{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/threat-intelligence"},"x-facet":{"type":"skill","slug":"threat-intelligence","display":"Threat Intelligence","count":24},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_49ebcfec-670"},"title":"Crisis Management Program Manager","description":"<p>Lead the firm&#39;s Global Response Operations program and directly oversee Global Threat Intelligence, ensuring the organization can anticipate, respond to, and recover from disruptive events across Millennium Management&#39;s global operations.</p>\n<p>Key Responsibilities:</p>\n<p>Strategy &amp; Governance - Develop and own global response operations to drive operational resiliency, aligned with enterprise risk appetite, regulatory expectations, and industry standards (e.g., ISO 22301, ISO 31000).</p>\n<p>Maintain the Crisis Management Framework (CMT charter, regional and site structures, severity levels, escalation criteria) and a comprehensive resiliency program.</p>\n<p>Partner with Enterprise Risk, Cyber, IT, Corporate Real Estate, HR, Legal, Compliance, and Operations to ensure a coordinated operational resilience posture.</p>\n<p>Crisis Management Leadership - Serve as primary crisis advisor to the CSO and Corporate Crisis Management Team (CMT) during multi-region or high-impact events (safety, security, cyber-physical, operational, reputational, geopolitical).</p>\n<p>Ensure clear, rehearsed activation protocols and handoffs between GSOC, regional/site IMTs, and the CMT; assume incident commander / deputy CMT lead role when required.</p>\n<p>Maintain and regularly update scenario playbooks (e.g., cyber outage with physical impact, regional conflict, terrorism, civil unrest, severe weather, major vendor failure).</p>\n<p>Preparedness Management - Assess existing prepare/recover methodologies and develop an integrated Resiliency framework.</p>\n<p>Work closely with cross-functional teams to understand existing protocols for key functions and locations.</p>\n<p>Global Threat Intelligence – Leadership &amp; Integration - Oversee the Global Threat Intelligence function, setting collection and analysis priorities based on the firm’s footprint and risk profile (geopolitics, terrorism, civil unrest, crime, cyber-physical, climate, regulatory/social trends).</p>\n<p>Ensure production of concise, decision-ready products (country profiles, flash alerts, risk outlooks, executive briefs) that drive specific crisis management and resiliency actions.</p>\n<p>Define clear triggers from intelligence to action (travel limitations, office posture changes, additional security measures, CMT/IMT activation, exercise themes).</p>\n<p>Exercises, Training &amp; Culture - Design and run global crisis exercises for the C-suite and regional leadership; oversee regular regional and site tabletop and functional drills.</p>\n<p>Set standards and content for resiliency and intelligence-related training (CMT, IMTs, GSOC, BC coordinators) and support awareness campaigns in partnership with HR and Communications.</p>\n<p>Drive a resilience culture, ensuring leaders know their roles in crises and staff understand core response actions and reporting channels.</p>\n<p>Continuous Improvement &amp; External Engagement - Lead After-Action Reviews for major incidents and exercises; track and close corrective actions, feeding lessons into strategy, policies, and plans.</p>\n<p>Maintain dashboards and metrics on crisis events, threat environment, and readiness, for regular CSO and Board-level reporting.</p>\n<p>Represent the firm in industry forums on resiliency and threat topics; maintain working relationships with peer institutions, law enforcement, emergency services, and key vendors.</p>\n<p>Experience &amp; Qualifications - 12–15+ years in crisis management, business continuity, corporate security, intelligence, or operational resilience.</p>\n<p>Experience in a global financial institution or similarly complex, regulated environment preferred.</p>\n<p>Proven track record leading complex, multi-jurisdiction incidents and senior-level exercises, including direct interaction with C-suite and Boards.</p>\n<p>Demonstrated experience building or maturing resiliency and/or intelligence programs (frameworks, governance, metrics, tooling).</p>\n<p>Strong understanding of global threat landscapes (geopolitical, terrorism, civil unrest, climate, cyber-physical) and their impact on financial markets, operations, and staff safety.</p>\n<p>Deep familiarity with relevant standards and regulatory regimes (e.g., ISO 22301, operational resilience frameworks in UK/EU/US/APAC).</p>\n<p>Exceptional executive communication and influence skills, capable of synthesizing complex information into clear recommendations under time pressure.</p>\n<p>Core Competencies - Strategic and systems thinking; able to connect threats, operations, and business outcomes.</p>\n<p>Calm, structured leadership and sound judgment under pressure.</p>\n<p>Strong analytical mindset with an intelligence-led, risk-based approach.</p>\n<p>High integrity, discretion, and sensitivity to privacy, legal, and cultural differences across countries.</p>\n<p>Program and change management skills, with the ability to drive adoption across regions and functions.</p>\n<p>The estimated base salary range for this position is $160,000 to $250,000, which is specific to New York and may change in the future.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_49ebcfec-670","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Security","sameAs":"https://mlp.eightfold.ai","logo":"https://logos.yubhub.co/mlp.eightfold.ai.png"},"x-apply-url":"https://mlp.eightfold.ai/careers/job/755953862178","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$160,000 to $250,000","x-skills-required":["crisis management","business continuity","corporate security","intelligence","operational resilience","ISO 22301","ISO 31000","global threat intelligence","cybersecurity","risk management","incident response","disaster recovery","resilience framework","governance","metrics","tooling"],"x-skills-preferred":[],"datePosted":"2026-04-18T22:13:57.122Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, New York, United States of America"}},"employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Finance","skills":"crisis management, business continuity, corporate security, intelligence, operational resilience, ISO 22301, ISO 31000, global threat intelligence, cybersecurity, risk management, incident response, disaster recovery, resilience framework, governance, metrics, tooling","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":160000,"maxValue":250000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_740da2af-174"},"title":"Security Engineer, Detection & Response","description":"<p>We are seeking a Senior Security Engineer with a specialty in Detection and Incident Response to join our Security Engineering team. This role sits at the intersection of security operations and software engineering, requiring you to investigate incidents and build the systems that detect, contain, and prevent them.</p>\n<p>You will design and ship high-precision detections across cloud services and enterprise SaaS, develop automation that shortens response timelines, and mature the telemetry pipelines that make it all possible. Your ability to write production-quality code is just as important as your ability to triage an alert.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Engineer, test, and deploy detection logic across cloud and enterprise environments, treating detections as software with version control, peer review, and measurable performance.</li>\n</ul>\n<ul>\n<li>Build and maintain incident response automation, runbooks, and tooling that reduce containment timelines without sacrificing developer velocity.</li>\n</ul>\n<ul>\n<li>Mature telemetry pipelines through improved schema design, normalization, enrichment, and quality checks that reduce false positives and increase signal fidelity.</li>\n</ul>\n<ul>\n<li>Perform digital incident investigations to identify and contain potential security breaches.</li>\n</ul>\n<ul>\n<li>Conduct digital forensics and malware analysis to understand attack vectors and adversary methodologies.</li>\n</ul>\n<ul>\n<li>Integrate alerting with messaging and ticketing systems to enable fast, traceable response workflows.</li>\n</ul>\n<ul>\n<li>Partner cross-functionally with IT, security, and engineering teams to harden identity and access patterns, close logging and forensics gaps, and implement maintainable guardrails that scale with the organisation.</li>\n</ul>\n<ul>\n<li>Utilize threat intelligence platforms to improve hunting, detection, and response workflows.</li>\n</ul>\n<ul>\n<li>Clearly explain the significance and impact of incidents, providing actionable recommendations to both technical and non-technical stakeholders.</li>\n</ul>\n<p>Ideal Candidate:</p>\n<ul>\n<li>5+ years of experience in Detection Engineering, Incident Response, or Security Operations, with a strong emphasis on building and shipping security tooling and automation.</li>\n</ul>\n<ul>\n<li>Proficiency in at least one programming language (e.g., Python, Go) and comfort writing production-grade code , not just scripts.</li>\n</ul>\n<ul>\n<li>Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments.</li>\n</ul>\n<ul>\n<li>Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically.</li>\n</ul>\n<ul>\n<li>Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs.</li>\n</ul>\n<ul>\n<li>Familiarity with digital forensics tools and malware analysis techniques.</li>\n</ul>\n<ul>\n<li>Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate.</li>\n</ul>\n<ul>\n<li>Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows.</li>\n</ul>\n<ul>\n<li>Strong communication skills, with the ability to translate complex security findings into clear business impact.</li>\n</ul>\n<ul>\n<li>Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus.</li>\n</ul>\n<p>Compensation packages at Scale for eligible roles include base salary, equity, and benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position, determined by work location and additional factors, including job-related skills, experience, interview performance, and relevant education or training. Scale employees in eligible roles are also granted equity based compensation, subject to Board of Director approval. Your recruiter can share more about the specific salary range for your preferred location during the hiring process, and confirm whether the hired role will be eligible for equity grant. You’ll also receive benefits including, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits, a learning and development stipend, and generous PTO. Additionally, this role may be eligible for additional benefits such as a commuter stipend.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_740da2af-174","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Scale","sameAs":"https://scale.com/","logo":"https://logos.yubhub.co/scale.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/scaleai/jobs/4684073005","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$237,600-$297,000 USD","x-skills-required":["Detection Engineering","Incident Response","Security Operations","Cloud Services","Enterprise SaaS","Automation","Telemetry Pipelines","Digital Forensics","Malware Analysis","Threat Intelligence Platforms","SIEM","EDR","SOAR","Cloud-Native Environments","Programming Languages","Python","Go"],"x-skills-preferred":["Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments","Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically","Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs","Familiarity with digital forensics tools and malware analysis techniques","Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate","Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows","Strong communication skills, with the ability to translate complex security findings into clear business impact","Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)"],"datePosted":"2026-04-18T16:00:14.303Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, NY; San Francisco, CA; Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Detection Engineering, Incident Response, Security Operations, Cloud Services, Enterprise SaaS, Automation, Telemetry Pipelines, Digital Forensics, Malware Analysis, Threat Intelligence Platforms, SIEM, EDR, SOAR, Cloud-Native Environments, Programming Languages, Python, Go, Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments, Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically, Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs, Familiarity with digital forensics tools and malware analysis techniques, Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate, Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows, Strong communication skills, with the ability to translate complex security findings into clear business impact, Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":237600,"maxValue":297000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b7959209-0c2"},"title":"Safeguards Policy Analyst, Fraud & Scams","description":"<p>As a Safeguards Policy Analyst focused on Fraud &amp; Scams, you will design, build, and execute enforcement workflows that detect and mitigate fraud and scam-related harms on Anthropic&#39;s products.</p>\n<p>This role sits within the Integrity &amp; Authenticity (I&amp;A) team, where you will function both as a policy owner and work closely with threat investigative and enforcement teams.</p>\n<p>Key responsibilities include drafting, maintaining, and iterating on Fraud &amp; Scams policies; conducting regular structured policy reviews; developing detailed threat models for fraud and scam vectors; and staying current on the fraud and scam landscape.</p>\n<p>You will also design and architect automated enforcement systems and human review workflows that scale effectively while maintaining high precision and recall.</p>\n<p>Additionally, you will serve as the primary policy point of contact for ML and Engineering teams developing fraud detection classifiers, working to translate policy intent into technical artifacts and training signals.</p>\n<p>If you have experience working as a Trust &amp; Safety professional with a focused background in fraud, scams, or financial crime, particularly in a tech platform or AI context, you may be a good fit for this role.</p>\n<p>Preferred qualifications include experience at a major technology platform, financial institution, or fraud intelligence firm in a policy, operations, or investigative capacity, familiarity with the generative AI risk landscape, and background in threat intelligence, financial crimes compliance (AML/KYC), or law enforcement focused on cyber-enabled fraud.</p>\n<p>The annual compensation range for this role is $245,000-$285,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b7959209-0c2","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.co/","logo":"https://logos.yubhub.co/anthropic.co.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5174857008","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$245,000-$285,000 USD","x-skills-required":["policy design","fraud and scam analysis","threat modeling","automated enforcement systems","human review workflows","ML and Engineering collaboration"],"x-skills-preferred":["generative AI risk landscape","threat intelligence","financial crimes compliance","law enforcement"],"datePosted":"2026-04-18T15:55:28.514Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly (Travel-Required) | San Francisco, CA | New York City, NY"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"policy design, fraud and scam analysis, threat modeling, automated enforcement systems, human review workflows, ML and Engineering collaboration, generative AI risk landscape, threat intelligence, financial crimes compliance, law enforcement","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":245000,"maxValue":285000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_051843ef-f93"},"title":"Vendor and Contract Manager, Safeguards","description":"<p>As the Vendor and Contract Manager on the Safeguards team, you will own the end-to-end lifecycle of Anthropic&#39;s safety-critical vendor, partner, and consultant relationships. This includes identifying and selecting vendors, contract negotiation, onboarding, ongoing performance management, and renewal.</p>\n<p>The vendors and partners you&#39;ll manage span verification, threat intelligence, process outsourcing, capability evaluation, civil society consultation, and research collaboration. You&#39;ll build repeatable processes where they&#39;re needed while staying nimble enough to handle novel partnership structures, like research collaborations, civil society consultations, and model red-teaming engagements that don&#39;t fit neatly into standard procurement workflows.