possess strong expertise in security tooling and risk frameworks, and physical security systems.</li>
</ul>
<ul>
<li>Have proven ability to lead complex programs and write clear, actionable reports for technical and non-technical audiences.</li>
</ul>
<ul>
<li>Excel at cross-functional collaboration, building trust with engineers, operations, legal, and external partners to drive adoption of security controls.</li>
</ul>
<p>About OpenAI</p>
<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>
<p>We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.</p>
<p>For additional information, please see OpenAI&#39;s Affirmative Action and Equal Employment Opportunity Policy Statement.</p>
<p>Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.</p>
<p>To notify OpenAI that you believe this job posting is non-compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.</p>
<p>We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.</p>
<p>OpenAI Global Applicant Privacy Policy</p>
<p>At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>Full time</Jobtype>
      <Experiencelevel></Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>global production, supply chain security, product secrecy, counterintelligence, insider risk, security tooling, risk frameworks, physical security systems</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>OpenAI</Employername>
      <Employerlogo>https://logos.yubhub.co/openai.com.png</Employerlogo>
      <Employerdescription>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.</Employerdescription>
      <Employerwebsite>https://openai.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ashbyhq.com/openai/25d4cedb-62f5-47a4-b506-a637fd529a7e</Applyto>
      <Location>Seoul, South Korea; Singapore</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>1a9a0f80-700</externalid>
      <Title>Senior Manager, Platform Engineering - Secure Supply Chain</Title>
      <Description><![CDATA[<p>At Twilio, we&#39;re shaping the future of communications, all from the comfort of our homes. We deliver innovative solutions to hundreds of thousands of businesses and empower millions of developers worldwide to craft personalized customer experiences.</p>
<p>Join the team as Twilio&#39;s next Senior Manager, Platform Engineering - Secure Supply Chain. This position is needed to lead Twilio&#39;s Platform Engineering Secure Supply Chain team, which provides critical infrastructure for software development across the company. The team owns systems spanning source control management, build systems, and artifact management, ensuring secure and efficient software delivery for all of Twilio.</p>
<p>Responsibilities:</p>
<ul>
<li>Lead and develop a team of engineers responsible for Twilio&#39;s secure supply chain infrastructure, including source control management (SCM), build systems, and artifact management platforms</li>
<li>Define and execute strategic vision for secure supply chain capabilities that create leverage and centralize the cost of change across the entire engineering organization</li>
<li>Partner closely with Security, Compliance, and Product Engineering leadership to establish and enforce secure supply chain standards, policies, and best practices company-wide</li>
<li>Drive operational excellence through metrics, service level objectives, and continuous improvement initiatives that balance security requirements with developer productivity</li>
<li>Build and maintain strong relationships with internal customers and stakeholders, translating business needs into technical solutions and roadmap priorities</li>
<li>Develop engineering talent through coaching, mentorship, and career development while fostering a culture of ownership, collaboration, and technical excellence</li>
<li>Champion automation, self-service capabilities, and platform thinking to scale secure supply chain practices across Twilio&#39;s diverse product portfolio</li>
<li>Collaborate with peer engineering leaders across the Platform organization to ensure cohesive technical strategy and efficient delivery</li>
<li>Communicate technical strategy, progress, and challenges effectively to senior leadership and cross-functional stakeholders</li>
</ul>
<p>Qualifications:</p>
<ul>
<li>8+ years of experience in software engineering, platform engineering, or infrastructure roles, with at least 4+ years in engineering management leading teams of 8-12 engineers</li>
<li>Proven track record leading platform engineering team and developer platform initiatives at scale in complex, multi-product organizations</li>
<li>Experience leading teams through significant technical migrations or platform modernization efforts</li>
<li>Deep technical knowledge of source control systems (GitHub), build systems (Buildkite, GitHub Actions, Harness), and artifact management platforms (Artifactory, Nexus, container registries)</li>
<li>Strong understanding of secure supply chain practices in cloud environments (AWS, GCP, Azure) including cloud-native CI/CD, container security, infrastructure-as-code, and cloud service integrations</li>
<li>Demonstrated experience partnering with Security and Compliance teams to implement security controls, vulnerability management, and compliance requirements without compromising developer velocity</li>
<li>Strong people leadership skills including hiring, performance management, coaching, and developing high-performing engineering teams</li>
<li>Excellent stakeholder management and communication skills with ability to influence and align cross-functional partners at all levels of the organization</li>
<li>Strategic thinking with ability to balance short-term execution against long-term vision and organizational impact</li>
<li>Experience managing budgets, vendor relationships, and making build-vs-buy decisions for platform capabilities</li>
</ul>
<p>Desired:</p>
<ul>
<li>Experience with software supply chain security frameworks (SLSA, SBOM, vulnerability scanning, dependency management)</li>
<li>Background in highly regulated industries or companies with significant compliance requirements (SOX, PCI, SOC2, FedRAMP, ISO)</li>
<li>Contributions to open source projects or industry thought leadership in secure supply chain or developer platforms</li>
</ul>
<p>What We Offer:</p>
<p>Working at Twilio offers many benefits, including competitive pay, generous time off, ample parental and wellness leave, healthcare, a retirement savings program, and much more. Offerings vary by location.</p>
<p>Compensation:</p>
<ul>
<li>Please note the salary range information provided applies only to candidates residing in California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Vermont, Washington D.C., and Washington State due to local requirements.</li>
<li>Compensation for candidates in other locations will be discussed during the hiring process.</li>
<li>The estimated pay ranges for this role are as follows:</li>
</ul>
<p>+ Based in Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, Vermont or Washington D.C.: $207,200.00 - $259,000.00   + Based in New York, New Jersey, Washington State, or California (outside of the San Francisco Bay area): $219,360.00 - $274,200.00   + Based in the San Francisco Bay area, California: $243,680.00 - $304,600.00</p>
<p>Application deadline information:</p>
<p>Applications for this role are intended to be accepted until April 6, 2026, but may change based on business needs.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$207,200.00 - $304,600.00</Salaryrange>
      <Skills>software engineering, platform engineering, infrastructure, source control management, build systems, artifact management, cloud environments, container security, infrastructure-as-code, cloud service integrations, security controls, vulnerability management, compliance requirements, developer velocity, people leadership, hiring, performance management, coaching, developing high-performing engineering teams, stakeholder management, communication skills, influence, align cross-functional partners, strategic thinking, budgets, vendor relationships, build-vs-buy decisions, software supply chain security frameworks, SBOM, vulnerability scanning, dependency management, highly regulated industries, companies with significant compliance requirements, open source projects, industry thought leadership</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio is a cloud communication platform that provides APIs and messaging services for businesses and developers to build personalized customer experiences.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7755317</Applyto>
