<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>7732e8ed-b24</externalid>
      <Title>Cyber Security Engineer</Title>
      <Description><![CDATA[<p><strong>Job Description</strong></p>
<p>You are a forward-thinking cybersecurity professional with a passion for defending critical infrastructure and sensitive data. As a Cyber Security Engineer at Synopsys, you will be responsible for configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</p>
<p><strong>Key Responsibilities</strong></p>
<ul>
<li>Configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</li>
<li>Developing, updating, and documenting Standard Operating Procedures (SOPs) for security tools and maintaining accurate network diagrams.</li>
<li>Creating and deploying host and network countermeasures based on open source intelligence (OSINT), behavioral analysis, and evolving threat landscapes.</li>
<li>Monitoring, tuning, and implementing security controls in tools such as McAfee ePO and Palo Alto to ensure optimal protection.</li>
<li>Managing and troubleshooting Security Information and Event Management (SIEM) feeds, ensuring timely detection and response to security events.</li>
<li>Designing and implementing custom QRadar dashboards to visualize and analyze critical security datasets.</li>
<li>Leading incident response efforts, ensuring chain of custody is maintained and investigations are thoroughly documented.</li>
<li>Characterizing and analyzing network and host traffic to identify anomalous activity and mitigate potential threats.</li>
<li>Developing and deploying custom Data Loss Prevention (DLP) signatures within Microsoft O365, Palo Alto, and McAfee environments.</li>
</ul>
<p><strong>Impact</strong></p>
<ul>
<li>Strengthening the security posture of Ansys Government Initiatives (AGI) by proactively defending against emerging threats.</li>
<li>Ensuring compliance with rigorous federal and organizational security standards, supporting government and commercial initiatives.</li>
<li>Reducing risk of data breaches and operational disruptions through robust countermeasure development and incident response.</li>
<li>Enhancing operational readiness by keeping security documentation, SOPs, and network diagrams current and actionable.</li>
<li>Empowering internal teams and stakeholders by providing clear security guidance, training, and technical leadership.</li>
<li>Contributing to a culture of continuous improvement, innovation, and collaboration within the security team and broader organization.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Minimum two (2) years performing system administrator duties for Windows and/or Linux environments.</li>
<li>This position requires a government security clearance. You must be a U.S. citizen for consideration.</li>
<li>SEC+ or equivalent industry-recognized certification.</li>
<li>At least two (2) years of experience in an Enterprise Security Operation Center (SOC) or similar response team.</li>
<li>Minimum two (2) years supporting the Federal Government—either directly or as a contractor—in a security-related field.</li>
<li>Strong technical understanding of current hardware and software technologies, including security tools and platforms.</li>
</ul>
<p><strong>Who You Are</strong></p>
<ul>
<li>Analytical thinker with excellent problem-solving and decision-making skills.</li>
<li>Organized, self-motivated, and able to prioritize competing requests in a dynamic environment.</li>
<li>Exceptional communicator, able to translate complex technical concepts for diverse audiences and present information to groups.</li>
<li>Collaborative team player, eager to support and learn from colleagues while driving collective success.</li>
<li>Customer-focused, with strong relationship management skills and a commitment to user education and support.</li>
<li>Adaptable and resilient, ready to respond to urgent issues and evolving security challenges.</li>
</ul>
<p><strong>The Team You’ll Be A Part Of</strong></p>
<p>You’ll join the Ansys Government Initiatives (AGI) Cybersecurity team, a specialized group dedicated to protecting sensitive government and commercial assets. The team collaborates closely with internal stakeholders, federal partners, and industry experts to safeguard critical infrastructure and ensure compliance with the highest security standards. Together, you’ll drive innovation, share knowledge, and foster a culture of trust and resilience.</p>
<p><strong>Rewards and Benefits</strong></p>
<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$101000-$152000</Salaryrange>
      <Skills>host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, proxies, Security Information and Event Management (SIEM) feeds, Data Loss Prevention (DLP) signatures, Microsoft O365, Palo Alto, McAfee ePO, QRadar, custom dashboards, incident response, chain of custody, investigations, network and host traffic, anomalous activity, threat mitigation, open source intelligence (OSINT), behavioral analysis, evolving threat landscapes, security controls, security tools, platforms, technical leadership, user education, relationship management</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a leading provider of electronic design automation (EDA) software and services. The company has a global presence with over 10,000 employees.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/exton/cyber-security-engineer-agi-ansys-government-initiatives/44408/92312998208</Applyto>
      <Location>Exton, Pennsylvania</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>0ef383eb-d73</externalid>
      <Title>Abuse Investigator (CBRN)</Title>
      <Description><![CDATA[<p><strong>Compensation</strong></p>
<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>
<ul>
<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>
</ul>
<ul>
<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>
</ul>
<ul>
<li>401(k) retirement plan with employer match</li>
</ul>
<ul>
<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>
</ul>
<ul>
<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>
</ul>
<ul>
<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>
</ul>
<ul>
<li>Mental health and wellness support</li>
</ul>
<ul>
<li>Employer-paid basic life and disability coverage</li>