</p>\n<p>You&#39;ll work closely with legal, procurement, finance, and engineering teams, and you&#39;ll be the person who knows where every Safeguards contract stands, what we&#39;re spending, and where we should consider a change.</p>\n<p>This is a role for someone who&#39;s comfortable operating across commercial, legal, and technical contexts in a fast-moving environment , someone who can negotiate contract terms, work with legal teams to redline contracts, set up model access for a research partner, and handle a vendor performance issue in one day.</p>\n<p>*Important context for this role: In this position you may be exposed to and engage with explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature.</p>\n<p>Responsibilities:</p>\n<p>Vendor Selection &amp; Onboarding - Understand the broad vendor landscape for Safeguards and drive vendor selection processes with expert input, factoring in tradeoffs between capability, price, and internal resources across categories including verification, threat intelligence, process outsourcing, and capability evaluation</p>\n<p>Conduct vendor due diligence and coordinate security and data governance reviews for vendors handling sensitive model access or content</p>\n<p>Forecast future partnership needs and proactively research vendors and partners that could meet emerging Safeguards requirements</p>\n<p>Contract &amp; Budget Management - Manage contracts across the Safeguards vendor and partner portfolio, working with legal and procurement teams on contract redlining, negotiation, and execution</p>\n<p>Work with legal teams and potential research partners to develop novel agreements for research collaboration, civil society consultation, and model red-teaming</p>\n<p>Handle invoicing, payment, and renewal processes with partners</p>\n<p>Own Safeguards vendor budget tracking and planning in partnership with finance teams, maintaining a clear picture of current spend and forecasting future needs</p>\n<p>Ongoing Vendor &amp; Partner Management - Manage vendor and researcher access to models and products during testing phases and trials</p>\n<p>Oversee and monitor vendor performance and usage, flagging issues and resolving concerns and disputes as they arise</p>\n<p>Report on vendor performance, spend, and contract status to Safeguards leadership</p>\n<p>You may be a good fit if you have:</p>\n<p>5+ years in vendor management, procurement, or contract operations, ideally in risk, fraud, compliance, or trust &amp; safety contexts at a technology company</p>\n<p>Demonstrated experience reviewing and negotiating contracts, including comfort with redlining and working alongside legal counsel</p>\n<p>Track record managing vendor budgets, including forecasting, tracking spend, and making tradeoff recommendations</p>\n<p>Understanding of AI safety, account abuse, or platform integrity issues , you know what verification vendors, threat intelligence providers, and content screening tools actually do</p>\n<p>Experience onboarding vendors and standing up new vendor relationships from scratch, not just managing existing ones</p>\n<p>Strong cross-functional collaboration skills, particularly with legal, procurement, finance, and engineering teams</p>\n<p>Comfort with ambiguity and fast-moving environments , you&#39;ve built or significantly improved vendor management processes, not just inherited them</p>\n<p>Nice to have:</p>\n<p>Experience in AI safety or AI-adjacent vendor ecosystems</p>\n<p>Familiarity with procurement tools such as Ironclad or Zip</p>\n<p>Annual compensation range for this role is $245,000-$285,000 USD</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_051843ef-f93","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5156596008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$245,000-$285,000 USD","x-skills-required":["vendor management","procurement","contract operations","risk management","fraud prevention","compliance","trust and safety","AI safety","account abuse prevention","platform integrity","verification vendors","threat intelligence providers","content screening tools"],"x-skills-preferred":["Ironclad","Zip","research collaboration","civil society consultation","model red-teaming"],"datePosted":"2026-04-18T15:54:23.403Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"vendor management, procurement, contract operations, risk management, fraud prevention, compliance, trust and safety, AI safety, account abuse prevention, platform integrity, verification vendors, threat intelligence providers, content screening tools, Ironclad, Zip, research collaboration, civil society consultation, model red-teaming","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":245000,"maxValue":285000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a922c6ae-3c1"},"title":"Technical CBRN-E  Threat Investigator","description":"<p>We are looking for a Technical CBRN-E Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for Chemical, Biological, Radiological, Nuclear, and Explosives (CBRN-E) threats.</p>\n<p>You will work at the intersection of AI safety and CBRN security, conducting thorough investigations into potential misuse cases, developing novel detection techniques, and building robust defenses against threat actors who may attempt to leverage our AI technology for developing weapons, synthesizing dangerous compounds, or creating biological harm.</p>\n<p>Important context: In this position you may be exposed to explicit content spanning a range of topics, including those of a sexual, violent, or psychologically disturbing nature. This role may require responding to escalations during weekends and holidays.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for developing, enhancing, or disseminating CBRN-E weapons, pathogens, toxins, or other threats to harm people, critical infrastructure, or the environment</li>\n</ul>\n<ul>\n<li>Conduct technical investigations using SQL, Python, and other tools to analyze large datasets, trace user behavior patterns, and uncover sophisticated CBRN-E threat actors</li>\n</ul>\n<ul>\n<li>Develop CBRN-E-specific detection capabilities, including abuse signals, tracking strategies, and detection methodologies tailored to dual-use research concerns</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on CBRN-E attack vectors, vulnerabilities, and threat actor TTPs leveraging AI systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis grounded in real threat actor behavior, open-source research, and publicly reported programs</li>\n</ul>\n<ul>\n<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>\n</ul>\n<ul>\n<li>Engage with external stakeholders including government agencies, regulatory bodies, scientific organizations, and biosecurity/chemical security research communities</li>\n</ul>\n<ul>\n<li>Inform safety-by-design strategies by forecasting how threat actors may leverage advances in AI technology for CBRN-E purposes</li>\n</ul>\n<p>You may be a good fit if you</p>\n<ul>\n<li>Have deep domain expertise in biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, or related CBRN-E threat domains</li>\n</ul>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience with threat actor profiling and utilizing threat intelligence frameworks</li>\n</ul>\n<ul>\n<li>Have hands-on experience with large language models and understanding of how AI technology could be misused for CBRN-E threats</li>\n</ul>\n<ul>\n<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>\n</ul>\n<ul>\n<li>Can present analytical work to both technical and non-technical audiences, including government stakeholders and senior leadership</li>\n</ul>\n<p>Strong candidates may also have</p>\n<ul>\n<li>Advanced degree (MS or PhD) in biological sciences, chemistry, biodefense, biosecurity, or related field</li>\n</ul>\n<ul>\n<li>Real-world experience countering weapons of mass destruction or other high-risk asymmetric threats</li>\n</ul>\n<ul>\n<li>Experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Familiarity with synthetic biology, biotechnology, or dual-use research</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p>The annual compensation range for this role is $230,000-$290,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a922c6ae-3c1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066997008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000-$290,000 USD","x-skills-required":["SQL","Python","biosecurity","chemical defense","biological weapons non-proliferation","dual-use research of concern (DURC)","synthetic biology","threat actor profiling","threat intelligence frameworks","large language models","AI technology misuse"],"x-skills-preferred":["advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field","real-world experience countering weapons of mass destruction or other high-risk asymmetric threats","experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information","background in AI safety, machine learning security, or technology abuse investigation","familiarity with synthetic biology, biotechnology, or dual-use research","experience building and scaling threat detection systems or abuse monitoring programs","active Top Secret security clearance"],"datePosted":"2026-04-18T15:53:57.472Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly (Travel-Required) | San Francisco, CA | Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, threat actor profiling, threat intelligence frameworks, large language models, AI technology misuse, advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field, real-world experience countering weapons of mass destruction or other high-risk asymmetric threats, experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information, background in AI safety, machine learning security, or technology abuse investigation, familiarity with synthetic biology, biotechnology, or dual-use research, experience building and scaling threat detection systems or abuse monitoring programs, active Top Secret security clearance","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_62900fcd-562"},"title":"Security Engineer - Offensive Security","description":"<p>As an Offensive Security Engineer on the Proactive Threat team at Stripe, you will simulate the tactics, techniques, and procedures (TTPs) of real-world adversaries to uncover security risks across Stripe&#39;s products and infrastructure.</p>\n<p>You&#39;ll conduct hands-on penetration testing, lead red team engagements, and collaborate with blue team counterparts to validate and improve detection and response capabilities. Your work will directly influence how Stripe builds, ships, and secures financial infrastructure used by millions of businesses worldwide.</p>\n<p>Responsibilities:</p>\n<p>Conduct comprehensive penetration tests across web applications, APIs, cloud environments (AWS/GCP/Azure), mobile applications, and internal infrastructure.</p>\n<p>Plan and execute red team engagements that emulate the TTPs of cyber and criminal threat actors targeting financial services, including initial access, lateral movement, persistence, and data exfiltration scenarios.</p>\n<p>Perform assumed-breach and objective-based assessments to test detection and response capabilities in coordination with defensive teams.</p>\n<p>Partner with detection engineering, threat intelligence, and incident response teams to validate security controls, identify coverage gaps, and improve detection fidelity.</p>\n<p>Contribute adversary tradecraft insights to inform detection rule development, threat hunting hypotheses, and incident response playbooks.</p>\n<p>Support incident investigations by providing offensive expertise, log analysis, and root cause analysis when required.</p>\n<p>Design, develop, and maintain custom offensive tools, scripts, and automation frameworks to enhance assessment efficiency and coverage.</p>\n<p>Build internal platforms and workflows that enable scalable, repeatable offensive operations.</p>\n<p>Contribute to internal security tooling repositories and champion engineering best practices within the team.</p>\n<p>Automate repetitive testing tasks, payload generation, and reporting workflows using modern development practices.</p>\n<p>Produce clear, actionable reports that communicate technical findings, business risk, and remediation guidance to both technical and non-technical stakeholders.</p>\n<p>Act as a subject-matter expert and primary point of contact for stakeholder teams engaged in offensive security programs and Stripe-wide security initiatives.</p>\n<p>Lead offensive security projects end-to-end, mentor junior team members, and foster a culture of continuous learning and knowledge sharing.</p>\n<p>Stay current with emerging threats, vulnerabilities, and attack techniques; share research internally and contribute to the broader security community.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_62900fcd-562","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Stripe","sameAs":"https://stripe.com/","logo":"https://logos.yubhub.co/stripe.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/stripe/jobs/7820898","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Python","Go","Web application security","Cloud platforms (AWS, Azure, or GCP)","Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound)","Adversary tradecraft and frameworks (MITRE ATT&CK)","Excellent written and verbal communication skills"],"x-skills-preferred":["Experience conducting offensive security in fintech, financial services, or other highly regulated environments","Background in vulnerability research, exploit development, or CVE discovery","Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations)","Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support","Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows"],"datePosted":"2026-04-18T15:51:01.913Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Ireland"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Web application security, Cloud platforms (AWS, Azure, or GCP), Offensive tooling (Burp Suite, Cobalt Strike, Mythic, Sliver, BloodHound), Adversary tradecraft and frameworks (MITRE ATT&CK), Excellent written and verbal communication skills, Experience conducting offensive security in fintech, financial services, or other highly regulated environments, Background in vulnerability research, exploit development, or CVE discovery, Experience collaborating with threat intelligence, detection engineering, or incident response teams (purple team operations), Familiarity with big data and log analysis tools (Splunk, Databricks, PySpark, osquery, etc.) for threat hunting or investigative support, Proficiency with AI/LLM-assisted development tools (e.g., Claude Code, Cursor, GitHub Copilot) and experience applying them to offensive security workflows"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c97d7951-486"},"title":"Safeguards Policy Analyst, Fraud & Scams","description":"<p>As a Safeguards Policy Analyst focused on Fraud &amp; Scams, you will design, build, and execute enforcement workflows that detect and mitigate fraud and scam-related harms on Anthropic&#39;s products.</p>\n<p>This role sits within the Integrity &amp; Authenticity (I&amp;A) team, where you will function both as a policy owner and work closely with threat investigative and enforcement teams.</p>\n<p>Key responsibilities include drafting, maintaining, and iterating on Fraud &amp; Scams policies; conducting regular structured policy reviews; developing detailed threat models for fraud and scam vectors; and staying current on the fraud and scam landscape.</p>\n<p>You will also design and architect automated enforcement systems and human review workflows that scale effectively while maintaining high precision and recall.</p>\n<p>Additionally, you will serve as the primary policy point of contact for ML and Engineering teams developing fraud detection classifiers, working to translate policy intent into technical artifacts and training signals.</p>\n<p>You may be a good fit if you have experience working as a Trust &amp; Safety professional with a focused background in fraud, scams, or financial crime, particularly in a tech platform or AI context.</p>\n<p>Preferred qualifications include experience at a major technology platform, financial institution, or fraud intelligence firm in a policy, operations, or investigative capacity, familiarity with the generative AI risk landscape, and background in threat intelligence, financial crimes compliance (AML/KYC), or law enforcement focused on cyber-enabled fraud.</p>\n<p>The annual compensation range for this role is $245,000-$285,000 USD.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c97d7951-486","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.co/","logo":"https://logos.yubhub.co/anthropic.co.