{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/vulnerability-management-platforms"},"x-facet":{"type":"skill","slug":"vulnerability-management-platforms","display":"Vulnerability Management Platforms","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_cef90895-c6d"},"title":"Technical Program Manager, Security (Coordinated Vulnerability Disclosure)","description":"<p>As a Technical Program Manager for Security, Coordinated Vulnerability Disclosure (CVD), you will build and lead the programs that govern how Anthropic responsibly discloses software vulnerabilities discovered by our AI-powered tools.</p>\n<p>These tools have already found real zero-days in Firefox, the Linux kernel, and other critical software. The challenge is no longer just finding vulnerabilities; it is managing the consequences of finding them at unprecedented scale and speed.</p>\n<p>Traditional coordinated disclosure frameworks were designed for a world where a researcher might find one serious vulnerability every few weeks. AI-powered discovery has changed that equation entirely; Claude can surface hundreds of findings in a single codebase in a single day.</p>\n<p>This role exists to ensure that every finding reaches the right maintainer, at the right pace, with the right context, and that Anthropic meets its Responsible Scaling Policy (RSP) commitments in the process.</p>\n<p>You will own the end-to-end CVD lifecycle: from internal triage and human validation of AI-generated findings, through tiered disclosure timelines, to external coordination with vendors, open-source maintainers, and organizations.</p>\n<p>This role requires deep collaboration across Security Engineering, Legal, Communications, Product, and Frontier Red Team to ensure Anthropic operates as a responsible steward of the vulnerabilities its tools discover.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Own end-to-end CVD program strategy and execution: Define and drive the roadmap for coordinated vulnerability disclosure, from AI-generated finding through maintainer notification, remediation tracking, and public disclosure.</li>\n</ul>\n<ul>\n<li>Lead internal triage and quality assurance: Establish and manage the human review process that validates all AI-generated findings before external disclosure.</li>\n</ul>\n<ul>\n<li>Design and operate tiered disclosure timelines: Implement severity-based disclosure windows with appropriate extension policies.</li>\n</ul>\n<ul>\n<li>Build and manage pacing and submission models: Develop rate-limiting frameworks that govern how many findings are submitted to each project, scaled to maintainer capacity and project size.</li>\n</ul>\n<ul>\n<li>Lead external coordination and partner engagement: Manage relationships with open-source maintainers and closed-source vendors.</li>\n</ul>\n<ul>\n<li>Establish program metrics and reporting: Define and track the metrics that determine program health, including fix rates, false-positive rates, median time-to-patch, and qualitative maintainer feedback.</li>\n</ul>\n<ul>\n<li>Drive response category classification: Manage the process for classifying findings into response categories (latent vulnerability, active exploitation, ecosystem-level pattern) and ensure the appropriate response protocol is triggered for each category.</li>\n</ul>\n<ul>\n<li>Lead cross-functional coordination: Manage stakeholder relationships across Security Engineering, Legal, Communications, Product, and Frontier Red Team to drive alignment and execution on disclosure initiatives.</li>\n</ul>\n<ul>\n<li>Collaborate with senior leadership and executives: Communicate program vision, risks, and progress with executive presence.</li>\n</ul>\n<p>You May Be a Good Fit If You Have:</p>\n<ul>\n<li>10+ years of experience in cybersecurity, vulnerability management, or security operations, with at least 4+ years leading vulnerability disclosure, vulnerability management, or coordinated response programs.</li>\n</ul>\n<ul>\n<li>Deep understanding of coordinated vulnerability disclosure processes, including experience working with CERT/CC, MITRE CVE, or similar coordination bodies.</li>\n</ul>\n<ul>\n<li>Technical familiarity with vulnerability discovery tooling, static analysis, fuzzing infrastructure (e.g., OSS-Fuzz, CodeQL), and the triage workflows that turn raw findings into actionable reports.</li>\n</ul>\n<ul>\n<li>Experience engaging directly with open-source maintainers and understanding the dynamics of open-source project governance, contributor capacity, and maintainer burnout.</li>\n</ul>\n<ul>\n<li>Proven experience as a Technical Program Manager or similar role in a cybersecurity or technology-focused environment, with a track record of leading complex, cross-organizational programs to successful completion.</li>\n</ul>\n<ul>\n<li>Executive communication skills with demonstrated ability to influence decisions at the senior leadership and C-suite level.</li>\n</ul>\n<p>Ability to manage highly ambiguous problems and navigate challenges to achieve program objectives in a fast-paced, evolving environment.</p>\n<p>Strong collaboration skills with proven ability to partner across diverse technical and non-technical stakeholders including Security Engineering, Legal, Communications, and Product teams.</p>\n<p>Strong Candidates May Also Have:</p>\n<ul>\n<li>Experience building vulnerability disclosure or coordinated response programs from the ground up in high-growth technology companies.</li>\n</ul>\n<ul>\n<li>Background as a CVE Numbering Authority (CNA) operator, or experience managing the operational requirements of CVE issuance, embargo coordination, and formal vulnerability tracking.