{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/windows-internals"},"x-facet":{"type":"skill","slug":"windows-internals","display":"Windows Internals","count":4},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_11ef34c2-278"},"title":"Information Security Engineer","description":"<p>We&#39;re looking for someone who has spent years thinking adversarially about Windows and Active Directory. As an Information Security Engineer focused on Windows and Active Directory, you&#39;ll own the security of Palantir&#39;s global Windows infrastructure.</p>\n<p>Your team runs 24/7 prevention, detection, and investigation of security events across our entire environment. The adversaries we face are sophisticated. We need someone who is more so.</p>\n<p><strong>Core Responsibilities</strong></p>\n<ul>\n<li>Own the security posture of Palantir&#39;s Windows and Active Directory estate , hardening, configuration standards, and ongoing validation that those standards hold.</li>\n<li>Reduce attack surface across AD: audit and remediate misconfigurations, legacy protocol exposure, excessive privilege, Kerberos delegation abuse, and tier model violations.</li>\n<li>Evaluate, deploy, and own the configuration of defensive tooling across the Windows environment: EDR, PAM, identity threat detection, and endpoint hardening controls.</li>\n<li>Build and maintain automation for security operations across Windows infrastructure , patching pipelines, configuration drift monitoring, access reviews, and credential hygiene.</li>\n<li>Partner with Identity and Infrastructure teams to drive architectural improvements: tiered administration, Protected Users, LAPS, Credential Guard, and authentication policy silos.</li>\n<li>Translate findings from assessments and red team exercises into durable fixes , configuration changes, architectural improvements, and policy updates that reduce recurrence.</li>\n</ul>\n<p><strong>What We&#39;re Looking For</strong></p>\n<ul>\n<li>Active Directory</li>\n<li>Deep, working knowledge of AD architecture: sites and services, replication, trust relationships, delegation models, and the LDAP schema.</li>\n<li>Hands-on experience investigating and detecting AD attacks across the full kill chain , from initial enumeration through domain dominance.</li>\n<li>Familiarity with attack tooling (BloodHound, Impacket, Rubeus, Mimikatz, CrackMapExec) and, critically, what they leave behind.</li>\n<li>Experience hardening AD environments: tiered administration, Protected Users, LAPS, Credential Guard, PAM trusts, and authentication policy silos.</li>\n<li>Windows Internals</li>\n<li>Thorough understanding of Windows security architecture: access tokens, privilege model, integrity levels, LSASS and credential storage, SAM, and the Security Reference Monitor.</li>\n<li>Ability to read and interpret Windows kernel structures, driver behavior, and undocumented APIs when necessary.</li>\n<li>Proficiency with low-level analysis tools: WinDbg, Process Monitor, Process Hacker, Volatility, and x64dbg.</li>\n<li>Experience with ETW-based telemetry pipelines and building detections on top of raw Windows event data.</li>\n<li>Detection &amp; Response</li>\n<li>Proven track record writing high-fidelity detection logic, not just tuning vendor signatures.</li>\n<li>Experience leading complex incident response investigations, including those involving nation-state or sophisticated criminal actors.</li>\n<li>Strong forensic fundamentals across disk, memory, and network artifacts on Windows systems.</li>\n</ul>\n<p><strong>What We Value</strong></p>\n<ul>\n<li>Experience with Entra ID (Azure AD), hybrid identity architectures, and cloud-based attack paths that pivot through on-prem AD.</li>\n<li>Prior work in adversary simulation, red teaming, or offensive security research , especially against AD targets.</li>\n<li>Public contributions: conference talks (BlueHat, BSides, SANS, etc.), blog posts, or open-source tooling.</li>\n</ul>\n<p><strong>What We Require</strong></p>\n<ul>\n<li>5+ years of hands-on security experience, with the majority focused on Windows environments and Active Directory.</li>\n<li>Proficiency in Python or PowerShell for detection development, automation, and forensic tooling.</li>\n<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>\n<li>A portfolio of real work: detections you&#39;ve written, research you&#39;ve published, tools you&#39;ve built, or incidents you&#39;ve led.