<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>5c943be1-a6f</externalid>
      <Title>Threat Detection Engineer</Title>
      <Description><![CDATA[<p>We are seeking an experienced Threat Detection Engineer to join our team. As a Threat Detection Engineer, you will be responsible for driving our best-in-class posture through threat hunting, detection engineering, and playbook creation. You will also lead information security response activities and work closely with business and technology teams to deliver positive outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Leveraging multiple data sources to identify modern evolving threats and developing new detection and response approaches</li>
<li>Creating and operating high-fidelity detections mechanisms that drive efficient, effective, and repeatable response</li>
<li>Owning, operating, and automating detection and response workflows to enable the team to focus on strategic objectives</li>
<li>Leading information security response activities for the firm</li>
<li>Working across business and technology teams to deliver positive outcomes across the firm</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>A bachelor&#39;s or master&#39;s degree in computer science or cyber security with a strong IT background or equivalent demonstrable experience</li>
<li>3 years&#39; experience working in a security engineering role, with financial industry experience preferred</li>
<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>
<li>Possession of security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>
<li>Experience with modern security tooling across security domains; network, endpoint, data, identity, and cloud</li>
<li>Experience in standard enterprise technology stack, including Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>
<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>
<li>Required scripting, development, and automation skills using PowerShell or Python and proficient development tools</li>
<li>Experience in OSINT, threat hunting, and analysing malicious emails</li>
<li>Ability to prioritise in a fast-moving, high-pressure, constantly changing environment</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>threat detection, security engineering, cyber security, KQL, SQL, SPL, security certifications, modern security tooling, standard enterprise technology stack, scripting, development, automation, OSINT, threat hunting</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>IT Infrastructure</Employername>
      <Employerlogo>https://logos.yubhub.co/mlp.eightfold.ai.png</Employerlogo>
      <Employerdescription>IT Infrastructure provides IT services and support to various organisations.</Employerdescription>
      <Employerwebsite>https://mlp.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://mlp.eightfold.ai/careers/job/755955470563</Applyto>
      <Location>London, United Kingdom</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>c2aaf7ac-804</externalid>
      <Title>Security Engineer - Threat Detection</Title>
      <Description><![CDATA[<p><strong>Job Description</strong></p>
<p>You will design, build, and maintain detections that identify malicious activity across Stripe&#39;s infrastructure, applications, and cloud environments.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle</li>
<li>Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry</li>
<li>Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls</li>
<li>Perform malware analysis and reverse engineering to extract indicators and inform detection strategies</li>
<li>Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS</li>
<li>Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic</li>
<li>Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises</li>
<li>Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment</li>
<li>Map detection coverage to MITRE ATT&amp;CK, identifying and prioritizing gaps across key attack surfaces</li>
<li>Lead projects, mentor teammates, and champion quality standards within the team</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>5+ years of experience in detection engineering, threat hunting, or security operations</li>
<li>Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)</li>
<li>Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration</li>
<li>Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities</li>
<li>Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)</li>
<li>Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources</li>
<li>Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)</li>
<li>Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences</li>
<li>Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments</li>
<li>Background in malware analysis, reverse engineering, or threat research</li>
<li>Experience with purple team operations , collaborating with offensive security to validate detections</li>
<li>Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis</li>
<li>Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows</li>
<li>Interest in agentic automation , using LLMs to augment hunting, tuning, or triage</li>
<li>Experience with detection validation tools (Atomic Red Team, ATT&amp;CK Evaluations)</li>
<li>Contributions to open-source detection content, research, or conference presentations</li>
<li>Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, threat hunting, security operations, SIEM platforms, adversary tradecraft, network-based detections, endpoint-based detections, telemetry analysis, detection/query languages, programming, communication skills, fintech, financial services, malware analysis, reverse engineering, purple team operations, big data platforms, AI/LLM-assisted development tools, agentic automation, detection validation tools, open-source detection content, relevant certifications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses, used by millions of companies worldwide.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7827230</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f5d87e3c-d74</externalid>