      <Location>Remote - US</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>770c5fe8-cce</externalid>
      <Title>Staff Security Engineer, Vulnerability Management</Title>
      <Description><![CDATA[<p>We are seeking a Staff Security Engineer to lead the most complex technical work in CoreWeave&#39;s Vulnerability Management program.</p>
<p>As a Staff Security Engineer, you will design and implement scalable triage, prioritization, and remediation-tracking systems across application, infrastructure, and hardware domains. You will set technical standards, drive high-impact initiatives, and mentor engineers through technical leadership, while partnering with leadership on priorities and execution risks.</p>
<p>Key Responsibilities:</p>
<ul>
<li>Lead high-complexity VM technical initiatives and deliver architecture decisions for assigned program areas</li>
<li>Design and build scalable triage automation, including integrations, decision logic, and production hardening</li>
<li>Implement end-to-end workflow components from assessment and detection to ticket routing and remediation tracking</li>
<li>Provide deep technical leadership on hardware-adjacent vulnerabilities (GPU firmware, DPU firmware/BlueField, and BMC surfaces)</li>
<li>Act as senior technical responder for embargoed disclosures and zero-day events, coordinating with owner teams that deploy fixes</li>
<li>Improve prioritization logic, severity models, and exception workflows through code, design reviews, and technical proposals</li>
<li>Produce actionable technical metrics and risk insights for leadership consumption</li>
<li>Lead root-cause analysis for high-impact vulnerability incidents and implement durable technical improvements</li>
<li>Mentor IC3/IC4/IC5 engineers through design guidance, code review, and incident coaching</li>
<li>Partner with security, engineering, and operational stakeholders to improve workflow reliability and accelerate remediation outcomes</li>
</ul>
<p>Requirements:</p>
<ul>
<li>9+ years of relevant experience with demonstrated strategic impact in vulnerability management, application security, platform security, or cloud security engineering</li>
<li>Proven track record building and scaling security automation (SOAR workflows, AI/ML systems, detection pipelines) in production environments</li>
<li>Deep subject matter expertise with vulnerability management best practices: CVSS, EPSS, CISA KEV, threat intelligence integration, and risk-based prioritization frameworks</li>
<li>Excellent development background with strong coding skills in Python, Go, or similar languages for building scalable, production-grade security systems</li>
<li>Significant experience with modern vulnerability management tooling (for example Wiz, Semgrep, Rapid7, Tenable, or equivalent)</li>
<li>Experience with specialized infrastructure: GPU/DPU environments, firmware security, hardware vulnerabilities, or high-performance computing</li>
<li>Demonstrated track record mentoring engineers across levels and driving cross-functional technical initiatives at organizational scale</li>
<li>Strong business acumen and understanding of how security decisions impact engineering velocity, customer trust, and business outcomes</li>
</ul>
<p>Preferred Qualifications:</p>
<ul>
<li>Practical experience building AI/ML-powered security systems (LLM integration, automated decision-making, human-in-the-loop validation) in production</li>
<li>Experience managing hardware vendor security partnerships (embargoed disclosures and pre-release collaboration)</li>
<li>Production experience with security automation platforms such as TINES and serverless frameworks (AWS Lambda, GCP Cloud Functions)</li>
<li>Strong DevOps, DevSecOps, or SRE background with deep experience in AWS/GCP/Azure cloud services and Infrastructure as Code (Terraform, CloudFormation)</li>
<li>Deep understanding of Kubernetes security (container scanning, admission controllers, supply chain security, runtime protection)</li>
<li>Experience leading security programs through rapid hypergrowth (10x+ infrastructure scaling) in startup or cloud-native environments</li>
<li>Practical experience managing vulnerabilities within a FedRAMP-certified environment or similar regulatory frameworks</li>
</ul>
<p>Salary and Benefits: The base salary range for this role is $188,000 to $275,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>
<p>Work Environment:</p>
<p>While we prioritize a hybrid work environment, remote work may be considered for candidates located more than 30 miles from an office, based on role requirements for specialized skill sets. New hires will be invited to attend onboarding at one of our hubs within their first month. Teams also gather quarterly to support collaboration.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$188,000 to $275,000</Salaryrange>
      <Skills>vulnerability management, application security, platform security, cloud security engineering, security automation, AI/ML systems, detection pipelines, Python, Go, modern vulnerability management tooling, GPU/DPU environments, firmware security, hardware vulnerabilities, high-performance computing, AI/ML-powered security systems, LLM integration, automated decision-making, human-in-the-loop validation, security automation platforms, TINES, serverless frameworks, AWS Lambda, GCP Cloud Functions, DevOps, DevSecOps, SRE, Kubernetes security, container scanning, admission controllers, supply chain security, runtime protection</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4653130006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>aec0a354-6fe</externalid>
      <Title>Staff Backend Engineer,  SSCS: Supply Chain</Title>
      <Description><![CDATA[<p>As a Staff Backend Engineer at GitLab, you will help shape a major investment in our Software Supply Chain Security offering. In this role, you&#39;ll serve as a senior technical leader for backend systems that help customers secure how software is built, verified, and delivered inside the GitLab platform.</p>
<p>You&#39;ll work on foundational capabilities across package policy enforcement, build provenance, artifact signing, and malicious package detection, with a strong focus on enterprise-grade security and performance. You&#39;ll define architecture before systems are built, write clear technical proposals, and guide implementation across interconnected parts of GitLab such as CI/CD, dependency management, and security workflows.</p>
<p>This role is a strong fit for someone who enjoys solving complex backend problems, influencing technical direction across teams, and building security features that matter to customers facing real threats. You&#39;ll do this in GitLab&#39;s remote, asynchronous, and values-driven environment, where written communication, ownership, and teamwork are central to how we work.</p>
<p>Some examples of our projects:</p>
<ul>
<li>Dependency Firewall for package policy enforcement across supported registries</li>
<li>Artifact attestation and signing using supply chain security standards and the Sigstore ecosystem</li>
</ul>
<p>Responsibilities:</p>
<ul>
<li>Define and drive the technical architecture for the SSCS Add-On, including backend systems for package policy enforcement, provenance generation, artifact signing, and malicious package detection.</li>
<li>Lead design and implementation work for Supply-chain Levels for Software Artifacts (SLSA) Level 2 and Level 3 capabilities within GitLab CI/CD.</li>
<li>Architect integrations with Sigstore services such as Cosign, Fulcio, and Rekor, including approaches for signing workflows, verification, and trust boundaries.</li>
<li>Design backend services and request paths that support allow, deny, and quarantine package policies with strong performance and reliability expectations.</li>
<li>Review merge requests with a focus on security, architectural consistency, maintainability, and test quality.</li>
<li>Mentor Backend Engineers across experience levels, helping raise the technical bar through design guidance, feedback, and hiring participation.</li>
<li>Partner with Product, Infrastructure, Authentication, Authorization, and Security counterparts on cross-team technical decisions.</li>
<li>Contribute to relevant open source and industry conversations, including working groups related to software supply chain security where appropriate.</li>
</ul>
<p>Requirements:</p>
<ul>
<li>Strong experience building backend applications with Ruby on Rails in a high-scale production environment.</li>
