{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/threat-detection"},"x-facet":{"type":"skill","slug":"threat-detection","display":"Threat Detection","count":20},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_5c943be1-a6f"},"title":"Threat Detection Engineer","description":"<p>We are seeking an experienced Threat Detection Engineer to join our team. As a Threat Detection Engineer, you will be responsible for driving our best-in-class posture through threat hunting, detection engineering, and playbook creation. You will also lead information security response activities and work closely with business and technology teams to deliver positive outcomes.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Leveraging multiple data sources to identify modern evolving threats and developing new detection and response approaches</li>\n<li>Creating and operating high-fidelity detections mechanisms that drive efficient, effective, and repeatable response</li>\n<li>Owning, operating, and automating detection and response workflows to enable the team to focus on strategic objectives</li>\n<li>Leading information security response activities for the firm</li>\n<li>Working across business and technology teams to deliver positive outcomes across the firm</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>A bachelor&#39;s or master&#39;s degree in computer science or cyber security with a strong IT background or equivalent demonstrable experience</li>\n<li>3 years&#39; experience working in a security engineering role, with financial industry experience preferred</li>\n<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>\n<li>Possession of security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>\n<li>Experience with modern security tooling across security domains; network, endpoint, data, identity, and cloud</li>\n<li>Experience in standard enterprise technology stack, including Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>\n<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>\n<li>Required scripting, development, and automation skills using PowerShell or Python and proficient development tools</li>\n<li>Experience in OSINT, threat hunting, and analysing malicious emails</li>\n<li>Ability to prioritise in a fast-moving, high-pressure, constantly changing environment</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_5c943be1-a6f","directApply":true,"hiringOrganization":{"@type":"Organization","name":"IT Infrastructure","sameAs":"https://mlp.eightfold.ai","logo":"https://logos.yubhub.co/mlp.eightfold.ai.png"},"x-apply-url":"https://mlp.eightfold.ai/careers/job/755955470563","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["threat detection","security engineering","cyber security","KQL","SQL","SPL","security certifications","modern security tooling","standard enterprise technology stack","scripting","development","automation","OSINT","threat hunting"],"x-skills-preferred":[],"datePosted":"2026-04-18T22:14:24.700Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, United Kingdom"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Finance","skills":"threat detection, security engineering, cyber security, KQL, SQL, SPL, security certifications, modern security tooling, standard enterprise technology stack, scripting, development, automation, OSINT, threat hunting"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c7fac07c-226"},"title":"Engineering Manager, Detection and Response","description":"<p>We are seeking a Detection and Response Engineering Manager to lead our Detection and Response teams in creating comprehensive Security Observability, Detection Lifecycle, and Security Incident Response programs for Anthropic.</p>\n<p>As a Detection and Response Engineering Manager, you will collaborate closely with teams and leaders across Anthropic, focusing on the observability, detection, investigation, incident response, and intelligence portions of the security lifecycle. You will also navigate prioritization in a fast-paced frontier environment, balancing operational demands with building innovative, scalable solutions for the future.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Managing and growing a high-performing D&amp;R team, planning strategy and hiring to support Anthropic&#39;s rapid growth and unique AI safety requirements</li>\n</ul>\n<ul>\n<li>Collaborating across security engineering teams to build comprehensive prevention, observability, detection, and response capabilities throughout the security lifecycle</li>\n</ul>\n<ul>\n<li>Facilitating development of scalable, AI-leveraged D&amp;R solutions that enable self-service observability and detection capabilities across Anthropic</li>\n</ul>\n<ul>\n<li>Building partnerships with product, infrastructure, and research teams to instill security monitoring best practices</li>\n</ul>\n<ul>\n<li>Owning and continuously improving Security Incident Response, Data Management, and Detection Engineering policies and playbooks</li>\n</ul>\n<ul>\n<li>Operating our threat intelligence program and maintaining relationships with external security partners and information sharing communities</li>\n</ul>\n<ul>\n<li>Continuously driving capability maturity across the detection lifecycle, establishing metrics and KPIs to measure effectiveness</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>10+ years building detection and response capabilities in a cloud-native organization</li>\n</ul>\n<ul>\n<li>5+ years of engineering management experience with a proven track record of building and scaling security teams</li>\n</ul>\n<ul>\n<li>Deep understanding of security monitoring, threat detection, incident response, and forensics best practices</li>\n</ul>\n<ul>\n<li>Experienced in securing complex cloud environments (Kubernetes, AWS/GCP) with modern detection technologies</li>\n</ul>\n<ul>\n<li>Knowledgeable in AI/ML security risks, detection patterns, and response strategies</li>\n</ul>\n<ul>\n<li>Strong verbal and written communication skills with the ability to distill complex security topics</li>\n</ul>\n<ul>\n<li>Skilled at collaborating cross-functionally and effectively balancing security requirements with business objectives</li>\n</ul>\n<ul>\n<li>Able to drive high-impact work while incorporating feedback and adapting to changing priorities</li>\n</ul>\n<ul>\n<li>Passionate about building diverse, high-performing teams and growing engineers in a fast-paced environment</li>\n</ul>\n<ul>\n<li>Low ego, high empathy, and have a track record as a talent magnet who attracts and retains top security talent</li>\n</ul>\n<p>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c7fac07c-226","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5068296008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cloud-native organization","security monitoring","threat detection","incident response","forensics best practices","modern detection technologies","AI/ML security risks","detection patterns","response strategies"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:55:45.412Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich, CH"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cloud-native organization, security monitoring, threat detection, incident response, forensics best practices, modern detection technologies, AI/ML security risks, detection patterns, response strategies"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_536aa8eb-f7c"},"title":"Technical Influence Operations Threat Investigator","description":"<p>We are looking for a Technical Influence Operations Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for influence operations, disinformation campaigns, coordinated inauthentic behavior, and other forms of information manipulation.</p>\n<p>You will work at the intersection of AI safety and information integrity, combining deep expertise in influence operations with technical investigation skills to identify threat actors who leverage AI to generate synthetic content, amplify narratives, manipulate public discourse, or undermine democratic processes. Your work will directly shape how Anthropic defends against one of the most rapidly evolving categories of AI misuse.</p>\n<p>Important context: In this position you may be exposed to explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature. This role may require responding to escalations during weekends and holidays.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for influence operations, including AI-generated disinformation, coordinated inauthentic behavior, astroturfing, and narrative manipulation campaigns</li>\n</ul>\n<ul>\n<li>Conduct technical investigations using SQL, Python, and other tools to analyze large datasets, trace user behavior patterns, and uncover coordinated networks of threat actors conducting influence operations</li>\n</ul>\n<ul>\n<li>Develop influence operation-specific detection capabilities, including abuse signals, behavioral clustering techniques, and detection methodologies tailored to AI-enabled information manipulation</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on influence operation TTPs, emerging narrative threats, and threat actor campaigns leveraging AI systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis linking on-platform activity to broader influence campaigns across social media, messaging platforms, and other digital ecosystems</li>\n</ul>\n<ul>\n<li>Monitor and analyze state-sponsored and non-state influence operations that may leverage AI capabilities, with particular focus on operations originating from or targeting geopolitically significant regions</li>\n</ul>\n<ul>\n<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>\n</ul>\n<ul>\n<li>Engage with external stakeholders including government agencies, platform integrity teams, academic researchers, and threat intelligence sharing communities</li>\n</ul>\n<ul>\n<li>Forecast how advances in AI technology,including improved content generation, voice synthesis, and multimodal capabilities,will reshape the influence operations landscape and inform safety-by-design strategies</li>\n</ul>\n<p>You may be a good fit if you:</p>\n<ul>\n<li>Have deep subject matter expertise in influence operations, coordinated inauthentic behavior, disinformation, or information warfare</li>\n</ul>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations</li>\n</ul>\n<ul>\n<li>Have hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations</li>\n</ul>\n<ul>\n<li>Have experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems</li>\n</ul>\n<ul>\n<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>\n</ul>\n<ul>\n<li>Can present analytical work to both technical and non-technical audiences, including government stakeholders and senior leadership</li>\n</ul>\n<p>Strong candidates may also have:</p>\n<ul>\n<li>Experience at a major technology platform working on influence operations, platform integrity, or content authenticity</li>\n</ul>\n<ul>\n<li>Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts</li>\n</ul>\n<ul>\n<li>Experience investigating operations linked to Chinese, Russian, Iranian, or other state-sponsored information campaigns</li>\n</ul>\n<ul>\n<li>Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions</li>\n</ul>\n<ul>\n<li>Familiarity with social network analysis techniques and tools for mapping coordinated behavior</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p>The annual compensation range for this role is $230,000-$290,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_536aa8eb-f7c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5140239008","x-work-arrangement":"remote-hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000-$290,000 USD","x-skills-required":["Deep subject matter expertise in influence operations, coordinated inauthentic behavior, disinformation, or information warfare","Proficiency in SQL and Python for data analysis and threat detection","Experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations","Hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations","Experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems"],"x-skills-preferred":["Experience at a major technology platform working on influence operations, platform integrity, or content authenticity","Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts","Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions","Familiarity with social network analysis techniques and tools for mapping coordinated behavior","Background in AI safety, machine learning security, or technology abuse investigation"],"datePosted":"2026-04-18T15:54:54.163Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly, United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Deep subject matter expertise in influence operations, coordinated inauthentic behavior, disinformation, or information warfare, Proficiency in SQL and Python for data analysis and threat detection, Experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations, Hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations, Experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems, Experience at a major technology platform working on influence operations, platform integrity, or content authenticity, Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts, Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions, Familiarity with social network analysis techniques and tools for mapping coordinated behavior, Background in AI safety, machine learning security, or technology abuse investigation","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a922c6ae-3c1"},"title":"Technical CBRN-E  Threat Investigator","description":"<p>We are looking for a Technical CBRN-E Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for Chemical, Biological, Radiological, Nuclear, and Explosives (CBRN-E) threats.</p>\n<p>You will work at the intersection of AI safety and CBRN security, conducting thorough investigations into potential misuse cases, developing novel detection techniques, and building robust defenses against threat actors who may attempt to leverage our AI technology for developing weapons, synthesizing dangerous compounds, or creating biological harm.</p>\n<p>Important context: In this position you may be exposed to explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature. This role may require responding to escalations during weekends and holidays.