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5174857008","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$245,000-$285,000 USD","x-skills-required":["Fraud and scam policy design and implementation","Threat modeling and risk assessment","Automated enforcement system design and architecture","Policy translation and technical artifact development","Collaboration with ML and Engineering teams"],"x-skills-preferred":["Generative AI risk landscape knowledge","Threat intelligence and financial crimes compliance","Law enforcement and cyber-enabled fraud expertise"],"datePosted":"2026-04-18T15:46:56.104Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote-Friendly (Travel-Required) | San Francisco, CA | New York City, NY"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Fraud and scam policy design and implementation, Threat modeling and risk assessment, Automated enforcement system design and architecture, Policy translation and technical artifact development, Collaboration with ML and Engineering teams, Generative AI risk landscape knowledge, Threat intelligence and financial crimes compliance, Law enforcement and cyber-enabled fraud expertise","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":245000,"maxValue":285000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_e88bd210-6a6"},"title":"Product Management Director, Okta Identity Threat Detection and Response Products","description":"<p>Secure Every Identity</p>\n<p>Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes.</p>\n<p>We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p><strong>Job Duties and Responsibilities:</strong></p>\n<p><strong>Roadmap and Vision</strong></p>\n<p>Define the product strategy and roadmap for Okta Identity Security functionality to ensure Okta&#39;s continued leadership in the security space.</p>\n<p>Evangelize your vision to engineering teams, the broader product organisation, and customers.</p>\n<p>Develop and execute a comprehensive roadmap, prioritising features that enhance both customer security posture and administrative ease of use.</p>\n<p>Analyse and leverage data to inform product and roadmap decisions, ensuring data-driven strategic choices.</p>\n<p><strong>Product Delivery and Execution</strong></p>\n<p>Ensure the timely and within-budget delivery of the Okta Identity Security product roadmap.</p>\n<p>Collaborate closely with architecture, engineering, and design to specify experiences that are platform-first and delight customers at scale.</p>\n<p>Work with scrum teams and Technical Program Managers (TPMs) to deliver features on time that address key security use cases.</p>\n<p>Rigorously prioritise across multiple product investment areas within the security domain.</p>\n<p>Partner with the data team to track product usage metrics, specifically tying them to improved security outcomes and business success.</p>\n<p><strong>Customer Engagement and Requirements Gathering</strong></p>\n<p>Work with engineering, other product managers, and customers to capture detailed security requirements and document user stories and use cases.</p>\n<p>Engage with customers to deeply understand their challenges related to identity-centric threats, access control, and network security.</p>\n<p>Ensure that beta customer feedback is incorporated into product iterations.</p>\n<p>Maintain close relationships with customers during beta programmes to integrate their insights effectively.</p>\n<p>Collaborate with technical marketing and sales to understand the competitive landscape for identity security and Okta’s position within it.</p>\n<p>Partner with product marketing to support the creation of compelling messaging and content, and define the go-to-market strategy for existing and new security offerings.</p>\n<p>Inform current and future pricing and packaging changes for Okta Identity Security products based on your subject matter expertise.</p>\n<p><strong>Own the Product</strong></p>\n<p>Maintain a customer-success-focused mindset, actively working to unblock sales and assist customers with security-related issues.</p>\n<p>Responsible for supporting the field on critical requests and customer security needs.</p>\n<p>Drive the development of world-class identity security products and platform capabilities.</p>\n<p>Lead Okta Identity Security quarterly business reviews and collaborate with the go-to-market team to expand the customer pipeline from roadmap to packaging.</p>\n<p>Leverage your domain expertise to identify new product opportunities for Okta Identity Security to expand our portfolio.</p>\n<p><strong>Qualifications:</strong></p>\n<p><strong>Required:</strong></p>\n<p>Bachelor’s degree in a technical field.</p>\n<p>Proven track record of demonstrating strategic vision and product design for security-focused products.</p>\n<p>Experience creating new product offerings, including Go-to-Market (GTM) strategy, pricing, product naming, legal contracts, and New Product Introduction (NPI).</p>\n<p>Experience with defining and driving Threat Protection, Threat Intelligence, SaaS Security and Network Security as a product suite.</p>\n<p>Experience across the product management lifecycle for enterprise security products or services.</p>\n<p>Thirst for learning: able to go broad and deep across business and technical security contexts.</p>\n<p>Track record of owning and delivering on large strategic projects – you can see the big picture, but deliver on the details.</p>\n<p>Strong technical background that allows you to influence technical design and investment decisions, particularly in security architectures.</p>\n<p>Ability to produce solid action plans from often incomplete, conflicting, or ambiguous security inputs.</p>\n<p>Strong track record of influencing teams and operating effectively as a player-coach.</p>\n<p>Excellent communication skills across technical and business audiences, especially when discussing complex security concepts.</p>\n<p>Strong leadership skills and executive presence.</p>\n<p>Passion for Okta’s immense opportunity and growth potential in the identity security market.</p>\n<p>8+ years product management experience.</p>\n<p>Experience interviewing and selecting candidates.</p>\n<p>Mentoring early-in-career product managers.</p>\n<p><strong>Preferred:</strong></p>\n<p>Advanced degree in a technical or business field.</p>\n<p>Deep knowledge of enterprise security products and services, including cybersecurity frameworks and best practices.</p>\n<p>Extensive knowledge of identity and access management (IAM) and its intersection with security.</p>\n<p>Understanding of authentication, authorisation, and threat detection standards.</p>\n<p>Experience with developing user flows and enabling customisable security experiences.</p>\n<p>Experience creating and managing multi-tenant SaaS security software products.</p>\n<p><strong>Salary and Benefits:</strong></p>\n<p>The annual base salary range for this position for candidates located in California (excluding San Francisco Bay Area), Colorado, Illinois, New York, and Washington is between $230,000-$317,000 USD.</p>\n<p>In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.</p>\n<p>To learn more about our Total Rewards programme please visit: https://rewards.okta.com/us.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_e88bd210-6a6","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7648682","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000-$317,000 USD","x-skills-required":["product management","security-focused products","Go-to-Market (GTM) strategy","pricing","product naming","legal contracts","New Product Introduction (NPI)","Threat Protection","Threat Intelligence","SaaS Security","Network Security","identity and access management (IAM)","authentication","authorisation","threat detection","user flows","customisable security experiences","multi-tenant SaaS security software products"],"x-skills-preferred":["advanced degree in a technical or business field","deep knowledge of enterprise security products and services","cybersecurity frameworks and best practices","extensive knowledge of IAM and its intersection with security","understanding of authentication, authorisation, and threat detection standards","experience with developing user flows and enabling customisable security experiences","experience creating and managing multi-tenant SaaS security software products"],"datePosted":"2026-04-18T15:45:16.131Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, New York"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"product management, security-focused products, Go-to-Market (GTM) strategy, pricing, product naming, legal contracts, New Product Introduction (NPI), Threat Protection, Threat Intelligence, SaaS Security, Network Security, identity and access management (IAM), authentication, authorisation, threat detection, user flows, customisable security experiences, multi-tenant SaaS security software products, advanced degree in a technical or business field, deep knowledge of enterprise security products and services, cybersecurity frameworks and best practices, extensive knowledge of IAM and its intersection with security, understanding of authentication, authorisation, and threat detection standards, experience with developing user flows and enabling customisable security experiences, experience creating and managing multi-tenant SaaS security software products","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":317000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9bf55fe3-b2b"},"title":"Detection & Response Engineer","description":"<p>We are seeking a skilled and proactive Detection &amp; Response Engineer to join our security team. In this critical role, you will be responsible for detecting, investigating, and responding to security incidents across our cloud-native and AI-focused infrastructure.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Monitor and analyse security alerts and logs to identify potential threats and anomalies</li>\n<li>Develop, implement, and maintain detection rules and correlation logic in our SIEM platform</li>\n<li>Conduct thorough investigations of security incidents, performing root cause analysis and impact assessments</li>\n<li>Lead incident response efforts, coordinating with relevant teams to contain and mitigate threats</li>\n<li>Create and maintain incident response playbooks and runbooks</li>\n<li>Perform regular threat hunting activities to proactively identify potential security risks</li>\n<li>Develop and refine metrics and reporting to track the effectiveness of detection and response capabilities</li>\n<li>Collaborate with other security teams to improve overall security posture and incident handling processes</li>\n<li>Stay current with emerging threats, attack techniques, and defensive strategies in the cloud-native and AI domains</li>\n</ul>\n<p><strong>Basic Qualifications</strong></p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Cybersecurity, or a related field</li>\n<li>3-5 years of experience in security operations, incident response, or a similar role</li>\n<li>Strong understanding of cybersecurity principles, attack techniques, and defensive strategies</li>\n<li>Proficiency in at least one scripting language (e.g., Python, Rust) for automation and tool development</li>\n<li>Experience with SIEM platforms and log analysis tools</li>\n<li>Familiarity with cloud environments (e.g., AWS, GCP, Azure) and their security features</li>\n<li>Knowledge of network protocols, system administration, and common attack vectors</li>\n<li>Strong analytical and problem-solving skills with attention to detail</li>\n<li>Excellent communication skills and ability to work effectively under pressure</li>\n</ul>\n<p><strong>Preferred Skills and Experience</strong></p>\n<ul>\n<li>Relevant security certifications (e.g., GCIH, GCIA, SANS)</li>\n<li>Experience with threat intelligence platforms and their integration into detection processes</li>\n<li>Familiarity with AI/ML security implications, particularly those outlined in the OWASP LLM Top 10</li>\n<li>Knowledge of software supply chain security and SBOM analysis</li>\n<li>Experience with containerized environments and Kubernetes security</li>\n<li>Experience in building custom security tools or integrations to enhance detection and response capabilities</li>\n<li>Interest in leveraging AI to improve threat detection and automate response processes</li>\n<li>Contributions to open-source security projects or threat research</li>\n<li>Experience with digital forensics and malware analysis</li>\n</ul>\n<p><strong>Compensation and Benefits</strong></p>\n<p>$200,000 - $340,000 USD</p>\n<p>Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short &amp; long-term disability insurance, life insurance, and various other discounts and perks.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9bf55fe3-b2b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"xAI","sameAs":"https://www.xai.com/","logo":"https://logos.yubhub.co/xai.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/xai/jobs/4559148007","x-work-arrangement":"onsite","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$200,000 - $340,000 USD","x-skills-required":["cybersecurity principles","attack techniques","defensive strategies","scripting language","SIEM platforms","log analysis tools","cloud environments","network protocols","system administration","common attack vectors"],"x-skills-preferred":["relevant security certifications","threat intelligence platforms","AI/ML security implications","software supply chain security","containerized environments","Kubernetes security","custom security tools","digital forensics","malware analysis"],"datePosted":"2026-04-18T15:23:47.430Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Palo Alto, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity principles, attack techniques, defensive strategies, scripting language, SIEM platforms, log analysis tools, cloud environments, network protocols, system administration, common attack vectors, relevant security certifications, threat intelligence platforms, AI/ML security implications, software supply chain security, containerized environments, Kubernetes security, custom security tools, digital forensics, malware analysis","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":200000,"maxValue":340000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_538cc1dd-079"},"title":"Lead Cybersecurity Automation Engineer","description":"<p>You will lead the development of end-to-end automation and orchestration strategies for Security Operations, covering detection, triage, investigation, containment, remediation, and post-incident learning.</p>\n<p>As a seasoned cybersecurity professional, you will architect and implement scalable, resilient automation frameworks that seamlessly integrate SIEM, SOAR, EDR/XDR, cloud security, identity, vulnerability management, and threat intelligence platforms.</p>\n<p>You will design and deploy AI/LLM-enabled workflows to enhance alert triage, enrichment, investigation summarization, decision support, and response actions.</p>\n<p>You will collaborate closely with internal stakeholders and external teams to align security outcomes with business priorities.</p>\n<p>You will foster a culture of engineering excellence and continuous improvement within SecOps.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning and defining the end-to-end automation and orchestration strategy for Security Operations</li>\n<li>Architecting and implementing scalable, resilient automation frameworks</li>\n<li>Designing and deploying AI/LLM-enabled workflows</li>\n<li>Collaborating with internal stakeholders and external teams</li>\n<li>Fostering a culture of engineering excellence and continuous improvement</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>10+ years of experience in cybersecurity</li>\n<li>Expertise in designing and deploying large-scale security automation and orchestration in enterprise environments</li>\n<li>Hands-on experience with SOAR platforms, SIEMs, EDR/XDR, and security telemetry pipelines</li>\n<li>Proven ability to apply AI/ML, including LLM-based agentic technologies, to security workflows</li>\n<li>Advanced scripting and automation skills</li>\n<li>Strong data analytics skills</li>\n<li>Solid systems architecture skills</li>\n<li>Excellent written and verbal communication skills</li>\n</ul>\n<p>As a member of the Synopsys Cybersecurity team, you will work alongside experts in SOC, IR, Threat Intelligence, Detection Engineering, and more, collaborating to build resilient, scalable, and innovative security solutions.