<li>Professional experience with Go for backend or infrastructure-oriented services.</li>
<li>A track record of leading architecture across multiple systems and influencing technical direction through strong engineering judgment.</li>
<li>Experience writing clear technical proposals, request for comments documents, and decision records in an async, documentation-first environment.</li>
<li>A solid security mindset and comfort working on products where trust, risk reduction, and secure defaults are central requirements.</li>
<li>Familiarity with software supply chain security concepts such as build provenance, artifact signing, dependency security, or software bill of materials.</li>
<li>Strong teamwork and communication skills, with the ability to work effectively across distributed teams and functions.</li>
<li>Interest in GitLab&#39;s values and in building secure, scalable product capabilities that help customers ship software with confidence.</li>
</ul>
<p>About the team:</p>
<p>The SSCS Add-On team is part of GitLab&#39;s Software Supply Chain Security stage and is focused on building a commercial offering that addresses real supply chain security challenges for enterprise customers. The team works on capabilities that combine multiple parts of the GitLab product into a more complete security solution for organisations with strong compliance and risk management needs.</p>
<p>The work is both technically interesting and strategically important. The team is building in a space shaped by fast-moving threats, evolving customer requirements, and close coordination with nearby teams across the broader security area. That combination creates an environment where engineers can contribute to product direction while solving practical backend challenges in a visible part of GitLab&#39;s platform.</p>
<p>For more on how related teams work, see Team Handbook Page.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Ruby on Rails, Go, Backend applications, Architecture, Technical leadership, Security, Supply chain security, Software development</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>GitLab</Employername>
      <Employerlogo>https://logos.yubhub.co/about.gitlab.com.png</Employerlogo>
      <Employerdescription>GitLab is an intelligent orchestration platform for DevSecOps that enables organisations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation.</Employerdescription>
      <Employerwebsite>https://about.gitlab.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/gitlab/jobs/8480559002</Applyto>
      <Location>Remote, India</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>5003c49e-cf6</externalid>
      <Title>Engineering Manager, SSCS: Supply Chain</Title>
      <Description><![CDATA[<p>As an Engineering Manager, you&#39;ll guide GitLab&#39;s dedicated Software Supply Chain Security (SSCS) Add-On engineering team as it develops core capabilities including Dependency Firewall, Build Provenance, Malicious Packages detection, and Artifact Signing.</p>
<p>This is a founding management role where you&#39;ll help shape how the team works, partner closely with the Staff Backend Engineer, Product Manager, and SSCS stage management, and turn a defined roadmap into steady, high-quality delivery for enterprise customers with strict security and compliance needs.</p>
<p>You&#39;ll focus on developing the team, creating a healthy operating rhythm, and establishing predictable execution for the SSCS SKU.</p>
<p>You&#39;ll join a product area where customers in regulated industries are already validating the need, and your work will help GitLab deliver software supply chain security features that customers can rely on.</p>
<p>While technical credibility matters, your main focus will be growing a strong backend engineering team, enabling team members in their development, and creating the conditions for long-term delivery and quality.</p>
<p>Responsibilities:</p>
<ul>
<li>Guide a backend engineering team building the SSCS Add-On across dependency enforcement, build provenance, malicious package detection, and artifact signing.</li>
</ul>
<ul>
<li>Be responsible for driving engineering delivery for general availability milestones by aligning sequencing, scope, and dependencies with the Staff Backend Engineer and Product Manager.</li>
</ul>
<ul>
<li>Develop the team by partnering with Talent Acquisition on sourcing, interview design, candidate evaluation, and hiring decisions.</li>
</ul>
<ul>
<li>Run regular 1:1s, performance reviews, and career development conversations that enable growth and clear expectations.</li>
</ul>
<ul>
<li>Advance engineering quality by monitoring cycle time, defect rates, and test coverage, and by addressing risks early.</li>
</ul>
<ul>
<li>Coordinate quarterly planning and roadmap tradeoff discussions with SSCS stage leadership and Product.</li>
</ul>
<ul>
<li>Work with Finance and other partners on headcount pacing and team planning as the Add-On scales.</li>
</ul>
<ul>
<li>Represent the SSCS Add-On team within stage leadership discussions and help ensure strong communication across functions.</li>
</ul>
<p>Requirements:</p>
<ul>
<li>Over 3 years of experience guiding backend product engineering teams in security, DevOps, or platform engineering environments.</li>
</ul>
<ul>
<li>Ability to hire and grow backend or security engineers in distributed team environments, with practical understanding of the talent landscape for these roles.</li>
</ul>
<ul>
<li>Technical credibility to contribute to architecture discussions involving package registries, CI/CD pipeline security, and signing infrastructure.</li>
</ul>
<ul>
<li>Experience managing predictable delivery across multi-quarter product roadmaps and managing cross-team dependencies.</li>
</ul>
<ul>
<li>Comfort working in an asynchronous, documentation-driven organization with clear written communication.</li>
</ul>
<ul>
<li>Familiarity with supply chain security, artifact management, or compliance-focused product areas, or transferable experience from related domains.</li>
</ul>
<ul>
<li>Working knowledge of concepts related to frameworks and ecosystems such as SLSA and Sigstore.</li>
</ul>
<ul>
<li>Ability to build credibility with engineers, product partners, and customer-facing stakeholders through clear judgment, coaching, and teamwork.</li>
</ul>
<p>About the team: The SSCS Add-On team is a product engineering team within GitLab&#39;s Software Supply Chain Security stage. We work on key capabilities in the SSCS Add-On SKU and collaborate closely with product and engineering partners to deliver security features for customers operating in regulated environments.</p>
<p>You&#39;ll report to the SSCS Senior Engineering Manager and partner directly with the Staff Backend Engineer and Product Manager.</p>
<p>As a distributed team working asynchronously across regions, we are focused on strong delivery practices, team health, and scaling the product area with clarity and accountability.</p>
<p>For more on how related teams work, see Team Handbook Page.</p>
<p>How GitLab Supports Full-Time Employees:</p>
<ul>
<li>Benefits to support your health, finances, and well-being</li>
</ul>
<ul>
<li>Flexible Paid Time Off</li>
</ul>
<ul>
<li>Team Member Resource Groups</li>
</ul>
<ul>
<li>Equity Compensation &amp; Employee Stock Purchase Plan</li>
</ul>
<ul>
<li>Growth and Development Fund</li>
</ul>
<ul>
<li>Parental leave</li>
</ul>
<ul>
<li>Home office support</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>GitLab, Software Supply Chain Security, Dependency Firewall, Build Provenance, Malicious Packages detection, Artifact Signing, Backend engineering, Security, DevOps, Platform engineering, Package registries, CI/CD pipeline security, Signing infrastructure, Supply chain security, Artifact management, Compliance-focused product areas, Frameworks and ecosystems, SLSA, Sigstore</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>GitLab</Employername>
      <Employerlogo>https://logos.yubhub.co/about.gitlab.com.png</Employerlogo>
      <Employerdescription>GitLab is a software development platform that provides tools for version control, issue tracking, and project management. It has over 50 million registered users and is trusted by more than 50% of the Fortune 100.</Employerdescription>
      <Employerwebsite>https://about.gitlab.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/gitlab/jobs/8478405002</Applyto>
      <Location>Remote, India</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>44ff0179-993</externalid>