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for developing, enhancing, or disseminating CBRN-E weapons, pathogens, toxins, or other threats to harm people, critical infrastructure, or the environment</li>\n</ul>\n<ul>\n<li>Conduct technical investigations using SQL, Python, and other tools to analyze large datasets, trace user behavior patterns, and uncover sophisticated CBRN-E threat actors</li>\n</ul>\n<ul>\n<li>Develop CBRN-E-specific detection capabilities, including abuse signals, tracking strategies, and detection methodologies tailored to dual-use research concerns</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on CBRN-E attack vectors, vulnerabilities, and threat actor TTPs leveraging AI systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis grounded in real threat actor behavior, open-source research, and publicly reported programs</li>\n</ul>\n<ul>\n<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>\n</ul>\n<ul>\n<li>Engage with external stakeholders including government agencies, regulatory bodies, scientific organizations, and biosecurity/chemical security research communities</li>\n</ul>\n<ul>\n<li>Inform safety-by-design strategies by forecasting how threat actors may leverage advances in AI technology for CBRN-E purposes</li>\n</ul>\n<p>You may be a good fit if you</p>\n<ul>\n<li>Have deep domain expertise in biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, or related CBRN-E threat domains</li>\n</ul>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience with threat actor profiling and utilizing threat intelligence frameworks</li>\n</ul>\n<ul>\n<li>Have hands-on experience with large language models and understanding of how AI technology could be misused for CBRN-E threats</li>\n</ul>\n<ul>\n<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>\n</ul>\n<ul>\n<li>Can present analytical work to both technical and non-technical audiences, including government stakeholders and senior leadership</li>\n</ul>\n<p>Strong candidates may also have</p>\n<ul>\n<li>Advanced degree (MS or PhD) in biological sciences, chemistry, biodefense, biosecurity, or related field</li>\n</ul>\n<ul>\n<li>Real-world experience countering weapons of mass destruction or other high-risk asymmetric threats</li>\n</ul>\n<ul>\n<li>Experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Familiarity with synthetic biology, biotechnology, or dual-use research</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p>The annual compensation range for this role is $230,000-$290,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a922c6ae-3c1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066997008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000-$290,000 USD","x-skills-required":["SQL","Python","biosecurity","chemical defense","biological weapons non-proliferation","dual-use research of concern (DURC)","synthetic biology","threat actor profiling","threat intelligence frameworks","large language models","AI technology misuse"],"x-skills-preferred":["advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field","real-world experience countering weapons of mass destruction or other high-risk asymmetric threats","experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information","background in AI safety, machine learning security, or technology abuse investigation","familiarity with synthetic biology, biotechnology, or dual-use research","experience building and scaling threat detection systems or abuse monitoring programs","active Top Secret security clearance"],"datePosted":"2026-04-18T15:53:57.472Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, threat actor profiling, threat intelligence frameworks, large language models, AI technology misuse, advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field, real-world experience countering weapons of mass destruction or other high-risk asymmetric threats, experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information, background in AI safety, machine learning security, or technology abuse investigation, familiarity with synthetic biology, biotechnology, or dual-use research, experience building and scaling threat detection systems or abuse monitoring programs, active Top Secret security clearance","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_6c1cd36d-464"},"title":"Senior Security Operations Engineer, Detection & Response","description":"<p>About Us</p>\n<p>dbt Labs is the pioneer of analytics engineering, helping data teams transform raw data into reliable, actionable insights. As of February 2025, we’ve grown from an open source project into the leading analytics engineering platform, now used by over 90,000 teams every week, driving data transformations and AI use cases.</p>\n<p>We’re backed by top-tier investors including Andreessen Horowitz, Sequoia Capital, and Altimeter. At our core, we believe in empowering data practitioners:</p>\n<ul>\n<li>Reliable, high-quality data is the fuel that propels AI-powered data engineering.</li>\n<li>AI is changing data work, fast. dbt’s data control plane keeps data engineers ahead of that curve.</li>\n<li>We empower engineers to deliver reliable, governed data faster, cheaper, and at scale.</li>\n</ul>\n<p>About the Security Team</p>\n<p>The mission of the Security Engineering team at dbt Labs is to provide clear, opinionated security guidance and scalable, secure-by-default offerings to engineers for the purpose of securing software development and enabling pragmatic risk decisions at dbt.</p>\n<p><strong>Responsibilities</strong></p>\n<p>As a Senior Security Operations Engineer on the Detection &amp; Response team, you will strengthen and maintain the company&#39;s security posture throughout the threat detection lifecycle from telemetry collection and continuous monitoring through threat detection, incident response, and security event management. You will serve as a subject matter expert for security operations across the dbt Labs&#39; teams and technology infrastructure, including multi-cloud production environments, identity, endpoints, and SaaS technologies.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Participate in a 24/7 on-call rotation providing coverage for active security incidents, investigations, and security events across our global infrastructure.</li>\n<li>Lead investigation and remediation of security incidents, coordinating cross-functional response efforts to minimize impact and recovery time.</li>\n<li>Play a major role in bootstrapping an end to end D&amp;R alert and investigation pipeline.</li>\n<li>Triage and investigate security alerts from detection tools including Wiz Defend, Crowdstrike, and cloud security platforms to identify genuine threats and reduce false positives.</li>\n<li>Develop and maintain detection rules, runbooks, and response procedures mapped to the company&#39;s threat model.</li>\n<li>Automate alert triage workflows and improve mean time to detection and response through tooling and process enhancements, including leveraging AI enrichment and processing.</li>\n<li>Collaborate with Infrastructure and Application Security teams to implement secure-by-design principles and remediate identified security issues.</li>\n<li>Conduct security event analysis to identify policy violations, misconfigurations, and potential attack vectors before they become incidents.</li>\n<li>Partner with our Enterprise Security &amp; Technology team to enhance endpoint security controls and monitoring across endpoints (MacOS laptops &amp; some Windows and Linux-based development environments).</li>\n<li>Design and facilitate tabletop exercises and game days to test detection, response, recovery, and remediation capabilities.</li>\n<li>Contribute to the maturation of the security incident response program through documentation, training, and process improvements.</li>\n<li>Mentor junior security engineers and cross-functional team members on incident handling best practices.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>Demonstrated ability to excel in high-pressure situations; we need someone who can make sound decisions during active security incidents and can calmly serve as incident commander with confidence.</li>\n</ul>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li>Have 8+ years of professional experience in security-related domains, including at least 4 years in security operations, incident response, threat hunting, or threat detection roles.</li>\n<li>Have demonstrable experience leading security incident investigations and coordinating cross-team response efforts.</li>\n</ul>\n<p><strong>What We Offer</strong></p>\n<ul>\n<li>Competitive compensation packages commensurate with experience, including salary, equity, and where applicable, performance-based pay.</li>\n<li>Opportunity to work with a leading analytics engineering platform and contribute to the growth and success of the company.</li>\n<li>Collaborative and dynamic work environment with a team of experienced professionals.</li>\n<li>Opportunities for professional growth and development.</li>\n</ul>\n<p><strong>How to Apply</strong></p>\n<p>If you are a motivated and experienced security professional looking for a new challenge, please submit your resume and cover letter to [insert contact information]. We look forward to hearing from you!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_6c1cd36d-464","directApply":true,"hiringOrganization":{"@type":"Organization","name":"dbt Labs","sameAs":"https://www.getdbt.com/","logo":"https://logos.yubhub.co/getdbt.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/dbtlabsinc/jobs/4674498005","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Security Operations","Incident Response","Threat Hunting","Threat Detection","Cloud Security","Endpoint Security","Security Event Analysis","Security Incident Response","Tabletop Exercises","Game Days","Documentation","Training","Process Improvements","Mentoring","Security Engineering","Data Control Plane","Analytics Engineering","AI-Powered Data Engineering","Reliable High-Quality Data","Secure-By-Default Offerings","Pragmatic Risk Decisions","Multi-Cloud Production Environments","Identity","Endpoints","SaaS Technologies","Wiz Defend","Crowdstrike","Cloud Security Platforms","Detection Rules","Runbooks","Response Procedures","Mean Time to Detection","Mean Time to Response","AI Enrichment","AI Processing","Secure-By-Design Principles","Infrastructure Security","Application Security","Endpoint Security Controls","Monitoring"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:52:43.496Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"US - Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security Operations, Incident Response, Threat Hunting, Threat Detection, Cloud Security, Endpoint Security, Security Event Analysis, Security Incident Response, Tabletop Exercises, Game Days, Documentation, Training, Process Improvements, Mentoring, Security Engineering, Data Control Plane, Analytics Engineering, AI-Powered Data Engineering, Reliable High-Quality Data, Secure-By-Default Offerings, Pragmatic Risk Decisions, Multi-Cloud Production Environments, Identity, Endpoints, SaaS Technologies, Wiz Defend, Crowdstrike, Cloud Security Platforms, Detection Rules, Runbooks, Response Procedures, Mean Time to Detection, Mean Time to Response, AI Enrichment, AI Processing, Secure-By-Design Principles, Infrastructure Security, Application Security, Endpoint Security Controls, Monitoring"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_8397e11e-7f9"},"title":"Sr. Technical Account Manager, Okta Strategic Customers","description":"<p>Secure Every Identity</p>\n<p>Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes.</p>\n<p>We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p>As a Senior Technical Account Manager, you will focus exclusively on Workforce Identity, serving as a trusted technical advisor and advocate for some of our largest customers. You will focus on strategic account alignment and broad deployment strategies to drive lasting success through elevated technical maturity.</p>\n<p>Key Workforce Identity Solutions You Will Support: The Okta Platform secures employees, contractors, and partners across every part of the Identity lifecycle, including governance, access, and privileged controls. Products include:</p>\n<ul>\n<li>Identity &amp; Access Management (IAM): Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, and Universal Directory.</li>\n<li>Identity Governance &amp; Administration (IGA): Lifecycle Management and Identity Governance.</li>\n<li>Privileged Access Management (PAM): Privileged Access.</li>\n<li>Identity Threat Detection &amp; Response (ITDR): Identity Security Posture Management and Identity Threat Protection.</li>\n</ul>\n<p>What You&#39;ll Be Doing</p>\n<p>Strategic Customer Partnership &amp; Influence:</p>\n<ul>\n<li>Build deep, long-lasting relationships with customers as their go-to technical advisor.</li>\n<li>Earn Okta trusted advisor status with customer identity owners and technical leadership, known as the primary point of contact for technical leaders.</li>\n<li>Possess and masterfully apply comprehensive technical expertise to solve complex problems, design sophisticated solutions, and influence customer strategies.</li>\n<li>Collaborate with customers to design identity strategies aligned with their business objectives.</li>\n<li>Leverage tailored technical plans for success with a portfolio of customers of increasing size and complexity.</li>\n<li>Help find ways to build upon and expand customers&#39; adoption of the Okta footprint through additional use cases and increasing security posture.</li>\n<li>Use knowledge of how Okta&#39;s product differentiators lead to positive outcomes for customers, securing the Okta footprint against competitive displacement.</li>\n</ul>\n<p>Complex Problem Resolution &amp; Advocacy:</p>\n<ul>\n<li>Demonstrate advanced problem-solving skills, capable of dissecting complex, multi-faceted problems and orchestrating effective solutions.</li>\n<li>Proactively identify risks and create mitigation plans, establishing actions, ownership, and driving resolutions.</li>\n<li>Able to handle most customer technical escalations independently, or collaboratively with the Customer Success Manager (CSM).</li>\n<li>Manage competing priorities with little impact on delivery, ensuring follow through on all activity.</li>\n<li>Demonstrate a strong ability to represent and advocate for the customer with cross-functional teams (including engineering and support), while supporting policies and decisions that are in the best interests of the company.</li>\n<li>Facilitate difficult discussions with senior stakeholders.</li>\n</ul>\n<p>Thought Leadership &amp; Team Enablement:</p>\n<ul>\n<li>Serve as a thought leader, providing best practices, workshops, and training.</li>\n<li>Generate specific vertical/use case insights and thought leadership, demonstrating an advanced level of Okta platform and identity domain knowledge, with a focus on enhancing customers&#39; security posture.</li>\n<li>Generate higher value for customers and deeper TAM engagement through repeatable asset and strategy creation for the team.</li>\n<li>Mentor peers and colleagues, upskilling capability with a focus on technical development.</li>\n<li>Contribute to the development of adoption and retention strategies, sharing knowledge of customer patterns, and leading execution.