</li>\n</ul>\n<p><strong>Additional Information</strong></p>\n<ul>\n<li>The estimated salary range for this position is estimated to be $145,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_11ef34c2-278","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Palantir","sameAs":"https://www.palantir.com/","logo":"https://logos.yubhub.co/palantir.com.png"},"x-apply-url":"https://jobs.lever.co/palantir/4bfef5e0-6689-4db8-9ffe-ab6df6836845","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$145,000 - $200,000/year","x-skills-required":["Active Directory","Windows Internals","Detection & Response","Python","PowerShell","ETW-based telemetry pipelines","Low-level analysis tools","WinDbg","Process Monitor","Process Hacker","Volatility","x64dbg","Entra ID","Hybrid identity architectures","Cloud-based attack paths"],"x-skills-preferred":[],"datePosted":"2026-04-25T20:55:45.478Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Denver"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Active Directory, Windows Internals, Detection & Response, Python, PowerShell, ETW-based telemetry pipelines, Low-level analysis tools, WinDbg, Process Monitor, Process Hacker, Volatility, x64dbg, Entra ID, Hybrid identity architectures, Cloud-based attack paths","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":145000,"maxValue":200000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c67c28f8-bb3"},"title":"Information Security Engineer","description":"<p>We&#39;re looking for someone who has spent years thinking adversarially about Windows and Active Directory. As an Information Security Engineer focused on Windows and Active Directory, you&#39;ll own the security of Palantir&#39;s global Windows infrastructure. Your team runs 24/7 prevention, detection, and investigation of security events across our entire environment.</p>\n<p>Core Responsibilities:</p>\n<ul>\n<li>Own the security posture of Palantir&#39;s Windows and Active Directory estate , hardening, configuration standards, and ongoing validation that those standards hold.</li>\n</ul>\n<ul>\n<li>Reduce attack surface across AD: audit and remediate misconfigurations, legacy protocol exposure, excessive privilege, Kerberos delegation abuse, and tier model violations.</li>\n</ul>\n<ul>\n<li>Evaluate, deploy, and own the configuration of defensive tooling across the Windows environment: EDR, PAM, identity threat detection, and endpoint hardening controls.</li>\n</ul>\n<ul>\n<li>Build and maintain automation for security operations across Windows infrastructure , patching pipelines, configuration drift monitoring, access reviews, and credential hygiene.</li>\n</ul>\n<ul>\n<li>Partner with Identity and Infrastructure teams to drive architectural improvements: tiered administration, Protected Users, LAPS, Credential Guard, and authentication policy silos.</li>\n</ul>\n<ul>\n<li>Translate findings from assessments and red team exercises into durable fixes , configuration changes, architectural improvements, and policy updates that reduce recurrence.</li>\n</ul>\n<p>What We&#39;re Looking For:</p>\n<ul>\n<li>Active Directory</li>\n</ul>\n<ul>\n<li>Deep, working knowledge of AD architecture: sites and services, replication, trust relationships, delegation models, and the LDAP schema.</li>\n</ul>\n<ul>\n<li>Hands-on experience investigating and detecting AD attacks across the full kill chain , from initial enumeration through domain dominance.</li>\n</ul>\n<ul>\n<li>Familiarity with attack tooling (BloodHound, Impacket, Rubeus, Mimikatz, CrackMapExec) and, critically, what they leave behind.</li>\n</ul>\n<ul>\n<li>Experience hardening AD environments: tiered administration, Protected Users, LAPS, Credential Guard, PAM trusts, and authentication policy silos.</li>\n</ul>\n<ul>\n<li>Windows Internals</li>\n</ul>\n<ul>\n<li>Thorough understanding of Windows security architecture: access tokens, privilege model, integrity levels, LSASS and credential storage, SAM, and the Security Reference Monitor.</li>\n</ul>\n<ul>\n<li>Ability to read and interpret Windows kernel structures, driver behavior, and undocumented APIs when necessary.</li>\n</ul>\n<ul>\n<li>Proficiency with low-level analysis tools: WinDbg, Process Monitor, Process Hacker, Volatility, and x64dbg.</li>\n</ul>\n<ul>\n<li>Experience with ETW-based telemetry pipelines and building detections on top of raw Windows event data.</li>\n</ul>\n<ul>\n<li>Detection &amp; Response</li>\n</ul>\n<ul>\n<li>Proven track record writing high-fidelity detection logic, not just tuning vendor signatures.