{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/systems-security"},"x-facet":{"type":"skill","slug":"systems-security","display":"Systems Security","count":8},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_38a5c86c-54e"},"title":"Senior Compliance Engineer","description":"<p>JOB TITLE: Senior Compliance Engineer LOCATION: Costa Mesa, California, United States DEPARTMENT: Corporate Technology : Information Security : Corporate Assurance</p>\n<p>As a Senior Compliance Engineer at Anduril Industries, you will be responsible for driving automation, compliance, and security engineering principles into the design, integration, and operation of Anduril&#39;s internal systems. This is a technically hands-on role that requires a strong DevSecOps background with deep expertise in cloud infrastructure security, embedded systems security, and federal compliance frameworks.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Design, develop, and maintain Infrastructure as Code (IaC) and Policy as Code (PaC) that enforce compliance with NIST SP 800-171 and 800-53, CMMC, and other applicable frameworks, enabling developers to deploy CMMC-certified applications using pre-packaged, compliant infrastructure templates.</li>\n<li>Architect, build, and deploy robust, scalable security controls across Anduril&#39;s corporate, development, and production cloud environments (AWS, Azure, GCP) and on-premise environments.</li>\n<li>Develop and automate IaC pipelines for managing and scaling cloud deployments securely and efficiently, including automated pipelines for deploying infrastructure, applications, and updates.</li>\n<li>Build automation for procedural compliance controls, generating compliance and audit artifacts at scale without manual intervention.</li>\n<li>Develop security models that integrate Continuous Monitoring (ConMon), DISA STIG scanning, and compliance reporting into a unified, automated workflow.</li>\n</ul>\n<p><strong>Compliance Engineering &amp; Framework Implementation</strong></p>\n<ul>\n<li>Analyze, interpret, and operationalize federal and industry cybersecurity regulations, including NIST SP 800-171 and 800-53, CMMC, FedRAMP, and SOC 2, translating regulatory language into actionable engineering guidance and enforceable technical controls.</li>\n<li>Evaluate system architectures and configurations to ensure alignment with required security controls for moderate-impact information systems.</li>\n<li>Interface directly with infrastructure teams to verify and enforce compliance across existing on-premise and cloud stacks, identifying gaps and driving remediation.</li>\n</ul>\n<p><strong>Cross-Functional Collaboration &amp; Enablement</strong></p>\n<ul>\n<li>Partner with engineers, the DevSecOps Team, and the Automation Team to implement and verify security controls in both corporate and product software environments.</li>\n<li>Act as a force multiplier by embedding security best practices into the workflows of infrastructure, application, and product teams, particularly for environments holding mission-critical data.</li>\n</ul>\n<p><strong>Strategic &amp; Advisory</strong></p>\n<ul>\n<li>Develop strategies and implementation plans for compliance-related matters, advising management on risk posture, regulatory changes, and investment priorities.</li>\n<li>Institute best-practice procedures for compliance and risk mitigation across the organization.</li>\n</ul>\n<p><strong>Required Qualifications</strong></p>\n<ul>\n<li>3+ years of professional experience in Cloud Security, DevSecOps, Site Reliability Engineering (SRE), or a related security engineering role.</li>\n<li>Background in one or more of the following disciplines: Systems Security Engineering, Cybersecurity, Systems Engineering, Software Engineering, Computer Engineering, or Computer Science.</li>\n<li>Proven experience building and securing complex cloud environments at scale.</li>\n<li>3+ years of hands-on experience working with compliance frameworks such as CMMC, NIST SP 800-171 and/or 800-53, and FedRAMP.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_38a5c86c-54e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anduril Industries","sameAs":"https://www.anduril.com/","logo":"https://logos.yubhub.co/anduril.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/andurilindustries/jobs/5087188007","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cloud Security","DevSecOps","Site Reliability Engineering","Systems Security Engineering","Cybersecurity","Systems Engineering","Software Engineering","Computer Engineering","Computer Science","Compliance Frameworks","NIST SP 800-171","NIST SP 800-53","CMMC","FedRAMP"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:54:24.911Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Costa Mesa, California, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Cloud Security, DevSecOps, Site Reliability Engineering, Systems Security Engineering, Cybersecurity, Systems Engineering, Software Engineering, Computer Engineering, Computer Science, Compliance Frameworks, NIST SP 800-171, NIST SP 800-53, CMMC, FedRAMP"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_82828d53-b1d"},"title":"Product Security Engineer, Programs","description":"<p>We&#39;re seeking a mid-senior level product security engineer to own security for assigned products in your technical domain, provide expert consultation on security architectures, guide implementation of security features, develop solutions engineering for complex security challenges, and ultimately secure our suite of advanced technologies.</p>\n<p>The ideal candidate has a background in electrical or software engineering, with a focus on platform security, or has pivoted to a product or application security role. They will be able to conduct complex security architecture reviews, research and mitigate exploits against hardware and software, and work with other engineering teams to build resiliency into our products.