      <Title>Senior Backend Engineer (RoR), SSCS: Pipeline Security</Title>
      <Description><![CDATA[<p>As a Senior Backend Engineer on the Pipeline Security team, you&#39;ll take technical ownership of GitLab&#39;s native Secrets Manager, a production system built on OpenBao that helps secure sensitive credentials across GitLab CI/CD pipelines.</p>
<p>You&#39;ll work at the intersection of backend engineering and infrastructure, shaping architecture in Ruby on Rails and Go, guiding decisions around role-based access control (RBAC), GraphQL APIs, and Kubernetes deployment configuration.</p>
<p>In your first year, you&#39;ll help move Secrets Manager toward general availability, establish technical patterns the team can build on, and represent the team&#39;s point of view in cross-functional discussions.</p>
<p>You&#39;ll have end-to-end ownership, from design through production operations, with room to identify what should be built next and improve how the team delivers secure, reliable features.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Build and maintain secure, readable backend code primarily in Ruby on Rails, with some development in Go for targeted components.</li>
</ul>
<ul>
<li>Design backend architecture for complex security features, including secrets access control, pipeline security enforcement, and OpenBao integration.</li>
</ul>
<ul>
<li>Lead the development of role-based access control models, GraphQL APIs, and supporting application patterns for features owned by the team.</li>
</ul>
<ul>
<li>Own features end to end, from technical design and implementation through deployment, validation, and production support.</li>
</ul>
<ul>
<li>Collaborate with Product, security partners, and other engineering teams to document tradeoffs, align on direction, and deliver iteratively in a distributed environment.</li>
</ul>
<ul>
<li>Improve code quality, maintainability, security, and performance through code review, design iteration, and internal standards for a high-scale web environment.</li>
</ul>
<ul>
<li>Build and maintain Helm charts, including configuration, tuning, documentation, and automated testing for Kubernetes-based deployments.</li>
</ul>
<ul>
<li>Validate features in Kubernetes environments, including GitLab Cloud Native and Cloud Native Hybrid deployments, using GitLab testing and performance testing frameworks.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Experience building and maintaining backend features with a focus on secure design, data handling, and production reliability.</li>
</ul>
<ul>
<li>Ability to write production-quality code in Ruby on Rails, including use of framework security patterns and review for common application risks.</li>
</ul>
<ul>
<li>Working knowledge of CI/CD concepts and the ways pipelines can be misconfigured, abused, or expose sensitive data.</li>
</ul>
<ul>
<li>Familiarity with secrets management approaches and security practices for handling credentials in CI environments; experience with tools such as HashiCorp Vault or similar systems is helpful.</li>
</ul>
<ul>
<li>Comfort collaborating across Product and engineering teams in an asynchronous, distributed environment and communicating technical tradeoffs clearly in writing.</li>
</ul>
<ul>
<li>Ability to review merge requests with a security-first mindset and improve solutions through feedback and iteration.</li>
</ul>
<ul>
<li>Experience debugging production issues, including investigation of security-related behavior and proposing practical fixes.</li>
</ul>
<ul>
<li>Openness to learning adjacent domains and tools, including Go, container security, and software supply chain security; we welcome transferable experience from different technical backgrounds.</li>
</ul>
<p><strong>About the Team</strong></p>
<p>The Pipeline Security team builds features that make GitLab CI pipelines more secure and trustworthy for teams running sensitive workloads. We own key parts of pipeline security within GitLab&#39;s CI/CD experience, with our current focus on native secrets management for CI pipelines and Supply-chain Levels for Software Artifacts (SLSA) Level 3 capabilities to strengthen software supply chain security.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$117,600-$252,000 USD</Salaryrange>
      <Skills>Ruby on Rails, Go, OpenBao, Role-Based Access Control (RBAC), GraphQL APIs, Kubernetes deployment configuration, Helm charts, CI/CD concepts, Secrets management approaches, Security practices for handling credentials in CI environments, Container security, Software supply chain security</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>GitLab</Employername>
      <Employerlogo>https://logos.yubhub.co/about.gitlab.com.png</Employerlogo>
      <Employerdescription>GitLab is an intelligent orchestration platform for DevSecOps, used by over 50 million registered users and more than 50% of the Fortune 100.</Employerdescription>
      <Employerwebsite>https://about.gitlab.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/gitlab/jobs/8432221002</Applyto>
      <Location>Remote, Canada; Remote, Ireland; Remote, Israel; Remote, Netherlands; Remote, United Kingdom; Remote, US</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>a3a1df2f-184</externalid>
      <Title>Principal Engineer, Software Supply Chain Security</Title>
      <Description><![CDATA[<p>As the Principal Engineer, Software Supply Chain Security, you&#39;ll own the technical strategy that secures how software is built and delivered on GitLab&#39;s DevSecOps platform. You&#39;ll provide architectural leadership across multiple engineering teams.</p>
<p>Your work will shape GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market. You&#39;ll focus on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture.</p>
<p>Some examples of our projects:</p>
<ul>
<li>SLSA Level 3 compliance and provenance attestation across GitLab&#39;s CI/CD platform</li>
<li>Integrated secrets management and runner security for container-isolated, secure pipelines</li>
</ul>
<p>You&#39;ll lead the end-to-end software supply chain security architecture for GitLab&#39;s CI/CD platform, including SLSA Level 3 implementation and CI infrastructure hardening. You&#39;ll drive cross-team technical strategy and decisions across our Software Supply Chain Security (SSCS) stage teams, aligning engineering work to SSCS strategic plans.</p>
<p>You&#39;ll collaborate with infrastructure and CI/CD teams to design and land long-term initiatives for secure, scalable runner architecture, container isolation, and pipeline security at scale. You&#39;ll propose and validate technical implementations that support architectural changes to improve CI/CD scaling and performance on critical paths.</p>
<p>You&#39;ll teach, mentor, and coach Staff Engineers and individual contributors, raising the bar on supply chain threat modeling, secrets management, artifact signing, and SBOM lifecycle practices.</p>
<p>You&#39;ll partner with Engineering Managers and senior leadership to define roadmaps, break down complex initiatives, and enable Staff Engineers to lead sub-department-wide efforts.</p>
<p>You&#39;ll engage with customers and external stakeholders as a technical consultant and spokesperson for GitLab&#39;s software supply chain security capabilities and roadmap.</p>
<p>You&#39;ll collaborate with product, security, and compliance stakeholders to ensure features meet enterprise security, governance, and regulatory expectations in the software supply chain security market.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Providing architectural leadership across multiple engineering teams</li>
<li>Shaping GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market</li>
<li>Focusing on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture</li>
</ul>
<p>Key requirements include:</p>
<ul>
<li>Deep expertise in software supply chain security, including threat modeling for supply chain attack vectors, SLSA implementation and attestation systems, and SBOM generation and lifecycle management</li>
<li>Strong knowledge of artifact signing and verification using the Sigstore ecosystem, including Cosign, Fulcio, Rekor, and in-toto attestations</li>
<li>Experience designing and hardening CI/CD security, such as runner isolation, pipeline security controls, and secrets management in large-scale environments</li>
</ul>
<p>Preferred qualifications include:</p>
<ul>
<li>Background in distributed systems and infrastructure, including building resilient CI/CD platforms that process high pipeline volumes and optimizing performance for critical paths</li>