      <Title>Offensive Security Engineer</Title>
      <Description><![CDATA[<p>As an Offensive Security Engineer at CoreWeave, you will lead efforts to identify and mitigate security risks across internal and external systems.</p>
<p>You&#39;ll perform penetration testing, conduct threat modeling, and provide guidance to engineering teams on secure design and best practices. This role also involves developing security tooling, researching emerging threats, and contributing to the continuous improvement of CoreWeave&#39;s overall security posture.</p>
<p>Some of what you&#39;ll work on:</p>
<ul>
<li>Perform penetration testing as well as purple and red team exercises.</li>
<li>Conduct threat modeling, code reviews, and design reviews for development teams.</li>
<li>Research new attack techniques and develop strategies to counter them.</li>
<li>Develop and enforce security best practices and standards, maintaining internal compliance.</li>
<li>Provide solutions to complex security issues, manage multiple tasks, and prioritize effectively in a fast-paced environment.</li>
<li>Present technical security information to both technical and non-technical audiences.</li>
<li>Maintain technical documentation, reports, and security tooling with attention to detail.</li>
<li>Participate in other security-related initiatives as assigned.</li>
</ul>
<p>Who You Are:</p>
<ul>
<li>5+ years of experience in offensive information security roles.</li>
<li>Proficiency in at least one programming or scripting language (e.g., Go, Python, C/C++) for automation, code reviews, and tooling.</li>
<li>Hands-on penetration testing experience and familiarity with offensive security tools.</li>
<li>Strong technical knowledge of Linux operating systems and containerized environments.</li>
<li>Experience securing Kubernetes and understanding related security practices.</li>
<li>Able to navigate ambiguity, identify root causes, and solve complex security problems.</li>
<li>Excellent written and verbal communication skills with strong technical documentation abilities.</li>
<li>Capable of working independently while managing multiple priorities in a fast-paced environment.</li>
<li>Strong desire to continuously learn and adopt new technologies and security techniques.</li>
</ul>
<p>Preferred:</p>
<ul>
<li>Experience with firmware reverse engineering, analyzing binaries, bootloaders, and embedded systems for vulnerabilities.</li>
<li>Relevant certifications such as Sec+, Net+, OSCP, or equivalent.</li>
<li>Experience with EDR tuning, detections-as-code, or threat hunting as part of a Blue Team.</li>
<li>Deep understanding of business-wide security best practices and implementation strategies.</li>
</ul>
<p>Wondering if you&#39;re a good fit?</p>
<p>We believe in investing in our people, and value candidates who can bring their own diversified experiences to our teams – even if you aren&#39;t a 100% skill or experience match.</p>
<p>Here are a few qualities we&#39;ve found compatible with our team.</p>
<p>If some of this describes you, we&#39;d love to talk.</p>
<ul>
<li>You love hunting vulnerabilities and proactively improving security.</li>
<li>You&#39;re curious about evolving attack vectors and defense strategies.</li>
<li>You&#39;re an expert in offensive security techniques and tooling, with a passion for safeguarding systems.</li>
</ul>
<p>Why CoreWeave?</p>
<p>At CoreWeave, we work hard, have fun, and move fast!</p>
<p>We&#39;re in an exciting stage of hyper-growth that you will not want to miss out on.</p>
<p>We&#39;re not afraid of a little chaos, and we&#39;re constantly learning.</p>
<p>Our team cares deeply about how we build our product and how we work together, which is represented through our core values:</p>
<ul>
<li>Be Curious at Your Core</li>
<li>Act Like an Owner</li>
<li>Empower Employees</li>
<li>Deliver Best-in-Class Client Experiences</li>
<li>Achieve More Together</li>
</ul>
<p>We support and encourage an entrepreneurial outlook and independent thinking.</p>
<p>We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems.</p>
<p>As we get set for takeoff, the organization&#39;s growth opportunities are constantly expanding.</p>
<p>You will be surrounded by some of the best talent in the industry, who will want to learn from you, too.</p>
<p>Come join us!</p>
<p>The base salary range for this role is $165,000 to $242,000.</p>
<p>The starting salary will be determined based on job-related knowledge, skills, experience, and market location.</p>
<p>We strive for both market alignment and internal equity when determining compensation.</p>
<p>In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>
<p>What We Offer</p>
<p>The range we&#39;ve posted represents the typical compensation range for this role.</p>
<p>To determine actual compensation, we review the market rate for each candidate which can include a variety of factors.</p>
<p>These include qualifications, experience, interview performance, and location.</p>
<p>In addition to a competitive salary, we offer a variety of benefits to support your needs, including:</p>
<ul>
<li>Medical, dental, and vision insurance</li>
<li>100% paid for by CoreWeave</li>
<li>Company-paid Life Insurance</li>
<li>Voluntary supplemental life insurance</li>
<li>Short and long-term disability insurance</li>
<li>Flexible Spending Account</li>
<li>Health Savings Account</li>
<li>Tuition Reimbursement</li>
<li>Ability to Participate in Employee Stock Purchase Program (ESPP)</li>
<li>Mental Wellness Benefits through Spring Health</li>
<li>Family-Forming support provided by Carrot</li>
<li>Paid Parental Leave</li>
<li>Flexible, full-service childcare support with Kinside</li>
<li>401(k) with a generous employer match</li>
<li>Flexible PTO</li>
<li>Catered lunch each day in our office and data center locations</li>