</p>\n<p>As a product security engineer, you will:</p>\n<ul>\n<li>Own the development and maturation of security features for Anduril&#39;s products</li>\n<li>Collaborate and build solutions with engineering teams to meet and exceed industry-standard security goals</li>\n<li>Collaborate with security assessment teams to assess Anduril&#39;s products and integrated components to uncover potential weaknesses</li>\n<li>Collaborate with manufacturing and operations teams to develop secure handling and operational processes</li>\n<li>Engage with teams to remediate uncovered weaknesses in designs, implementations, integrations, and processes</li>\n</ul>\n<p>Required qualifications include:</p>\n<ul>\n<li>Experience with one or more programming languages (e.g. C/C++, Golang, Rust, Python)</li>\n<li>Experience assessing security of firmware, applications, network, IoT, or embedded systems</li>\n<li>Experience developing features for and improving security of firmware, applications, network, or embedded systems</li>\n<li>Experience building, testing, and delivering production-ready systems, especially for embedded and/or Linux systems</li>\n<li>Familiarity with anti-tamper and reverse engineering mechanisms</li>\n<li>Strong and professional communication skills (written and verbal)</li>\n<li>Strong understanding of the &#39;why&#39; behind product, systems, and security design</li>\n<li>A sincere commitment to a positive, inclusive, and collaborative culture</li>\n<li>Must be eligible to obtain and maintain a U.S. TS clearance</li>\n</ul>\n<p>Preferred qualifications include:</p>\n<ul>\n<li>Excels at the above-listed requirements</li>\n<li>Possesses and able to maintain an active U.S. TS Security clearance with SCI and/or SAP eligibility</li>\n<li>Familiarity with security architectures of embedded, aerospace, or cyber-physical systems</li>\n<li>Fluency in modern USG cyber methodologies, including Cyber Survivability guidance and related policy (JSIG, ICD 503, CSEIG, SSECG, NIST SP 800-160, Cyber T&amp;E Guidebook, CMMC, etc.)</li>\n<li>Experience with programmable logic devices and their development tools</li>\n<li>Regularly builds, tests, and delivers production-ready systems, especially for embedded and/or Linux systems</li>\n</ul>\n<p>US Salary Range: $156,000-$253,000 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_82828d53-b1d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anduril","sameAs":"https://www.anduril.com/","logo":"https://logos.yubhub.co/anduril.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/andurilindustries/jobs/5042718007","x-work-arrangement":"onsite","x-experience-level":"mid-senior","x-job-type":"full-time","x-salary-range":"$156,000-$253,000 USD","x-skills-required":["C/C++","Golang","Rust","Python","firmware security","application security","network security","IoT security","embedded systems security","anti-tamper mechanisms","reverse engineering"],"x-skills-preferred":["security architectures","Cyber Survivability guidance","programmable logic devices","development tools"],"datePosted":"2026-04-18T15:52:29.958Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Costa Mesa, California, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"C/C++, Golang, Rust, Python, firmware security, application security, network security, IoT security, embedded systems security, anti-tamper mechanisms, reverse engineering, security architectures, Cyber Survivability guidance, programmable logic devices, development tools","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":156000,"maxValue":253000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_de168cba-02c"},"title":"Principal Software Engineer, Platform Security","description":"<p>We&#39;re looking for a principal-level engineer to serve as a technical leader for platform security across Anduril. This role combines deep expertise in cryptography, systems security, and secure architecture with the ability to drive security strategy across business lines and the platform.</p>\n<p>As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Own the technical vision and architecture for platform security across Anduril&#39;s product ecosystem</li>\n<li>Design cryptographic systems, protocols, and key management architectures for autonomous and robotic platforms operating in contested and disconnected environments</li>\n<li>Lead the design of hardware root-of-trust architectures integrating TPMs, TEEs, HSMs, and secure boot across diverse embedded platforms</li>\n<li>Drive the strategy for promoting business-line security implementations into shared, composable platform services</li>\n<li>Serve as the senior technical authority for security architecture reviews across the organization, providing definitive guidance on cryptographic design, protocol security, and system hardening</li>\n<li>Define security patterns, reference architectures, and engineering standards that enable teams across Anduril to build securely and independently</li>\n<li>Mentor and develop senior engineers on the team, raising the bar for security engineering across the organization</li>\n<li>Represent Anduril&#39;s security engineering capabilities to customers, partners, and auditors when deep technical credibility is required</li>\n<li>Evaluate emerging threats, cryptographic standards, and security technologies, driving adoption where they strengthen the platform</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li>12+ years of experience in software engineering, with significant depth in systems security and cryptography</li>\n<li>Expert-level knowledge of cryptographic protocol design, including key management architectures, certificate systems, and cryptographic agility</li>\n<li>Deep experience with hardware security: TPM, TEE, HSM, secure boot, and hardware root-of-trust design across multiple platform types</li>\n<li>Proficient in two or more of: C++, Rust, Go</li>\n<li>Experience designing security architectures for embedded, real-time, or robotic systems with constrained environments</li>\n<li>Track record of leading cross-organizational technical initiatives and driving architectural decisions that span multiple teams</li>\n<li>Strong ability to communicate complex security concepts to engineering leadership, product teams, and external stakeholders</li>\n<li>Experience performing and leading threat modeling, security architecture reviews, and cryptographic design reviews</li>\n<li>Eligible to obtain and maintain active U.S. Secret security clearance</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Experience with post-quantum