</li>\n<li>Lead project tasks or initiatives aimed at improvement of TAM processes and knowledge.</li>\n</ul>\n<p>What You&#39;ll Bring to the Role</p>\n<ul>\n<li>Requires 8+ years of related experience in a professional role, or equivalent experience (e.g., 6+ years with a Master’s degree).</li>\n<li>3+ years of experience as a Technical Account Manager (TAM) or a comparable role such as Technical Consultant, Product Management, or Solution Architect.</li>\n<li>3+ years in identity and access management, including SSO, MFA, lifecycle management, or security best practices.</li>\n<li>Education: BA/BS/MS in Computer Science, Information Technology or related discipline, or equivalent work experience required.</li>\n<li>Certifications: Okta Certified, CISSP, or equivalent.</li>\n<li>Technical Mastery (Workforce Identity Focus):</li>\n<li>Extensive proficiency utilizing Okta feature sets and platforms to portray a design, or architecture, that satisfies well-known customer use cases to a customer technical persona including architect.</li>\n<li>Able to modify existing quickstart or code samples to adapt them to the customer&#39;s requirements.</li>\n<li>Confident in assisting TAM peers on technical challenges, or on behalf of other TAMs customers.</li>\n<li>Solid understanding of one or more of the following key areas:</li>\n<li>Technologies and protocols to support identity federation and robust access control models (e.g., SAML 2.0, WS-Federation, OAuth, OpenID Connect).</li>\n<li>Experience dealing with legacy applications in a hybrid IT environment with non-standard applications (i.e., those that do not support modern identity federation protocols).</li>\n<li>SaaS deployment such as Salesforce, Box, Office 365, Workday, and HR as master for identities.</li>\n<li>Lifecycle management scenarios to 3rd party systems and applications (Workflows, HR-driven provisioning, MSFT integrations, SCIM, etc).</li>\n<li>Enterprise applications in the ecosystem to provide identity and attributes to applications or to harness an external application to help drive business processes (ITSM, HR, etc).</li>\n<li>Security and performance monitoring and 3rd party signals integrations (SEIM, MDM, WAF, etc).</li>\n<li>Awareness of augmentation of identity protocols and flows, capable of identifying augmentation that requires additional review.</li>\n<li>Communication and Leadership Skills:</li>\n<li>Excellent communication skills, capable of translating complex technical topics into actionable insights.</li>\n<li>Convey complex ideas in a compelling and easily understandable manner.</li>\n<li>Ability to set expectations and communicate goals and objectives with customers at various levels, up to CxO.</li>\n<li>Skilled in setting and enforcing appropriate boundaries with both internal and external stakeholders.</li>\n<li>Ability to track and influence customer behavior.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_8397e11e-7f9","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7776839","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Identity & Access Management (IAM)","Single Sign-On (SSO)","Adaptive MFA","Device Access","API Access Management","Secure Partner Access","Access Gateway","Universal Directory","Identity Governance & Administration (IGA)","Lifecycle Management","Identity Governance","Privileged Access Management (PAM)","Privileged Access","Identity Threat Detection & Response (ITDR)","Identity Security Posture Management","Identity Threat Protection","Technical Account Management (TAM)","Technical Consultant","Product Management","Solution Architect","Identity and Access Management","SSO","MFA","Security Best Practices","Okta Certified","CISSP","SAML 2.0","WS-Federation","OAuth","OpenID Connect","Legacy Applications","Hybrid IT Environment","Non-Standard Applications","SaaS Deployment","Salesforce","Box","Office 365","Workday","HR","Lifecycle Management Scenarios","Third Party Systems","Applications","Workflows","HR-Driven Provisioning","MSFT Integrations","SCIM","Enterprise Applications","Identity and Attributes","Business Processes","ITSM","Security and Performance Monitoring","Third Party Signals Integrations","SEIM","MDM","WAF","Augmentation of Identity Protocols","Communication and Leadership Skills"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:50:58.376Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Toronto, Ontario, Canada"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Identity & Access Management (IAM), Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, Universal Directory, Identity Governance & Administration (IGA), Lifecycle Management, Identity Governance, Privileged Access Management (PAM), Privileged Access, Identity Threat Detection & Response (ITDR), Identity Security Posture Management, Identity Threat Protection, Technical Account Management (TAM), Technical Consultant, Product Management, Solution Architect, Identity and Access Management, SSO, MFA, Security Best Practices, Okta Certified, CISSP, SAML 2.0, WS-Federation, OAuth, OpenID Connect, Legacy Applications, Hybrid IT Environment, Non-Standard Applications, SaaS Deployment, Salesforce, Box, Office 365, Workday, HR, Lifecycle Management Scenarios, Third Party Systems, Applications, Workflows, HR-Driven Provisioning, MSFT Integrations, SCIM, Enterprise Applications, Identity and Attributes, Business Processes, ITSM, Security and Performance Monitoring, Third Party Signals Integrations, SEIM, MDM, WAF, Augmentation of Identity Protocols, Communication and Leadership Skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ee84f5eb-f18"},"title":"Senior Solutions Specialist","description":"<p>As a Senior Solutions Specialist at Okta, you will be part of the presales team that delivers sales presentations and product demonstrations to educate customers on the best ways to implement Okta identity and access management solutions.</p>\n<p>You will report to the Senior Manager in the OFCTO organization.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Strategic Customer Engagement: Support strategic customer conversations aligning with technical and engineering leaders and stakeholders. Deliver on emerging trends, industry best practices, and identity-driven digital transformation. Assist in preparing executive-level messaging and participate in strategic discussions to align Okta&#39;s solutions with customer business outcomes.</li>\n</ul>\n<ul>\n<li>Technical Leadership: Provide strategic and technical guidance to Solutions Engineering teams across both the Okta and Auth0 identity platforms. Collaborate with the Global Office of Field CTO office team to deliver actionable insights from the field, validate customer needs, and identify recurring trends for the Okta Product &amp; Engineering teams.</li>\n</ul>\n<ul>\n<li>Field Enablement and Collaboration: Contribute to frameworks, tools, and content to support Solutions Engineering teams in executing effectively. Partner with sales leadership to identify and address critical business opportunities and challenges. Drive cross-functional collaboration to ensure seamless execution of global initiatives.</li>\n</ul>\n<ul>\n<li>Market Influence: Represent Okta as a thought leader in the identity and security space. Influence industry standards and participate in relevant technical advisory boards.</li>\n</ul>\n<ul>\n<li>Innovation and Strategy: Partner closely with OFCTO teams as an advocate for customer-driven innovation, market trends, and GTM insights to provide input to influence product teams. Support, derive, and champion strategic initiatives that enhance Okta&#39;s differentiation and business impact.</li>\n</ul>\n<p>Position Requirements:</p>\n<ul>\n<li>Identity &amp; Directory Services Mastery: Deep Infrastructure Knowledge: Expert-level understanding of Active Directory (AD) and Azure AD (Entra ID) or similar, including Group Policy Objects (GPOs), Kerberos, and OIDC/SAML protocols.</li>\n</ul>\n<ul>\n<li>Multi-IdP Ecosystems: Proficiency in managing and securing diverse Identity Providers (IdPs) like Okta, Ping Identity, and Google Workspace.</li>\n</ul>\n<ul>\n<li>Hybrid Identity: Experience managing the complexities of identity synchronization between on-premises environments and the cloud.</li>\n</ul>\n<ul>\n<li>Device Identity &amp; Access Management Mastery: Passwordless Expertise: Deep, hands-on knowledge of FIDO2/WebAuthn, Passkeys, and implementing passwordless authentication strategies using solutions like Okta FastPass.</li>\n</ul>\n<ul>\n<li>Endpoint &amp; Device Context: Strong understanding of Desktop MFA, device registration, and leveraging device posture signals from MDM/UEM (e.g., Jamf, Intune, Workspace ONE) and EDR (e.g., CrowdStrike) platforms to enforce risk-based access policies.</li>\n</ul>\n<ul>\n<li>PKI &amp; Certificate Management: Familiarity with certificate-based authentication and its role in establishing device trust.</li>\n</ul>\n<ul>\n<li>Identity Threat Detection &amp; Response (ITDR): Threat Landscape Knowledge: A thorough understanding of modern identity attack vectors, including phishing, token theft, MFA bypass techniques, and lateral movement.</li>\n</ul>\n<ul>\n<li>Behavioral Analysis: Experience with User and Entity Behavior Analytics (UEBA) and the ability to interpret threat signals to detect and respond to suspicious activity.</li>\n</ul>\n<ul>\n<li>Security Ecosystem Integration: Proficiency in designing solutions that integrate identity platforms with SIEM (e.g., Splunk, Sentinel) and SOAR tools for automated threat response.</li>\n</ul>\n<ul>\n<li>Strong communication and presentation skills, with experience contributing to technical events.</li>\n</ul>\n<p>Travel expectation: up to 40% for customer meetings, industry events, and internal off-sites.</p>\n<p>This is a remote position.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ee84f5eb-f18","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7769595","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$215,000-$323,000 USD (OTE range for candidates located in the San Francisco Bay area)","x-skills-required":["Active Directory (AD)","Azure AD (Entra ID)","Group Policy Objects (GPOs)","Kerberos","OIDC/SAML protocols","FIDO2/WebAuthn","Passkeys","Okta FastPass","Desktop MFA","Device registration","MDM/UEM (e.g., Jamf, Intune, Workspace ONE)","EDR (e.g., CrowdStrike)","Certificate-based authentication","PKI & Certificate Management","Identity Threat Detection & Response (ITDR)","User and Entity Behavior Analytics (UEBA)","SIEM (e.g., Splunk, Sentinel)","SOAR tools"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:50:06.588Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Chicago, Illinois; Los Angeles, California; New York, New York; San Francisco, California; Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Active Directory (AD), Azure AD (Entra ID), Group Policy Objects (GPOs), Kerberos, OIDC/SAML protocols, FIDO2/WebAuthn, Passkeys, Okta FastPass, Desktop MFA, Device registration, MDM/UEM (e.g., Jamf, Intune, Workspace ONE), EDR (e.g., CrowdStrike), Certificate-based authentication, PKI & Certificate Management, Identity Threat Detection & Response (ITDR), User and Entity Behavior Analytics (UEBA), SIEM (e.g., Splunk, Sentinel), SOAR tools","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":215000,"maxValue":323000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b5ce114e-dac"},"title":"Cloud Engineer – Factory Systems and Operational Technology","description":"<p>Anduril Industries is a defence technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology and business model of the 21st century&#39;s most innovative companies to the defence industry, Anduril is changing how military systems are designed, built and sold.</p>\n<p>The company&#39;s family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a real-time, 3D command and control centre.</p>\n<p>As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion and networking technology to the military in months, not years.</p>\n<p>We are seeking a mission-driven Cloud Infrastructure Engineer to take a leading role in designing and implementing world-class defensive controls. This is a high-impact role with the autonomy to shape security architecture and protect the technology that is changing the future of defence.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Design and Own Security Architecture: Architect, build and deploy robust, scalable security controls for our corporate, development and production cloud environments (AWS, Azure, GCP).</li>\n</ul>\n<ul>\n<li>Automate Everything: Develop and automate infrastructure-as-code (IaC) to manage and scale our cloud deployments securely and efficiently.</li>\n</ul>\n<ul>\n<li>Proactively Defend: Continuously monitor, identify and remediate security weaknesses and configuration drift across our entire cloud footprint.</li>\n</ul>\n<ul>\n<li>Be a Force Multiplier: Partner with infrastructure, application and product teams to embed security best practices into their workflows and secure environments holding mission-critical data.</li>\n</ul>\n<ul>\n<li>Enable Scale and Reliability: Engineer systems and processes that ensure our platforms are highly available, resilient and prepared for rapid growth.</li>\n</ul>\n<ul>\n<li>Serve as a Cloud Security Expert: Act as the go-to subject matter expert for teams across Anduril, providing guidance, mentorship and paved-road solutions for building securely in the cloud.</li>\n</ul>\n<p>Requirements:</p>\n<ul>\n<li>Proven experience building and securing complex cloud environments, typically gained through 3+ years in a Cloud Security, DevOps or SRE role.</li>\n</ul>\n<ul>\n<li>Deep proficiency in at least one major cloud provider (AWS, Azure or GCP).</li>\n</ul>\n<ul>\n<li>Strong hands-on experience with Infrastructure as Code (e.g., Terraform, CloudFormation, Bicep).</li>\n</ul>\n<ul>\n<li>Solid programming/scripting ability in one or more languages (e.g., Python, Go, Rust).</li>\n</ul>\n<ul>\n<li>Firm understanding of public cloud networking principles (e.g., VPCs, subnets, routing, security groups).</li>\n</ul>\n<ul>\n<li>Must be a U.S. Person and eligible to obtain and maintain a U.S. Top Secret security clearance.</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Experience hardening and monitoring Kubernetes clusters (EKS, GKE, AKS).</li>\n</ul>\n<ul>\n<li>Experience with cloud security posture management (CSPM) or threat detection tooling.</li>\n</ul>\n<ul>\n<li>Familiarity with CI/CD pipelines and securing the software supply chain.</li>\n</ul>\n<ul>\n<li>Knowledge of compliance frameworks such as FedRAMP, MRL, SOC 2 or CMMC.</li>\n</ul>\n<ul>\n<li>On-premises network engineering experience.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b5ce114e-dac","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anduril Industries","sameAs":"https://www.anduril.com/","logo":"https://logos.yubhub.co/anduril.