<li>A casual work environment</li>
<li>A work culture focused on innovative disruption</li>
</ul>
<p>Our Workplace</p>
<p>While we prioritize a hybrid work environment, remote work may be considered for candidates located more than 30 miles from an office, based on role requirements for specialized skill sets.</p>
<p>New hires will be invited to attend onboarding at one of our hubs within their first month.</p>
<p>Teams also gather quarterly to support collaboration.</p>
<p>California Consumer Privacy Act - California applicants only</p>
<p>CoreWeave is an equal opportunity employer, committed to fostering an inclusive and supportive workplace.</p>
<p>All qualified applicants and candidates will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information.</p>
<p>As part of this commitment and consistent with the Americans with Disabilities Act (ADA), CoreWeave will ensure that qualified applicants and candidates with disabilities are provided reasonable accommodations for the hiring process, unless such accommodation would cause an undue hardship.</p>
<p>If reasonable accommodation is needed, please contact: careers@coreweave.com.</p>
<p>Export Control Compliance</p>
<p>This position requires access to export controlled information.</p>
<p>To conform to U.S. Government export regulations applicable to that information, applicant must either be (A) a U.S. person, defined as a (i) U.S. citizen or national, (ii) U.S. lawful permanent resident (green card holder), (iii) refugee under 8 U.S.C. § 1157, or (iv) asylee under 8 U.S.C. § 1158, (B) eligible to access the information under an appropriate export license, or (C) otherwise exempt from the regulations.</p>
<p>Applicant must also comply with all applicable laws and regulations related to the handling and transfer of export-controlled information.</p>
<p>By applying for this position, applicant acknowledges that they have read, understand, and will comply with these requirements.</p>
<p>Failure to comply with these requirements may result in termination of employment, revocation of any security clearances, or other disciplinary action.</p>
<p>Applicant must also agree to undergo a background investigation and obtain any necessary security clearances prior to commencing employment.</p>
<p>Please note that this position is subject to U.S. Government export regulations and may require applicant to sign a non-disclosure agreement (NDA) prior to commencing employment.</p>
<p>Applicant must also agree to comply with all applicable laws and regulations related to the handling and transfer of export-controlled information.</p>
<p>By applying for this position, applicant acknowledges that they have read, understand, and will comply with these requirements.</p>
<p>Failure to comply with these requirements may result in termination of employment, revocation of any security clearances, or other disciplinary action.</p>
<p>Applicant must also agree to undergo a background investigation and obtain any necessary security clearances prior to commencing employment.</p>
<p>Please note that this position is subject to U.S. Government export regulations and may require applicant to sign a non-disclosure agreement (NDA) prior to commencing employment.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$165,000 to $242,000</Salaryrange>
      <Skills>programming or scripting language, penetration testing, threat modeling, code reviews, design reviews, security best practices, Linux operating systems, containerized environments, Kubernetes, security practices, firmware reverse engineering, analyzing binaries, bootloaders, embedded systems, EDR tuning, detections-as-code, threat hunting, business-wide security best practices</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud computing company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4657803006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>6c1cd36d-464</externalid>
      <Title>Senior Security Operations Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>About Us</p>
<p>dbt Labs is the pioneer of analytics engineering, helping data teams transform raw data into reliable, actionable insights. As of February 2025, we’ve grown from an open source project into the leading analytics engineering platform, now used by over 90,000 teams every week, driving data transformations and AI use cases.</p>
<p>We’re backed by top-tier investors including Andreessen Horowitz, Sequoia Capital, and Altimeter. At our core, we believe in empowering data practitioners:</p>
<ul>
<li>Reliable, high-quality data is the fuel that propels AI-powered data engineering.</li>
<li>AI is changing data work, fast. dbt’s data control plane keeps data engineers ahead of that curve.</li>
<li>We empower engineers to deliver reliable, governed data faster, cheaper, and at scale.</li>
</ul>
<p>About the Security Team</p>
<p>The mission of the Security Engineering team at dbt Labs is to provide clear, opinionated security guidance and scalable, secure-by-default offerings to engineers for the purpose of securing software development and enabling pragmatic risk decisions at dbt.</p>
<p><strong>Responsibilities</strong></p>
<p>As a Senior Security Operations Engineer on the Detection &amp; Response team, you will strengthen and maintain the company&#39;s security posture throughout the threat detection lifecycle from telemetry collection and continuous monitoring through threat detection, incident response, and security event management. You will serve as a subject matter expert for security operations across the dbt Labs&#39; teams and technology infrastructure, including multi-cloud production environments, identity, endpoints, and SaaS technologies.</p>
<p><strong>Key Responsibilities</strong></p>
<ul>
<li>Participate in a 24/7 on-call rotation providing coverage for active security incidents, investigations, and security events across our global infrastructure.</li>