</p>\n<p>Synopsys offers a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_538cc1dd-079","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/austin/lead-cybersecurity-automation-engineer/44408/92980004592","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$161000-$242000","x-skills-required":["cybersecurity","automation","orchestration","SIEM","SOAR","EDR/XDR","cloud security","identity","vulnerability management","threat intelligence","AI/ML","LLM","agentic technologies","scripting","data analytics","systems architecture"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:23:30.122Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, automation, orchestration, SIEM, SOAR, EDR/XDR, cloud security, identity, vulnerability management, threat intelligence, AI/ML, LLM, agentic technologies, scripting, data analytics, systems architecture","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":161000,"maxValue":242000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b313e462-e65"},"title":"Security Operations Engineer - Engine by Starling","description":"<p>At Engine by Starling, we are on a mission to find and work with leading banks all around the world who have the ambition to build rapid growth businesses, on our technology.</p>\n<p>Engine is Starling&#39;s software-as-a-service (SaaS) business, the technology that was built to power Starling, and two years ago we split out as a separate business. Starling has seen exceptional growth and success, and a large part of that is down to the fact that we have built our own modern technology from the ground up.</p>\n<p>This SaaS technology platform is now available to banks and financial institutions all around the world, enabling them to benefit from the innovative digital features, and efficient back-office processes that has helped achieve Starling&#39;s success.</p>\n<p>As a company, everyone is expected to roll up their sleeves to help deliver great outcomes for our clients. We are an engineering led company and we’re looking for people who are will be excited by the potential for Engine’s technology to transform banking in different markets around the world.</p>\n<p>Our purpose is underpinned by five values: Listen, Keep It Simple, Do The Right Thing, Own It, and Aim For Greatness.</p>\n<p>Hybrid Working We have a Hybrid approach to working here at Engine - our preference is that you&#39;re located within a commutable distance of one of our offices so that we&#39;re able to interact and collaborate in person.</p>\n<p>About the Role To support our growth, we are looking for talented and motivated SOC engineers to join our foundational in-house SOC team.</p>\n<p>In this pivotal role, you will be instrumental in supporting the development, implementation, and operating of our security monitoring, detection, and response capabilities, with a particular focus on our cloud environments.</p>\n<p>You&#39;ll be at the forefront of responding to incidents and alerts, and helping shape the future of our security operations capabilities.</p>\n<p>What you&#39;ll get to do:</p>\n<p>Security Monitoring &amp; Alert Triage: Monitor security alerts and events generated by various security tools, perform triage and analysis of security incidents and anomalies, distinguishing between true positives and false positives.</p>\n<p>Prioritise alerts based on severity, potential impact, and business criticality.</p>\n<p>Incident Detection &amp; Response: Investigate security incidents thoroughly, leveraging logs from platforms, endpoints, applications, and other security tools.</p>\n<p>Create and follow incident response playbooks and contribute to their continuous improvement.</p>\n<p>Collaborate with Technology, Product and Engineering Teams to contain, eradicate, and recover from security incidents.</p>\n<p>Document incident details, findings, and remediation steps accurately and comprehensively.</p>\n<p>Additionally:</p>\n<p>Stay informed about the latest cyber threats, attack techniques, and vulnerabilities, especially those targeting cloud environments.</p>\n<p>Participate in proactive threat hunting activities using available tools and data sources.</p>\n<p>Contribute to the optimisation, tuning, and maintenance of SOC tools.</p>\n<p>Identify opportunities for automation to streamline security operations and enhance detection capabilities.</p>\n<p>Maintain detailed records of security incidents, investigations, and remediation actions.</p>\n<p>Requirements:</p>\n<p>3+ years of hands-on experience in a Security Operations Center (SOC) or similar cybersecurity role.</p>\n<p>Demonstrable experience with cloud security monitoring and incident response.</p>\n<p>Familiarity with various attack vectors, threat intelligence frameworks (e.g., MITRE ATT&amp;CK).</p>\n<p>A cyber/information security related degree and/or relevant cybersecurity qualifications would be beneficial e.g. CompTIA Security+, (ISC)² SSCP or CySA+</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b313e462-e65","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Engine by Starling","sameAs":"https://www.starlingbank.com/engine/","logo":"https://logos.yubhub.co/starlingbank.com.png"},"x-apply-url":"https://apply.workable.com/j/BDF61CB32E","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cloud security monitoring","Incident response","Threat intelligence","Attack vectors","Cybersecurity","Security operations center","SOC"],"x-skills-preferred":[],"datePosted":"2026-03-20T16:16:20.527Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Cardiff"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Finance","skills":"Cloud security monitoring, Incident response, Threat intelligence, Attack vectors, Cybersecurity, Security operations center, SOC"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_4474c998-9c7"},"title":"Cyber Security Engineer","description":"<p><strong>Cyber Security Engineer</strong></p>\n<p><strong>What we&#39;re all about</strong></p>\n<p>At Quantexa, we&#39;re a team of innovators and problem solvers who are passionate about creating real change for our clients and their industries. We&#39;re driven by a desire to do things better than the last time, and we&#39;re always looking for talented individuals to join our team.</p>\n<p><strong>The opportunity</strong></p>\n<p>We&#39;re seeking a highly skilled Cyber Security Engineer to join our Security Operations team. As a Cyber Security Engineer, you will play a key part in protecting Quantexa&#39;s systems and data from cyber threats. You will be responsible for the day-to-day operation, optimisation, and monitoring of core security platforms, with a particular focus on Zscaler, Cloud monitoring through Wiz, and Endpoint Detection and Response through CrowdStrike.</p>\n<p><strong>Responsibilities</strong></p>\n<p><strong>Wiz (Cloud Security Posture Management)</strong></p>\n<ul>\n<li>Monitor and triage Wiz findings daily, validating alerts and determining operational impact.</li>\n<li>Perform tuning and threat hunting within Wiz and other tooling.</li>\n<li>Identify misconfigurations, excessive permissions, and exposed assets, escalating where required.</li>\n<li>Track remediation progress with engineering owners and ensure closure of high-priority issues.</li>\n</ul>\n<p><strong>Zscaler (Web Security Tunnel 2.0)</strong></p>\n<ul>\n<li>Review and triage Zscaler alerts and policy violations, following documented response procedures.</li>\n<li>Investigate suspicious traffic, access attempts, and user activity to determine legitimacy and risk.</li>\n<li>Support enforcement actions by validating policy alignment and working with IT and Cloud teams to remediate issues.</li>\n<li>Monitor coverage and configuration across users and locations, identifying gaps or misconfigurations.</li>\n<li>Support policy tuning by analysing false positives and recommending rule or policy adjustments.</li>\n<li>Contribute to playbook development, operational maturity, and ongoing service readiness.</li>\n</ul>\n<p><strong>CrowdStrike (Endpoint Detection and Response)</strong></p>\n<ul>\n<li>Review and triage endpoint detections, applying documented response steps.</li>\n<li>Execute containment actions, including network isolation and sensor troubleshooting.</li>\n<li>Validate full sensor coverage across the estate and address gaps in coordination with IT.</li>\n<li>Support tuning activities by analysing false positives and proposing rule refinements.</li>\n<li>Contribute to playbook improvements and operational readiness tasks.</li>\n</ul>\n<p><strong>Security Operations</strong></p>\n<ul>\n<li>Conduct initial investigation of security incidents, collect evidence, and escalate based on severity with a keen eye on the quality of the output.</li>\n<li>Perform daily review of alerts across our SIEM, Wiz, CrowdStrike, and other platforms.</li>\n<li>Validate vulnerabilities and configuration weaknesses raised by scanning tools.</li>\n<li>Ability to interpret and operationalise threat intelligence, understand how it informs detection, prioritisation, and response activities, and clearly communicate technical threat intelligence to non-technical stakeholders.</li>\n<li>Support cloud security controls, identity hygiene checks, and network policy reviews.</li>\n<li>Contribute to the ongoing maturity and documentation of operational processes.</li>\n</ul>\n<p><strong>Collaboration and Ways of Working</strong></p>\n<ul>\n<li>Act as a trusted operational partner to the Cyber Security Manager and the wider Information Security team, providing proactive support and consistent engagement.</li>\n<li>Partner closely with DevOps, IT, and Engineering teams to drive timely and effective remediation actions.</li>\n<li>Deliver clear and concise updates on incidents and operational activities proactively, without the need for prompting.</li>\n<li>Actively participate in team stand ups, contributing constructively to continuous improvement and operational maturity.</li>\n<li>Support senior engineers with platform enhancements, integrations, and controlled change activities.</li>\n</ul>\n<p><strong>What you&#39;ll bring</strong></p>\n<ul>\n<li>Demonstrated hands-on experience with security operations, incident triage, or vulnerability management.</li>\n<li>Familiarity with EDR platforms (ideally CrowdStrike) and security telemetry analysis.</li>\n<li>Knowledge of cloud environments, particularly Azure including Entra and Conditional Access, and a good understanding of cloud security concepts.</li>\n<li>Ability to understand alert context, assess impact, and follow structured response processes.</li>\n<li>Strong attention to detail, disciplined documentation, and good communication skills.</li>\n</ul>\n<p><strong>Benefits</strong></p>\n<ul>\n<li>Competitive salary</li>\n<li>Company bonus</li>\n<li>Hybrid workplace &amp; free access to global WeWork locations &amp; events</li>\n<li>Pension Scheme with a company contribution of 6% (if you contribute 4% or more)</li>\n<li>25 days annual leave</li>\n<li>Flexible working hours</li>\n<li>Professional development opportunities</li>\n<li>Access to a range of employee benefits, including health insurance, gym membership, and more</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_4474c998-9c7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Quantexa","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/5jNMqMFg7cJnLPEDaozihW/hybrid-cyber-security-engineer-in-london-at-quantexa","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cloud Security Posture Management","Endpoint Detection and Response","Web Security","Security Operations","Threat Intelligence","Cloud Security","Azure","Conditional Access","Entra","CrowdStrike","Wiz","Zscaler","SIEM","Vulnerability Management","Incident Triage","EDR Platforms","Security Telemetry Analysis"],"x-skills-preferred":["Cloud Security Posture Management","Endpoint Detection and Response","Web Security","Security Operations","Threat Intelligence","Cloud Security","Azure","Conditional Access","Entra","CrowdStrike","Wiz","Zscaler","SIEM","Vulnerability Management","Incident Triage","EDR Platforms","Security Telemetry Analysis"],"datePosted":"2026-03-09T16:56:37.142Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Cloud Security Posture Management, Endpoint Detection and Response, Web Security, Security Operations, Threat Intelligence, Cloud Security, Azure, Conditional Access, Entra, CrowdStrike, Wiz, Zscaler, SIEM, Vulnerability Management, Incident Triage, EDR Platforms, Security Telemetry Analysis, Cloud Security Posture Management, Endpoint Detection and Response, Web Security, Security Operations, Threat Intelligence, Cloud Security, Azure, Conditional Access, Entra, CrowdStrike, Wiz, Zscaler, SIEM, Vulnerability Management, Incident Triage, EDR Platforms, Security Telemetry Analysis"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0d6b0b5c-92a"},"title":"Governance, Risk, and Compliance (GRC) SME- (m/w/d) DACH-Region","description":"<p><strong>Job Description</strong></p>\n<p>You will be part of a team that supports CIOs in managing central challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget restrictions. As a Cyber GRC Senior Consultant, you will work with security, IT, and compliance teams to strengthen cybersecurity, manage cyber risks, and ensure regulatory compliance.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Participate in global projects in an international team, supported by over 330,000 technical professionals from our parent company</li>\n<li>Contribute to the development of consulting offerings and innovative go-to-market solutions for the C-Suite to make cyber risks understandable and reducible</li>\n<li>Lead and conduct risk analyses according to the NIST CSF</li>\n<li>Be responsible for conceiving innovative new services using AI and ML where they offer real added value</li>\n<li>Support pre-sales, sales, and account management activities from the perspective of a subject matter expert</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>You have a clear career progression and experience working with renowned consulting firms and large commercial sector customers</li>\n<li>You bring a strong passion for cybersecurity and actively follow current industry trends and developments</li>\n<li>Your cybersecurity expertise includes:</li>\n</ul>\n<p>+ A relevant university degree (Bachelor or Master) in Information Security, Cybersecurity, or IT Security \t+ At least 1-5+ years of experience in the field of Cyber Security/Information Security \t+ A broad business competence profile, including stakeholder management, problem-solving ability, and resilience \t+ Experience in collecting, validating, analyzing, documenting, and communicating information to stakeholders</p>\n<p><strong>Desired Skills</strong></p>\n<ul>\n<li>Good knowledge of the NIST Cybersecurity Framework (CSF)</li>\n<li>A further university degree in Cyber or Information Security</li>\n<li>Cyber Due Diligence Assessments</li>\n<li>Cyber Risk Management for third parties and supply chains</li>\n<li>Review of Incident Response Plans</li>\n<li>Support in tenders, RFP responses, and offers</li>\n<li>Conducting Crisis Management Exercises (CMX)</li>\n<li>Certifications such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM</li>\n<li>Participation in the development of Target Operating Models (TOMs) and RACI matrices</li>\n<li>Creation of Cyber Security Roadmaps</li>\n<li>Support in Post-Incident Reviews</li>\n<li>Analysis and summarization of Cyber Threat Intelligence Reports</li>\n<li>Implementation of Cyber Compliance Programs (DSGVO, DORA, ISO 27001, NIS2, SOX)</li>\n<li>Cyber Risk or Maturity Assessments</li>\n<li>Conception and/or implementation of Awareness Trainings</li>\n<li>Participation in Identity &amp; Access Management Projects</li>\n<li>Participation in Privileged Access Management Projects</li>\n</ul>\n<p><strong>Ideal Candidate Profile</strong></p>\n<ul>\n<li>Our ideal candidates have the following skills:</li>\n</ul>\n<p>+ Strong business competence, particularly in stakeholder management and problem-solving \t+ Experience in preparing and communicating complex information to stakeholders \t+ Very good communication skills in German (C2) and English (C2) and project-related travel readiness \t+ Enjoy working with customers from different industries \t+ Experience in balancing technical and commercial requirements to develop practical solutions \t+ Ability to build lasting business relationships at all levels \t+ Ability to provide expert support and guidance to less experienced colleagues \t+ Ability to explain complex cyber methods in a non-technical and understandable way (written and oral)</p>\n<p><strong>Benefits</strong></p>\n<p>You will be part of a team that supports CIOs in managing central challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget restrictions. Our team of business analysts, enterprise architects, and cyber security specialists combines operational, strategic, analytical, and innovative competencies to drive business-IT alignment, IT governance transformation, IT cost optimization, efficiency improvement, innovation promotion, and cyber risk, governance, and compliance topics.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>You will be part of a globally renowned management consulting firm that is on the front-line of industry disruption. We are a mid-size player with a supportive, entrepreneurial spirit that works with a market-leading brand in every sector, while our parent organization Infosys is a top-5 powerhouse IT brand that is outperforming the market and experiencing rapid growth.