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/andurilindustries/jobs/5087348007","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$129,000-$193,000 USD","x-skills-required":["Cloud Security","DevOps","SRE","Infrastructure as Code","Terraform","CloudFormation","Bicep","Python","Go","Rust","Public Cloud Networking","VPCs","Subnets","Routing","Security Groups"],"x-skills-preferred":["Kubernetes","Cloud Security Posture Management","Threat Detection Tooling","CI/CD Pipelines","Software Supply Chain Security","Compliance Frameworks","FedRAMP","MRL","SOC 2","CMMC","On-Premises Network Engineering"],"datePosted":"2026-04-18T15:49:59.253Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Costa Mesa, California, United States"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Cloud Security, DevOps, SRE, Infrastructure as Code, Terraform, CloudFormation, Bicep, Python, Go, Rust, Public Cloud Networking, VPCs, Subnets, Routing, Security Groups, Kubernetes, Cloud Security Posture Management, Threat Detection Tooling, CI/CD Pipelines, Software Supply Chain Security, Compliance Frameworks, FedRAMP, MRL, SOC 2, CMMC, On-Premises Network Engineering","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":129000,"maxValue":193000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_87f95105-71a"},"title":"Senior Technical Account Manager, Okta Strategic Customers","description":"<p>Secure Every Identity</p>\n<p>As a Senior Technical Account Manager, you will play a critical role in securing every identity, from AI to human identity. You will focus on strategic account alignment and broad deployment strategies to drive lasting success through elevated technical maturity.</p>\n<p>Key Workforce Identity Solutions You Will Support: The Okta Platform secures employees, contractors, and partners across every part of the Identity lifecycle, including governance, access, and privileged controls. Products include:</p>\n<ul>\n<li>Identity &amp; Access Management (IAM): Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, and Universal Directory.</li>\n<li>Identity Governance &amp; Administration (IGA): Lifecycle Management and Identity Governance.</li>\n<li>Privileged Access Management (PAM): Privileged Access.</li>\n<li>Identity Threat Detection &amp; Response (ITDR): Identity Security Posture Management and Identity Threat Protection.</li>\n</ul>\n<p>Strategic Customer Partnership &amp; Influence:</p>\n<ul>\n<li>Build deep, long-lasting relationships with customers as their go-to technical advisor.</li>\n<li>Earn Okta trusted advisor status with customer identity owners and technical leadership, known as the primary point of contact for technical leaders.</li>\n<li>Possess and masterfully apply comprehensive technical expertise to solve complex problems, design sophisticated solutions, and influence customer strategies.</li>\n<li>Collaborate with customers to design identity strategies aligned with their business objectives.</li>\n<li>Leverage tailored technical plans for success with a portfolio of customers of increasing size and complexity.</li>\n<li>Help find ways to build upon and expand customers&#39; adoption of the Okta footprint through additional use cases and increasing security posture.</li>\n<li>Use knowledge of how Okta&#39;s product differentiators lead to positive outcomes for customers, securing the Okta footprint against competitive displacement.</li>\n</ul>\n<p>Complex Problem Resolution &amp; Advocacy:</p>\n<ul>\n<li>Demonstrate advanced problem-solving skills, capable of dissecting complex, multi-faceted problems and orchestrating effective solutions.</li>\n<li>Proactively identify risks and create mitigation plans, establishing actions, ownership, and driving resolutions.</li>\n<li>Able to handle most customer technical escalations independently, or collaboratively with the Customer Success Manager (CSM).</li>\n<li>Manage competing priorities with little impact on delivery, ensuring follow through on all activity.</li>\n<li>Demonstrate a strong ability to represent and advocate for the customer with cross-functional teams (including engineering and support), while supporting policies and decisions that are in the best interests of the company.</li>\n<li>Facilitate difficult discussions with senior stakeholders.</li>\n</ul>\n<p>Thought Leadership &amp; Team Enablement:</p>\n<ul>\n<li>Serve as a thought leader, providing best practices, workshops, and training.</li>\n<li>Generate specific vertical/use case insights and thought leadership, demonstrating an advanced level of Okta platform and identity domain knowledge, with a focus on enhancing customers&#39; security posture.</li>\n<li>Generate higher value for customers and deeper TAM engagement through repeatable asset and strategy creation for the team.</li>\n<li>Mentor peers and colleagues, upskilling capability with a focus on technical development.</li>\n<li>Contribute to the development of adoption and retention strategies, sharing knowledge of customer patterns, and leading execution.</li>\n<li>Lead project tasks or initiatives aimed at improvement of TAM processes and knowledge.</li>\n</ul>\n<p>What You&#39;ll Bring to the Role</p>\n<ul>\n<li>Requires 8+ years of related experience in a professional role, or equivalent experience (e.g., 6+ years with a Master’s degree).</li>\n<li>3+ years of experience as a Technical Account Manager (TAM) or a comparable role such as Technical Consultant, Product Management, or Solution Architect.</li>\n<li>3+ years in identity and access management, including SSO, MFA, lifecycle management, or security best practices.</li>\n<li>Education: BA/BS/MS in Computer Science, Information Technology or related discipline, or equivalent work experience required.</li>\n<li>Certifications: Okta Certified, CISSP, or equivalent</li>\n</ul>\n<p>Technical Mastery (Workforce Identity Focus):</p>\n<ul>\n<li>Extensive proficiency utilizing Okta feature sets and platforms to portray a design, or architecture, that satisfies well-known customer use cases to a customer technical persona including architect.</li>\n<li>Able to modify existing quickstart or code samples to adapt them to the customer&#39;s requirements.</li>\n<li>Confident in assisting TAM peers on technical challenges, or on behalf of other TAMs customers.</li>\n<li>Solid understanding of one or more of the following key areas:</li>\n<li>Technologies and protocols to support identity federation and robust access control models (e.g., SAML 2.0, WS-Federation, OAuth, OpenID Connect).</li>\n<li>Experience dealing with legacy applications in a hybrid IT environment with non-standard applications (i.e., those that do not support modern identity federation protocols).</li>\n<li>SaaS deployment such as Salesforce, Box, Office 365, Workday, and HR as master for identities.</li>\n<li>Lifecycle management scenarios to 3rd party systems and applications (Workflows, HR-driven provisioning, MSFT integrations, SCIM, etc).</li>\n<li>Enterprise applications in the ecosystem to provide identity and attributes to applications or to harness an external application to help drive business processes (ITSM, HR, etc).</li>\n<li>Security and performance monitoring and 3rd party signals integrations (SEIM, MDM, WAF, etc).</li>\n<li>Awareness of augmentation of identity protocols and flows, capable of identifying augmentation that requires additional review.</li>\n</ul>\n<p>Communication and Leadership Skills:</p>\n<ul>\n<li>Excellent communication skills, capable of translating complex technical to</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_87f95105-71a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7331319","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Identity & Access Management (IAM)","Single Sign-On (SSO)","Adaptive MFA","Device Access","API Access Management","Secure Partner Access","Access Gateway","Universal Directory","Identity Governance & Administration (IGA)","Lifecycle Management","Identity Governance","Privileged Access Management (PAM)","Privileged Access","Identity Threat Detection & Response (ITDR)","Identity Security Posture Management","Identity Threat Protection","Technical Account Management (TAM)","Technical Consultant","Product Management","Solution Architect","Identity and Access Management","SSO","MFA","Security Best Practices","Okta Certified","CISSP","SAML 2.0","WS-Federation","OAuth","OpenID Connect","Legacy Applications","Hybrid IT Environment","Non-Standard Applications","SaaS Deployment","Salesforce","Box","Office 365","Workday","HR","Lifecycle Management Scenarios","Third Party Systems","Applications","Workflows","HR-Driven Provisioning","MSFT Integrations","SCIM","Enterprise Applications","Identity and Attributes","Business Processes","ITSM","Security and Performance Monitoring","Third Party Signals Integrations","SEIM","MDM","WAF","Augmentation of Identity Protocols","Flows"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:47:07.362Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Arizona; Bellevue, Washington; Colorado; Los Angeles, California; Nevada; Oregon; San Francisco, California; Seattle, Washington"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Identity & Access Management (IAM), Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, Universal Directory, Identity Governance & Administration (IGA), Lifecycle Management, Identity Governance, Privileged Access Management (PAM), Privileged Access, Identity Threat Detection & Response (ITDR), Identity Security Posture Management, Identity Threat Protection, Technical Account Management (TAM), Technical Consultant, Product Management, Solution Architect, Identity and Access Management, SSO, MFA, Security Best Practices, Okta Certified, CISSP, SAML 2.0, WS-Federation, OAuth, OpenID Connect, Legacy Applications, Hybrid IT Environment, Non-Standard Applications, SaaS Deployment, Salesforce, Box, Office 365, Workday, HR, Lifecycle Management Scenarios, Third Party Systems, Applications, Workflows, HR-Driven Provisioning, MSFT Integrations, SCIM, Enterprise Applications, Identity and Attributes, Business Processes, ITSM, Security and Performance Monitoring, Third Party Signals Integrations, SEIM, MDM, WAF, Augmentation of Identity Protocols, Flows"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_146ddf7d-edd"},"title":"Network Security Engineer","description":"<p><strong>About the Role</strong></p>\n<p>We are seeking a seasoned Senior Network Security Engineer to join our dynamic security team. The ideal candidate will possess deep expertise in network security technologies, focusing on switching and routing systems within cloud-native and AI-focused infrastructure.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Serve as a subject matter expert in network security, particularly firewalls, VPNs, IDS/IPS, routing protocols (e.g., BGP, OSPF), and switching technologies.</li>\n<li>Manage and update firewall configurations across our enterprise network to align with operational and security needs.</li>\n<li>Deploy new firewalls, switches, routers, and network security devices in response to evolving threats and demands.</li>\n<li>Develop and propose innovative network security solutions to address operational challenges in routing and switching environments.</li>\n<li>Enhance security processes through thorough documentation and change management.</li>\n<li>Act as the primary resolver for complex network security issues, including escalation support.</li>\n<li>Ensure network security systems, switches, and routers are up-to-date with patches, firmware, and maintenance.</li>\n<li>Monitor and respond to security events in cloud environments (e.g., AWS, GCP, Azure, Datacenter), with emphasis on network traffic analysis.</li>\n</ul>\n<p><strong>Basic Qualifications</strong></p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Cybersecurity, Information Systems, or a related field.</li>\n<li>4+ years of experience in network security engineering, with hands-on focus on switching and routing.</li>\n<li>Certifications like CISA, CRISC, CGEIT, Security+, CASP+, or similar preferred.</li>\n<li>Strong understanding of network security principles, protocols (e.g., TCP/IP, VLANs, ACLs), and best practices for secure routing and switching.</li>\n<li>Proficiency in at least one major cloud platform (AWS, GCP, or Azure) and its network security services (e.g., VPCs, Security Groups).</li>\n<li>Experience with network analysis tools such as Wireshark, tcpdump; and vendors including Cisco, Juniper, Palo Alto Networks.</li>\n<li>Familiarity with scripting languages (e.g., Python, Bash) for automation of network security tasks.</li>\n</ul>\n<p><strong>Preferred Skills and Experience</strong></p>\n<ul>\n<li>Relevant network-specific certifications (e.g., CCNP Security, CCIE Security, JNCIP-SEC, PCNSE).</li>\n<li>Experience in multi-cloud environments and Infrastructure as Code tools like Terraform for network provisioning.</li>\n<li>Knowledge of DevSecOps practices tailored to network security integration.</li>\n<li>Experience building custom tools or integrations for enhancing network security operations.</li>\n<li>Interest in leveraging AI for network threat detection and automation.</li>\n<li>Contributions to open-source projects in network security or related tools.</li>\n</ul>\n<p><strong>Compensation and Benefits</strong></p>\n<p>$180,000 - $440,000 USD</p>\n<p>Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short &amp; long-term disability insurance, life insurance, and various other discounts and perks.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_146ddf7d-edd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"xAI","sameAs":"https://www.xai.com","logo":"https://logos.yubhub.co/xai.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/xai/jobs/4800712007","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$180,000 - $440,000 USD","x-skills-required":["firewalls","VPNs","IDS/IPS","routing protocols","switching technologies","cloud platforms","network security services","network analysis tools","scripting languages"],"x-skills-preferred":["CCNP Security","CCIE Security","JNCIP-SEC","PCNSE","multi-cloud environments","Infrastructure as Code","DevSecOps","custom tools","AI for network threat detection"],"datePosted":"2026-04-18T15:46:53.978Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Palo Alto, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"firewalls, VPNs, IDS/IPS, routing protocols, switching technologies, cloud platforms, network security services, network analysis tools, scripting languages, CCNP Security, CCIE Security, JNCIP-SEC, PCNSE, multi-cloud environments, Infrastructure as Code, DevSecOps, custom tools, AI for network threat detection","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":180000,"maxValue":440000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_bdf949b3-c66"},"title":"Databricks Enterprise Lead Security Architect -   Principal IT Software Engineer","description":"<p>We are seeking a highly skilled Lead Security Architect to join our team within Databricks IT. As a Lead Security Architect, you will be responsible for designing and implementing a secure and scalable architecture to protect our corporate assets. You will focus on key areas of IT security, including Identity and Access Management, Zero Trust architecture, and endpoint security, while also working to secure critical business applications and sensitive data.