cryptography, distributed key generation (DKG), or threshold cryptographic schemes</li>\n<li>Background in defense, aerospace, or autonomous systems with exposure to FIPS 140, Common Criteria, or NSA CSfC requirements</li>\n<li>Experience designing secure communication protocols for autonomous platforms or mesh networks</li>\n<li>Deep knowledge of Linux kernel security, mandatory access controls (SELinux/AppArmor), and OS hardening at scale</li>\n<li>Experience building and evolving platform security services consumed by dozens of teams</li>\n<li>Familiarity with compliance frameworks (STIGs, NIST 800-53, CMMC) and translating them into engineering controls that don&#39;t compromise developer velocity</li>\n<li>Publications, patents, or recognized contributions in cryptography or systems security</li>\n<li>Experience with Nix build systems and reproducible build pipelines for security-critical software</li>\n</ul>\n<p>US Salary Range: $254,000-$336,000 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_de168cba-02c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anduril Industries","sameAs":"https://www.andurilindustries.com/","logo":"https://logos.yubhub.co/andurilindustries.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/andurilindustries/jobs/5087992007","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$254,000-$336,000 USD","x-skills-required":["cryptography","systems security","secure architecture","cryptographic protocol design","key management architectures","certificate systems","cryptographic agility","hardware security","TPM","TEE","HSM","secure boot","hardware root-of-trust design","embedded systems","real-time systems","robotic systems","constrained environments","cross-organizational technical initiatives","architectural decisions","complex security concepts","threat modeling","security architecture reviews","cryptographic design reviews","U.S. Secret security clearance"],"x-skills-preferred":["post-quantum cryptography","distributed key generation","threshold cryptographic schemes","defense","aerospace","autonomous systems","FIPS 140","Common Criteria","NSA CSfC requirements","secure communication protocols","mesh networks","Linux kernel security","mandatory access controls","OS hardening","compliance frameworks","STIGs","NIST 800-53","CMMC","publications","patents","recognized contributions","Nix build systems","reproducible build pipelines"],"datePosted":"2026-04-18T15:49:36.448Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Boston, Massachusetts, United States; Costa Mesa, California, United States; Seattle, Washington, United States; Washington, District of Columbia, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cryptography, systems security, secure architecture, cryptographic protocol design, key management architectures, certificate systems, cryptographic agility, hardware security, TPM, TEE, HSM, secure boot, hardware root-of-trust design, embedded systems, real-time systems, robotic systems, constrained environments, cross-organizational technical initiatives, architectural decisions, complex security concepts, threat modeling, security architecture reviews, cryptographic design reviews, U.S. Secret security clearance, post-quantum cryptography, distributed key generation, threshold cryptographic schemes, defense, aerospace, autonomous systems, FIPS 140, Common Criteria, NSA CSfC requirements, secure communication protocols, mesh networks, Linux kernel security, mandatory access controls, OS hardening, compliance frameworks, STIGs, NIST 800-53, CMMC, publications, patents, recognized contributions, Nix build systems, reproducible build pipelines","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":254000,"maxValue":336000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_27d6fab4-848"},"title":"Staff Product Security Engineer","description":"<p>Job Title: Staff Product Security Engineer</p>\n<p>Location: United States</p>\n<p>Department: Security</p>\n<p>Job Description:</p>\n<p>This role can be based remotely anywhere in the United States. The Product Security Team&#39;s mission is to left-shift SDLC (Security Development Lifecycle) processes for all code written in Databricks (for customer use or supporting customers internally) to reduce the likelihood of introducing new vulnerabilities in production and minimize the count and effect of externally identified vulnerabilities on Databricks Services.</p>\n<p>You will be an individual contributor on the product security team at Databricks, managing SDLC functions for features and products within Databricks. This would include, but is not limited to, security design reviews, threat models, manual code reviews, exploit writing, and exploit chain creation. You will also support IR and VRP programs when there is a vulnerability report or a product security incident.</p>\n<p>You will work with a global team, spread across various locations in the US and EMEA.</p>\n<p>The impact you will have:</p>\n<ul>\n<li>Full SDLC support for new product features being developed in ENG and non-ENG teams. This would include threat modeling, design review, manual code review, exploit writing, etc.</li>\n</ul>\n<ul>\n<li>Work with other security teams to provide support for incident response and vulnerability response as and when needed.</li>\n</ul>\n<ul>\n<li>Work with the results of SAST tools to help evaluate and identify false positives and file defects for real issues.</li>\n</ul>\n<ul>\n<li>Work on DAST tools and related automation for auto-assessment and defect filing.</li>\n</ul>\n<ul>\n<li>Maintain the automation framework and add new features as needed to support different security compliances that Databricks may want to get into – FedRamp, PCI, HIPAA, etc.</li>\n</ul>\n<ul>\n<li>Prioritize security from a risk management perspective, rather than an absolute textbook version.</li>\n</ul>\n<ul>\n<li>Help develop and implement security processes to improve the overall productivity of the product security organization and the SDLC process in general</li>\n</ul>\n<p>What we look for:</p>\n<ul>\n<li>3-10 years&#39; experience with the threat modeling process and ability to find design problems based on a block diagram of data flow.