</p>\n<p>Our consulting business is annually recognized as one of the UK&#39;s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity, and dedicated training and career paths we offer to our consultants. We are committed to fostering an inclusive work culture that inspires everyone to deliver their best.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0d6b0b5c-92a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/oexxh4mvWPKhUMdVS3q5pd/hybrid-governance%2C-risk%2C-and-compliance-(grc)-sme--(m%2Fw%2Fd)-dach-region-in-munich-at-infosys-consulting---europe","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cybersecurity","Risk Management","Regulatory Compliance","NIST CSF","Cyber Due Diligence Assessments","Cyber Risk Management","Incident Response Plans","Crisis Management Exercises","Certifications","Target Operating Models","RACI matrices","Cyber Security Roadmaps","Post-Incident Reviews","Cyber Threat Intelligence Reports","Cyber Compliance Programs","Cyber Risk Assessments","Awareness Trainings","Identity & Access Management","Privileged Access Management"],"x-skills-preferred":["German","English","Stakeholder Management","Problem-Solving","Resilience","Communication","Project Management","Business Analysis","Enterprise Architecture","Cyber Security","IT Governance","IT Cost Optimization","Efficiency Improvement","Innovation Promotion"],"datePosted":"2026-03-09T16:54:02.938Z","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"Cybersecurity, Risk Management, Regulatory Compliance, NIST CSF, Cyber Due Diligence Assessments, Cyber Risk Management, Incident Response Plans, Crisis Management Exercises, Certifications, Target Operating Models, RACI matrices, Cyber Security Roadmaps, Post-Incident Reviews, Cyber Threat Intelligence Reports, Cyber Compliance Programs, Cyber Risk Assessments, Awareness Trainings, Identity & Access Management, Privileged Access Management, German, English, Stakeholder Management, Problem-Solving, Resilience, Communication, Project Management, Business Analysis, Enterprise Architecture, Cyber Security, IT Governance, IT Cost Optimization, Efficiency Improvement, Innovation Promotion"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1bdc3caf-792"},"title":"Governance, Risk, and Compliance (GRC) SME - Senior Consultant","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are looking for a highly skilled Cyber GRC (Governance, Risk, and Compliance) Senior Consultant to help organizations strengthen their cybersecurity posture, manage cyber risks, and ensure regulatory compliance. The ideal candidate will have deep expertise in cybersecurity frameworks, risk management, regulatory compliance, and security governance.</p>\n<p>As a Cyber GRC Senior Consultant, you will collaborate with client security, IT, and compliance teams to direct and oversee the development and implementation of cybersecurity policies, conduct risk assessments, and ensure adherence to global security standards and regulations.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>Work on global projects with a truly global team, with the support of over 330,000 technical staff from our parent organization.</p>\n<p>Contribute to the development of consulting go to market offerings and innovative solutions targeted at the C-Suite executive community that help them to understand and mitigate their cyber risks.</p>\n<p>Direct and lead NIST CSF risk assessments</p>\n<p>Oversee the design of innovative new services to lead the market incorporating AI and ML where it brings value.</p>\n<p>Support presales, sales, and account management pursuits from a subject matter expert perspective.</p>\n<p><strong>Requirements</strong></p>\n<p>You will have already achieved strong career progression to date, and experience working with recognized consulting brands and large commercial sector clients. You will have a passion for cyber security and a genuine interest in staying updated with the latest industry trends and developments.</p>\n<p>Your security experience must include:</p>\n<p>A relevant undergrad or post grad degree (Infosec, Cyber Security, IT Security)</p>\n<p>1-5 years+ in the field of cyber security/infosec.</p>\n<p>A broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Your diverse Security experience should include one or some of below:</p>\n<p>A good understanding of NIST CSF</p>\n<p>A post graduate degree in cyber /information security</p>\n<p>Cyber Due Diligence Assessments</p>\n<p>Third- Party &amp; Supply chain Cyber Risk Management</p>\n<p>Incident Response Plan review</p>\n<p>Supporting bids, RFP responses and proposals</p>\n<p>Crisis Management Exercises (CMX)</p>\n<p>Accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM,</p>\n<p>Helped design Target Operating Models (TOMs) and RACI Matrices</p>\n<p>Helping the design of Cyber Security Roadmaps</p>\n<p>Supporting Post Incident Reviews</p>\n<p>Reading and summarising Cyber Threat Intelligence reports</p>\n<p>Cyber Security Risk Assessments or Maturity Assessments</p>\n<p>Design and/deliver awareness training.</p>\n<p>Worked on Identity and Access Management projects.</p>\n<p>Worked on Privileged access management projects</p>\n<p><strong>Our ideal candidate may have some of the following skills:</strong></p>\n<p>Have a broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Enjoy working with different clients from different industries.</p>\n<p>Have some experience in balancing technical and commercial considerations to develop practical advice or solutions for clients.</p>\n<p>Be able to build strong and effective business relationships at all levels</p>\n<p>Be able to support and oversee staff with less experience in their tasks</p>\n<p>Be able to explain complex cyber methodologies using accessible non-technical language (both written and verbal)</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now._</p>\n<p><strong>About your team</strong></p>\n<p>At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology. We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1bdc3caf-792","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/kpLfuJ6MMnQF6UP1PbZm31/remote-governance%2C-risk%2C-and-compliance-(grc)-sme---senior-consultant-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity frameworks","risk management","regulatory compliance","security governance","NIST CSF","cyber due diligence assessments","third-party and supply chain cyber risk management","incident response plan review","crisis management exercises","accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM","target operating models","RACI matrices","cybersecurity roadmaps","post-incident reviews","cyber threat intelligence reports","cybersecurity risk assessments","identity and access management","privileged access management"],"x-skills-preferred":["stakeholder management","problem-solving","resilience","data and information gathering","data and information validation","data and information synthesis","data and information documentation","data and information communication","interpersonal skills","written communication skills","verbal communication skills"],"datePosted":"2026-03-09T16:53:00.785Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"cybersecurity frameworks, risk management, regulatory compliance, security governance, NIST CSF, cyber due diligence assessments, third-party and supply chain cyber risk management, incident response plan review, crisis management exercises, accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM, target operating models, RACI matrices, cybersecurity roadmaps, post-incident reviews, cyber threat intelligence reports, cybersecurity risk assessments, identity and access management, privileged access management, stakeholder management, problem-solving, resilience, data and information gathering, data and information validation, data and information synthesis, data and information documentation, data and information communication, interpersonal skills, written communication skills, verbal communication skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_15b631cd-e96"},"title":"Director - Vehicle and Connected Services Monitoring","description":"<p><strong>Director - Vehicle and Connected Services Monitoring</strong></p>\n<p>This leadership role within the Vehicle and Connected Cybersecurity organization is responsible for leading the &quot;eyes and ears&quot; of the company. You will lead a global team of experts tasked with monitoring trillions of signals from vehicle telematics, embedded systems, and cloud-native application stacks, ensuring that millions of connected vehicles and the cloud services that power them are continuously protected against sophisticated global threats.</p>\n<p>Your mandate covers the entire lifecycle of a threat—from proactive intelligence gathering and managing global bug bounty programs to real-time detection engineering and high-stakes incident response. As a key leader in the Ford+ transformation, you will bridge the gap between Product Development, Model e, Ford Pro, and Enterprise IT to ensure a unified, world-class defense posture.</p>\n<p><strong>Responsibilities</strong></p>\n<p><strong>Global Vehicle &amp; Application Monitoring (VSOC/ASOC Operations):</strong></p>\n<p>Directing 24/7 monitoring for Ford’s global connected fleet and digital services, ensuring operational excellence with high-fidelity visibility across geographies, and overseeing the analysis of vast signals from vehicle telematics, embedded systems, and cloud-native applications.</p>\n<p><strong>Analysis &amp; Incident Response (CIRT Partnership):</strong></p>\n<p>Serving as the primary executive lead for security incidents involving vehicles or connected services, partnering with the corporate Incident Response Team (CIRT), directing forensic analysis on vehicle-specific protocols (CAN, Automotive Ethernet) and cloud/mobile application stacks, and developing rapid-response playbooks including Over-the-Air (OTA) security mitigations.</p>\n<p><strong>Monitoring Development &amp; Detection Engineering:</strong></p>\n<p>Leading teams to build advanced detection logic, behavioral heuristics, and Machine Learning (ML) models for automotive attack patterns, driving the implementation of Security Orchestration, Automation, and Response (SOAR) platforms, and integrating data science for anomaly detection.</p>\n<p><strong>Product Threat Intelligence:</strong></p>\n<p>Building and leading a dedicated capability to track threat actors targeting the automotive sector, EV charging infrastructure, and fleet management tools, translating intelligence into proactive defense strategies, and representing Ford in industry forums like Auto-ISAC.</p>\n<p><strong>Threat Hunting &amp; Bug Bounty Program:</strong></p>\n<p>Leading a specialized hunt team to identify hidden threats and vulnerabilities, overseeing Ford’s Coordinated Vulnerability Disclosure (CVD) and Bug Bounty programs, and aligning insights with internal red-teaming and secure-coding priorities.</p>\n<p><strong>Executive Leadership &amp; Qualifications:</strong></p>\n<p>Defining and executing a global monitoring roadmap aligned with Ford’s software-centric transition, acting as the primary authority for operational cyber risks, leading and mentoring a global organization, and influencing cross-functional partners</p>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li><strong>Education:</strong> Bachelor’s degree in Computer Science, Cybersecurity, or Engineering (Master’s or PhD highly preferred).</li>\n<li><strong>Experience:</strong> 15+ years in Cybersecurity, with at least 7 years in a senior leadership role overseeing large-scale SOC or Incident Response organizations.</li>\n<li><strong>Technical Depth:</strong> Deep understanding of SOC operations, threat intelligence frameworks (MITRE ATT&amp;CK), and automotive-specific security challenges.</li>\n<li><strong>Executive Presence:</strong> Proven ability to manage high-pressure security incidents and communicate complex technical risks to non-technical stakeholders.</li>\n</ul>\n<p><strong>Benefits</strong></p>\n<p>You may not check every box, or your experience may look a little different from what we&#39;ve outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!</p>\n<p>As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including:</p>\n<ul>\n<li>Immediate medical, dental, vision and prescription drug coverage</li>\n</ul>\n<ul>\n<li>Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more</li>\n</ul>\n<ul>\n<li>Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more</li>\n</ul>\n<ul>\n<li>Vehicle discount program for employees and family members and management leases</li>\n</ul>\n<ul>\n<li>Tuition assistance</li>\n</ul>\n<ul>\n<li>Established and active employee resource groups</li>\n</ul>\n<ul>\n<li>Paid time off for individual and team community service</li>\n</ul>\n<ul>\n<li>A generous schedule of paid holidays, including the week between Christmas and New Year’s Day</li>\n</ul>\n<ul>\n<li>Paid time off and the option to purchase additional vacation time.</li>\n</ul>\n<p><strong>Salary</strong></p>\n<p>This position is leadership level 5 and ranges from $138,240-261,720.</p>\n<p>Final determination of salary grade will be based on candidate&#39;s skills and experience, and base salary will be set within the applicable range according to job scope, responsibility and competitive market value.</p>\n<p>For more information on salary and benefits, click here: https://fordcareers.co/LL5</p>\n<p><strong>Visa Sponsorship</strong></p>\n<p>Visa sponsorship is not available for this position.</p>\n<p><strong>Equal Opportunity Employer</strong></p>\n<p>Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.</p>\n<p>We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call 1-888-336-0660.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_15b631cd-e96","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Ford Motor Company","sameAs":"https://efds.fa.em5.oraclecloud.com"},"x-apply-url":"https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/59812","x-work-arrangement":"remote","x-experience-level":"executive","x-job-type":"full-time","x-salary-range":"$138,240-261,720","x-skills-required":["Cybersecurity","SOC operations","Threat intelligence frameworks","Automotive-specific security challenges","Machine Learning","Security Orchestration, Automation, and Response","Data science","Anomaly detection","Forensic analysis","Incident response","Bug bounty programs","Coordinated Vulnerability Disclosure","Red-teaming","Secure-coding"],"x-skills-preferred":[],"datePosted":"2026-03-09T11:04:41.073Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"United States"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Automotive","skills":"Cybersecurity, SOC operations, Threat intelligence frameworks, Automotive-specific security challenges, Machine Learning, Security Orchestration, Automation, and Response, Data science, Anomaly detection, Forensic analysis, Incident response, Bug bounty programs, Coordinated Vulnerability Disclosure, Red-teaming, Secure-coding","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":138240,"maxValue":261720,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b6169e99-a3e"},"title":"Safeguards Analyst, Account Abuse","description":"<p><strong>About the Role</strong></p>\n<p>Anthropic is an AI safety and research company working to build reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our customers and society as a whole. As a Safeguards Analyst focusing on Account Abuse, you will play a critical role in building and scaling the detection, enforcement, and operational capabilities that protect our platform against scaled abuse.