</p>\n<p>Your expertise will be crucial in building proactive security strategies that align with our business goals and protect the company from an ever-evolving threat landscape. This position demands deep expertise in security principles and a comprehensive understanding of the entire infrastructure stack and IAM systems to design robust, future-ready security solutions.</p>\n<p>You will be instrumental in safeguarding our systems&#39; resilience and integrity against ever-evolving cyber threats. You will play a critical role in shaping our security strategy for modern platforms across AWS, Azure, GCP, network infrastructure, storage, and SaaS solutions, help establish a strong least privilege (PoLP) model, providing specialized IAM expertise, and securely supporting SaaS with sensitive information (NHI).</p>\n<p>You will also be a key contributor in building our internal strategy for secure AI development. Additionally, you will support the secure integration of SaaS platforms such as Google Workspace, collaboration tools, and GTM systems, maintaining alignment with enterprise security standards.</p>\n<p>Close collaboration with cross-functional teams is essential to embed security throughout the technology stack.</p>\n<p>The impact you will have:</p>\n<ul>\n<li>Design and implement secure, scalable reference architectures for the Databricks IT across Cloud Infra (Compute, DBs, Network, Storage), SaaS, Custom Built Applications, Data &amp; AI systems.</li>\n<li>Establish and enforce security controls for: Core Security Areas: - Databricks Workspace Management: Workspace isolation, Unity Catalog for data governance.</li>\n<li>Secure Networking: VPC configs, PrivateLink, IP Allow Lists.</li>\n<li>Identity and Access Management (IAM): SSO, SCIM user provisioning, RBAC via Un, Strong MFA best practices for enterprise identities and customers.</li>\n<li>Data Encryption: At rest and in transit, customer-managed keys for critical assets.</li>\n<li>Data Exfiltration Prevention: Admin console settings, VPC endpoint controls.</li>\n<li>Cluster Security: User isolation, compliance with enhanced security monitoring/Compliance Security Profiles (HIPAA, PCI-DSS, FedRAMP).</li>\n<li>Offensive Security: Test and challenge the effectiveness of the organization’s security defenses by mimicking the tactics, techniques, and procedures used by actual attackers.</li>\n<li>Specialized Security Functions: - Non-human Identity Management: Design and implement secure authentication and authorization for automated systems (service accounts, API keys, machine identities), focusing on automation and integration with existing identity management systems.</li>\n<li>IAM Best Practices: Develop and document comprehensive Identity and Access Management policies, including user provisioning, de-provisioning, access reviews, privileged access management, and multi-factor authentication, ensuring security and compliance.</li>\n<li>Data Loss Prevention (DLP): Implement DLP solutions to identify, monitor, and protect sensitive data across endpoints, networks, and cloud environments, preventing unauthorized access, use, or transmission.</li>\n<li>SaaS Proxy Design and Implementation: Design and implement cloud-based proxies for SaaS applications (SASE solutions) to provide secure access, enforce security policies, monitor user activity, and protect against threats.</li>\n<li>Cloud Infrastructure Best Practices: Establish and document best practices for VPC configurations, cloud networking, and infrastructure as code using Terraform, ensuring secure network segmentation, routing, firewalls, and VPNs for consistent, automated, and secure deployments.</li>\n<li>Least Privilege Access for Data Security: Design and implement data security controls based on the principle of least privilege, ensuring users and systems have only the minimum necessary access through fine-grained controls, data classification, and regular access reviews.</li>\n<li>Guide internal IT on Databricks’ security and compliance certifications (SOC 2, ISO 27001/27017/27018, HIPAA, PCI-DSS, FedRAMP), and support security reviews/audits.</li>\n<li>Support incident response, vulnerability management, threat modeling, and red teaming using audit logs, cluster policies, and enhanced monitoring.</li>\n<li>Stay current on industry trends and emerging threats in GenAI, AI Agentic flow, MCPs to enhance security posture.</li>\n<li>Advise executive leadership on security architecture, risks, and mitigation.</li>\n<li>Mentor security engineers and developers on secure design and best practices.</li>\n</ul>\n<p>What we look for:</p>\n<ul>\n<li>Bachelor’s degree in Computer Science, Information Security, Engineering, or a related field</li>\n<li>Master’s degree in Computer Science specifically in Information Security or a related discipline is strongly preferred</li>\n<li>Minimum 12 years in cybersecurity, with 5+ in security architecture or senior technical roles.</li>\n<li>Experience in FedRAMP High systems/ GovCloud preferred.</li>\n<li>Must have direct experience designing and securing enterprise platforms in complex multi-cloud environments, deep knowledge of enterprise architecture and security features (control plane/data plane separation, network infra, workspace hardening, network segmentation/ isolation), and hands-on experience automating security controls with Terraform and scripting.</li>\n<li>Proven expertise securing data analytics pipelines, SaaS integrations, and workload isolation in enterprise ecosystems.</li>\n<li>Experience with Enterprise Security Analysis Tools and monitoring/security policy optimization.</li>\n<li>Deep experience in threat modeling, design, PoC, and implementing large-scale enterprise solutions.</li>\n<li>Extensive hands-on experience in AWS cloud security, network security, with knowledge of Zero Trust, Data Protection, and Appsec.</li>\n<li>Strong understanding of enterprise IAM systems (Okta, SailPoint, VDI, Entra ID) and Data Protection.</li>\n<li>Expert experience with SIEM platforms, XDR, and cloud-native threat detection tools.</li>\n<li>Expert in web application security, OWASP, API security, and secure design and testing.</li>\n<li>Hands-on experience with security automation is required, with proficiency in AI-assisted development, Python, Cursor, Lambda, Terraform, or comparable scripting/IaC tools for operational efficiency.</li>\n<li>Industry certifications like CISSP, CCSP, CEH, AWS Certified Security – Specialty, AWS Certified Solutions Architect – Professional, or AWS Certified Advanced Networking – Specialty (or equivalent) are preferred.</li>\n<li>Ability to influence stakeholders and drive alignment.</li>\n<li>Strategic thinker with a passion for security innovation, continuous improvement, and building scalable defenses.</li>\n</ul>\n<p>Pay Range Transparency</p>\n<p>Databricks is committed to fair and equitable compensation practices. The pay range(s) for this role is listed below and represents the expected salary range for non-commissionable roles or on-target earnings for commissionable roles. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to job-related skills, depth of experience, relevant certifications and training, and specific work location. Based on the factors above, Databricks anticipates utilizing the full width of the range. The total compensation package for this position may also include eligibility for annual performance bonus, equity, and the benefits listed above.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_bdf949b3-c66","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Databricks","sameAs":"https://databricks.com","logo":"https://logos.yubhub.co/databricks.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/databricks/jobs/8207910002","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Security Architecture","Identity and Access Management","Zero Trust","Endpoint Security","Data Encryption","Data Exfiltration Prevention","Cluster Security","Offensive Security","Non-human Identity Management","IAM Best Practices","Data Loss Prevention","SaaS Proxy Design and Implementation","Cloud Infrastructure Best Practices","Least Privilege Access for Data Security","Guide internal IT on Databricks’ security and compliance certifications","Support incident response, vulnerability management, threat modeling, and red teaming","Stay current on industry trends and emerging threats in GenAI, AI Agentic flow, MCPs","Advise executive leadership on security architecture, risks, and mitigation","Mentor security engineers and developers on secure design and best practices"],"x-skills-preferred":["Terraform","Python","Cursor","Lambda","AWS cloud security","Network security","Data Protection","Appsec","SIEM platforms","XDR","cloud-native threat detection tools","Web application security","OWASP","API security","Secure design and testing","AI-assisted development","Security automation","Scripting/IaC tools","CISSP","CCSP","CEH","AWS Certified Security – Specialty","AWS Certified Solutions Architect – Professional","AWS Certified Advanced Networking – Specialty"],"datePosted":"2026-04-18T15:45:19.828Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Mountain View, California; San Francisco, California"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security Architecture, Identity and Access Management, Zero Trust, Endpoint Security, Data Encryption, Data Exfiltration Prevention, Cluster Security, Offensive Security, Non-human Identity Management, IAM Best Practices, Data Loss Prevention, SaaS Proxy Design and Implementation, Cloud Infrastructure Best Practices, Least Privilege Access for Data Security, Guide internal IT on Databricks’ security and compliance certifications, Support incident response, vulnerability management, threat modeling, and red teaming, Stay current on industry trends and emerging threats in GenAI, AI Agentic flow, MCPs, Advise executive leadership on security architecture, risks, and mitigation, Mentor security engineers and developers on secure design and best practices, Terraform, Python, Cursor, Lambda, AWS cloud security, Network security, Data Protection, Appsec, SIEM platforms, XDR, cloud-native threat detection tools, Web application security, OWASP, API security, Secure design and testing, AI-assisted development, Security automation, Scripting/IaC tools, CISSP, CCSP, CEH, AWS Certified Security – Specialty, AWS Certified Solutions Architect – Professional, AWS Certified Advanced Networking – Specialty"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_e88bd210-6a6"},"title":"Product Management Director, Okta Identity Threat Detection and Response Products","description":"<p>Secure Every Identity</p>\n<p>Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes.</p>\n<p>We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p><strong>Job Duties and Responsibilities:</strong></p>\n<p><strong>Roadmap and Vision</strong></p>\n<p>Define the product strategy and roadmap for Okta Identity Security functionality to ensure Okta&#39;s continued leadership in the security space.</p>\n<p>Evangelize your vision to engineering teams, the broader product organisation, and customers.</p>\n<p>Develop and execute a comprehensive roadmap, prioritising features that enhance both customer security posture and administrative ease of use.</p>\n<p>Analyse and leverage data to inform product and roadmap decisions, ensuring data-driven strategic choices.</p>\n<p><strong>Product Delivery and Execution</strong></p>\n<p>Ensure the timely and within-budget delivery of the Okta Identity Security product roadmap.</p>\n<p>Collaborate closely with architecture, engineering, and design to specify experiences that are platform-first and delight customers at scale.</p>\n<p>Work with scrum teams and Technical Program Managers (TPMs) to deliver features on time that address key security use cases.</p>\n<p>Rigorously prioritise across multiple product investment areas within the security domain.</p>\n<p>Partner with the data team to track product usage metrics, specifically tying them to improved security outcomes and business success.</p>\n<p><strong>Customer Engagement and Requirements Gathering</strong></p>\n<p>Work with engineering, other product managers, and customers to capture detailed security requirements and document user stories and use cases.</p>\n<p>Engage with customers to deeply understand their challenges related to identity-centric threats, access control, and network security.</p>\n<p>Ensure that beta customer feedback is incorporated into product iterations.</p>\n<p>Maintain close relationships with customers during beta programmes to integrate their insights effectively.</p>\n<p>Collaborate with technical marketing and sales to understand the competitive landscape for identity security and Okta’s position within it.</p>\n<p>Partner with product marketing to support the creation of compelling messaging and content, and define the go-to-market strategy for existing and new security offerings.</p>\n<p>Inform current and future pricing and packaging changes for Okta Identity Security products based on your subject matter expertise.</p>\n<p><strong>Own the Product</strong></p>\n<p>Maintain a customer-success-focused mindset, actively working to unblock sales and assist customers with security-related issues.</p>\n<p>Responsible for supporting the field on critical requests and customer security needs.</p>\n<p>Drive the development of world-class identity security products and platform capabilities.</p>\n<p>Lead Okta Identity Security quarterly business reviews and collaborate with the go-to-market team to expand the customer pipeline from roadmap to packaging.</p>\n<p>Leverage your domain expertise to identify new product opportunities for Okta Identity Security to expand our portfolio.</p>\n<p><strong>Qualifications:</strong></p>\n<p><strong>Required:</strong></p>\n<p>Bachelor’s degree in a technical field.</p>\n<p>Proven track record of demonstrating strategic vision and product design for security-focused products.</p>\n<p>Experience creating new product offerings, including Go-to-Market (GTM) strategy, pricing, product naming, legal contracts, and New Product Introduction (NPI).</p>\n<p>Experience with defining and driving Threat Protection, Threat Intelligence, SaaS Security and Network Security as a product suite.