<li>Practical experience with container security and Kubernetes security, including admission controllers, policy controllers, workload isolation, and registry hardening</li>
<li>Proficiency in Go or Rust in a production environment, combined with expert-level understanding of CI/CD workflows and DevSecOps best practices</li>
<li>Experience operating as a Principal or Staff Engineer across multiple development teams, providing architectural leadership and partnering with Engineering Managers and senior leaders</li>
<li>Demonstrated capacity to clearly communicate complex problems and solutions</li>
</ul>
<p>Our Software Supply Chain Security stage engineering teams are responsible for authentication and access within GitLab. We also build features that help customers manage vulnerabilities, dependencies, security policies, and compliance frameworks across their organizations.</p>
<p>The base salary range for this role&#39;s listed level is currently for residents of the United States only. This range is intended to reflect the role&#39;s base salary rate in locations throughout the US. Grade level and salary ranges are determined through interviews and a review of education, experience, knowledge, skills, abilities of the applicant, equity with other team members, alignment with market data, and geographic location. The base salary range does not include any bonuses, equity, or benefits.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$157,900-$338,400 USD</Salaryrange>
      <Skills>software supply chain security, threat modeling, SLSA implementation, attestation systems, SBOM generation, lifecycle management, artifact signing, verification, Sigstore ecosystem, Cosign, Fulcio, Rekor, in-toto attestations, CI/CD security, runner isolation, pipeline security controls, secrets management, distributed systems, infrastructure, container security, Kubernetes security, admission controllers, policy controllers, workload isolation, registry hardening, Go, Rust, CI/CD workflows, DevSecOps best practices, background in distributed systems and infrastructure, practical experience with container security and Kubernetes security, proficiency in Go or Rust in a production environment, expert-level understanding of CI/CD workflows and DevSecOps best practices, experience operating as a Principal or Staff Engineer across multiple development teams</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>GitLab</Employername>
      <Employerlogo>https://logos.yubhub.co/about.gitlab.com.png</Employerlogo>
      <Employerdescription>GitLab is a software development platform that provides tools for version control, project management, and collaboration. It has over 50 million registered users and is trusted by more than 50% of the Fortune 100.</Employerdescription>
      <Employerwebsite>https://about.gitlab.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/gitlab/jobs/8373553002</Applyto>
      <Location>Remote, Canada; Remote, Israel; Remote, Netherlands; Remote, United Kingdom; Remote, US</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>8fc80897-0ec</externalid>
      <Title>Intermediate Backend Engineer,  SSCS: Supply Chain</Title>
      <Description><![CDATA[<p>As an Intermediate Backend Engineer on the SSCS Add-On team at GitLab, you&#39;ll help build a dedicated software supply chain security feature for regulated enterprise organisations.</p>
<p>In this role, you&#39;ll contribute to capabilities that help customers control software dependencies, verify artifact integrity, and identify malicious packages before they reach production.</p>
<p>Your work will sit at the intersection of backend engineering, product integration, and security-focused development.</p>
<p>You&#39;ll build in Ruby on Rails, work alongside Go services as needed, and help connect Add-On functionality with GitLab&#39;s existing security scanning experience so findings are surfaced consistently for users.</p>
<p>Because the team is small, you&#39;ll have meaningful influence on implementation details, team practices, and the product experience.</p>
<p>This role is part of GitLab&#39;s all-remote, async-first, values-driven environment, where clear written communication and thoughtful coordination across time zones are essential.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Implement well-scoped backend features across the Add-On&#39;s supply chain security product, including package policy integrations, ingestion pipeline improvements, signing and verification support, and reliability-focused work, delivering maintainable code on agreed timelines and meeting team-defined delivery commitments.</li>
</ul>
<ul>
<li>Build and maintain integrations between Add-On functionality and GitLab&#39;s existing software composition analysis scanning infrastructure so findings appear consistently and accurately in merge request security reports, reducing integration issues and supporting a reliable user experience.</li>
</ul>
<ul>
<li>Write and maintain comprehensive automated test coverage, including RSpec and integration tests, to improve test reliability, reduce regressions, and support safe, consistent releases as the codebase grows.</li>
</ul>
<ul>
<li>Take on work across multiple feature areas as priorities evolve, contributing as a generalist where the team needs support most.</li>
</ul>
<ul>
<li>Participate actively in code review by giving thoughtful, actionable feedback and incorporating feedback constructively into your own work to help maintain code quality and reduce rework.</li>
</ul>
<ul>
<li>Contribute clear internal documentation for the features and behavior you ship so teammates can support, extend, and troubleshoot the product effectively.</li>
</ul>
<ul>
<li>Coordinate with adjacent Software Supply Chain Security teams, including Dependency Firewall and Malware Database, as the Add-On brings together capabilities from across GitLab, helping deliver aligned functionality and smoother cross-team execution.</li>
</ul>
<ul>
<li>Collaborate effectively in an async-first environment across global time zones, including occasional off-hours overlap when needed, to keep work moving and decisions documented clearly.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Backend development experience with the ability to deliver maintainable production code.</li>
</ul>
<ul>
<li>Solid proficiency in Ruby on Rails and strong PostgreSQL fundamentals.</li>
</ul>
<ul>
<li>Familiarity with Golang, or a willingness to learn and work across both Ruby on Rails and Go.</li>
</ul>
<ul>
<li>Strong testing discipline, including experience with RSpec or an equivalent testing framework.</li>
</ul>
<ul>
<li>Clear, direct written communication skills and experience collaborating with distributed teammates in asynchronous workflows.</li>
</ul>
<ul>
<li>Ability to manage scoped work independently, communicate progress clearly, and adjust as team priorities shift.</li>
</ul>
<ul>
<li>Interest in package ecosystems such as npm, Maven, PyPI, or OCI containers, or adjacent experience that helps you ramp in this domain.</li>
</ul>
<ul>
<li>Interest in software supply chain security, dependency management, DevSecOps, or security-adjacent product development, with the ability to apply security considerations in backend development work.</li>
</ul>
<p><strong>About the Team</strong></p>
<p>The SSCS Add-On team is part of GitLab&#39;s Software Supply Chain Security stage and is focused on building a commercial offering that addresses real supply chain security challenges for enterprise customers.</p>
<p>The team works on capabilities that combine multiple parts of the GitLab product into a more complete security solution for organisations with strong compliance and risk management needs.</p>
<p>The work is both technically interesting and strategically important.</p>
<p>The team is building in a space shaped by fast-moving threats, evolving customer requirements, and close coordination with nearby teams across the broader security area.</p>
<p>That combination creates an environment where engineers can contribute to product direction while solving practical backend challenges in a visible part of GitLab&#39;s platform.</p>
<p>For more on how related teams work, see Team Handbook Page.</p>
<p><strong>How GitLab Supports Full-Time Employees</strong></p>
<ul>
<li>Benefits to support your health, finances, and well-being</li>
</ul>
<ul>
<li>Flexible Paid Time Off</li>
</ul>
<ul>
<li>Team Member Resource Groups</li>
</ul>
<ul>
<li>Equity Compensation &amp; Employee Stock Purchase Plan</li>