</li>\n</ul>\n<ul>\n<li>Solid understanding on at least two of the following domains: web security, cloud security, systems security, and applied cryptography.</li>\n</ul>\n<ul>\n<li>Proficient with one or more of programming languages (Python/Java/Scala/JavaScript) and ability to read code to identify security defects.</li>\n</ul>\n<ul>\n<li>Strong skills on scripting and automation on exploits.</li>\n</ul>\n<ul>\n<li>Fuzzing skills are good to have.</li>\n</ul>\n<ul>\n<li>Exploit writing skills are a positive and greatly required.</li>\n</ul>\n<p>Pay Range Transparency:</p>\n<p>Databricks is committed to fair and equitable compensation practices. The pay range(s) for this role is listed below and represents the expected base salary range for non-commissionable roles or on-target earnings for commissionable roles. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to job-related skills, depth of experience, relevant certifications and training, and specific work location. Based on the factors above, Databricks anticipated utilizing the full width of the range. The total compensation package for this position may also include eligibility for annual performance bonus, equity, and the benefits listed above.</p>\n<p>For more information regarding which range your location is in visit our page here.</p>\n<p>Zone 1 Pay Range: $190,000 - $261,250 USD</p>\n<p>Zone 2 Pay Range: $171,000 - $235,200 USD</p>\n<p>Zone 3 Pay Range: $161,500 - $222,100 USD</p>\n<p>Zone 4 Pay Range: $152,000 - $209,000 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_27d6fab4-848","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Databricks","sameAs":"https://databricks.com","logo":"https://logos.yubhub.co/databricks.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/databricks/jobs/7882009002","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$190,000 - $261,250 USD","x-skills-required":["threat modeling","security design reviews","manual code reviews","exploit writing","exploit chain creation","incident response","vulnerability response","SAST tools","DAST tools","automation","FedRamp","PCI","HIPAA","risk management","security processes","productivity","SDLC process","web security","cloud security","systems security","applied cryptography","programming languages","scripting","fuzzing"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:42:34.724Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"threat modeling, security design reviews, manual code reviews, exploit writing, exploit chain creation, incident response, vulnerability response, SAST tools, DAST tools, automation, FedRamp, PCI, HIPAA, risk management, security processes, productivity, SDLC process, web security, cloud security, systems security, applied cryptography, programming languages, scripting, fuzzing","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":190000,"maxValue":261250,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_eec951b9-d96"},"title":"Security Engineer","description":"<p>We&#39;re seeking a Security Engineer at the senior-level or above to own the product security and authorization lifecycle for Saronic&#39;s autonomous surface vessels. You will serve as the responsible security engineer for one or more vessel programs, owning the security posture from design through production, authorization, and operational deployment.</p>\n<p>This is a hands-on security engineering role; not a GRC or project management role. You&#39;ll identify the frameworks that apply, architect the vessel&#39;s security to satisfy them, and drive authorization to completion. Where standards don&#39;t yet exist, you&#39;ll define them.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Own the security posture for one or more vessel programs from architecture through fielding, serving as the responsible security engineer for the product</li>\n<li>Drive threat modeling across vessel subsystems including embedded compute, communications, navigation, propulsion controls, sensor fusion, and C2 interfaces and define security architectures, trust boundaries, and segmentation strategies based on findings</li>\n<li>Identify and mitigate security risks unique to autonomous maritime platforms, including GPS/GNSS spoofing, RF interference, sensor manipulation, supply chain compromise, and physical access threats</li>\n<li>Own the end-to-end authorization lifecycle for vessel programs, from initial security planning through ATO or equivalent customer authorization milestones</li>\n<li>Navigate DoD cybersecurity authorization frameworks including RMF, CSRMC, and service-specific requirements across Navy, Coast Guard, Marine Corps, and joint programs</li>\n<li>Prepare and maintain authorization artifacts, security documentation, and evidence packages that satisfy Authorizing Officials and program offices</li>\n<li>Identify and map applicable compliance frameworks for each vessel and customer segment including NIST SP 800-53, NIST SP 800-171, CMMC 2.0, FedRAMP, IEC 62443, IMO MASS Code, and IACS UR E26/E27 and proactively define Saronic&#39;s compliance posture where standards are still emerging</li>\n<li>Engage directly with government program offices, Authorizing Officials, DOT&amp;E evaluators, and classification societies as a credible technical representative of Saronic&#39;s security posture</li>\n<li>Support cybersecurity testing and evaluation efforts, including preparation for operational test events, red team assessments, and cooperative vulnerability assessments</li>\n<li>Partner with supply chain and manufacturing teams to address hardware provenance, firmware integrity, and anti-tamper requirements for production vessels</li>\n<li>Work with Legal and Contracts to ensure security and compliance requirements are accurately reflected in customer agreements, proposals, and contract deliverables</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li>6+ years of hands-on experience in product security, systems security engineering, authorization engineering, or a closely related security engineering role for defense or high-assurance platforms</li>\n<li>Strong understanding of DoD cybersecurity authorization processes (RMF, ATO/IATT, CSRMC, continuous ATO) with experience contributing to or driving systems through authorization</li>\n<li>Working knowledge of NIST SP 800-53, NIST SP 800-171, and CMMC 