</p>\n<p>Experience across the product management lifecycle for enterprise security products or services.</p>\n<p>Thirst for learning: able to go broad and deep across business and technical security contexts.</p>\n<p>Track record of owning and delivering on large strategic projects – you can see the big picture, but deliver on the details.</p>\n<p>Strong technical background that allows you to influence technical design and investment decisions, particularly in security architectures.</p>\n<p>Ability to produce solid action plans from often incomplete, conflicting, or ambiguous security inputs.</p>\n<p>Strong track record of influencing teams and operating effectively as a player-coach.</p>\n<p>Excellent communication skills across technical and business audiences, especially when discussing complex security concepts.</p>\n<p>Strong leadership skills and executive presence.</p>\n<p>Passion for Okta’s immense opportunity and growth potential in the identity security market.</p>\n<p>8+ years product management experience.</p>\n<p>Experience interviewing and selecting candidates.</p>\n<p>Mentoring early-in-career product managers.</p>\n<p><strong>Preferred:</strong></p>\n<p>Advanced degree in a technical or business field.</p>\n<p>Deep knowledge of enterprise security products and services, including cybersecurity frameworks and best practices.</p>\n<p>Extensive knowledge of identity and access management (IAM) and its intersection with security.</p>\n<p>Understanding of authentication, authorisation, and threat detection standards.</p>\n<p>Experience with developing user flows and enabling customisable security experiences.</p>\n<p>Experience creating and managing multi-tenant SaaS security software products.</p>\n<p><strong>Salary and Benefits:</strong></p>\n<p>The annual base salary range for this position for candidates located in California (excluding San Francisco Bay Area), Colorado, Illinois, New York, and Washington is between $230,000-$317,000 USD.</p>\n<p>In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.</p>\n<p>To learn more about our Total Rewards programme please visit: https://rewards.okta.com/us.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_e88bd210-6a6","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7648682","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000-$317,000 USD","x-skills-required":["product management","security-focused products","Go-to-Market (GTM) strategy","pricing","product naming","legal contracts","New Product Introduction (NPI)","Threat Protection","Threat Intelligence","SaaS Security","Network Security","identity and access management (IAM)","authentication","authorisation","threat detection","user flows","customisable security experiences","multi-tenant SaaS security software products"],"x-skills-preferred":["advanced degree in a technical or business field","deep knowledge of enterprise security products and services","cybersecurity frameworks and best practices","extensive knowledge of IAM and its intersection with security","understanding of authentication, authorisation, and threat detection standards","experience with developing user flows and enabling customisable security experiences","experience creating and managing multi-tenant SaaS security software products"],"datePosted":"2026-04-18T15:45:16.131Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, New York"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"product management, security-focused products, Go-to-Market (GTM) strategy, pricing, product naming, legal contracts, New Product Introduction (NPI), Threat Protection, Threat Intelligence, SaaS Security, Network Security, identity and access management (IAM), authentication, authorisation, threat detection, user flows, customisable security experiences, multi-tenant SaaS security software products, advanced degree in a technical or business field, deep knowledge of enterprise security products and services, cybersecurity frameworks and best practices, extensive knowledge of IAM and its intersection with security, understanding of authentication, authorisation, and threat detection standards, experience with developing user flows and enabling customisable security experiences, experience creating and managing multi-tenant SaaS security software products","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":317000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f6fd9cfe-34d"},"title":"Engineering Manager, Detection and Response","description":"<p>We are seeking a Detection and Response Engineering Manager to lead our Detection and Response teams in creating comprehensive Security Observability, Detection Lifecycle, and Security Incident Response programs for Anthropic.</p>\n<p>As a Detection and Response Engineering Manager, you will collaborate closely with teams and leaders across Anthropic, focusing on the observability, detection, investigation, incident response, and intelligence portions of the security lifecycle. You will also collaborate closely with preventative security engineering teams and other cross-functional teams.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Managing and growing a high-performing D&amp;R team, planning strategy and hiring to support Anthropic&#39;s rapid growth and unique AI safety requirements</li>\n</ul>\n<ul>\n<li>Navigating prioritization in a fast-paced frontier environment, balancing operational demands with building innovative, scalable solutions for the future</li>\n</ul>\n<ul>\n<li>Collaborating across security engineering teams to build comprehensive prevention, observability, detection, and response capabilities throughout the security lifecycle</li>\n</ul>\n<ul>\n<li>Facilitating development of scalable, AI-leveraged D&amp;R solutions that enable self-service observability and detection capabilities across Anthropic</li>\n</ul>\n<ul>\n<li>Building partnerships with product, infrastructure, and research teams to instill security monitoring best practices</li>\n</ul>\n<ul>\n<li>Owning and continuously improving Security Incident Response, Data Management, and Detection Engineering policies and playbooks</li>\n</ul>\n<ul>\n<li>Operating our threat intelligence program and maintaining relationships with external security partners and information sharing communities</li>\n</ul>\n<ul>\n<li>Continuously driving capability maturity across the detection lifecycle, establishing metrics and KPIs to measure effectiveness</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>10+ years building detection and response capabilities in a cloud-native organization</li>\n</ul>\n<ul>\n<li>5+ years of engineering management experience with a proven track record of building and scaling security teams</li>\n</ul>\n<ul>\n<li>Deep understanding of security monitoring, threat detection, incident response, and forensics best practices</li>\n</ul>\n<ul>\n<li>Experienced in securing complex cloud environments (Kubernetes, AWS/GCP) with modern detection technologies</li>\n</ul>\n<ul>\n<li>Knowledgeable in AI/ML security risks, detection patterns, and response strategies</li>\n</ul>\n<ul>\n<li>Strong verbal and written communication skills with the ability to distill complex security topics</li>\n</ul>\n<ul>\n<li>Skilled at collaborating cross-functionally and effectively balancing security requirements with business objectives</li>\n</ul>\n<ul>\n<li>Able to drive high-impact work while incorporating feedback and adapting to changing priorities</li>\n</ul>\n<ul>\n<li>Passionate about building diverse, high-performing teams and growing engineers in a fast-paced environment</li>\n</ul>\n<ul>\n<li>Low ego, high empathy, and have a track record as a talent magnet who attracts and retains top security talent</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f6fd9cfe-34d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5068296008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cloud security","Threat detection","Incident response","Security monitoring","AI/ML security","Kubernetes","AWS/GCP","Security engineering","Team management"],"x-skills-preferred":["Cloud-native development","Containerization","DevOps","Agile methodologies","Communication skills"],"datePosted":"2026-04-18T15:39:35.389Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Zürich, CH"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Cloud security, Threat detection, Incident response, Security monitoring, AI/ML security, Kubernetes, AWS/GCP, Security engineering, Team management, Cloud-native development, Containerization, DevOps, Agile methodologies, Communication skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_10ab61a1-14e"},"title":"Cyber Security Engineering, Sr Engineer","description":"<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>\n<p>You are a passionate and experienced cybersecurity professional with a keen eye for detail and a deep understanding of threat detection and mitigation. You thrive in fast-paced, collaborative environments and are energized by the challenge of staying ahead of evolving cyber threats. Your technical expertise spans across log aggregation platforms like Elastic, scripting languages such as Python, and enterprise SIEMs. You have a strong grasp of threat actor techniques, vulnerabilities, and exploits, and you leverage frameworks like Mitre ATT&amp;CK to inform your detection strategies.</p>\n<p>You are committed to continuous learning, regularly updating your knowledge to remain at the forefront of cybersecurity advancements. Your analytical mindset enables you to dissect complex security incidents and identify patterns that others might miss. You value clear documentation and process consistency, ensuring that your work can be easily understood and replicated by your peers.</p>\n<p>You are a natural communicator, able to articulate security concepts to both technical and non-technical stakeholders. Your collaborative spirit drives cross-functional engagement, enhancing the organization’s security posture. With a high tolerance for autonomy, you are comfortable taking initiative and leading projects to completion. Certifications such as CISSP, GCIH, GCFE, GCFA, or GMON are a testament to your dedication, but your practical experience is what truly sets you apart.</p>\n<p>You will be responsible for building detection logics using log aggregation platforms like Elastic in large enterprise environments, maintaining and improving existing detection tools and systems to ensure optimal performance and reliability, creating and maintaining documentation for detection processes and procedures to ensure clarity and consistency, utilizing your knowledge of threat actor techniques, vulnerabilities, and exploits to identify and help mitigate potential security risks, collaborating with cross-functional teams to enhance overall security posture and response strategies, staying up-to-date with the latest advancements in cybersecurity to continuously improve detection capabilities.</p>\n<p>By joining our team, you will enhance the security posture of Synopsys by identifying and mitigating potential threats, contribute to the development and maintenance of robust detection tools and systems, improve the efficiency and effectiveness of security operations through automation and scripting, provide valuable insights and recommendations to enhance overall security strategies, support the continuous improvement of detection processes and procedures, and elevate the organization&#39;s resilience and readiness against emerging cyber threats.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_10ab61a1-14e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/austin/cyber-security-engineering-sr-engineer-16007/44408/92616533008","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$101000-$152000","x-skills-required":["ci/cd methodology","elastic","python","enterprise siems","mitre att&ck framework","threat detection","incident response","security operations"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:22:41.630Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"ci/cd methodology, elastic, python, enterprise siems, mitre att&ck framework, threat detection, incident response, security operations","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":101000,"maxValue":152000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_053f3a1e-d2d"},"title":"Security Engineer, Detection and Response","description":"<p><strong>Compensation</strong></p>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p><strong>About the Team</strong></p>\n<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Security Engineer on Detection &amp; Response, you’ll help protect OpenAI’s most sensitive assets– including our intellectual property, customer data, and the infrastructure that supports them– by building and operating the systems we use to detect suspicious activity and respond effectively when it matters. You’ll work across endpoints, identity, cloud, hyperscale compute infrastructure, and datacenter-adjacent layers, partnering closely with security teams and infrastructure owners to define the telemetry and response requirements we need and building tooling and automation where it delivers the most leverage.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Build and evolve Detection &amp; Response capabilities across OpenAI’s infrastructure, products, and research environments, with an emphasis on high-signal detection and reliable operational response.</li>\n</ul>\n<ul>\n<li>Engineer detection pipelines and tooling: develop rule lifecycle management, measurement/quality loops (coverage, precision, latency), tuning processes, and safe rollout patterns.</li>\n</ul>\n<ul>\n<li>Automate response and investigations by building workflows that reduce toil (triage, enrichment, containment, evidence capture) and improve time-to-understand/time-to-contain.</li>\n</ul>\n<ul>\n<li>Partner with other Security teams and system/infrastructure owners across the company to ensure new systems ship with the right telemetry, threat models, and response playbooks from day one.</li>\n</ul>\n<ul>\n<li>Define D&amp;R requirements and drive visibility across endpoints, identity, SaaS, cloud, Kubernetes: identify telemetry/control gaps, prioritize them, and advocate for fixes with partner teams (and implement directly when it’s the fastest/most effective path).</li>\n</ul>\n<ul>\n<li>Evaluate and respond to emergent security concerns in a frontier AI lab environment, such as detection and response strategies for agents operating across infrastructure at scale.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have hands-on threat detection and/or incident response experience, including building detections, running investigations, and improving operational playbooks.</li>\n</ul>\n<ul>\n<li>Understand modern adversary tradecraft (TTPs) and can translate it into practical detection strategies and response actions.