<li>Lead investigation and remediation of security incidents, coordinating cross-functional response efforts to minimize impact and recovery time.</li>
<li>Play a major role in bootstrapping an end to end D&amp;R alert and investigation pipeline.</li>
<li>Triage and investigate security alerts from detection tools including Wiz Defend, Crowdstrike, and cloud security platforms to identify genuine threats and reduce false positives.</li>
<li>Develop and maintain detection rules, runbooks, and response procedures mapped to the company&#39;s threat model.</li>
<li>Automate alert triage workflows and improve mean time to detection and response through tooling and process enhancements, including leveraging AI enrichment and processing.</li>
<li>Collaborate with Infrastructure and Application Security teams to implement secure-by-design principles and remediate identified security issues.</li>
<li>Conduct security event analysis to identify policy violations, misconfigurations, and potential attack vectors before they become incidents.</li>
<li>Partner with our Enterprise Security &amp; Technology team to enhance endpoint security controls and monitoring across endpoints (MacOS laptops &amp; some Windows and Linux-based development environments).</li>
<li>Design and facilitate tabletop exercises and game days to test detection, response, recovery, and remediation capabilities.</li>
<li>Contribute to the maturation of the security incident response program through documentation, training, and process improvements.</li>
<li>Mentor junior security engineers and cross-functional team members on incident handling best practices.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Demonstrated ability to excel in high-pressure situations; we need someone who can make sound decisions during active security incidents and can calmly serve as incident commander with confidence.</li>
</ul>
<p><strong>Qualifications</strong></p>
<ul>
<li>Have 8+ years of professional experience in security-related domains, including at least 4 years in security operations, incident response, threat hunting, or threat detection roles.</li>
<li>Have demonstrable experience leading security incident investigations and coordinating cross-team response efforts.</li>
</ul>
<p><strong>What We Offer</strong></p>
<ul>
<li>Competitive compensation packages commensurate with experience, including salary, equity, and where applicable, performance-based pay.</li>
<li>Opportunity to work with a leading analytics engineering platform and contribute to the growth and success of the company.</li>
<li>Collaborative and dynamic work environment with a team of experienced professionals.</li>
<li>Opportunities for professional growth and development.</li>
</ul>
<p><strong>How to Apply</strong></p>
<p>If you are a motivated and experienced security professional looking for a new challenge, please submit your resume and cover letter to [insert contact information]. We look forward to hearing from you!</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Security Operations, Incident Response, Threat Hunting, Threat Detection, Cloud Security, Endpoint Security, Security Event Analysis, Security Incident Response, Tabletop Exercises, Game Days, Documentation, Training, Process Improvements, Mentoring, Security Engineering, Data Control Plane, Analytics Engineering, AI-Powered Data Engineering, Reliable High-Quality Data, Secure-By-Default Offerings, Pragmatic Risk Decisions, Multi-Cloud Production Environments, Identity, Endpoints, SaaS Technologies, Wiz Defend, Crowdstrike, Cloud Security Platforms, Detection Rules, Runbooks, Response Procedures, Mean Time to Detection, Mean Time to Response, AI Enrichment, AI Processing, Secure-By-Design Principles, Infrastructure Security, Application Security, Endpoint Security Controls, Monitoring</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>dbt Labs</Employername>
      <Employerlogo>https://logos.yubhub.co/getdbt.com.png</Employerlogo>
      <Employerdescription>dbt Labs is a leading analytics engineering platform, used by over 90,000 teams every week, with annual recurring revenue (ARR) surpassing $100 million.</Employerdescription>
      <Employerwebsite>https://www.getdbt.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/dbtlabsinc/jobs/4674498005</Applyto>
      <Location>US - Remote</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>b3a08e4a-8c1</externalid>
      <Title>Senior Security Operations Engineer</Title>
      <Description><![CDATA[<p>Join Brex, the intelligent finance platform that enables companies to spend smarter and move faster in over 200 markets. As a Senior Security Operations Engineer, you will focus on preventing, detecting, and responding to security threats across Brex&#39;s corporate and cloud environments. You will use existing systems and develop tools to improve our security capabilities.</p>
<p>Our team is responsible for functions across corporate security, detection &amp; response, and infrastructure security domains. We perform systems engineering and automation to support those functions. Security Operations is part of our wider Trust &amp; IT organization, which means you will have the opportunity to work closely with Application Security, Corporate Engineering, GRC, and IT.</p>
<p>You will also help build and maintain our team&#39;s open-source project Substation and have the opportunity to contribute to the Brex Tech Blog. You&#39;ll be part of a team that actively contributes to the wider security community and has a commitment to mentorship and engineering excellence.</p>
<p>We&#39;re looking for individuals with a strong background and interest in detecting, responding to, and resolving security incidents and security challenges. You should be comfortable dealing with lots of moving pieces, changing priorities, and new technologies, while having a keen eye for detail.</p>