</ul>
<ul>
<li>Annual learning and development stipend to fuel your professional growth</li>
</ul>
<ul>
<li>Daily meals in our offices, and meal delivery credits as eligible</li>
</ul>
<ul>
<li>Relocation support for eligible employees</li>
</ul>
<ul>
<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>
</ul>
<p><strong>About the Team</strong></p>
<p>OpenAI’s mission is to ensure that general-purpose artificial intelligence benefits all of humanity. We believe that achieving our goal requires real world deployment and iteratively updating based on what we learn.</p>
<p>The Intelligence and Investigations team supports this by identifying and investigating misuses of our products – especially new types of abuse. This enables our partner teams to develop data-backed product policies and build scaled safety mitigations. Precisely understanding abuse allows us to safely enable users to build useful things with our products.</p>
<p><strong>About the Role</strong></p>
<p>As an Abuse Investigator on the Intelligence and Investigations team, you will be responsible for detecting misuse of our platform or services. Specifically, you will focus on cases where users attempt to use our platform in connection with prohibited activities such as developing or delivering biological and/or chemical threats to harm people, critical resources/infrastructure, or the environment. OpenAI has strict prohibitions and policies in this area, and you will detect, disrupt, and enforce on actors who violate our policies.</p>
<p>This role requires domain-specific expertise, experience investigating sophisticated threats, and the ability to navigate ambiguous signals in a complex and adversarial threat environment.</p>
<p>You will respond to time-sensitive escalations and will be expected to present your investigative work, both in writing and verbally, to key stakeholders across government, industry, and civil society, when required. You will also help inform the company’s evolving threat response and integrity monitoring and mitigation stack, while working closely on individual cases and enforcement assessments.</p>
<p><strong>In this role, you will:</strong></p>
<ul>
<li>Detect, investigate, and disrupt the attempted misuse of OpenAI products for the development or dissemination of biological threats, including dual-use misuse and emerging biothreat vectors. You will also be expected to work across related domains (e.g., chemical threats).</li>
</ul>
<ul>
<li>Partner closely with teams across Policy, Legal, Integrity, Global Affairs, and Security to conduct robust investigations, including cross-internet and open-source research to trace and understand abuse and ensure OpenAI’s mitigations address evolving needs in the space.</li>
</ul>
<ul>
<li>Develop abuse signals and tracking strategies to proactively detect users attempting dual-use or biohazard-related misuse of our platform and review content for enforcement decisions.</li>
</ul>
<ul>
<li>Communicate findings from your investigations with internal stakeholders and leadership and, at times, external partners including regulatory or scientific organizations.</li>
</ul>
<ul>
<li>Develop a categorical understanding of our product surfaces in the biosecurity space, and work with teams to improve data visibility and internal tooling.</li>
</ul>
<p><strong>You might thrive in this role if you:</strong></p>
<ul>
<li>Have industry-leading experience in biosecurity, biological weapons non-proliferation, dual-use research of concern (DURC), or related biodefense fields,</li>
</ul>
<ul>
<li>Have strong familiarity with technical investigations, especially using SQL and Python, in a government/military and/or tech company</li>
</ul>
<ul>
<li>Have demonstrated experience in risk-mitigation (e.g., adversarial thinking and record of success in threat mitigation)</li>
</ul>
<ul>
<li>Have worked on investigations related to biological threat actors, malicious dual-use exploitation, or responsible innovation in synthetic biology or bioengineering</li>
</ul>
<ul>
<li>Have at least 5+ years of experience tracking misuse and/or abuse in biosecurity or life sciences domains, or equivalent education in these domains</li>
</ul>
<ul>
<li>Have at least 2 years of experience developing innovative detection solutions and conducting open-ended research to solve real-world problems</li>
</ul>
<ul>
<li>Experience in presenting analytical work in public or policy settings</li>
</ul>
<ul>
<li>Have experience scaling and automating processes, especially with language models</li>
</ul>
<p><strong>About OpenAI</strong></p>
<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>
<p>We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.</p>
<p>For additional information, please see [OpenAI’s Affirmative Action and Equal Employment Opportunity Policy Statement](https://cdn.openai.com/policies/eeo-policy-statement.pdf).</p>
<p>Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protec</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>Full time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>Remote</Workarrangement>
      <Salaryrange>$230.4K – $425K</Salaryrange>
      <Skills>biosecurity, biological weapons non-proliferation, dual-use research of concern (DURC), biodefense, SQL, Python, risk-mitigation, adversarial thinking, threat mitigation, biological threat actors, malicious dual-use exploitation, responsible innovation in synthetic biology or bioengineering, misuse and/or abuse in biosecurity or life sciences domains, innovative detection solutions, open-ended research, analytical work in public or policy settings, scaling and automating processes, language models</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>OpenAI</Employername>
      <Employerlogo>https://logos.yubhub.co/openai.com.png</Employerlogo>
      <Employerdescription>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. It is a privately held company.</Employerdescription>
      <Employerwebsite>https://jobs.ashbyhq.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ashbyhq.com/openai/5d618f84-fcce-496c-bfe9-995bd9ff9065</Applyto>
      <Location>Remote - US; San Francisco; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>