2.0 and their application to weapons systems, autonomous platforms, or similarly complex defense products</li>\n<li>Experience with threat modeling, security architecture, or risk assessment for cyber-physical systems, embedded systems, or operational technology environments</li>\n<li>Strong technical foundation, able to read architecture diagrams, evaluate security controls at a systems level, and hold credible technical conversations with hardware, software, and cloud engineers</li>\n<li>Ability to clearly communicate with both technical and non-technical stakeholders, including production of security documentation and authorization artifacts</li>\n<li>Ownership mindset with the ability to operate in ambiguity, define the path forward, and move work to completion across teams</li>\n<li>Ability to obtain and maintain a security clearance</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Experience as a product security lead, systems security engineer, or authorization lead for a defense platform or program of record</li>\n<li>Direct experience engaging with government Authorizing Officials, program offices, or DOT&amp;E as a technical security representative</li>\n<li>Experience in defense technology startups, DARPA programs, or organizations that move at speed within the defense acquisition system</li>\n<li>Familiarity with maritime-specific frameworks including IMO MASS Code, IACS UR E26/E27, IEC 62443, or classification society autonomous vessel rules</li>\n<li>Understanding of autonomous systems security challenges including communications security, electronic warfare hardening, GPS/GNSS resilience, and AI/ML system security</li>\n<li>Experience with ITAR/EAR compliance, supply chain security, or manufacturing security for defense products</li>\n<li>Familiarity with the defense acquisition lifecycle and how authorization milestones integrate into program schedules</li>\n</ul>\n<p>Additional Information:</p>\n<ul>\n<li>Benefits: Medical Insurance, Dental and Vision Insurance, Time Off, Parental Leave, Competitive Salary, Retirement Plan, Stock Options, Life and Disability Insurance, Pet Insurance</li>\n<li>This role requires access to export-controlled information or items that require “U.S. Person” status.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_eec951b9-d96","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Saronic Technologies","sameAs":"https://www.saronictech.com/","logo":"https://logos.yubhub.co/saronictech.com.png"},"x-apply-url":"https://jobs.lever.co/saronic/6e800df8-6173-4f13-863e-b8803017f317","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["product security","systems security engineering","authorization engineering","threat modeling","security architecture","risk assessment","cyber-physical systems","embedded systems","operational technology environments","NIST SP 800-53","NIST SP 800-171","CMMC 2.0","RMF","CSRMC","ATO/IATT","continuous ATO","FedRAMP","IEC 62443","IMO MASS Code","IACS UR E26/E27"],"x-skills-preferred":["product security lead","systems security engineer","authorization lead","defense platform","program of record","government Authorizing Officials","program offices","DOT&E","technical security representative","defense technology startups","DARPA programs","organizations","defense acquisition system","maritime-specific frameworks","ITAR/EAR compliance","supply chain security","manufacturing security"],"datePosted":"2026-04-17T12:58:42.019Z","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"product security, systems security engineering, authorization engineering, threat modeling, security architecture, risk assessment, cyber-physical systems, embedded systems, operational technology environments, NIST SP 800-53, NIST SP 800-171, CMMC 2.0, RMF, CSRMC, ATO/IATT, continuous ATO, FedRAMP, IEC 62443, IMO MASS Code, IACS UR E26/E27, product security lead, systems security engineer, authorization lead, defense platform, program of record, government Authorizing Officials, program offices, DOT&E, technical security representative, defense technology startups, DARPA programs, organizations, defense acquisition system, maritime-specific frameworks, ITAR/EAR compliance, supply chain security, manufacturing security"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c629a0da-f6c"},"title":"Security Engineer","description":"<p>We&#39;re seeking a Security Engineer at the senior-level or above focused on hardware, embedded systems, and firmware security to own the security posture of Saronic&#39;s vessel hardware platforms from silicon to system.</p>\n<p>You will be the technical authority on hardware root of trust, secure boot, firmware integrity, embedded system hardening, and the security of third-party hardware integrations. Your work ensures that every component on the vessel is resilient against tampering, exploitation, and supply chain compromise, designed in from the start and maintained across the fleet lifecycle.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li><p>Conduct hardware security assessments including fault injection, side-channel analysis, interface evaluation, and bus protocol analysis across Saronic-built and third-party hardware including sensors, radios, navigation systems, propulsion controllers, and communication modules</p>\n</li>\n<li><p>Evaluate and harden physical interfaces, debug ports, maintenance access points, and removable media interfaces on vessel hardware</p>\n</li>\n<li><p>Evaluate supply chain security risks for hardware components and recommend provenance validation, anti-tamper, and attestation controls</p>\n</li>\n<li><p>Develop and maintain a hardware security testing capability including tooling, methodology, and repeatable test procedures</p>\n</li>\n<li><p>Design and implement secure boot chains establishing hardware root of trust from power-on through application launch, integrating TPM, secure elements, and HSMs for device identity, key storage, measured boot, and remote attestation</p>\n</li>\n<li><p>Design and implement secure firmware update mechanisms including signed updates, rollback protection, and verified delivery across the fleet</p>\n</li>\n<li><p>Own the cryptographic key lifecycle for hardware-bound keys, including provisioning, rotation, revocation, and