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Develop and iterate on account signals and prevention frameworks that consolidate internal and external data into actionable abuse indicators</li>\n<li>Develop and optimize identity and account-linking signals using graph-based data infrastructure to detect coordinated and scaled account abuse</li>\n<li>Evaluate, integrate, and operationalize third-party vendor signals — assessing whether new data sources provide genuine lift in detection</li>\n<li>Expand internal account signals with new data sources and behavioural indicators to improve detection coverage</li>\n<li>Build and maintain processes that evaluate new product launches for scaled abuse risks, working closely with product teams to ensure enforcement readiness</li>\n<li>Operationalize and iterate on enforcement tooling — including appeals workflows, review processes, and user communications — to maintain quality and scale with growing volume</li>\n<li>Analyze enforcement performance through operational metrics, partnering with the team to keep detection accurate as abuse patterns evolve</li>\n<li>Manage payment fraud and dispute operations to protect revenue and maintain our standing with payment partners</li>\n<li>Coordinate enforcement efforts for policy compliance gaps across products, working with relevant teams to build scalable review processes</li>\n<li>Collaborate with cross-functional teams (Engineering, Product, Legal, Data Science) to surface new signals and translate detection capabilities into enforcement workflows</li>\n<li>Maintain detailed documentation of signal development, enforcement processes, and operational decisions</li>\n</ul>\n<p><strong>Qualifications:</strong></p>\n<ul>\n<li>2+ years of experience in risk scoring, fraud detection, trust and safety, or policy enforcement</li>\n<li>Hands-on experience building detection systems, risk models, or enforcement processes and workflows</li>\n<li>Experience evaluating and integrating third-party data sources into detection or scoring pipelines</li>\n<li>Strong SQL and Python skills — this role involves heavy data analysis across complex, multi-table data relationships</li>\n<li>Familiarity with identity signals such as device fingerprinting, account linking, or entity resolution, or experience with appeals processes and customer-facing enforcement communications</li>\n<li>Demonstrated ability to analyze complex data problems and translate findings into actionable improvements</li>\n<li>Strong written and verbal communication skills — ability to explain technical tradeoffs and navigate cross-functional stakeholder conversations</li>\n<li>Equivalent practical experience or a Bachelor&#39;s degree in Computer Science, Data Science, or related field</li>\n</ul>\n<p><strong>You might be a good fit if you:</strong></p>\n<ul>\n<li>Have built risk scores, detection systems, signal pipelines, or enforcement processes in a previous role — identity verification, trust and safety, or similar</li>\n<li>Are comfortable working with ambiguous, noisy data and extracting meaningful signal</li>\n<li>Think critically about signal quality and enforcement performance — evaluating whether new detection signals or processes meaningfully improve outcomes</li>\n<li>Have experience with graph-based data, account-linking problems, or cross-functional process design</li>\n<li>Are proactive about identifying gaps in existing detection or enforcement and proposing new approaches</li>\n<li>Have experience leveraging generative AI tools to support analytical, detection, or enforcement workflows</li>\n<li>Can balance deep analytical work with cross-functional collaboration and stakeholder coordination</li>\n<li>Have a background or interest in cybersecurity or threat intelligence (a plus, not a requirement)</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b6169e99-a3e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5108841008","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$230,000 - $310,000USD","x-skills-required":["risk scoring","fraud detection","trust and safety","policy enforcement","SQL","Python","graph-based data infrastructure","identity signals","device fingerprinting","account linking","entity resolution","appeals processes","customer-facing enforcement communications"],"x-skills-preferred":["generative AI tools","cross-functional process design","cybersecurity","threat intelligence"],"datePosted":"2026-03-08T14:00:53.781Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"risk scoring, fraud detection, trust and safety, policy enforcement, SQL, Python, graph-based data infrastructure, identity signals, device fingerprinting, account linking, entity resolution, appeals processes, customer-facing enforcement communications, generative AI tools, cross-functional process design, cybersecurity, threat intelligence","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":310000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_723d3153-72d"},"title":"Security Engineer, Detection & Response","description":"<p><strong>About the role</strong></p>\n<p>At Anthropic, we are pioneering new frontiers in AI that have the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That&#39;s why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams. In this role, you will have the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic’s technology stack</li>\n<li>Develop and deploy novel tooling that may leverage Large Language Models to enhance detection, investigation, and response capabilities</li>\n<li>Create and optimise detections, playbooks, and workflows to quickly identify and respond to potential incidents</li>\n<li>Review Incident Response metrics and procedures and drive continuous improvement</li>\n<li>Work cross functionally with other security and engineering teams</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>3+ years of software engineering experience, with security experience a plus and/or</li>\n<li>5+ years of detection engineering, incident response, or threat hunting experience</li>\n<li>A solid understanding of cloud environments and operations</li>\n<li>Experience working with engineering teams in a SaaS environment</li>\n<li>Exceptional communication and collaboration skills</li>\n<li>An ability to lead projects with little guidance</li>\n<li>The ability to pick up new languages and technologies quickly</li>\n<li>Experience handling security incidents and investigating anomalies as part of a team</li>\n<li>Knowledge of EDR, SIEM, SOAR, or related security tools</li>\n</ul>\n<p><strong>Strong candidates may also have experience with:</strong></p>\n<ul>\n<li>Experience performing security operations or investigations involving large-scale Kubernetes environments</li>\n<li>A high level of proficiency in Python and query languages such as SQL</li>\n<li>Experience analysing attack behaviour and prototyping high-quality detections</li>\n<li>Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics</li>\n<li>Experience contributing to a high growth startup environment</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p><strong>Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We&#39;re an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_723d3153-72d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/4982193008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$300,000 - $405,000 USD","x-skills-required":["software engineering","security experience","detection engineering","incident response","threat hunting","cloud environments","operations","engineering teams","SaaS environment","communication skills","project leadership","new languages and technologies","security incidents","anomalies","EDR","SIEM","SOAR","security tools"],"x-skills-preferred":["Python","SQL","threat intelligence","malware analysis","infrastructure as code","detection engineering","forensics","Kubernetes environments","high growth startup environment"],"datePosted":"2026-03-08T13:58:41.409Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering, security experience, detection engineering, incident response, threat hunting, cloud environments, operations, engineering teams, SaaS environment, communication skills, project leadership, new languages and technologies, security incidents, anomalies, EDR, SIEM, SOAR, security tools, Python, SQL, threat intelligence, malware analysis, infrastructure as code, detection engineering, forensics, Kubernetes environments, high growth startup environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_18528dac-ae1"},"title":"Threat Collections Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Role</strong></p>\n<p>We are looking for a Threat Collections Engineer to join our Threat Intelligence team. In this role, you will build the infrastructure that powers our threat discovery capabilities—integrating external data sources, developing detection systems for automated lead generation, and creating internal tooling that scales our investigators&#39; impact.</p>\n<p>This is a foundational engineering role on a small, high-impact team. You will take projects from proof-of-concept to production, work closely with investigators to understand their needs, and help scale what may become a multi-person collections function.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build automated detection systems that use disparate signals to identify abusive behaviour.</li>\n<li>Take systems from idea to proof-of-concept to production-grade with appropriate monitoring, documentation, and maintenance processes</li>\n<li>Develop and maintain YARA rule infrastructure, including tools for writing, validating, and testing rules against real data</li>\n<li>Create integrations with external threat intelligence platforms (e.g. VirusTotal, Censys, Urlscan) via MCP servers to enable multi-source correlation during investigations</li>\n<li>Build data pipelines that ingest intelligence from RSS feeds, CTI news sources, and partner sharing, using Claude to extract TTPs and generate targeted hunting queries</li>\n<li>Develop behavioural analytics capabilities using DBT-based frameworks and create searchable audit logging infrastructure</li>\n<li>Establish feedback loops with investigators to tune detection systems and reduce false positives</li>\n<li>Scrape and normalise data from external sources to feed threat detection and enrichment workflows</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have strong coding proficiency in Python and SQL for building detection logic, data pipelines, and automation</li>\n<li>Have experience with data pipeline orchestration tools (Airflow, DBT, or similar)</li>\n<li>Have familiarity with threat intelligence concepts including IOCs, YARA rules, and threat correlation techniques</li>\n<li>Have experience integrating external APIs and building data ingestion systems</li>\n<li>Can translate investigator needs and workflows into technical requirements</li>\n<li>Are comfortable building v0 systems and iterating based on user feedback</li>\n<li>Have strong communication skills for working closely with non-engineering stakeholders</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Experience with threat intelligence sharing frameworks (e.g. MISP, STIX/TAXII)</li>\n<li>Background in cyber threat intelligence, security operations, or abuse detection</li>\n<li>Experience building MCP servers or similar tool integrations for AI systems</li>\n<li>Familiarity with web scraping and data extraction at scale</li>\n<li>Experience with behavioural analytics or anomaly detection systems</li>\n<li>Understanding of LLM capabilities and how to leverage them for automation</li>\n<li>A Top Secret Clearance</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.** Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</strong></p>\n<p><strong>Your safety matters to us.** To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics as it does with computer science.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_18528dac-ae1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5074937008","x-work-arrangement":"remote","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$300,000 - $320,000 USD","x-skills-required":["Python","SQL","Airflow","DBT","YARA rules","Threat intelligence","API integration","Data ingestion","Web scraping","Data extraction"],"x-skills-preferred":["MISP","STIX/TAXII","Cyber threat intelligence","Security operations","Abuse detection","LLM capabilities","Automation"],"datePosted":"2026-03-08T13:53:41.541Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, SQL, Airflow, DBT, YARA rules, Threat intelligence, API integration, Data ingestion, Web scraping, Data extraction, MISP, STIX/TAXII, Cyber threat intelligence, Security operations, Abuse detection, LLM capabilities, Automation","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":320000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_68c29e94-faa"},"title":"Technical Cyber Threat Investigator","description":"<p><strong>About the Role</strong></p>\n<p>We are looking for a Technical Cyber Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for malicious cyber operations.</p>\n<p>You will work at the intersection of AI safety and cybersecurity, conducting thorough investigations into potential misuse cases, developing novel detection techniques, and building robust defenses against emerging cyber threats in the rapidly evolving landscape of AI-enabled risks. Your work will directly protect the broader ecosystem from sophisticated threat actors who seek to leverage AI technology for harm.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for cyber operations, including influence operations, malware development, social engineering, and other adversarial activities</li>\n</ul>\n<ul>\n<li>Develop abuse signals and tracking strategies to proactively detect sophisticated threat actors across our platform</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on new attack vectors, vulnerabilities, and threat actor TTPs targeting LLM systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis grounded in real threat actor behavior, using open-source research, dark web monitoring, and internal data</li>\n</ul>\n<ul>\n<li>Utilize investigation findings to implement systematic improvements to our safety approach and mitigate harm at scale</li>\n</ul>\n<ul>\n<li>Study trends internally and in the broader ecosystem to anticipate how AI systems could be misused, generating and publishing reports</li>\n</ul>\n<ul>\n<li>Build and maintain relationships with external threat intelligence partners, information sharing communities, and government stakeholders</li>\n</ul>\n<ul>\n<li>Work cross-functionally to build out our threat intelligence program, establishing processes, tools, and best practices</li>\n</ul>\n<p><strong>You may be a good fit if you</strong></p>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience with large language models and understanding of how AI technology could be misused for cyber threats</li>\n</ul>\n<ul>\n<li>Have subject matter expertise in abusive user behaviour detection, such as influence operations, coordinated inauthentic behaviour, or cyber threat intelligence</li>\n</ul>\n<ul>\n<li>Have experience tracking threat actors across surface, deep, and dark web environments</li>\n</ul>\n<ul>\n<li>Can derive insights from large datasets to make key decisions and recommendations</li>\n</ul>\n<ul>\n<li>Have experience with threat actor profiling and utilising threat intelligence frameworks (MITRE ATT&amp;CK, etc.)</li>\n</ul>\n<ul>\n<li>Have strong project management skills and ability to build processes from the ground up</li>\n</ul>\n<ul>\n<li>Possess excellent communication skills to collaborate with cross-functional teams and present to leadership</li>\n</ul>\n<p><strong>Strong candidates may also have</strong></p>\n<ul>\n<li>Experience working with government agencies or in regulated environments</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p><strong>Deadline to apply</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n</ul>\n<ul>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n</ul>\n<ul>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong></p>\n<p>Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</p>\n<p><strong>Your safety matters to us.</strong></p>\n<p>To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/career</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_68c29e94-faa","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066995008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000 - $290,000 USD","x-skills-required":["SQL","Python","large language models","AI technology","cyber threats","abusive user behaviour detection","threat actor profiling","threat intelligence frameworks","project management","communication skills"],"x-skills-preferred":["experience working with government agencies","background in AI safety","machine learning security","technology abuse investigation","experience building and scaling threat detection systems"],"datePosted":"2026-03-08T13:53:20.742Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, large language models, AI technology, cyber threats, abusive user behaviour detection, threat actor profiling, threat intelligence frameworks, project management, communication skills, experience working with government agencies, background in AI safety, machine learning security, technology abuse investigation, experience building and scaling threat detection systems","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c8d7ea06-b25"},"title":"Technical CBRN-E Threat Investigator","description":"<p><strong>About the Role</strong></p>\n<p>We are looking for a Technical CBRN-E Threat Investigator to join our Threat Intelligence team. In this role, you will be responsible for detecting, investigating, and disrupting the misuse of Anthropic&#39;s AI systems for Chemical, Biological, Radiological, Nuclear, and Explosives (CBRN-E) threats.