</li>\n</ul>\n<ul>\n<li>Familiarity with AI/ML-powered security tooling and the unique challenges of managing AI-generated vulnerability reports at scale, including false-positive filtering and quality assurance.</li>\n</ul>\n<ul>\n<li>Experience with vulnerability management platforms and tracking systems (e.g., HackerOne, Bugcrowd, or custom internal tooling).</li>\n</ul>\n<ul>\n<li>Prior work in security research, penetration testing, or red teaming that provides firsthand understanding of the vulnerability lifecycle from discovery through remediation.</li>\n</ul>\n<ul>\n<li>Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP) and their intersection with vulnerability disclosure requirements.</li>\n</ul>\n<p>Experience managing multi-stakeholder disclosure scenarios involving ecosystem-level vulnerabilities that affect multiple projects simultaneously.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_cef90895-c6d","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://www.anthropic.com/","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5123769008","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$290,000-$405,000 USD","x-skills-required":["cybersecurity","vulnerability management","security operations","coordinated vulnerability disclosure","AI-powered tooling","static analysis","fuzzing infrastructure","open-source maintainers","compliance frameworks","vulnerability management platforms","tracking systems"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:56:16.224Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, vulnerability management, security operations, coordinated vulnerability disclosure, AI-powered tooling, static analysis, fuzzing infrastructure, open-source maintainers, compliance frameworks, vulnerability management platforms, tracking systems","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":290000,"maxValue":405000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7ad63033-e7e"},"title":"Senior Security Engineer I, Vulnerability Management","description":"<p>We are seeking a Senior Security Engineer I to join our Vulnerability Management team. This is an execution-focused role where you will perform hands-on triage, drive remediation follow-through, and improve day-to-day operational quality across cloud and specialized infrastructure environments.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Performing hands-on vulnerability triage and risk assessment using team-defined standards and playbooks</li>\n<li>Tracking remediation progress with owner teams, escalating blockers, and ensuring clean issue closure</li>\n<li>Supporting automated triage workflows by validating outputs and improving signal quality</li>\n<li>Contributing to automated remediation campaigns (e.g., EOL cleanup, vulnerable software upgrades, and fix verification)</li>\n<li>Supporting zero-day and embargo response by helping inventory affected assets and tracking owner-team deployment status</li>\n<li>Participating in incident investigations by gathering technical evidence and supporting impact analysis</li>\n<li>Participating in on-call rotation for critical vulnerability events</li>\n<li>Maintaining high-quality documentation, runbooks, and operational updates</li>\n</ul>\n<p>The ideal candidate will have 3+ years of relevant experience in vulnerability management, security operations, application security, or related security engineering. Key skills include a strong understanding of vulnerability assessment fundamentals, hands-on experience with vulnerability management platforms, proficiency in scripting/automation for workflow support, and familiarity with cloud security concepts.</p>\n<p>In addition to a competitive salary, we offer a variety of benefits to support your needs, including medical, dental, and vision insurance, 100% paid for by CoreWeave, company-paid life insurance, and flexible PTO.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7ad63033-e7e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4654263006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$139,000 to $204,000","x-skills-required":["vulnerability management","security operations","application security","vulnerability assessment fundamentals","vulnerability management platforms","scripting/automation for workflow support","cloud security concepts"],"x-skills-preferred":["security automation/SOAR platforms","container/Kubernetes vulnerability workflows","hardware-adjacent vulnerability domains","compliance evidence collection"],"datePosted":"2026-04-18T15:53:49.171Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"vulnerability management, security operations, application security, vulnerability assessment fundamentals, vulnerability management platforms, scripting/automation for workflow support, cloud security concepts, security automation/SOAR platforms, container/Kubernetes vulnerability workflows, hardware-adjacent vulnerability domains, compliance evidence collection","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":139000,"maxValue":204000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a2183a2d-c20"},"title":"Cyber Security Engineer, Staff Engineer","description":"<p>At Synopsys, we&#39;re seeking a dedicated and detail-oriented Cyber Security Engineer to join our team. As a Cyber Security Engineer, you will play a pivotal role in sustaining long-term CMMC compliance and advancing our cybersecurity maturity. You will own and coordinate CMMC Level 2 documentation, review and validate Standard Operating Procedures (SOPs), and verify implementation and effectiveness of CMMC security controls and practices. You will also support mock audits, readiness reviews, and official CMMC assessments, including evidence preparation and assessor interaction support.