escrow</p>\n</li>\n<li><p>Harden embedded Linux systems on vessel platforms, including kernel configuration, mandatory access controls, secure IPC, and attack surface reduction</p>\n</li>\n<li><p>Secure operational technology protocols and interfaces used in vessel control systems, propulsion, navigation, and sensor fusion including CAN bus, NMEA, and maritime/industrial communication protocols</p>\n</li>\n<li><p>Define security boundaries, trust zones, and segmentation strategies for vessel-internal compute and communication architectures</p>\n</li>\n<li><p>Drive threat modeling across vessel hardware subsystems and translate findings into actionable engineering requirements</p>\n</li>\n<li><p>Produce secure-by-design reference architectures and define hardware and firmware security standards, testing requirements, and acceptance criteria integrated into engineering workflows</p>\n</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li><p>6+ years of hands-on experience in hardware security, embedded systems security, firmware security, or a closely related security engineering role</p>\n</li>\n<li><p>Deep expertise in hardware hacking techniques including fault injection, side-channel attacks, JTAG/SWD exploitation, bus sniffing/injection, and physical security assessments</p>\n</li>\n<li><p>Demonstrated experience designing and implementing secure boot chains, hardware root of trust, and secure firmware update mechanisms in production systems</p>\n</li>\n<li><p>Strong experience assessing third-party hardware integrations and evaluating supply chain security risks</p>\n</li>\n<li><p>Deep knowledge of embedded Linux security hardening, kernel security, and mandatory access control frameworks</p>\n</li>\n<li><p>Experience with operational technology security, industrial protocols, or control system security</p>\n</li>\n<li><p>Proficiency in C, C++, Python, or Rust in the context of firmware, embedded, or systems-level security work, and with hardware security testing tools</p>\n</li>\n<li><p>Ability to obtain and maintain a security clearance</p>\n</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li><p>Experience in defense, aerospace, robotics, autonomy, maritime, or other high-assurance environments</p>\n</li>\n<li><p>Experience with autonomous systems, unmanned vehicles, or safety-critical embedded platforms</p>\n</li>\n<li><p>Experience with RTOS, microcontroller security, or resource-constrained device environments</p>\n</li>\n<li><p>Knowledge of CAN bus, NMEA protocols, maritime communication systems, RF/GPS/GNSS security, or ICS security standards</p>\n</li>\n<li><p>Familiarity with defense or safety-critical compliance frameworks (NIST SP 800-53, IEC 62443, Common Criteria, or equivalent)</p>\n</li>\n<li><p>Relevant certifications such as OSEE, GXPN, GSE, or hardware-focused credentials</p>\n</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c629a0da-f6c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Saronic Technologies","sameAs":"https://www.saronictechnologies.com/","logo":"https://logos.yubhub.co/saronictechnologies.com.png"},"x-apply-url":"https://jobs.lever.co/saronic/4b15b1b4-3c34-47ad-b964-dbcf0f8a3dc4","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Hardware security","Embedded systems security","Firmware security","Fault injection","Side-channel analysis","Interface evaluation","Bus protocol analysis","Physical security assessments","Secure boot chains","Hardware root of trust","Firmware integrity","Embedded system hardening","Third-party hardware integrations","Supply chain security risks","Provenance validation","Anti-tamper","Attestation controls","Hardware security testing","Tooling","Methodology","Repeatable test procedures","Device identity","Key storage","Measured boot","Remote attestation","Signed updates","Rollback protection","Verified delivery","Cryptographic key lifecycle","Provisioning","Rotation","Revocation","Escrow","Embedded Linux systems","Kernel configuration","Mandatory access controls","Secure IPC","Attack surface reduction","Operational technology protocols","Industrial protocols","Control system security","CAN bus","NMEA","Maritime/industrial communication protocols","Security boundaries","Trust zones","Segmentation strategies","Threat modeling","Actionable engineering requirements","Secure-by-design reference architectures","Hardware and firmware security standards","Testing requirements","Acceptance criteria","Engineering workflows","C","C++","Python","Rust","Hardware security testing tools"],"x-skills-preferred":["Defense","Aerospace","Robotics","Autonomy","Maritime","High-assurance environments","Autonomous systems","Unmanned vehicles","Safety-critical embedded platforms","RTOS","Microcontroller security","Resource-constrained device environments","NMEA protocols","Maritime communication systems","RF/GPS/GNSS security","ICS security standards","Defense or safety-critical compliance frameworks","OSEE","GXPN","GSE","Hardware-focused credentials"],"datePosted":"2026-04-17T12:57:49.070Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Hardware security, Embedded systems security, Firmware security, Fault injection, Side-channel analysis, Interface evaluation, Bus protocol analysis, Physical security assessments, Secure boot chains, Hardware root of trust, Firmware integrity, Embedded system hardening, Third-party hardware integrations, Supply chain security risks, Provenance validation, Anti-tamper, Attestation controls, Hardware security testing, Tooling, Methodology, Repeatable test procedures, Device identity, Key storage, Measured boot, Remote attestation, Signed updates, Rollback protection, Verified delivery, Cryptographic key lifecycle, Provisioning, Rotation, Revocation, Escrow, Embedded Linux systems, Kernel configuration, Mandatory access controls, Secure IPC, Attack surface reduction, Operational technology protocols, Industrial protocols, Control system security, CAN bus, NMEA, Maritime/industrial communication protocols, Security boundaries, Trust zones, Segmentation strategies, Threat modeling, Actionable engineering requirements, Secure-by-design reference architectures, Hardware and firmware security standards, Testing requirements, Acceptance criteria, Engineering workflows, C, C++, Python, Rust, Hardware security