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Detect and investigate attempts to misuse Anthropic&#39;s AI systems for developing, enhancing, or disseminating CBRN-E weapons, pathogens, toxins, or other threats to harm people, critical infrastructure, or the environment</li>\n</ul>\n<ul>\n<li>Conduct technical investigations using SQL, Python, and other tools to analyze large datasets, trace user behavior patterns, and uncover sophisticated CBRN-E threat actors</li>\n</ul>\n<ul>\n<li>Develop CBRN-E-specific detection capabilities, including abuse signals, tracking strategies, and detection methodologies tailored to dual-use research concerns</li>\n</ul>\n<ul>\n<li>Create actionable intelligence reports on CBRN-E attack vectors, vulnerabilities, and threat actor TTPs leveraging AI systems</li>\n</ul>\n<ul>\n<li>Conduct cross-platform threat analysis grounded in real threat actor behavior, open-source research, and publicly reported programs</li>\n</ul>\n<ul>\n<li>Collaborate with policy and enforcement teams to make informed decisions about user violations and ensure appropriate mitigation actions</li>\n</ul>\n<ul>\n<li>Engage with external stakeholders including government agencies, regulatory bodies, scientific organizations, and biosecurity/chemical security research communities</li>\n</ul>\n<ul>\n<li>Inform safety-by-design strategies by forecasting how threat actors may leverage advances in AI technology for CBRN-E purposes</li>\n</ul>\n<p><strong>You may be a good fit if you</strong></p>\n<ul>\n<li>Have deep domain expertise in biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, or related CBRN-E threat domains</li>\n</ul>\n<ul>\n<li>Have demonstrated proficiency in SQL and Python for data analysis and threat detection</li>\n</ul>\n<ul>\n<li>Have experience with threat actor profiling and utilizing threat intelligence frameworks</li>\n</ul>\n<ul>\n<li>Have hands-on experience with large language models and understanding of how AI technology could be misused for CBRN-E threats</li>\n</ul>\n<ul>\n<li>Have excellent stakeholder management skills and ability to work with diverse teams including researchers, policy experts, legal teams, and external partners</li>\n</ul>\n<p><strong>Strong candidates may also have</strong></p>\n<ul>\n<li>Advanced degree (MS or PhD) in biological sciences, chemistry, biodefense, biosecurity, or related field</li>\n</ul>\n<ul>\n<li>Real-world experience countering weapons of mass destruction or other high-risk asymmetric threats</li>\n</ul>\n<ul>\n<li>Experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information</li>\n</ul>\n<ul>\n<li>Background in AI safety, machine learning security, or technology abuse investigation</li>\n</ul>\n<ul>\n<li>Familiarity with synthetic biology, biotechnology, or dual-use research</li>\n</ul>\n<ul>\n<li>Experience building and scaling threat detection systems or abuse monitoring programs</li>\n</ul>\n<ul>\n<li>Active Top Secret security clearance</li>\n</ul>\n<p><strong>Logistics</strong></p>\n<ul>\n<li>Education requirements: We require at least a Bachelor&#39;s degree in a related field or equivalent experience.</li>\n</ul>\n<ul>\n<li>Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</li>\n</ul>\n<ul>\n<li>Visa sponsorship: We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</li>\n</ul>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work.</strong></p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c8d7ea06-b25","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066997008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$230,000 - $290,000USD","x-skills-required":["SQL","Python","CBRN-E threat domains","biosecurity","chemical defense","biological weapons non-proliferation","dual-use research of concern (DURC)","synthetic biology","threat actor profiling","threat intelligence frameworks","large language models","AI technology","stakeholder management"],"x-skills-preferred":["advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field","real-world experience countering weapons of mass destruction or other high-risk asymmetric threats","experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information","background in AI safety, machine learning security, or technology abuse investigation","familiarity with synthetic biology, biotechnology, or dual-use research","experience building and scaling threat detection systems or abuse monitoring programs","active Top Secret security clearance"],"datePosted":"2026-03-08T13:49:06.543Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SQL, Python, CBRN-E threat domains, biosecurity, chemical defense, biological weapons non-proliferation, dual-use research of concern (DURC), synthetic biology, threat actor profiling, threat intelligence frameworks, large language models, AI technology, stakeholder management, advanced degree in biological sciences, chemistry, biodefense, biosecurity, or related field, real-world experience countering weapons of mass destruction or other high-risk asymmetric threats, experience working with government agencies or in regulated environments dealing with sensitive CBRN-E information, background in AI safety, machine learning security, or technology abuse investigation, familiarity with synthetic biology, biotechnology, or dual-use research, experience building and scaling threat detection systems or abuse monitoring programs, active Top Secret security clearance","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":230000,"maxValue":290000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f940647d-c39"},"title":"SOC Engineer","description":"<p>We are looking for a SOC Engineer to join our Security Operations team and help defend a fast-moving, cloud-native AI vibe-coding platform. In this role, you will stay on top of emerging threats—from 0-days and active exploitation campaigns to bug bounty findings and customer-reported issues—and rapidly determine their relevance and potential impact to Replit.</p>\n<p>This is a hands-on, investigative role requiring strong technical depth, understanding of modern software engineering and CI/CD systems, familiarity with cloud-native infrastructure (especially GCP), and the ability to work across multiple teams in a fast-paced environment.</p>\n<p><strong>Responsibilities</strong></p>\n<p><strong>Threat Awareness &amp; Rapid Assessment</strong></p>\n<ul>\n<li>Continuously monitor emerging threats, including bad actor activity, 0-day vulnerabilities, public exploitation campaigns, bug bounty reports, and customer-reported security issues</li>\n</ul>\n<ul>\n<li>Quickly assess the applicability of these threats to Replit’s cloud infrastructure, SaaS services, internal tooling, and platform components.</li>\n</ul>\n<p><strong>Investigation &amp; Impact Analysis</strong></p>\n<ul>\n<li>Conduct targeted investigations to determine whether Replit is already impacted by a newly discovered threat, vulnerability, or exploit.</li>\n</ul>\n<ul>\n<li>Analyze logs, telemetry, and system behaviors using SIEM, metrics, Cloud Logging, and related tools.</li>\n</ul>\n<ul>\n<li>Identify gaps or weaknesses in existing detection or visibility and propose improvements.</li>\n</ul>\n<p><strong>Containment, Mitigation &amp; Cross-Team Collaboration</strong></p>\n<ul>\n<li>Research potential impact paths and develop mitigation strategies for confirmed or applicable threats.</li>\n</ul>\n<ul>\n<li>Partner closely with Security, SRE, and Engineering teams to coordinate and implement containment, patches, configuration updates, or code-level fixes.</li>\n</ul>\n<ul>\n<li>Document findings, mitigations, and follow-up actions clearly for internal teams.</li>\n</ul>\n<p><strong>Required Skills &amp; Experience</strong></p>\n<ul>\n<li>Strong understanding of software engineering fundamentals, including code structure, build systems, dependencies, and package ecosystems—enabling effective partnership with Engineering teams.</li>\n</ul>\n<ul>\n<li>Understanding of CI/CD pipelines and DevOps workflows, enabling collaboration with Infrastructure and DevOps teams.</li>\n</ul>\n<ul>\n<li>Solid knowledge of cloud architecture, especially Google Cloud Platform (GCP) services used in modern cloud-native deployments.</li>\n</ul>\n<ul>\n<li>Familiarity with SaaS architectures, identity systems, and integration patterns for effective collaboration with Cloud Security teams.</li>\n</ul>\n<ul>\n<li>Hands-on experience with SIEM, Cloud Logging, and log-based investigation workflows.</li>\n</ul>\n<ul>\n<li>Ability to perform investigations using log data, behavioral indicators, and threat intelligence.</li>\n</ul>\n<ul>\n<li>General understanding of vulnerability lifecycles, exploitability analysis, and common attack vectors.</li>\n</ul>\n<p><strong>Preferred Qualifications</strong></p>\n<ul>\n<li>Experience with threat intelligence, security research, or vulnerability analysis.</li>\n</ul>\n<ul>\n<li>Familiarity with Kubernetes, containers, serverless infrastructure, or modern distributed systems.</li>\n</ul>\n<ul>\n<li>Ability to write scripts or small tools for investigation or automation (Python, Go, Bash).</li>\n</ul>\n<ul>\n<li>Experience working with bug bounty programs or coordinated vulnerability disclosure workflows.</li>\n</ul>\n<ul>\n<li>Experience in fast-paced, cloud-native, or AI/ML-driven environments.</li>\n</ul>\n<p><strong>What We Value</strong></p>\n<ul>\n<li>Curiosity &amp; initiative: Strong desire to understand attacker behaviors, emerging threats, and how they apply to real-world systems.</li>\n</ul>\n<ul>\n<li>Speed &amp; analytical rigor: Ability to quickly assess high-risk vulnerabilities with clear, evidence-based reasoning.</li>\n</ul>\n<ul>\n<li>Collaboration: Comfort working across cross-functional teams spanning Security, SRE, Engineering, and Infrastructure.</li>\n</ul>\n<ul>\n<li>Clear communication: Ability to explain findings, risks, and mitigation strategies to stakeholders at all levels.</li>\n</ul>\n<ul>\n<li>Ownership mindset: Takes initiative to drive investigations, improvements, and remediations to completion</li>\n</ul>\n<ul>\n<li>Continuous learning: Passion for staying up to date on new vulnerabilities, exploit trends, and cloud-native security best practices.</li>\n</ul>\n<p><strong>Full-Time Employee Benefits Include:</strong></p>\n<p>💰 Competitive Salary &amp; Equity</p>\n<p>💹 401(k) Program with a 4% match</p>\n<p>⚕️ Health, Dental, Vision and Life Insurance</p>\n<p>🩼 Short Term and Long Term Disability</p>\n<p>🚼 Paid Parental, Medical, Caregiver Leave</p>\n<p>🚗 Commuter Benefits</p>\n<p>📱 Monthly Wellness Stipend</p>\n<p>🧑‍💻 Autonomous Work Environment</p>\n<p>🖥 In Office Set-Up Reimbursement</p>\n<p>🏝 Flexible Time Off (FTO) + Holidays</p>\n<p>🚀 Quarterly Team Gatherings</p>\n<p>☕ In Office Amenities</p>\n<p><strong>Want to learn more about what we are up to?</strong></p>\n<ul>\n<li>Meet the Replit Agent</li>\n</ul>\n<ul>\n<li>Replit: Make an app for that</li>\n</ul>\n<ul>\n<li>Replit Blog</li>\n</ul>\n<ul>\n<li>Amjad TED Talk</li>\n</ul>\n<p><strong>Interviewing + Culture at Replit</strong></p>\n<ul>\n<li>Operating Principles</li>\n</ul>\n<ul>\n<li>Reasons not to work at Replit</li>\n</ul>\n<p>To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world. We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f940647d-c39","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Replit","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/replit.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/replit/54051fe0-045f-46b1-a2b8-a730575b05eb","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$180K – $250K","x-skills-required":["software engineering fundamentals","CI/CD systems","cloud-native infrastructure","GCP services","SaaS architectures","identity systems","integration patterns","SIEM","Cloud Logging","log-based investigation workflows","vulnerability lifecycles","exploitability analysis","common attack vectors"],"x-skills-preferred":["threat intelligence","security research","vulnerability analysis","Kubernetes","containers","serverless infrastructure","modern distributed systems","Python","Go","Bash","bug bounty programs","coordinated vulnerability disclosure workflows","fast-paced","cloud-native","AI/ML-driven environments"],"datePosted":"2026-03-07T15:20:18.290Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Foster City, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software engineering fundamentals, CI/CD systems, cloud-native infrastructure, GCP services, SaaS architectures, identity systems, integration patterns, SIEM, Cloud Logging, log-based investigation workflows, vulnerability lifecycles, exploitability analysis, common attack vectors, threat intelligence, security research, vulnerability analysis, Kubernetes, containers, serverless infrastructure, modern distributed systems, Python, Go, Bash, bug bounty programs, coordinated vulnerability disclosure workflows, fast-paced, cloud-native, AI/ML-driven environments","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":180000,"maxValue":250000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_aa015612-5ff"},"title":"Product & Solutions Lead, Safety and Security","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Product &amp; Solutions Lead, Safety and Security</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Intelligence &amp; Investigations</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>$288K – $425K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>The Intelligence &amp; Investigations (I2) team detects and disrupts abuse and strategic risks so people can use AI safely. We translate real-world signals, investigations, and external threat intelligence into practical mitigations, operating guidance, and partner-ready support that improves safety outcomes across the AI ecosystem.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Product &amp; Solutions Lead focused on safety and security, you will build and operate 0–1 products, services, and technical solution packages that help developers and public institutions move from experimentation to durable, trusted outcomes—while maintaining public safety, transparency, and respect for privacy and rights.</p>\n<p>This role balances two modes of delivery:</p>\n<ol>\n<li>Bespoke products and technical solutions for strategic internal and external partners, and</li>\n</ol>\n<ol>\n<li>Scalable product and solution packages that can be reused broadly across partners and deployments.</li>\n</ol>\n<p>Training is a component of scale, but not the center of gravity. You will also ship reference implementations, playbooks, evaluation kits, and repeatable operating models that partners can adopt and operate.</p>\n<p>You will work directly with engineers and a multidisciplinary group of safety and geopolitical analysts, and data and quantitative scientists to convert complex, evolving challenges into solutions that teams can adopt in high-stakes environments.</p>\n<p>This role is based in San Francisco, CA (hybrid, 3 days/week). Relocation support is available.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Own the 0–1 roadmap for safety and security solution offerings: define the target users, problem statements, tools, operating models, success metrics, and the set of reusable deliverables we ship.</li>\n</ul>\n<ul>\n<li>Design and ship bespoke technical solutions for priority partners (internal and external), then abstract what works into reusable patterns and toolkits.</li>\n</ul>\n<ul>\n<li>Build partner-ready technical artifacts: solution blueprints, reference architectures, evaluation and monitoring guidance, incident/response playbooks, and deployment checklists.</li>\n</ul>\n<ul>\n<li>Package open-source and proprietary capabilities into adoption-ready solutions (e.g., reference implementations, configuration patterns, validated workflows).</li>\n</ul>\n<ul>\n<li>Maintain a consistent delivery model across engagements: intake, scoping, governance alignment, execution cadence, and retrospectives that improve the offering over time.</li>\n</ul>\n<ul>\n<li>Translate evolving threats into actionable guidance and updates for solution packages (e.g., scams/fraud patterns, cyber-enabled threats, ecosystem abuse trends).</li>\n</ul>\n<ul>\n<li>Develop lightweight enablement components as needed: targeted technical modules, hands-on labs, and readiness assessments that accelerate adoption of the solutions.</li>\n</ul>\n<ul>\n<li>Define and instrument impact measurement: adoption milestones, readiness indicators, reliability and safety posture improvements, and partner satisfaction with outputs.</li>\n</ul>\n<ul>\n<li>Partner closely across engineering, safety, geopolitical analysis, and quantitative teams to ensure solutions are technically credible, threat-informed, and measurable.</li>\n</ul>\n<ul>\n<li>Communicate crisply and decision-readily to internal and external stakeholders: progress, trade-offs, risks, and recommendations.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have 6+ years in product, technical program leadership, solutions, or platform operations, especially in safety, security, risk, integrity, or enterprise/public-sector contexts.