<p>Most importantly, you should be enthusiastic about working with a variety of backgrounds, roles, and people across Brex. Building a world-class financial service requires world-class security.</p>
<p>As a Senior Security Operations Engineer, you will:</p>
<ul>
<li>Work on a highly cross-functional team to prevent, detect, and respond to security threats across Brex&#39;s corporate and cloud environments</li>
<li>Perform security incident response, investigation, remediation, and documentation, participate in periodic threat hunting and security exercises</li>
<li>Leading, scoping, and building features, participate in designing, and maintaining tools and systems which support the team&#39;s domains – corporate security, detection &amp; response, and infrastructure security</li>
<li>Collaborating and partnering with engineering and operations teams to drive remediation of security issues, while balancing prioritization of those security issues within SLA and teams&#39; respective backlogs</li>
<li>Caring about secure system design, valuing building things correctly, an understanding of a MVP approach, and an empathetic mindset when working with others</li>
</ul>
<p>Requirements:</p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Engineering, or related field OR equivalent training/fellowship OR 5+ years work experience</li>
<li>Experience working in a corporate security, detection &amp; response, or infrastructure security role with responsibilities for security alert triage and security incident response</li>
<li>Familiarity with CI/CD systems and DevOps workflows (e.g., Buildkite, Flux, Git, Terraform) in cloud environments (e.g., AWS, Azure, GCP)</li>
<li>Experience with deploying and maintaining some of the security services and tools owned by the team (e.g., SIEM, data pipelines, SOAR, domain monitoring, endpoint tooling, email protection tooling, cloud security tools)</li>
<li>While not primarily a development role, the team develops and maintains tools written in Go and Python, so experience with coding is required</li>
<li>You thrive in a collaborative environment filled with a diverse group of people with different expertise and backgrounds</li>
</ul>
<p>Bonus points:</p>
<ul>
<li>Proficiency with Go and other programming languages</li>
<li>Experience with securing distributed systems in AWS, cloud, and Kubernetes environments</li>
<li>Contributions to the wider technical community (open source, public research, mentorship, community organizing, blogging, presentations, etc.)</li>
</ul>
<p>Compensation:</p>
<p>The expected salary range for this role is $192,000 - $240,000. However, the starting base pay will depend on a number of factors including the candidate&#39;s location, skills, experience, market demands, and internal pay parity. Depending on the position offered, equity and other forms of compensation may be provided as part of a total compensation package.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$192,000 - $240,000</Salaryrange>
      <Skills>Security Operations, Cloud Security, CI/CD Systems, DevOps Workflows, Go, Python, Security Incident Response, Threat Hunting, Secure System Design, Open Source Development, Community Organizing, Blogging, Presentations</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Brex</Employername>
      <Employerlogo>https://logos.yubhub.co/brex.com.png</Employerlogo>
      <Employerdescription>Brex is a financial technology company that provides corporate cards and banking services to businesses.</Employerdescription>
      <Employerwebsite>https://brex.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/brex/jobs/8339252002</Applyto>
      <Location>San Francisco, California, United States</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>62900fcd-562</externalid>
      <Title>Security Engineer - Offensive Security</Title>
      <Description><![CDATA[<p>As an Offensive Security Engineer on the Proactive Threat team at Stripe, you will simulate the tactics, techniques, and procedures (TTPs) of real-world adversaries to uncover security risks across Stripe&#39;s products and infrastructure.</p>
<p>You&#39;ll conduct hands-on penetration testing, lead red team engagements, and collaborate with blue team counterparts to validate and improve detection and response capabilities. Your work will directly influence how Stripe builds, ships, and secures financial infrastructure used by millions of businesses worldwide.</p>
<p>Responsibilities:</p>
<p>Conduct comprehensive penetration tests across web applications, APIs, cloud environments (AWS/GCP/Azure), mobile applications, and internal infrastructure.</p>
<p>Plan and execute red team engagements that emulate the TTPs of cyber and criminal threat actors targeting financial services, including initial access, lateral movement, persistence, and data exfiltration scenarios.</p>
<p>Perform assumed-breach and objective-based assessments to test detection and response capabilities in coordination with defensive teams.</p>
<p>Partner with detection engineering, threat intelligence, and incident response teams to validate security controls, identify coverage gaps, and improve detection fidelity.</p>
<p>Contribute adversary tradecraft insights to inform detection rule development, threat hunting hypotheses, and incident response playbooks.</p>
<p>Support incident investigations by providing offensive expertise, log analysis, and root cause analysis when required.</p>
<p>Design, develop, and maintain custom offensive tools, scripts, and automation frameworks to enhance assessment efficiency and coverage.</p>
<p>Build internal platforms and workflows that enable scalable, repeatable offensive operations.</p>
<p>Contribute to internal security tooling repositories and champion engineering best practices within the team.</p>
<p>Automate repetitive testing tasks, payload generation, and reporting workflows using modern development practices.</p>