</li>\n</ul>\n<ul>\n<li>Experience leading complex incident response investigations, including those involving nation-state or sophisticated criminal actors.</li>\n</ul>\n<ul>\n<li>Strong forensic fundamentals across disk, memory, and network artifacts on Windows systems.</li>\n</ul>\n<p>What We Value:</p>\n<ul>\n<li>Experience with Entra ID (Azure AD), hybrid identity architectures, and cloud-based attack paths that pivot through on-prem AD.</li>\n</ul>\n<ul>\n<li>Prior work in adversary simulation, red teaming, or offensive security research , especially against AD targets.</li>\n</ul>\n<ul>\n<li>Public contributions: conference talks (BlueHat, BSides, SANS, etc.), blog posts, or open-source tooling.</li>\n</ul>\n<p>What We Require:</p>\n<ul>\n<li>5+ years of hands-on security experience, with the majority focused on Windows environments and Active Directory.</li>\n</ul>\n<ul>\n<li>Proficiency in Python or PowerShell for detection development, automation, and forensic tooling.</li>\n</ul>\n<ul>\n<li>Active TS/SCI security clearance, or eligibility and willingness to obtain one.</li>\n</ul>\n<ul>\n<li>A portfolio of real work: detections you&#39;ve written, research you&#39;ve published, tools you&#39;ve built, or incidents you&#39;ve led.</li>\n</ul>\n<p>Additional Information:</p>\n<ul>\n<li>The estimated salary range for this position is estimated to be $145,000 - $200,000/year.</li>\n</ul>\n<ul>\n<li>Our benefits aim to promote health and wellbeing across all areas of Palantirians’ lives. We work to continuously improve our offerings and listen to our community as we design and update them.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c67c28f8-bb3","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Palantir","sameAs":"https://www.palantir.com/","logo":"https://logos.yubhub.co/palantir.com.png"},"x-apply-url":"https://jobs.lever.co/palantir/1e77a5e8-9843-4516-a186-7c24f0ff07a0","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$145,000 - $200,000/year","x-skills-required":["Active Directory","Windows Internals","ETW-based telemetry pipelines","Low-level analysis tools","Python","PowerShell","Forensic fundamentals","Incident response","Security clearance"],"x-skills-preferred":["Entra ID","Hybrid identity architectures","Cloud-based attack paths","Adversary simulation","Red teaming","Offensive security research"],"datePosted":"2026-04-25T20:55:15.975Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Boulder"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Active Directory, Windows Internals, ETW-based telemetry pipelines, Low-level analysis tools, Python, PowerShell, Forensic fundamentals, Incident response, Security clearance, Entra ID, Hybrid identity architectures, Cloud-based attack paths, Adversary simulation, Red teaming, Offensive security research","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":145000,"maxValue":200000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_4f9633fe-824"},"title":"Support Engineer, Anti-Cheat","description":"<p>Electronic Arts creates next-level entertainment experiences that inspire players and fans around the world. Here, everyone is part of the story. Part of a community that connects across the globe. A place where creativity thrives, new perspectives are invited, and ideas matter. A team where everyone makes play happen.</p>\n<p>Join the SPEAR (Secure Product Engineering &amp; Anti-Cheat Response) Anti-Cheat Engineering team, part of EA Security! Our mission is to ensure fair play across our many PC titles. We deliver a kernel anti-cheat solution that promotes an even playing field for the millions of fans that play EA games.</p>\n<p>We are looking for an engineer who is passionate about making software playable for all users. Your primary responsibilities will be updating our anti-cheat technology to resolve compatibility issues reported by our partners and customers, and address support problems raised by the game studios.</p>\n<p>You will report to the Senior Manager of the Anti-Cheat Engineering team, located in the US.