</li>\n</ul>\n<ul>\n<li>Bring a threat modeling mindset. You can evaluate new infrastructure or features, identify D&amp;R implications (what could go wrong, what we’d need to see, how we’d respond), and turn that into concrete requirements for teams shipping the system.</li>\n</ul>\n<ul>\n<li>Have experience working in Kubernetes/containerized environments, including building detections from cluster telemetry and understanding common failure and attack modes (workloads, nodes, control plane, networking).</li>\n</ul>\n<ul>\n<li>Are comfortable reasoning about lower-level infrastructure and datacenter risks, such as firmware/BMC surfaces, network segmentation/telemetry, and hard-to-observe control paths.</li>\n</ul>\n<ul>\n<li>Have experience across major cloud platforms (Azure, AWS, GCP, OCI), and can design cloud-agnostic detection approaches where possible.</li>\n</ul>\n<ul>\n<li>Like building automation that replaces repetitive D&amp;R work, including thoughtfully using agent-style workflows where they meaningfully reduce toil, while keeping outcomes measurable, auditable, and safe.</li>\n</ul>\n<ul>\n<li>Are energized by new problem areas at a forward-leaning technology company: e.g., thinking through how to detect and respond to agents operating across systems at scale, and turning those ideas into pragmatic telemetry and response requirements.</li>\n</ul>\n<ul>\n<li>Communicate clearly and collaborate well across teams. You can translate D&amp;R needs into clear requirements, align stakeholders, and drive follow-through across technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Are comfortable with scripting and enjoy using AI/agent tooling to accelerate investigations and automation—more “directing” than doing everything by hand.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p><strong>Additional Information</strong></p>\n<p>We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.</p>\n<p>Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_053f3a1e-d2d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/f956b77c-3cc5-4fdd-9463-2a6e5047e57c","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"Full time","x-salary-range":"The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.","x-skills-required":["threat detection","incident response","Kubernetes","cloud platforms","scripting","AI/agent tooling","security engineering","endpoint security","identity security","cloud security","hyperscale compute infrastructure","datacenter-adjacent layers"],"x-skills-preferred":["threat modeling","adversary tradecraft","TTPs","cloud-agnostic detection","automation","agent-style workflows","measurable outcomes","auditable outcomes","safe outcomes"],"datePosted":"2026-03-08T22:14:51.375Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco; New York City; Seattle"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"threat detection, incident response, Kubernetes, cloud platforms, scripting, AI/agent tooling, security engineering, endpoint security, identity security, cloud security, hyperscale compute infrastructure, datacenter-adjacent layers, threat modeling, adversary tradecraft, TTPs, cloud-agnostic detection, automation, agent-style workflows, measurable outcomes, auditable outcomes, safe outcomes"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_68c29e94-faa"},"title":"Technical Cyber Threat Investigator","description":"<p><strong>About the Role</strong></p>\n<p>We are looking for a Technical Cyber Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for malicious cyber operations.</p>\n<p>You will work at the intersection of AI safety and cybersecurity, conducting thorough investigations into potential misuse cases, developing novel detection techniques, and building robust defenses against emerging cyber threats in the rapidly evolving landscape of AI-enabled risks. Your work will directly protect the broader ecosystem from sophisticated threat actors who seek to leverage AI technology for harm.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for cyber operations, including influence operations, malware development, social engineering, and other adversarial activities</li>\n</ul>\n<ul>\n<li>Develop abuse signals and tracking strategies to proactively detect sophisticated threat actors across our platform</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on new attack vectors, vulnerabilities, and threat actor TTPs targeting LLM systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis grounded in real threat actor behavior, using open-source research, dark web monitoring, and internal data</li>\n</ul>\n<ul>\n<li>Utilize investigation findings to implement systematic improvements to our safety approach and mitigate harm at scale</li>\n</ul>\n<ul>\n<li>Study trends internally and in the broader ecosystem to anticipate how AI systems could be misused, generating and publishing reports</li>\n</ul>\n<ul>\n<li>Build and maintain relationships with external threat intelligence partners, information sharing communities, and government stakeholders</li>\n</ul>\n<ul>\n<li>Work cross-functionally to build out our threat intelligence program, establishing processes, tools, and best practices</li>\n</ul>\n<p><strong>You may be a good fit if you</strong></p>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience with large language models and understanding of how AI technology could be misused for cyber threats</li>\n</ul>\n<ul>\n<li>Have subject matter expertise in abusive user behaviour detection, such as influence operations, coordinated inauthentic behaviour, or cyber threat intelligence</li>\n</ul>\n<ul>\n<li>Have experience tracking threat actors across surface, deep, and dark web environments</li>\n</ul>\n<ul>\n<li>Can derive insights from large datasets to make key decisions and recommendations</li>\n</ul>\n<ul>\n<li>Have experience with threat actor profiling and utilising threat intelligence frameworks (MITRE ATT&amp;CK, etc.)</li>\n</ul>\n<ul>\n<li>Have strong project management skills and ability to build processes from the ground up</li>\n</ul>\n<ul>\n<li>Possess excellent communication skills to collaborate with cross-functional teams and present to leadership</li>\n</ul>\n<p><strong>Strong candidates may also have</strong></p>\n<ul>\n<li>Experience working with government agencies or in regulated environments</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p><strong>Deadline to apply</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n</ul>\n<ul>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n</ul>\n<ul>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong></p>\n<p>Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>\n<p><strong>Your safety matters to us.</strong></p>\n<p>To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/career</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_68c29e94-faa","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066995008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000 - $290,000 USD","x-skills-required":["SQL","Python","large language models","AI technology","cyber threats","abusive user behaviour detection","threat actor profiling","threat intelligence frameworks","project management","communication skills"],"x-skills-preferred":["experience working with government agencies","background in AI safety","machine learning security","technology abuse investigation","experience building and scaling threat detection systems"],"datePosted":"2026-03-08T13:53:20.742Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, large language models, AI technology, cyber threats, abusive user behaviour detection, threat actor profiling, threat intelligence frameworks, project management, communication skills, experience working with government agencies, background in AI safety, machine learning security, technology abuse investigation, experience building and scaling threat detection systems","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c8d7ea06-b25"},"title":"Technical CBRN-E Threat Investigator","description":"<p><strong>About the Role</strong></p>\n<p>We are looking for a Technical CBRN-E Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for Chemical, Biological, Radiological, Nuclear, and Explosives (CBRN-E) threats.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for developing, enhancing, or disseminating CBRN-E weapons, pathogens, toxins, or other threats to harm people, critical infrastructure, or the environment</li>\n</ul>\n<ul>\n<li>Conduct technical investigations using SQL, Python, and other tools to analyze large datasets, trace user behavior patterns, and uncover sophisticated CBRN-E threat actors</li>\n</ul>\n<ul>\n<li>Develop CBRN-E-specific detection capabilities, including abuse signals, tracking strategies, and detection methodologies tailored to dual-use research concerns</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on CBRN-E attack vectors, vulnerabilities, and threat actor TTPs leveraging AI systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis grounded in real threat actor behavior, open-source research, and publicly reported programs</li>\n</ul>\n<ul>\n<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>\n</ul>\n<ul>\n<li>Engage with external stakeholders including government agencies, regulatory bodies, scientific organizations, and biosecurity/chemical security research communities</li>\n</ul>\n<ul>\n<li>Inform safety-by-design strategies by forecasting how threat actors may leverage advances in AI technology for CBRN-E purposes</li>\n</ul>\n<p><strong>You may be a good fit if you</strong></p>\n<ul>\n<li>Have deep domain expertise in biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, or related CBRN-E threat domains</li>\n</ul>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience with threat actor profiling and utilizing threat intelligence frameworks</li>\n</ul>\n<ul>\n<li>Have hands-on experience with large language models and understanding of how AI technology could be misused for CBRN-E threats</li>\n</ul>\n<ul>\n<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>\n</ul>\n<p><strong>Strong candidates may also have</strong></p>\n<ul>\n<li>Advanced degree (MS or PhD) in biological sciences, chemistry, biodefense, biosecurity, or related field</li>\n</ul>\n<ul>\n<li>Real-world experience countering weapons of mass destruction or other high-risk asymmetric threats</li>\n</ul>\n<ul>\n<li>Experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Familiarity with synthetic biology, biotechnology, or dual-use research</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n</ul>\n<ul>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n</ul>\n<ul>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c8d7ea06-b25","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066997008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000 - $290,000USD","x-skills-required":["SQL","Python","CBRN-E threat domains","biosecurity","chemical defense","biological weapons non-proliferation","dual-use research of concern (DURC)","synthetic biology","threat actor profiling","threat intelligence frameworks","large language models","AI technology","stakeholder management"],"x-skills-preferred":["advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field","real-world experience countering weapons of mass destruction or other high-risk asymmetric threats","experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information","background in AI safety, machine learning security, or technology abuse investigation","familiarity with synthetic biology, biotechnology, or dual-use research","experience building and scaling threat detection systems or abuse monitoring programs","active Top Secret security clearance"],"datePosted":"2026-03-08T13:49:06.543Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, CBRN-E threat domains, biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, threat actor profiling, threat intelligence frameworks, large language models, AI technology, stakeholder management, advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field, real-world experience countering weapons of mass destruction or other high-risk asymmetric threats, experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information, background in AI safety, machine learning security, or technology abuse investigation, familiarity with synthetic biology, biotechnology, or dual-use research, experience building and scaling threat detection systems or abuse monitoring programs, active Top Secret security clearance","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1ee98770-f81"},"title":"Technical Influence Operations Threat Investigator","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Role</strong></p>\n<p>We are looking for a Technical Influence Operations Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for influence operations, disinformation campaigns, coordinated inauthentic behaviour, and other forms of information manipulation.</p>\n<p>You will work at the intersection of AI safety and information integrity, combining deep expertise in influence operations with technical investigation skills to identify threat actors who leverage AI to generate synthetic content, amplify narratives, manipulate public discourse, or undermine democratic processes. Your work will directly shape how Anthropic defends against one of the most rapidly evolving categories of AI misuse.