testing tools, Defense, Aerospace, Robotics, Autonomy, Maritime, High-assurance environments, Autonomous systems, Unmanned vehicles, Safety-critical embedded platforms, RTOS, Microcontroller security, Resource-constrained device environments, NMEA protocols, Maritime communication systems, RF/GPS/GNSS security, ICS security standards, Defense or safety-critical compliance frameworks, OSEE, GXPN, GSE, Hardware-focused credentials"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3469e687-cba"},"title":"Offensive Security Engineer, Agent Security","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Offensive Security Engineer, Agent Security</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco; New York City; Remote - US; Seattle; Washington, DC</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>San Francisco, Seattle, New York$347K – $490K • Offers Equity</li>\n<li>Zone A$312.3K – $490K • Offers Equity</li>\n<li>Zone B$277.6K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI’s technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.</p>\n<p><strong>About the Role</strong></p>\n<p>We&#39;re seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI&#39;s security posture. This role isn&#39;t your typical red team job - it&#39;s an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization.</p>\n<p>You&#39;ll have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy.</p>\n<p>This role will be primarily focused on continuously testing our agent powered products like codex and operator. These systems are uniquely valuable targets because they’re rapidly evolving, have access to perform sensitive actions on behalf of users, and have large, diverse attack surfaces. You will play a crucial role in securing our agents by hunting for realistic vulnerabilities that emerge from the interactions between the applications, infrastructure, and models that power them.</p>\n<p><strong>In this role you will:</strong></p>\n<ul>\n<li>Continuously hunt for vulnerabilities in the interactions between the applications, infrastructure, and models that power our agentic products.</li>\n</ul>\n<ul>\n<li>Conduct open-scope red and purple team operations, simulating realistic attack scenarios.</li>\n</ul>\n<ul>\n<li>Collaborate proactively with defensive security teams to enhance detection, response, and mitigation capabilities.</li>\n</ul>\n<ul>\n<li>Perform comprehensive penetration testing on our diverse suite of products.</li>\n</ul>\n<ul>\n<li>Leverage advanced automation and OpenAI technologies to optimize your offensive security work.</li>\n</ul>\n<ul>\n<li>Present insightful, actionable findings clearly and compellingly to inspire impactful change.</li>\n</ul>\n<ul>\n<li>Influence security strategy by providing attacker-driven insights into risk and threat modeling.</li>\n</ul>\n<p><strong>You might thrive in this role if you have:</strong></p>\n<ul>\n<li>7+ years of hands-on red team experience or exceptional accomplishments demonstrating equivalent expertise.</li>\n</ul>\n<ul>\n<li>Deep expertise conducting offensive security operations within modern technology companies.</li>\n</ul>\n<ul>\n<li>Experience designing, developing, or testing assessing the security of AI-powered systems.</li>\n</ul>\n<ul>\n<li>Experience working finding, exploiting and mitigating common vulnerabilities in AI systems like prompt injection, leaking sensitive data, confused deputies, and dynamically generated UI components.</li>\n</ul>\n<ul>\n<li>Exceptional skill in code review, identifying novel and subtle vulnerabilities.</li>\n</ul>\n<ul>\n<li>Proven experience performing offensive security assessments in at least one hyperscaler cloud environment (Azure preferred).</li>\n</ul>\n<ul>\n<li>Demonstrated mastery assessing complex technology stacks, including:</li>\n</ul>\n<ul>\n<li>Highly customized Kubernetes clusters</li>\n</ul>\n<ul>\n<li>Container environments</li>\n</ul>\n<ul>\n<li>CI/CD pipelines</li>\n</ul>\n<ul>\n<li>GitHub security</li>\n</ul>\n<ul>\n<li>macOS and Linux operating systems</li>\n</ul>\n<ul>\n<li>Data science tooling and environments</li>\n</ul>\n<ul>\n<li>Python-based web services</li>\n</ul>\n<ul>\n<li>React-based frontend applications</li>\n<li>Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts.</li>\n</ul>\n<ul>\n<li>Excellent coding skills, capable of writing robust tools and automation for offensive operations.</li>\n</ul>\n<ul>\n<li>Ability to communicate complex technical concepts to both technical and non-technical stakeholders.</li>\n</ul>\n<p><strong>Experience Level</strong></p>\n<p>Senior</p>\n<p><strong>Employment Type</strong></p>\n<p>Full-time</p>\n<p><strong>Workplace Type</strong></p>\n<p>Remote</p>\n<p><strong>Category</strong></p>\n<p>Engineering</p>\n<p><strong>Industry</strong></p>\n<p>Technology</p>\n<p><strong>Salary Range</strong></p>\n<p>$347K – $490K • Offers Equity</p>\n<p><strong>Required Skills</strong></p>\n<ul>\n<li>Red team experience</li>\n<li>Offensive security operations</li>\n<li>AI-powered systems security</li>\n<li>Vulnerability assessment</li>\n<li>Penetration testing</li>\n<li>Automation</li>\n<li>Code review</li>\n<li>Cloud security</li>\n<li>Kubernetes</li>\n<li>Container security</li>\n<li>CI/CD pipelines</li>\n<li>GitHub security</li>\n<li>macOS and Linux operating systems</li>\n<li>Data science tooling and environments</li>\n<li>Python-based web services</li>\n<li>React-based frontend applications</li>\n</ul>\n<p><strong>Preferred Skills</strong></p>\n<ul>\n<li>Azure cloud security</li>\n<li>Highly customized Kubernetes clusters</li>\n<li>Container environments</li>\n<li>CI/CD pipelines</li>\n<li>GitHub security</li>\n<li>macOS and Linux operating systems</li>\n<li>Data science tooling and environments</li>\n<li>Python-based web services</li>\n<li>React-based frontend applications</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3469e687-cba","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/bb97fffc-cdda-43a3-a6bc-234f9c031720","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$347K – $490K • Offers Equity","x-skills-required":["red team experience","offensive security operations","AI-powered systems security","vulnerability assessment","penetration testing","automation","code review","cloud security","kubernetes","container