<p>Produce clear, actionable reports that communicate technical findings, business risk, and remediation guidance to both technical and non-technical stakeholders.</p>
<p>Act as a subject-matter expert and primary point of contact for stakeholder teams engaged in offensive security programs and Stripe-wide security initiatives.</p>
<p>Lead offensive security projects end-to-end, mentor junior team members, and foster a culture of continuous learning and knowledge sharing.</p>
<p>Stay current with emerging threats, vulnerabilities, and attack techniques; share research internally and contribute to the broader security community.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Python, Go, Web application security, Cloud platforms (AWS, Azure, or GCP), Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound), Adversary tradecraft and frameworks (MITRE ATT&amp;CK), Excellent written and verbal communication skills, Experience conducting offensive security in fintech, financial services, or other highly regulated environments, Background in vulnerability research, exploit development, or CVE discovery, Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations), Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support, Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses. It has a large user base, with millions of companies using its services.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7820898</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>eda84ece-394</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams.</p>
<p>In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams. You will lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic&#39;s technology stack.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Developing and deploying novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>
<li>Creating and optimizing detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>
<li>Reviewing Incident Response metrics and procedures and driving continuous improvement</li>
<li>Working cross-functionally with other security and engineering teams</li>
</ul>
<p>Note: This position will require participation in an on-call rotation.</p>
<p>To be successful in this role, you will need:</p>
<ul>
<li>3+ years of software engineering experience, with security experience a plus</li>
<li>5+ years of detection engineering, incident response, or threat hunting experience</li>
<li>A solid understanding of cloud environments and operations</li>
<li>Experience working with engineering teams in a SaaS environment</li>
<li>Exceptional communication and collaboration skills</li>
<li>An ability to lead projects with little guidance</li>
<li>The ability to pick up new languages and technologies quickly</li>
<li>Experience handling security incidents and investigating anomalies as part of a team</li>
<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>
</ul>
<p>Strong candidates may also have experience with:</p>
<ul>
<li>Performing security operations or investigations involving large-scale Kubernetes environments</li>
<li>A high level of proficiency in Python and query languages such as SQL</li>
<li>Analyzing attack behavior and prototyping high-quality detections</li>
<li>Threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>
<li>Contributing to a high-growth startup environment</li>
</ul>
<p>If you&#39;re interested in this role, please submit an application, even if you don&#39;t believe you meet every single qualification. We encourage diversity and inclusion in our hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000-$405,000 USD</Salaryrange>
      <Skills>software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, EDR, SIEM, SOAR, Python, SQL, Kubernetes, Large Language Models, playbooks, workflows, continuous improvement, collaboration, leadership, new languages and technologies</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a public benefit corporation that creates reliable, interpretable, and steerable AI systems.</Employerdescription>
      <Employerwebsite>https://www.anthropic.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4982193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>85f1ada0-78d</externalid>
      <Title>Security Engineer</Title>
      <Description><![CDATA[<p>We&#39;re seeking a Security Engineer at the senior-level or above on our Security Operations team with strong detection engineering experience. You&#39;ll design and develop high-fidelity detection content, build and operate the data pipelines that power our security operations, develop automation playbooks that accelerate response, and work across a uniquely diverse telemetry landscape spanning cloud infrastructure, embedded vessel platforms, corporate systems, and operational technology.</p>
<p>This role is heavily weighted toward detection engineering. You should think in terms of adversary behaviour and telemetry coverage, not just alert triage. You&#39;ll own detections end-to-end: from identifying gaps in coverage, through designing and testing detection logic, to tuning and validating in production.</p>
<p>Key Responsibilities:</p>
<ul>
<li><p>Design, build, test, and tune high-fidelity detection rules and analytic queries across endpoint, cloud, network, identity, and DLP telemetry sources</p>
</li>
<li><p>Develop and maintain detection content using detection-as-code practices including version-controlled logic, automated testing, and CI/CD deployment</p>
</li>
<li><p>Map detection coverage to MITRE ATT&amp;CK, identify gaps, and prioritise new detection development based on threat intelligence and business risk</p>
</li>
<li><p>Engineer correlation rules, behavioural analytics, and anomaly-based detections that minimise false positives while surfacing real adversary tradecraft</p>
</li>
<li><p>Own the detection lifecycle from initial development through production tuning, performance monitoring, and retirement</p>
</li>