</p>\n<p>_Important context: In this position you may be exposed to explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature. This role may require responding to escalations during weekends and holidays._</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for influence operations, including AI-generated disinformation, coordinated inauthentic behaviour, astroturfing, and narrative manipulation campaigns</li>\n</ul>\n<ul>\n<li>Conduct technical investigations using SQL, Python, and other tools to analyse large datasets, trace user behaviour patterns, and uncover coordinated networks of threat actors conducting influence operations</li>\n</ul>\n<ul>\n<li>Develop influence operation-specific detection capabilities, including abuse signals, behavioural clustering techniques, and detection methodologies tailored to AI-enabled information manipulation</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on influence operation TTPs, emerging narrative threats, and threat actor campaigns leveraging AI systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis linking on-platform activity to broader influence campaigns across social media, messaging platforms, and other digital ecosystems</li>\n</ul>\n<ul>\n<li>Monitor and analyse state-sponsored and non-state influence operations that may leverage AI capabilities, with particular focus on operations originating from or targeting geopolitically significant regions</li>\n</ul>\n<ul>\n<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>\n</ul>\n<ul>\n<li>Engage with external stakeholders including government agencies, platform integrity teams, academic researchers, and threat intelligence sharing communities</li>\n</ul>\n<ul>\n<li>Forecast how advances in AI technology—including improved content generation, voice synthesis, and multimodal capabilities—will reshape the influence operations landscape and inform safety-by-design strategies</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have deep subject matter expertise in influence operations, coordinated inauthentic behaviour, disinformation, or information warfare</li>\n</ul>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience tracking and attributing influence campaigns to specific threat actors, including state-sponsored operations</li>\n</ul>\n<ul>\n<li>Have hands-on experience with large language models and understanding of how AI technology could be weaponized for influence operations</li>\n</ul>\n<ul>\n<li>Have experience with open-source intelligence (OSINT) methodologies and tools for investigating online information ecosystems</li>\n</ul>\n<ul>\n<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>\n</ul>\n<ul>\n<li>Can present analytical work to both technical and non-technical audiences, including government stakeholders and senior leadership</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Experience at a major technology platform working on influence operations, platform integrity, or content authenticity</li>\n</ul>\n<ul>\n<li>Background in intelligence analysis, information operations, or counter-disinformation within government or military contexts</li>\n</ul>\n<ul>\n<li>Experience investigating operations linked to Chinese, Russian, Iranian, or other state-sponsored information campaigns</li>\n</ul>\n<ul>\n<li>Fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic (speaking, reading, and writing) combined with a nuanced understanding of the geopolitical landscape and cultural context of the respective regions</li>\n</ul>\n<ul>\n<li>Familiarity with social network analysis techniques and tools for mapping coordinated behaviour</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration attorney to assist with the process.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1ee98770-f81","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5140239008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000 - $290,000 USD","x-skills-required":["SQL","Python","influence operations","disinformation","coordinated inauthentic behaviour","astroturfing","narrative manipulation campaigns","large language models","open-source intelligence (OSINT) methodologies","social network analysis techniques"],"x-skills-preferred":["fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic","background in intelligence analysis, information operations, or counter-disinformation","experience building and scaling threat detection systems or abuse monitoring programs"],"datePosted":"2026-03-08T13:47:58.152Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly, United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, influence operations, disinformation, coordinated inauthentic behaviour, astroturfing, narrative manipulation campaigns, large language models, open-source intelligence (OSINT) methodologies, social network analysis techniques, fluency in Mandarin Chinese, Russian, Farsi, and/or Arabic, background in intelligence analysis, information operations, or counter-disinformation, experience building and scaling threat detection systems or abuse monitoring programs","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_38e5f550-c43"},"title":"Security Engineer, Detection and Response - EMEA","description":"<p><strong>About the Team</strong></p>\n<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity.</p>\n<p>The Security team protects OpenAI’s technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Security Engineer on Detection &amp; Response, you’ll help protect OpenAI’s most sensitive assets– including our intellectual property, customer data, and the infrastructure that supports them– by building and operating the systems we use to detect suspicious activity and respond effectively when it matters. You’ll work across endpoints, identity, cloud, hyperscale compute infrastructure, and datacenter-adjacent layers, partnering closely with security teams and infrastructure owners to define the telemetry and response requirements we need and building tooling and automation where it delivers the most leverage.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Build and evolve Detection &amp; Response capabilities across OpenAI’s infrastructure, products, and research environments, with an emphasis on high-signal detection and reliable operational response.</li>\n</ul>\n<ul>\n<li>Engineer detection pipelines and tooling: develop rule lifecycle management, measurement/quality loops (coverage, precision, latency), tuning processes, and safe rollout patterns.</li>\n</ul>\n<ul>\n<li>Automate response and investigations by building workflows that reduce toil (triage, enrichment, containment, evidence capture) and improve time-to-understand/time-to-contain.</li>\n</ul>\n<ul>\n<li>Partner with other Security teams and system/infrastructure owners across the company to ensure new systems ship with the right telemetry, threat models, and response playbooks from day one.</li>\n</ul>\n<ul>\n<li>Define D&amp;R requirements and drive visibility across endpoints, identity, SaaS, cloud, Kubernetes: identify telemetry/control gaps, prioritize them, and advocate for fixes with partner teams (and implement directly when it’s the fastest/most effective path).</li>\n</ul>\n<ul>\n<li>Evaluate and respond to emergent security concerns in a frontier AI lab environment, such as detection and response strategies for agents operating across infrastructure at scale.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have hands-on threat detection and/or incident response experience, including building detections, running investigations, and improving operational playbooks.</li>\n</ul>\n<ul>\n<li>Understand modern adversary tradecraft (TTPs) and can translate it into practical detection strategies and response actions.</li>\n</ul>\n<ul>\n<li>Bring a threat modeling mindset. You can evaluate new infrastructure or features, identify D&amp;R implications (what could go wrong, what we’d need to see, how we’d respond), and turn that into concrete requirements for teams shipping the system.</li>\n</ul>\n<ul>\n<li>Have experience working in Kubernetes/containerized environments, including building detections from cluster telemetry and understanding common failure and attack modes (workloads, nodes, control plane, networking).</li>\n</ul>\n<ul>\n<li>Are comfortable reasoning about lower-level infrastructure and datacenter risks, such as firmware/BMC surfaces, network segmentation/telemetry, and hard-to-observe control paths.</li>\n</ul>\n<ul>\n<li>Have experience across major cloud platforms (Azure, AWS, GCP, OCI), and can design cloud-agnostic detection approaches where possible.</li>\n</ul>\n<ul>\n<li>Like building automation that replaces repetitive D&amp;R work, including thoughtfully using agent-style workflows where they meaningfully reduce toil, while keeping outcomes measurable, auditable, and safe.</li>\n</ul>\n<ul>\n<li>Are energized by new problem areas at a forward-leaning technology company: e.g., thinking through how to detect and respond to agents operating across systems at scale, and turning those ideas into pragmatic telemetry and response requirements.</li>\n</ul>\n<ul>\n<li>Communicate clearly and collaborate well across teams. You can translate D&amp;R needs into clear requirements, align stakeholders, and drive follow-through across technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Are comfortable with scripting and enjoy using AI/agent tooling to accelerate investigations and automation—more “directing” than doing everything by hand.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_38e5f550-c43","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/2d8b30c7-afa3-42ca-b315-ead35e8457ab","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["threat detection","incident response","Kubernetes","cloud platforms","scripting","AI/agent tooling","security","datacenter risks","firmware/BMC surfaces","network segmentation/telemetry","hard-to-observe control paths"],"x-skills-preferred":["threat modeling","adversary tradecraft","TTPs","detection strategies","response actions","cloud-agnostic detection approaches","automation","agent-style workflows","measurable outcomes","auditable outcomes","safe outcomes"],"datePosted":"2026-03-06T18:32:29.366Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London, UK; Dublin, Ireland"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"threat detection, incident response, Kubernetes, cloud platforms, scripting, AI/agent tooling, security, datacenter risks, firmware/BMC surfaces, network segmentation/telemetry, hard-to-observe control paths, threat modeling, adversary tradecraft, TTPs, detection strategies, response actions, cloud-agnostic detection approaches, automation, agent-style workflows, measurable outcomes, auditable outcomes, safe outcomes"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a100bbea-105"},"title":"Security Engineer, Detection and Response","description":"<p><strong>Security Engineer, Detection and Response</strong></p>\n<p><strong>About the Team</strong></p>\n<p>Security is at the foundation of OpenAI’s mission to ensure that artificial general intelligence benefits all of humanity.</p>\n<p>The Security team protects OpenAI’s technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Security Engineer on Detection &amp; Response, you’ll help protect OpenAI’s most sensitive assets– including our intellectual property, customer data, and the infrastructure that supports them– by building and operating the systems we use to detect suspicious activity and respond effectively when it matters. You’ll work across endpoints, identity, cloud, hyperscale compute infrastructure, and datacenter-adjacent layers, partnering closely with security teams and infrastructure owners to define the telemetry and response requirements we need and building tooling and automation where it delivers the most leverage.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Build and evolve Detection &amp; Response capabilities across OpenAI’s infrastructure, products, and research environments, with an emphasis on high-signal detection and reliable operational response.</li>\n</ul>\n<ul>\n<li>Engineer detection pipelines and tooling: develop rule lifecycle management, measurement/quality loops (coverage, precision, latency), tuning processes, and safe rollout patterns.</li>\n</ul>\n<ul>\n<li>Automate response and investigations by building workflows that reduce toil (triage, enrichment, containment, evidence capture) and improve time-to-understand/time-to-contain.</li>\n</ul>\n<ul>\n<li>Partner with other Security teams and system/infrastructure owners across the company to ensure new systems ship with the right telemetry, threat models, and response playbooks from day one.</li>\n</ul>\n<ul>\n<li>Define D&amp;R requirements and drive visibility across endpoints, identity, SaaS, cloud, Kubernetes: identify telemetry/control gaps, prioritize them, and advocate for fixes with partner teams (and implement directly when it’s the fastest/most effective path).</li>\n</ul>\n<ul>\n<li>Evaluate and respond to emergent security concerns in a frontier AI lab environment, such as detection and response strategies for agents operating across infrastructure at scale.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have hands-on threat detection and/or incident response experience, including building detections, running investigations, and improving operational playbooks.</li>\n</ul>\n<ul>\n<li>Understand modern adversary tradecraft (TTPs) and can translate it into practical detection strategies and response actions.</li>\n</ul>\n<ul>\n<li>Bring a threat modeling mindset. You can evaluate new infrastructure or features, identify D&amp;R implications (what could go wrong, what we’d need to see, how we’d respond), and turn that into concrete requirements for teams shipping the system.</li>\n</ul>\n<ul>\n<li>Have experience working in Kubernetes/containerized environments, including building detections from cluster telemetry and understanding common failure and attack modes (workloads, nodes, control plane, networking).</li>\n</ul>\n<ul>\n<li>Are comfortable reasoning about lower-level infrastructure and datacenter risks, such as firmware/BMC surfaces, network segmentation/telemetry, and hard-to-observe control paths.</li>\n</ul>\n<ul>\n<li>Have experience across major cloud platforms (Azure, AWS, GCP, OCI), and can design cloud-agnostic detection approaches where possible.</li>\n</ul>\n<ul>\n<li>Like building automation that replaces repetitive D&amp;R work, including thoughtfully using agent-style workflows where they meaningfully reduce toil, while keeping outcomes measurable, auditable, and safe.</li>\n</ul>\n<ul>\n<li>Are energized by new problem areas at a forward-leaning technology company: e.g., thinking through how to detect and respond to agents operating across systems at scale, and turning those ideas into pragmatic telemetry and response requirements.</li>\n</ul>\n<ul>\n<li>Communicate clearly and collaborate well across teams. You can translate D&amp;R needs into clear requirements, align stakeholders, and drive follow-through across technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Are comfortable with scripting and enjoy using AI/agent tooling to accelerate investigations and automation—more “directing” than doing everything by hand.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a100bbea-105","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/3728b144-f640-42be-84af-94f6b0743d7c","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"Competitive salary and benefits package","x-skills-required":["threat detection","incident response","Kubernetes","cloud platforms","scripting","AI/agent tooling","security automation","threat modeling","adversary tradecraft"],"x-skills-preferred":["cloud-agnostic detection","network segmentation","firmware/BMC surfaces","datacenter risks","containerized environments","cloud platforms","security orchestration","incident response automation"],"datePosted":"2026-03-06T18:30:38.077Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Sydney, Australia; Singapore; Tokyo, Japan"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"threat detection, incident response, Kubernetes, cloud platforms, scripting, AI/agent tooling, security automation, threat modeling, adversary tradecraft, cloud-agnostic detection, network segmentation, firmware/BMC surfaces, datacenter risks, containerized environments, cloud platforms, security orchestration, incident response automation"}]}