</li>\n</ul>\n<ul>\n<li>Have built 0–1 solution offerings (product plus services or productized services): taking ambiguous needs, shipping something concrete, then scaling it into a repeatable model.</li>\n</ul>\n<ul>\n<li>Have a builder’s mindset: comfortable incubating early-stage ideas, testing them with partners, and evolving them into durable, repeatable safety and security solutions.</li>\n</ul>\n<ul>\n<li>Can go deep with engineers and still produce partner-ready artifacts that are clear</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_aa015612-5ff","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/c664cc09-d996-450c-8683-ad591ac27c11","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$288K – $425K","x-skills-required":["product leadership","technical program leadership","solutions","platform operations","safety","security","risk","integrity","enterprise/public-sector contexts","product development","solution development","technical writing","communication","project management","team leadership","collaboration","problem-solving","analytical skills","data analysis","data visualization","machine learning","artificial intelligence","cybersecurity","threat intelligence","incident response","compliance","regulatory affairs"],"x-skills-preferred":["cloud computing","containerization","DevOps","agile development","scrum","kanban","continuous integration","continuous deployment","continuous testing","test automation","security testing","penetration testing","vulnerability assessment","compliance testing","regulatory testing","data protection","information security","cybersecurity frameworks","risk management","compliance management","regulatory compliance","data governance","information governance","data quality","data integrity","data validation","data verification","data certification","data assurance","data security","data encryption","data masking","data tokenization","data anonymization","data pseudonymization","data aggregation","data fusion","data integration","data warehousing","data mart","data lake","data catalog","data governance","data quality","data integrity","data validation","data verification","data certification","data assurance","data security","data encryption","data masking","data tokenization","data anonymization","data pseudonymization","data aggregation","data fusion","data integration","data warehousing","data mart","data lake","data catalog"],"datePosted":"2026-03-06T18:42:25.322Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"product leadership, technical program leadership, solutions, platform operations, safety, security, risk, integrity, enterprise/public-sector contexts, product development, solution development, technical writing, communication, project management, team leadership, collaboration, problem-solving, analytical skills, data analysis, data visualization, machine learning, artificial intelligence, cybersecurity, threat intelligence, incident response, compliance, regulatory affairs, cloud computing, containerization, DevOps, agile development, scrum, kanban, continuous integration, continuous deployment, continuous testing, test automation, security testing, penetration testing, vulnerability assessment, compliance testing, regulatory testing, data protection, information security, cybersecurity frameworks, risk management, compliance management, regulatory compliance, data governance, information governance, data quality, data integrity, data validation, data verification, data certification, data assurance, data security, data encryption, data masking, data tokenization, data anonymization, data pseudonymization, data aggregation, data fusion, data integration, data warehousing, data mart, data lake, data catalog, data governance, data quality, data integrity, data validation, data verification, data certification, data assurance, data security, data encryption, data masking, data tokenization, data anonymization, data pseudonymization, data aggregation, data fusion, data integration, data warehousing, data mart, data lake, data catalog","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":288000,"maxValue":425000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_23a792a8-cc4"},"title":"Vendor Security Program Manager","description":"<p><strong>Job Posting</strong></p>\n<p><strong>Vendor Security Program Manager</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco; New York City; Seattle; Washington, DC</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Location Type</strong></p>\n<p>Hybrid</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>SF, Seattle and NYC: $207K – $335K • Offers Equity</li>\n<li>Zone A: $186K – $301.5K • Offers Equity</li>\n<li>Zone B: $165.6K – $268K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>The Vendor Security team sits at the core of our mission to ensure our technology benefits humanity safely and securely. We provide security assurances and robust compliance frameworks for our technology, people, and products. Our mission is to build trust with the world in our products and company. Our work is technical yet highly operational, strategically aligning with security and engineering teams to navigate and mitigate risks proactively. We prioritize impact, enable innovation, and foster a culture of continuous compliance and security awareness.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Program Manager within the Vendor Security team, you will play a crucial role in protecting our organisation against external risks posed by suppliers, vendors, partners, and hardware manufacturers. Your responsibilities will include conducting comprehensive security assessments, building a program to manage global supply chain and vendor risks, and driving security initiatives across all of our third-party relationships. You will be analytical, detail-oriented, and proactive, capable of translating complex security evaluations into clear, actionable strategies.</p>\n<p>The role is expected to operate with a strong point of view on risk. You will be responsible not only for identifying and documenting vendor and supply-chain risk, but for helping the company make informed trade-offs between speed, scale, and security. This role requires exceptional organisational skills, the ability to effectively communicate across different business functions, and a strong commitment to operational excellence in a dynamic environment.</p>\n<p>This role may be based out of one of our US offices (San Francisco, Seattle, NYC or DC.) We use a hybrid work model of 3 days in the office per week and offer relocation assistance to new employees.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Be the interface for Security to the rest of the organisation for vendors.</li>\n</ul>\n<ul>\n<li>Own vendor security risk decisions and escalation paths, including clearly documenting risk acceptance, mitigation plans, and executive-level trade-offs when security requirements cannot be fully met.</li>\n</ul>\n<ul>\n<li>Conduct deep, evidence-based security assessments of third parties, including review of architectures, configurations, controls, logs, and operational practices - moving beyond questionnaires and attestations to validate real-world security posture of vendors.</li>\n</ul>\n<ul>\n<li>Assess and manage security risk across a diverse vendor landscape, including SaaS providers, cloud and infrastructure partners, hardware manufacturers, chip suppliers, and other strategic or high-impact suppliers.</li>\n</ul>\n<ul>\n<li>Develop, build, and continuously improve the vendor security program and security supply chain risk management function at OpenAI.</li>\n</ul>\n<ul>\n<li>Develop, propose, and implement effective controls to mitigate identified vendor risks.</li>\n</ul>\n<ul>\n<li>Build and maintain collaborative partnerships with key internal stakeholders including Infrastructure Security, Product, Engineering, Legal, Procurement, and Threat Intelligence to ensure comprehensive security coverage of the vendor and third-party supply chain.</li>\n</ul>\n<ul>\n<li>Streamline and automate vendor and supply chain security processes to increase efficiency and reduce manual overhead.</li>\n</ul>\n<p><strong>You might thrive in this role if you have:</strong></p>\n<ul>\n<li>Proven experience conducting third-party or supply chain security assessments, including building and scaling a vendor management security program.</li>\n</ul>\n<ul>\n<li>An in-depth understanding of information security principles and controls, including data protection, access management, proactive and reactive security measures, and application security.</li>\n</ul>\n<ul>\n<li>Comfort operating in ambiguity, with the ability to form defensible security opinions even when information is incomplete or uncertain.</li>\n</ul>\n<ul>\n<li>Strong analytical and problem-solving skills, with the ability to identify and mitigate complex security risks.</li>\n</ul>\n<ul>\n<li>Excellent communication and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and stakeholders.</li>\n</ul>\n<ul>\n<li>Strong organisational and project management skills, with the ability to prioritise tasks and manage multiple projects simultaneously.</li>\n</ul>\n<ul>\n<li>A strong commitment to operational excellence and continuous improvement, with a focus on delivering high-quality results in a dynamic environment.</li>\n</ul>\n<ul>\n<li>A passion for security and a desire to make a meaningful impact in the field.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_23a792a8-cc4","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/fb1e823e-cfcc-4293-8893-cc77e467c561","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$207K – $335K • Offers Equity","x-skills-required":["information security principles and controls","data protection","access management","proactive and reactive security measures","application security","third-party or supply chain security assessments","vendor management security program","security risk management","compliance frameworks","security awareness","operational excellence","project management","communication and interpersonal skills"],"x-skills-preferred":["cloud security","infrastructure security","threat intelligence","security analytics","incident response","security testing","penetration testing","security consulting","security training","security awareness training"],"datePosted":"2026-03-06T18:37:35.209Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco; New York City; Seattle; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"information security principles and controls, data protection, access management, proactive and reactive security measures, application security, third-party or supply chain security assessments, vendor management security program, security risk management, compliance frameworks, security awareness, operational excellence, project management, communication and interpersonal skills, cloud security, infrastructure security, threat intelligence, security analytics, incident response, security testing, penetration testing, security consulting, security training, security awareness training","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":207000,"maxValue":335000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9152bb38-f8b"},"title":"Global Detection and Response Lead","description":"<p><strong>Global Detection and Response Lead</strong></p>\n<p><strong>Location</strong></p>\n<p>San Francisco</p>\n<p><strong>Employment Type</strong></p>\n<p>Full time</p>\n<p><strong>Department</strong></p>\n<p>Security</p>\n<p><strong>Compensation</strong></p>\n<ul>\n<li>San Francisco $347K – $490K • Offers Equity</li>\n</ul>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p>More details about our benefits are available to candidates during the hiring process.</p>\n<p>This role is at-will and OpenAI reserves the right to modify base pay and other compensation components at any time based on individual performance, team or company results, or market conditions.</p>\n<p><strong>About the Team</strong></p>\n<p>OpenAI’s Security organization exists to enable safe, responsible innovation at scale. As our systems, infrastructure, and research footprint grow, we invest deeply in world-class security capabilities that protect our people, products, and users without slowing progress.</p>\n<p>This organization safeguards OpenAI’s environments by building advanced detection systems, driving real-time response capabilities, scaling telemetry and logging infrastructure, and delivering actionable threat intelligence to stay ahead of adversaries.</p>\n<p><strong>About the Role</strong></p>\n<p>We are seeking a <strong>Global Detection and Response Lead</strong> to own and scale OpenAI’s cybersecurity detection and response operations. In this role, you will set the strategy and drive execution for security monitoring, incident response, recovery, and post-incident improvements across our global infrastructure.</p>\n<p>You will be a hands-on leader with deep technical credibility and strong operational instincts. You will build and mentor high-performing teams, partner closely with Infrastructure, Research, Product Security, Enterprise Security, IT, and Engineering, and ensure that detection and response capabilities are embedded by design into the systems that power OpenAI.</p>\n<p>This is a strategic and practical leadership role requiring deep technical credibility, operational rigor, and the ability to build high-performing teams in a fast-moving environment.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Oversee global detection and response operations, including continuous monitoring, triage, investigation, containment, and remediation of security events across a diverse set of networks and infrastructure.</li>\n</ul>\n<ul>\n<li>Lead, mentor, and directly manage several small teams of senior engineers across observability, detection and response, and threat intelligence. Hire and scale these functions deliberately and proportionately as OpenAI’s compute footprint and platform ambitions grow.</li>\n</ul>\n<ul>\n<li>Ensure world-class operational rigor and readiness through management of incident playbooks, on-call and escalation paths, tabletop exercises, and continuous improvement of response quality and speed.</li>\n</ul>\n<ul>\n<li>Improve detection quality and coverage by partnering with engineering teams to ensure critical telemetry is available, reliable, and actionable across cloud, corporate, and production environments.</li>\n</ul>\n<ul>\n<li>Deeply partner across all of OpenAI to evaluate and respond to emergent security concerns in a frontier AI lab environment, such as detection and response strategies for agents operating across infrastructure at scale.</li>\n</ul>\n<ul>\n<li>Build a world-class security program capable of withstanding tier-1 adversaries by maximally embracing our own models to solve frontier security problems.</li>\n</ul>\n<p><strong>You might thrive in this role if you:</strong></p>\n<ul>\n<li>Have 10+ years in cybersecurity with deep expertise in detection engineering, incident response, and security operations.</li>\n</ul>\n<ul>\n<li>Have an active U.S. Government security clearance (Top Secret) or willingness and eligibility to obtain one.</li>\n</ul>\n<ul>\n<li>Are mission-oriented, have unimpeachable integrity, and are passionate and motivated to detect and respond to adversaries in a highly complex, fast-paced environment.</li>\n</ul>\n<ul>\n<li>Have deep experience building and leading detection and response, instrumentation/observability, and threat intelligence teams across a global footprint, including airgapped and sovereign environments.</li>\n</ul>\n<ul>\n<li>Have stellar leadership skills, and a demonstrated history of driving durable, and continuous improvements to programs, processes, and people.</li>\n</ul>\n<ul>\n<li>Have exceptional written and verbal communication skills, can remain calm under pressure, and can effectively run command of security incidents involving numerous stakeholders across a diverse gamut of teams, expertise, and seniority.</li>\n</ul>\n<ul>\n<li>Have deep expertise in modern observability stacks (e.g., SIEM, data lakes, EDR, cloud telemetry, logging) and detection primi</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9152bb38-f8b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/c8855563-e744-4fa0-a497-34c8d25d2d76","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$347K – $490K","x-skills-required":["cybersecurity","detection engineering","incident response","security operations","observability","threat intelligence","cloud telemetry","logging","SIEM","data lakes","EDR"],"x-skills-preferred":[],"datePosted":"2026-03-06T18:32:16.205Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, detection engineering, incident response, security operations, observability, threat intelligence, cloud telemetry, logging, SIEM, data lakes, EDR","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":347000,"maxValue":490000,"unitText":"YEAR"}}}]}