<li><p>Build and operate pipelines to ingest, normalise, enrich, and manage security telemetry at scale across diverse data sources, using Terraform and infrastructure-as-code practices to deploy and maintain logging and detection infrastructure</p>
</li>
<li><p>Design and maintain log collection, parsing, and enrichment configurations that ensure the right telemetry is available at the right fidelity for detection and investigation</p>
</li>
<li><p>Evaluate and onboard new telemetry sources as Saronic&#39;s infrastructure and threat landscape evolve</p>
</li>
<li><p>Monitor pipeline health, data quality, and ingestion reliability to ensure detections operate on complete and accurate data</p>
</li>
<li><p>Develop and manage automated response playbooks in SOAR platforms to accelerate containment and reduce analyst toil</p>
</li>
<li><p>Build automation that enriches alerts with contextual data, reducing investigation time and improving analyst decision-making</p>
</li>
<li><p>Support incident response efforts and translate lessons learned into improved detections and playbooks</p>
</li>
<li><p>Partner with SOC analysts, Cloud Security, Product Security, and IT teams to close visibility and detection gaps across environments</p>
</li>
<li><p>Collaborate with threat intelligence to ensure detection engineering is informed by current adversary TTPs relevant to defence, maritime, and autonomous systems</p>
</li>
</ul>
<p>Required Qualifications:</p>
<ul>
<li><p>3+ years of hands-on experience in detection engineering, security operations, security automation, or a closely related security engineering role</p>
</li>
<li><p>Demonstrated experience designing, testing, and tuning detection rules and analytic queries across production security telemetry (endpoint, cloud, network, identity, or DLP)</p>
</li>
<li><p>Hands-on experience with SIEM platforms and proficiency with query languages such as SPL, KQL, or equivalent</p>
</li>
<li><p>Experience building and operating security data pipelines, including log ingestion, normalisation, enrichment, and data quality management</p>
</li>
<li><p>Understanding of data engineering concepts including ETL pipelines, data modelling, schema design, and indexing as applied to security telemetry</p>
</li>
<li><p>Hands-on coding experience in Python, PowerShell, Go, or Rust for security automation, detection tooling, or pipeline development, and familiarity with Terraform for managing detection and logging infrastructure as code</p>
</li>
<li><p>Understanding of MITRE ATT&amp;CK framework and its application to detection coverage and gap analysis</p>
</li>
<li><p>Ability to obtain and maintain a security clearance</p>
</li>
</ul>
<p>Preferred Qualifications:</p>
<ul>
<li><p>Experience in defence, aerospace, robotics, autonomy, or other high-assurance environments</p>
</li>
<li><p>Experience with EDR platforms including custom detection rule creation and telemetry analysis</p>
</li>
<li><p>Experience with cloud-native detection in AWS and Microsoft 365/Azure</p>
</li>
<li><p>Experience using Terraform to deploy and manage security monitoring infrastructure, log pipeline components, or cloud-native security service configurations</p>
</li>
<li><p>Hands-on experience with incident response, threat hunting, or adversary emulation</p>
</li>
<li><p>Exposure to embedded Linux, operational technology, or ICS telemetry and detection</p>
</li>
<li><p>Familiarity with NIST SP 800-171, NIST SP 800-53, or CMMC and their logging and monitoring requirements</p>
</li>
<li><p>Relevant certifications such as GCIH, GCIA, GCDA, GSOM, OSDA, or OSCP</p>
</li>
</ul>
<p>Additional Information:</p>
<ul>
<li><p>Benefits: Medical Insurance, Dental and Vision Insurance, Time Off, Parental Leave, Competitive Salary, Retirement Plan, Stock Options, Life and Disability Insurance, Pet Insurance</p>
</li>
<li><p>This role requires access to export-controlled information or items that require &#39;U.S. Person&#39; status.</p>
</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, security operations, security automation, SIEM platforms, query languages, data engineering, ETL pipelines, data modelling, schema design, indexing, Python, PowerShell, Go, Rust, Terraform, MITRE ATT&amp;CK framework, security clearance, EDR platforms, cloud-native detection, incident response, threat hunting, adversary emulation, embedded Linux, operational technology, ICS telemetry, NIST SP 800-171, NIST SP 800-53, CMMC, GCIH, GCIA, GCDA, GSOM, OSDA, OSCP</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Saronic Technologies</Employername>
      <Employerlogo>https://logos.yubhub.co/saronictechnologies.com.png</Employerlogo>
      <Employerdescription>Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.</Employerdescription>
      <Employerwebsite>https://www.saronictechnologies.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/saronic/79424778-76c1-41c6-8385-cba5f6ddc50e</Applyto>
      <Location>San Francisco</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>55d2bc34-fc1</externalid>
      <Title>CyberSecurity Engineer, SOC Analyst</Title>
      <Description><![CDATA[<p>About Mistral AI
At Mistral AI, we believe in the power of AI to simplify tasks, save time, and enhance learning and creativity. Our technology is designed to integrate seamlessly into daily working life.</p>
<p>Role Summary
Mistral AI is looking for a Security Operations Center (SOC) Analyst to monitor, defend and respond to threats across our rapidly evolving AI ecosystem. You will treat security telemetry as the core of our active defense. Your objective is to ensure the continuous security of our diverse environment, spanning IT, Engineering, Science, Compute and Infrastructure by building robust detection mechanisms and moving swiftly from alert to automated response.</p>
<p>Responsibilities
• Partner with engineering and platform teams to ensure the comprehensive centralization of security logs across all Mistral environments.