</ul>
<ul>
<li>Growth and Development Fund</li>
</ul>
<ul>
<li>Parental leave</li>
</ul>
<ul>
<li>Home office support</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Ruby on Rails, Golang, PostgreSQL, RSpec, testing discipline, package ecosystems, software supply chain security, dependency management, DevSecOps, security-adjacent product development</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>GitLab</Employername>
      <Employerlogo>https://logos.yubhub.co/about.gitlab.com.png</Employerlogo>
      <Employerdescription>GitLab is an intelligent orchestration platform for DevSecOps, trusted by over 50 million registered users and more than 50% of the Fortune 100.</Employerdescription>
      <Employerwebsite>https://about.gitlab.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/gitlab/jobs/8480565002</Applyto>
      <Location>Remote, India</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>cbaf9906-291</externalid>
      <Title>Platform Hardware Security</Title>
      <Description><![CDATA[<p>We&#39;re seeking a Platform Hardware Security Engineer to design and implement security architectures for bare-metal infrastructure. You&#39;ll work with teams across Anthropic to build firmware, bootloaders, operating systems, and attestation systems to ensure the integrity of our infrastructure from the ground up.</p>
<p>This role requires expertise in low-level systems security and the ability to architect solutions that balance security requirements with the performance demands of training AI models across our massive fleet.</p>
<p>Responsibilities:</p>
<ul>
<li>Design and implement secure boot chains from firmware through OS initialization for diverse hardware platforms (CPUs, BMCs, switches, peripherals, and embedded microcontrollers)</li>
</ul>
<ul>
<li>Architect attestation systems that provide cryptographic proof of system state from hardware root of trust through application layer</li>
</ul>
<ul>
<li>Develop measured boot implementations and runtime integrity monitoring</li>
</ul>
<ul>
<li>Create reference architectures and security requirements for bare-metal deployments</li>
</ul>
<ul>
<li>Integrate security controls with infrastructure teams without impacting training performance</li>
</ul>
<ul>
<li>Prototype and validate security mechanisms before production deployment</li>
</ul>
<ul>
<li>Conduct firmware vulnerability assessments and penetration testing</li>
</ul>
<ul>
<li>Build firmware analysis pipelines for continuous security monitoring</li>
</ul>
<ul>
<li>Document security architectures and maintain threat models</li>
</ul>
<ul>
<li>Collaborate with software and hardware vendors to ensure security capabilities meet our requirements</li>
</ul>
<p>Who you are:</p>
<ul>
<li>8+ years of experience in systems security, with at least 5 years focused on firmware and hardware security (firmware, bootloaders, and OS-level security)</li>
</ul>
<ul>
<li>Hands-on experience with secure boot, measured boot, and attestation technologies (TPM, Intel TXT, AMD SEV, ARM TrustZone)</li>
</ul>
<ul>
<li>Strong understanding of cryptographic protocols and hardware security modules</li>
</ul>
<ul>
<li>Experience with UEFI/BIOS or embedded firmware security, bootloader hardening, and chain of trust implementation</li>
</ul>
<ul>
<li>Proficiency in low-level programming (C, Rust, Assembly) and systems programming</li>
</ul>
<ul>
<li>Knowledge of firmware vulnerability assessment and threat modeling</li>
</ul>
<ul>
<li>Track record of designing security architectures for complex, distributed systems</li>
</ul>
<ul>
<li>Experience with supply chain security</li>
</ul>
<ul>
<li>Ability to work effectively across hardware and software boundaries</li>
</ul>
<ul>
<li>Knowledge of NIST firmware security guidelines and hardware security frameworks</li>
</ul>
<p>Strong candidates may also have:</p>
<ul>
<li>Experience with confidential computing technologies and hardware-based TEEs</li>
</ul>
<ul>
<li>Knowledge of SLSA framework and software supply chain security standards</li>
</ul>
<ul>
<li>Experience securing large-scale HPC or cloud infrastructure</li>
</ul>
<ul>
<li>Contributions to open-source security projects (coreboot, CHIPSEC, etc.)</li>
</ul>
<ul>
<li>Background in formal verification or security proof techniques</li>
</ul>
<ul>
<li>Experience with silicon root of trust implementations</li>
</ul>
<ul>
<li>Experience working with building foundational technical designs, operational leadership, and vendor collaboration</li>
</ul>
<ul>
<li>Previous work with AI/ML infrastructure security</li>
</ul>
<p>Annual Salary: $405,000-$485,000 USD</p>
<p>Logistics:</p>
<ul>
<li>Minimum education: Bachelor’s degree or an equivalent combination of education, training, and/or experience</li>
</ul>
<ul>
<li>Required field of study: A field relevant to the role as demonstrated through coursework, training, or professional experience</li>
</ul>
<ul>
<li>Minimum years of experience: Years of experience required will correlate with the internal job level requirements for the position</li>
</ul>
<ul>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
</ul>
<ul>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p>Why work with us?</p>
<ul>
<li>Competitive compensation and benefits</li>
</ul>
<ul>
<li>Optional equity donation matching</li>
</ul>
<ul>
<li>Generous vacation and parental leave</li>
</ul>
<ul>
<li>Flexible working hours</li>
</ul>
<ul>
<li>Lovely office space in which to collaborate with colleagues</li>
</ul>
<p>Guidance on Candidates&#39; AI Usage: Learn about our policy for using AI in our application process</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$405,000-$485,000 USD</Salaryrange>
      <Skills>Secure boot, Measured boot, Attestation technologies, Cryptographic protocols, Hardware security modules, UEFI/BIOS or embedded firmware security, Bootloader hardening, Chain of trust implementation, Low-level programming, Systems programming, Firmware vulnerability assessment, Threat modeling, Supply chain security, NIST firmware security guidelines, Hardware security frameworks, Confidential computing technologies, Hardware-based TEEs, SLSA framework, Software supply chain security standards, Large-scale HPC or cloud infrastructure, Open-source security projects, Formal verification, Security proof techniques, Silicon root of trust implementations, Vendor collaboration, AI/ML infrastructure security</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4929689008</Applyto>
      <Location>New York City, NY | Seattle, WA; San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>9bf55fe3-b2b</externalid>
      <Title>Detection &amp; Response Engineer</Title>
      <Description><![CDATA[<p>We are seeking a skilled and proactive Detection &amp; Response Engineer to join our security team. In this critical role, you will be responsible for detecting, investigating, and responding to security incidents across our cloud-native and AI-focused infrastructure.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Monitor and analyse security alerts and logs to identify potential threats and anomalies</li>
<li>Develop, implement, and maintain detection rules and correlation logic in our SIEM platform</li>
<li>Conduct thorough investigations of security incidents, performing root cause analysis and impact assessments</li>
<li>Lead incident response efforts, coordinating with relevant teams to contain and mitigate threats</li>
<li>Create and maintain incident response playbooks and runbooks</li>
<li>Perform regular threat hunting activities to proactively identify potential security risks</li>
<li>Develop and refine metrics and reporting to track the effectiveness of detection and response capabilities</li>
<li>Collaborate with other security teams to improve overall security posture and incident handling processes</li>
<li>Stay current with emerging threats, attack techniques, and defensive strategies in the cloud-native and AI domains</li>
</ul>
<p><strong>Basic Qualifications</strong></p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Cybersecurity, or a related field</li>
<li>3-5 years of experience in security operations, incident response, or a similar role</li>
<li>Strong understanding of cybersecurity principles, attack techniques, and defensive strategies</li>
<li>Proficiency in at least one scripting language (e.g., Python, Rust) for automation and tool development</li>
<li>Experience with SIEM platforms and log analysis tools</li>
<li>Familiarity with cloud environments (e.g., AWS, GCP, Azure) and their security features</li>