</p>\n<p>You will collaborate with IT and engineering teams to establish and track patching and remediation priorities, focusing on CMMC scoring impact. You will maintain ownership of all Plans of Action and Milestones (POA&amp;Ms), validating remediation closure evidence, and ensuring alignment with DoD and CMMC requirements. You will also support continuous control monitoring activities for ongoing compliance between assessments.</p>\n<p>As a Cyber Security Engineer, you will communicate compliance posture, risks, and remediation status to both technical and non-technical audiences, and support user and stakeholder education. You will also escalate unresolved compliance or remediation risks to cybersecurity and audit leadership as appropriate.</p>\n<p>This is an exciting opportunity to join a driven and collaborative Cybersecurity team at Synopsys, working alongside experts in IT, Engineering, and Business Operations. You will report to the Executive Director of Cybersecurity and play a central role in audit readiness, evidence management, and cross-functional collaboration.</p>\n<p>To be successful in this role, you will need:</p>\n<ul>\n<li>Security+ (SEC+) or equivalent industry-recognized cybersecurity certification</li>\n<li>4+ years of experience performing Information Assurance, ISSO, ISSE, or equivalent cybersecurity assurance functions</li>\n<li>2+ years supporting cybersecurity operations in a DoD or defense-adjacent enterprise environment</li>\n<li>Experience supporting NIST SP 800-171, RMF-aligned, or CMMC-related compliance activities</li>\n<li>Ability to obtain and maintain a U.S. DoD, FBI, or DHS security clearance</li>\n<li>Strong technical understanding of modern hardware, software, and enterprise infrastructure environments</li>\n<li>Familiarity with vulnerability management platforms, compliance evidence repositories, and security monitoring outputs</li>\n<li>Excellent organizational, prioritization, and time-management skills</li>\n<li>Strong analytical and problem-solving abilities with attention to detail</li>\n<li>Ability to work effectively across technical and non-technical teams to resolve complex compliance issues</li>\n<li>Strong written and verbal communication skills, including the ability to present information to leadership and stakeholder groups</li>\n<li>Demonstrated ability to manage multiple competing priorities in a high-assurance environment</li>\n</ul>\n<p>If you are a collaborative team player who thrives in cross-functional environments, detail-oriented and diligent, proactive and resourceful, clear communicator who can translate technical concepts to non-technical audiences, analytical thinker with strong problem-solving skills, adaptable and resilient, and ethical and trustworthy, committed to maintaining high standards of integrity and confidentiality, then we encourage you to apply for this exciting opportunity.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a2183a2d-c20","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/morrisville/cyber-security-engineer-staff-engineer-15964/44408/93005893632","x-work-arrangement":"onsite","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$129000-$193000","x-skills-required":["Security+ (SEC+) or equivalent industry-recognized cybersecurity certification","4+ years of experience performing Information Assurance, ISSO, ISSE, or equivalent cybersecurity assurance functions","2+ years supporting cybersecurity operations in a DoD or defense-adjacent enterprise environment","Experience supporting NIST SP 800-171, RMF-aligned, or CMMC-related compliance activities","Ability to obtain and maintain a U.S. DoD, FBI, or DHS security clearance","Strong technical understanding of modern hardware, software, and enterprise infrastructure environments","Familiarity with vulnerability management platforms, compliance evidence repositories, and security monitoring outputs","Excellent organizational, prioritization, and time-management skills","Strong analytical and problem-solving abilities with attention to detail","Ability to work effectively across technical and non-technical teams to resolve complex compliance issues","Strong written and verbal communication skills, including the ability to present information to leadership and stakeholder groups","Demonstrated ability to manage multiple competing priorities in a high-assurance environment"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:21:04.730Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Morrisville"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Security+ (SEC+) or equivalent industry-recognized cybersecurity certification, 4+ years of experience performing Information Assurance, ISSO, ISSE, or equivalent cybersecurity assurance functions, 2+ years supporting cybersecurity operations in a DoD or defense-adjacent enterprise environment, Experience supporting NIST SP 800-171, RMF-aligned, or CMMC-related compliance activities, Ability to obtain and maintain a U.S. DoD, FBI, or DHS security clearance, Strong technical understanding of modern hardware, software, and enterprise infrastructure environments, Familiarity with vulnerability management platforms, compliance evidence repositories, and security monitoring outputs, Excellent organizational, prioritization, and time-management skills, Strong analytical and problem-solving abilities with attention to detail, Ability to work effectively across technical and non-technical teams to resolve complex compliance issues, Strong written and verbal communication skills, including the ability to present information to leadership and stakeholder groups, Demonstrated ability to manage multiple competing priorities in a high-assurance environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":129000,"maxValue":193000,"unitText":"YEAR"}}}]}