• Design, test, and continuously tune high-fidelity alert scenarios and correlation rules to detect anomalous behavior while minimizing alert fatigue.
• Operationalize Cyber Threat Intelligence (CTI), monitoring the landscape for threats specific to AI and cloud infrastructure, and integrating actionable intel directly into our detection pipelines.
• Conduct rigorous, deep-dive investigations into security alerts, tracking root causes, identifying potential lateral movement, and determining impact.
• Drive the lifecycle of security incidents from containment to remediation, and coordinate cross-functional crisis management during high-severity events.</p>
<p>About You
• 3+ years of experience in a Security Operations Center (SOC), Incident Response, or Threat Hunting role, ideally within a cloud-native or fast-paced tech environment.
• Deep understanding of the threat landscape, the MITRE ATT&amp;CK framework, and the methodologies required to protect high-value infrastructure and intellectual property.
• Strong experience writing complex queries (e.g., KQL, Splunk SPL, or similar) and leveraging SIEM platforms to build out correlation rules and detection logic.
• Ability to write practical automation scripts in Python or Go to interact with security APIs, enrich alert context, and streamline response workflows.
• Proven experience participating in or leading incident response efforts, demonstrating a calm, methodical approach to high-pressure crisis management.</p>
<p>Hiring Process
• Introduction call - 30 min
• Hiring Manager interview - 30 min
• Technical Rounds - Dee-Dive interview - 55 min - Panel interview - 1h15
• Culture-fit discussion - 30 min
• References</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Security Operations Center (SOC), Incident Response, Threat Hunting, KQL, Splunk SPL, SIEM platforms, Python, Go, security APIs, alert context, response workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI is an AI company that provides high-performance, optimized, open-source and cutting-edge models, products and solutions. Its comprehensive AI platform meets enterprise needs, whether on-premises or in cloud environments.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/f9782b09-ca3c-4bfc-ba7a-349551ef9a82</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>723d3153-72d</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p><strong>About the role</strong></p>
<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams. In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic’s technology stack</li>
<li>Develop and deploy novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>
<li>Create and optimise detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>
<li>Review Incident Response metrics and procedures and drive continuous improvement</li>
<li>Work cross functionally with other security and engineering teams</li>
</ul>
<p><strong>You may be a good fit if you:</strong></p>
<ul>
<li>3+ years of software engineering experience, with security experience a plus and/or</li>
<li>5+ years of detection engineering, incident response, or threat hunting experience</li>
<li>A solid understanding of cloud environments and operations</li>
<li>Experience working with engineering teams in a SaaS environment</li>
<li>Exceptional communication and collaboration skills</li>
<li>An ability to lead projects with little guidance</li>
<li>The ability to pick up new languages and technologies quickly</li>
<li>Experience handling security incidents and investigating anomalies as part of a team</li>
<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>
</ul>
<p><strong>Strong candidates may also have experience with:</strong></p>
<ul>
<li>Experience performing security operations or investigations involving large-scale Kubernetes environments</li>
<li>A high level of proficiency in Python and query languages such as SQL</li>
<li>Experience analysing attack behaviour and prototyping high-quality detections</li>
<li>Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>
<li>Experience contributing to a high growth startup environment</li>
</ul>
<p><strong>Deadline to apply:</strong></p>
<p>None. Applications will be reviewed on a rolling basis.</p>
<p><strong>Logistics</strong></p>
<ul>
<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>
<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>
<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>
</ul>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>
<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>
<p><strong>How we&#39;re different</strong></p>
<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$300,000 - $405,000 USD</Salaryrange>
      <Skills>software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, engineering teams, SaaS environment, communication skills, project leadership, new languages and technologies, security incidents, anomalies, EDR, SIEM, SOAR, security tools, Python, SQL, threat intelligence, malware analysis, infrastructure as code, detection engineering, forensics, Kubernetes environments, high growth startup environment</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a quickly growing organisation with a mission to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4982193008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>