<li>Knowledge of network protocols, system administration, and common attack vectors</li>
<li>Strong analytical and problem-solving skills with attention to detail</li>
<li>Excellent communication skills and ability to work effectively under pressure</li>
</ul>
<p><strong>Preferred Skills and Experience</strong></p>
<ul>
<li>Relevant security certifications (e.g., GCIH, GCIA, SANS)</li>
<li>Experience with threat intelligence platforms and their integration into detection processes</li>
<li>Familiarity with AI/ML security implications, particularly those outlined in the OWASP LLM Top 10</li>
<li>Knowledge of software supply chain security and SBOM analysis</li>
<li>Experience with containerized environments and Kubernetes security</li>
<li>Experience in building custom security tools or integrations to enhance detection and response capabilities</li>
<li>Interest in leveraging AI to improve threat detection and automate response processes</li>
<li>Contributions to open-source security projects or threat research</li>
<li>Experience with digital forensics and malware analysis</li>
</ul>
<p><strong>Compensation and Benefits</strong></p>
<p>$200,000 - $340,000 USD</p>
<p>Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short &amp; long-term disability insurance, life insurance, and various other discounts and perks.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$200,000 - $340,000 USD</Salaryrange>
      <Skills>cybersecurity principles, attack techniques, defensive strategies, scripting language, SIEM platforms, log analysis tools, cloud environments, network protocols, system administration, common attack vectors, relevant security certifications, threat intelligence platforms, AI/ML security implications, software supply chain security, containerized environments, Kubernetes security, custom security tools, digital forensics, malware analysis</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>xAI</Employername>
      <Employerlogo>https://logos.yubhub.co/xai.com.png</Employerlogo>
      <Employerdescription>xAI€’s mission is to create AI systems that aid humanity in its pursuit of knowledge. The organisation is small and highly motivated.</Employerdescription>
      <Employerwebsite>https://www.xai.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/xai/jobs/4559148007</Applyto>
      <Location>Palo Alto, CA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>6d2bed6a-1bd</externalid>
      <Title>Application Security Engineer</Title>
      <Description><![CDATA[<p>We are seeking a skilled and innovative Application Security Engineer to join our technology-driven company. In this role, you will be responsible for ensuring the security and integrity of our cloud-native applications and systems throughout the software development lifecycle, with a particular focus on code security, CI/CD pipelines, and emerging AI technologies.</p>
<p>Responsibilities: Conduct in-depth code reviews and static analysis to identify and mitigate security vulnerabilities in our applications Design and implement secure coding guidelines and best practices for development teams Collaborate closely with development teams to integrate security practices throughout the CI/CD pipeline Perform threat modeling and risk assessments for applications, developing mitigation strategies for potential risks Manage vulnerability tracking and remediation efforts, providing guidance to development teams Support incident response activities related to application security Stay current on emerging security threats and trends in cloud-native technologies and AI, continuously enhancing our security measures Evaluate and secure software supply chains, including producing and maintaining Software Bills of Materials (SBOMs) Address security concerns specific to AI and machine learning models, with a focus on the OWASP LLM Top 10</p>
<p>Basic Qualifications: Bachelor&#39;s degree in Computer Science, Cybersecurity, or a related field 3-5 years of experience in application security, with a strong focus on code security practices Deep understanding of secure coding practices, application security frameworks, and common vulnerabilities (e.g., OWASP Top 10) Proficiency in Python or Rust programming languages and experience with secure coding practices in these languages Experience securing CI/CD pipelines and implementing DevSecOps practices Familiarity with software supply chain security and SBOM generation tools Experience with security testing tools (e.g., Burp Suite, OWASP ZAP) and static/dynamic code analysis Understanding of AI/ML security implications, particularly those outlined in the OWASP LLM Top 10 Excellent communication skills, able to explain complex security issues to both technical and non-technical audiences</p>
<p>Preferred Skills and Experience: Experience with cloud platforms (e.g., GCP, AWS, Azure) and their security features Relevant security certifications (e.g., CSSLP, OSWE) Background in data privacy and compliance regulations relevant to cloud-native applications and AI systems Experience with GitOps and infrastructure-as-code security Familiarity with federated learning and privacy-preserving machine learning techniques Experience in building custom security tooling to enhance and automate security processes Interest in leveraging AI to automate security tasks and improve efficiency Contributions to open-source security projects or tools Experience in securing AI/ML models and data pipelines</p>
<p>Compensation and Benefits: $200,000 - $340,000 USD Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short &amp; long-term disability insurance, life insurance, and various other discounts and perks.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$200,000 - $340,000 USD</Salaryrange>
      <Skills>Python, Rust, Secure coding practices, Application security frameworks, Common vulnerabilities, OWASP Top 10, CI/CD pipelines, DevSecOps practices, Software supply chain security, SBOM generation tools, Security testing tools, Static/dynamic code analysis, AI/ML security implications, OWASP LLM Top 10, Cloud platforms, Security certifications, Data privacy and compliance regulations, GitOps, Infrastructure-as-code security, Federated learning, Privacy-preserving machine learning techniques, Custom security tooling, AI automation, Open-source security projects, AI/ML model security</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>xAI</Employername>
      <Employerlogo>https://logos.yubhub.co/xai.com.png</Employerlogo>
      <Employerdescription>xAI creates AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge.</Employerdescription>
      <Employerwebsite>https://www.xai.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/xai/jobs/4559147007</Applyto>
      <Location>Palo Alto, CA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>2c812f80-7cc</externalid>
      <Title>Director of Quality</Title>
      <Description><![CDATA[<p>Meet Yubico, the creator of the most secure passkeys and leading provider of hardware authentication security keys. Our company&#39;s mission is to make secure login easy and available for everyone.</p>
<p>We are a global company with a strong company culture and employees located in over 14 countries. Yubico&#39;s headquarters are based in Stockholm, Sweden and Santa Clara, CA.</p>
<p>The Role</p>
<p>We are seeking a strategic and hands-on Director of Quality to architect and drive the Quality Management System for our global YubiKey production, warehousing, and fulfillment operations. In this pivotal role, you will move beyond standard quality checks to establish a multi-layered prevention model that mirrors our security philosophy.</p>
<p>Tasks &amp; Responsibilities:</p>
<p>Quality Strategy:</p>
<ul>
<li><p>Architect and drive the implementation of a scalable Quality Management System (QMS) according to ISO 9001 standards.</p>
</li>
<li><p>Accelerate and structure the ongoing transition from tribal knowledge to documented, auditable, and repeatable process to support QMS.</p>
</li>
<li><p>Establish a multi-tier quality framework where failures are caught by overlapping layers of defense, including supplier quality, incoming inspection, in-process automated gating, and final outgoing audit.</p>
</li>
</ul>
<p>Internal Education Program:</p>
<ul>
<li><p>Build and lead an internal Quality Academy to drive QMS delivery.</p>
</li>
<li><p>Collaborate with Engineering to push for rigorous DFMEA and tool requirements, recognizing them as the supplier of manufacturing capabilities while educating Operators on SOPs/OCAPs and Leadership on quality metrics.</p>