security","ci/cd pipelines","github security","macos and linux operating systems","data science tooling and environments","python-based web services","react-based frontend applications"],"x-skills-preferred":["azure cloud security","highly customized kubernetes clusters","container environments","ci/cd pipelines","github security","macos and linux operating systems","data science tooling and environments","python-based web services","react-based frontend applications"],"datePosted":"2026-03-06T18:27:44.474Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco; New York City; Remote - US; Seattle; Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"engineering","industry":"technology","skills":"red team experience, offensive security operations, AI-powered systems security, vulnerability assessment, penetration testing, automation, code review, cloud security, kubernetes, container security, ci/cd pipelines, github security, macos and linux operating systems, data science tooling and environments, python-based web services, react-based frontend applications, azure cloud security, highly customized kubernetes clusters, container environments, ci/cd pipelines, github security, macos and linux operating systems, data science tooling and environments, python-based web services, react-based frontend applications","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":347000,"maxValue":490000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_651a81aa-1bc"},"title":"Software Engineer Systems Research Internship","description":"<p><strong>Software Engineer Systems Research Internship, Applied Emerging Talent (Summer 2026)</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Intern</p>\n<p><strong>Location Type</strong></p>\n<p>On-site</p>\n<p><strong>Department</strong></p>\n<p>Applied AI</p>\n<p><strong>Deadline to Apply</strong></p>\n<p>March 11, 2026 at 3:00 AM EDT</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$67 per hour</li>\n</ul>\n<p><strong>About the Team</strong></p>\n<p>The Applied team works across research, engineering, product, and design to bring OpenAI’s technology to the world. We seek to learn from deployment and broadly distribute the benefits of AI, while ensuring that this powerful tool is used responsibly and safely. We aim to make our innovative tools globally accessible, transcending geographic, economic, or platform barriers. Our commitment is to facilitate the use of AI to enhance lives, fostered by rigorous insights into how people use our products.</p>\n<p><strong>About the Role</strong></p>\n<p>A systems research internship is for people who love the real-world intersection of systems-engineering and research: you’ll investigate a hard systems problem, build something meaningful, and measure it carefully. The goal is practical impact—making Applied Systems better: more efficient, more scalable, and more reliable.</p>\n<p>OpenAI is currently recruiting for candidates interested in a 13-week, paid, in-person internship based in our San Francisco office during Summer 2026. In some cases, it may be extended for an additional 13 weeks (for a total of up to 26 weeks), based on team needs, candidate interest, and performance.</p>\n<p><strong>In this role, you will typically focus on improving real systems in areas like:</strong></p>\n<ul>\n<li>Distributed systems &amp; storage (throughput, latency, consistency, durability)</li>\n</ul>\n<ul>\n<li>Compute &amp; scheduling (GPU/accelerator utilization, job orchestration, queuing)</li>\n</ul>\n<ul>\n<li>Performance engineering (profiling, bottlenecks, scalability, capacity planning)</li>\n</ul>\n<ul>\n<li>Reliability &amp; observability (fault tolerance, monitoring, incident learning)</li>\n</ul>\n<ul>\n<li>Networking &amp; data pipelines (data movement, caching, streaming efficiency)</li>\n</ul>\n<ul>\n<li>Systems for ML (training/inference performance, evaluation infrastructure, tooling)</li>\n</ul>\n<p>Most projects involve some of these steps:</p>\n<ul>\n<li>Defining a clear hypothesis (“we think X will reduce latency by Y under Z”)</li>\n</ul>\n<ul>\n<li>Instrumenting existing production systems, gathering metrics and detailed analysis to validate the hypothesis</li>\n</ul>\n<ul>\n<li>Building or modifying a real system (prototype or production-quality improvements when appropriate)</li>\n</ul>\n<ul>\n<li>Running experiments/benchmarks and analyzing results</li>\n</ul>\n<ul>\n<li>Communicating tradeoffs and recommendations clearly</li>\n</ul>\n<ul>\n<li>Publishing the research work in technical journals and conferences</li>\n</ul>\n<p><strong>Your background looks something like:</strong></p>\n<ul>\n<li>Currently pursuing a PhD in Computer Science, Computer Engineering, or relevant technical field</li>\n</ul>\n<ul>\n<li>Proficiency with Coding in c++, Java, python, rust, etc</li>\n</ul>\n<ul>\n<li>Doing ongoing research on systems topics such as DL/ML, information retrieval, systems security and cryptography, databases, networking, distributed systems, and compilers, etc</li>\n</ul>\n<ul>\n<li>Ability to move fast in an environment where things are sometimes loosely defined and may have competing priorities or deadlines</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_651a81aa-1bc","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/13a9e4e4-505b-4545-8b2b-b0bcc09c2b4f","x-work-arrangement":"onsite","x-experience-level":"entry","x-job-type":"internship","x-salary-range":"$67 per hour","x-skills-required":["c++","Java","python","rust","distributed systems","storage","compute","scheduling","performance engineering","reliability","observability","networking","data pipelines","systems for ML"],"x-skills-preferred":["DL/ML","information retrieval","systems security and cryptography","databases","networking","distributed systems","compilers"],"datePosted":"2026-03-06T18:22:48.817Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"INTERN","occupationalCategory":"Engineering","industry":"Technology","skills":"c++, Java, python, rust, distributed systems, storage, compute, scheduling, performance engineering, reliability, observability, networking, data pipelines, systems for ML, DL/ML, information retrieval, systems security and cryptography, databases, networking, distributed systems, compilers"}]}