</p>\n<p>You Will:</p>\n<ul>\n<li>Be the first line of investigating bugs, compatibility issues, and performance issues reported by studios</li>\n<li>Develop fixes to make Javelin anti-cheat software compatible with various other end user hardware and software</li>\n</ul>\n<p>You Have:</p>\n<ul>\n<li>3+ years of experience with C++ or other low-level programming languages</li>\n<li>2+ year of experience in debugging crashes through memory dumps</li>\n<li>2+ year of experience with WinDbg and DebugView</li>\n</ul>\n<p>Bonus Skills:</p>\n<ul>\n<li>Experience in Windows internals</li>\n<li>Experience developing anti-tamper, anti-virus, or anti-malware technologies</li>\n<li>Familiarity with with game cheats and the cheat community</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_4f9633fe-824","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Electronic Arts","sameAs":"https://jobs.ea.com","logo":"https://logos.yubhub.co/jobs.ea.com.png"},"x-apply-url":"https://jobs.ea.com/en_US/careers/JobDetail/Support-Engineer-Anti-Cheat/213466","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$122,300 - $158,500 USD","x-skills-required":["C++","low-level programming languages","debugging crashes through memory dumps","WinDbg","DebugView"],"x-skills-preferred":["Windows internals","anti-tamper","anti-virus","anti-malware technologies","game cheats","cheat community"],"datePosted":"2026-04-24T13:20:14.395Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Kirkland"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"C++, low-level programming languages, debugging crashes through memory dumps, WinDbg, DebugView, Windows internals, anti-tamper, anti-virus, anti-malware technologies, game cheats, cheat community","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":122300,"maxValue":158500,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d1a59823-bfb"},"title":"Anti-Cheat Engineer","description":"<p>Electronic Arts creates next-level entertainment experiences that inspire players and fans around the world. As part of the SPEAR (Secure Product Engineering &amp; Anti-Cheat Response) Anti-Cheat Engineering team, you will contribute to ensuring fair play across our many PC titles.</p>\n<p>Your primary responsibility will be supporting the development of our Windows on ARM support, thereby extending our game security capabilities into new and emerging markets. You will implement features to support loading different versions of EA Javelin Anticheat based on user hardware, improve our build and test pipelines, and develop features to support EA Javelin Anticheat operating on non-Windows devices.</p>\n<p>You will work closely with the Senior Manager of the Anti-Cheat Engineering team, located in the US, and collaborate with other engineers to achieve our mission of delivering a secure and fair gaming experience.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Implement features to support for loading different versions of EA Javelin Anticheat based on user hardware</li>\n<li>Support improvements to our build and test pipelines that provide automated validation of EA Javelin Anticheat on ARM hardware</li>\n<li>Implement bug fixes and remediate security findings in EA Javelin Anticheat</li>\n<li>Develop features to support EA Javelin Anticheat operating on non-Windows devices, like Proton and Linux</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>4+ years of experience with C++ or other low-level programming languages</li>\n<li>2+ years of experience with low-level Windows internals and processor intrinsics</li>\n<li>1+ years of experience with Clang and LLVM</li>\n<li>1+ years of experience in debugging at the machine code level</li>\n<li>Previously shipped Windows drivers on x86_64 and ARM64</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d1a59823-bfb","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Electronic Arts","sameAs":"https://jobs.ea.com","logo":"https://logos.yubhub.co/jobs.ea.com.png"},"x-apply-url":"https://jobs.ea.com/en_US/careers/JobDetail/Anti-Cheat-Engineer/212779","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["C++","low-level programming languages","Windows internals","processor intrinsics","Clang","LLVM","debugging at the machine code level","Windows drivers"],"x-skills-preferred":["obfuscation or encryption technologies","anti-tamper","anti-virus","anti-malware technologies","anti-cheat solutions on Linux"],"datePosted":"2026-04-24T13:16:05.664Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"C++, low-level programming languages, Windows internals, processor intrinsics, Clang, LLVM, debugging at the machine code level, Windows drivers, obfuscation or encryption technologies, anti-tamper, anti-virus, anti-malware technologies, anti-cheat solutions on Linux"}]}