</li>
</ul>
<p>Quality Operations:</p>
<ul>
<li><p>Partner closely with Engineering during the Design phase to drive Design Failure Mode and Effects Analysis (DFMEA).</p>
</li>
<li><p>Provide requirements and drive execution to ensure &#39;design gating&#39; - preventing products from moving to production without a clear quality plan.</p>
</li>
</ul>
<p>Process Resilience (PFMEA):</p>
<ul>
<li><p>Lead the execution of risk-based Process Failure Mode and Effects Analysis (PFMEA) during the Production and Fulfillment phase.</p>
</li>
<li><p>Make these technical documents &#39;readable&#39; and actionable for floor staff to prevent errors in configuration, warehouse, packaging, and fulfillment.</p>
</li>
</ul>
<p>Develop and maintain rigorous Control Plans that specify exactly how quality is monitored at every step.</p>
<p>Implement detection methods, including new inspection methods and functional testing.</p>
<p>Material Review Board (MRB) Leadership:</p>
<ul>
<li><p>Chair the MRB and manage the deviation/waiver process.</p>
</li>
<li><p>Ensure rigorous engineering validation is performed before any out-of-spec material is approved for production runs.</p>
</li>
</ul>
<p>Out of Control Action Plans (Rectify):</p>
<ul>
<li><p>Define clear, readable &#39;Out of Control Action Plans&#39; (OCAP).</p>
</li>
<li><p>Transform reactive firefighting into systematic rectification by ensuring production teams know exactly when to Stop, Call, Wait, or Adjust when metrics drift.</p>
</li>
</ul>
<p>Supply Chain Counterfeit Prevention Program:</p>
<ul>
<li><p>Own and execute the Counterfeit Prevention Program.</p>
</li>
<li><p>Implement strict controls over component sourcing and chain of custody to protect the security integrity of YubiKeys.</p>
</li>
</ul>
<p>Supplier Quality Management:</p>
<ul>
<li>Enforce rigorous quality standards for raw material suppliers and contract manufacturers, ensuring compliance with our security and reliability requirements.</li>
</ul>
<p>Basic Requirements:</p>
<ul>
<li><p>10+ years of progressive experience in global Quality Assurance (supporting global supply chain (e.g., North America, EMEA, APJ) within hardware production, customization and fulfillment with significant leadership experience.</p>
</li>
<li><p>Quality Management Systems: Proven track record of architecting and implementing a QMS from the ground up or upgrading one to ISO 9001 standards.</p>
</li>
<li><p>Ability to facilitate workshops and drive these processes with internal audiences.</p>
</li>
<li><p>Security Mindset: Familiar with and able to execute on Counterfeit Prevention Programs (e.g., AS9100/9120) and supply chain security protocols.</p>
</li>
<li><p>Education: Bachelor&#39;s degree in Engineering, Quality Management, or related technical field</p>
</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$185,000-$210,000 per year</Salaryrange>
      <Skills>Quality Management Systems, ISO 9001, Advanced Product Quality Planning, DFMEA, PFMEA, Control Plans, Counterfeit Prevention Programs, Supply Chain Security Protocols</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Yubico</Employername>
      <Employerlogo>https://logos.yubhub.co/yubico.com.png</Employerlogo>
      <Employerdescription>Yubico is a global company that creates secure passkeys and provides hardware authentication security keys. It has a presence in over 14 countries and serves a global customer base.</Employerdescription>
      <Employerwebsite>https://www.yubico.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/yubico/dde84684-68c5-4a06-865c-39d1e1e2f656</Applyto>
      <Location>Santa Clara</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>fb4fa003-a73</externalid>
      <Title>Platform Hardware Security Engineer</Title>
      <Description><![CDATA[<p><strong>About the Role</strong></p>
<p>We&#39;re seeking a Platform Hardware Security Engineer to design and implement security architectures for bare-metal infrastructure. You&#39;ll work with teams across Anthropic to build firmware, bootloaders, operating systems, and attestation systems to ensure the integrity of our infrastructure from the ground up.</p>
<p>This role requires expertise in low-level systems security and the ability to architect solutions that balance security requirements with the performance demands of training AI models across our massive fleet.</p>
<p><strong>What you&#39;ll do:</strong></p>
<ul>
<li>Design and implement secure boot chains from firmware through OS initialization for diverse hardware platforms (CPUs, BMCs, switches, peripherals, and embedded microcontrollers)</li>
<li>Architect attestation systems that provide cryptographic proof of system state from hardware root of trust through application layer</li>
<li>Develop measured boot implementations and runtime integrity monitoring</li>
<li>Create reference architectures and security requirements for bare-metal deployments</li>
<li>Integrate security controls with infrastructure teams without impacting training performance</li>
<li>Prototype and validate security mechanisms before production deployment</li>
<li>Conduct firmware vulnerability assessments and penetration testing</li>
<li>Build firmware analysis pipelines for continuous security monitoring</li>
<li>Document security architectures and maintain threat models</li>
<li>Collaborate with software and hardware vendors to ensure security capabilities meet our requirements</li>
</ul>
<p><strong>Who you are:</strong></p>
<ul>
<li>8+ years of experience in systems security, with at least 5 years focused on firmware and hardware security (firmware, bootloaders, and OS-level security)</li>
<li>Hands-on experience with secure boot, measured boot, and attestation technologies (TPM, Intel TXT, AMD SEV, ARM TrustZone)</li>
<li>Strong understanding of cryptographic protocols and hardware security modules</li>
<li>Experience with UEFI/BIOS or embedded firmware security, bootloader hardening, and chain of trust implementation</li>
<li>Proficiency in low-level programming (C, Rust, Assembly) and systems programming</li>
<li>Knowledge of firmware vulnerability assessment and threat modeling</li>
<li>Track record of designing security architectures for complex, distributed systems</li>
<li>Experience with supply chain security</li>
<li>Ability to work effectively across hardware and software boundaries</li>
<li>Knowledge of NIST firmware security guidelines and hardware security frameworks</li>
</ul>
<p><strong>Strong candidates may also have:</strong></p>
<ul>
<li>Experience with confidential computing technologies and hardware-based TEEs</li>
<li>Knowledge of SLSA framework and software supply chain security standards</li>
<li>Experience securing large-scale HPC or cloud infrastructure</li>
<li>Contributions to open-source security projects (coreboot, CHIPSEC, etc.)</li>
<li>Background in formal verification or security proof techniques</li>
<li>Experience with silicon root of trust implementations</li>
<li>Experience working with building foundational technical designs, operational leadership, and vendor collaboration</li>
<li>Previous work with AI/ML infrastructure security</li>
</ul>
<p><strong>Logistics</strong></p>
<ul>
<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$405,000 - $485,000 USD</Salaryrange>
      <Skills>firmware security, hardware security, secure boot, measured boot, attestation technologies, cryptographic protocols, hardware security modules, UEFI/BIOS, embedded firmware security, bootloader hardening, chain of trust implementation, low-level programming, systems programming, firmware vulnerability assessment, threat modeling, supply chain security, NIST firmware security guidelines, hardware security frameworks, confidential computing technologies, hardware-based TEEs, SLSA framework, software supply chain security standards, large-scale HPC or cloud infrastructure, open-source security projects, formal verification, security proof techniques, silicon root of trust implementations, AI/ML infrastructure security</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a quickly growing organisation that aims to create reliable, interpretable, and steerable AI systems. The company&apos;s mission is to build beneficial AI systems that are safe and beneficial for users and society as a whole.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4929689008</Applyto>
      <Location>New York City, NY; Seattle, WA; San Francisco, CA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>