{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/workload-isolation"},"x-facet":{"type":"skill","slug":"workload-isolation","display":"Workload Isolation","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_a3a1df2f-184"},"title":"Principal Engineer, Software Supply Chain Security","description":"<p>As the Principal Engineer, Software Supply Chain Security, you&#39;ll own the technical strategy that secures how software is built and delivered on GitLab&#39;s DevSecOps platform. You&#39;ll provide architectural leadership across multiple engineering teams.</p>\n<p>Your work will shape GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market. You&#39;ll focus on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture.</p>\n<p>Some examples of our projects:</p>\n<ul>\n<li>SLSA Level 3 compliance and provenance attestation across GitLab&#39;s CI/CD platform</li>\n<li>Integrated secrets management and runner security for container-isolated, secure pipelines</li>\n</ul>\n<p>You&#39;ll lead the end-to-end software supply chain security architecture for GitLab&#39;s CI/CD platform, including SLSA Level 3 implementation and CI infrastructure hardening. You&#39;ll drive cross-team technical strategy and decisions across our Software Supply Chain Security (SSCS) stage teams, aligning engineering work to SSCS strategic plans.</p>\n<p>You&#39;ll collaborate with infrastructure and CI/CD teams to design and land long-term initiatives for secure, scalable runner architecture, container isolation, and pipeline security at scale. You&#39;ll propose and validate technical implementations that support architectural changes to improve CI/CD scaling and performance on critical paths.</p>\n<p>You&#39;ll teach, mentor, and coach Staff Engineers and individual contributors, raising the bar on supply chain threat modeling, secrets management, artifact signing, and SBOM lifecycle practices.</p>\n<p>You&#39;ll partner with Engineering Managers and senior leadership to define roadmaps, break down complex initiatives, and enable Staff Engineers to lead sub-department-wide efforts.</p>\n<p>You&#39;ll engage with customers and external stakeholders as a technical consultant and spokesperson for GitLab&#39;s software supply chain security capabilities and roadmap.</p>\n<p>You&#39;ll collaborate with product, security, and compliance stakeholders to ensure features meet enterprise security, governance, and regulatory expectations in the software supply chain security market.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Providing architectural leadership across multiple engineering teams</li>\n<li>Shaping GitLab&#39;s enterprise security posture in the rapidly growing software supply chain security market</li>\n<li>Focusing on SLSA Level 3 compliance, secrets management, CI/CD security hardening, and the foundations of GitLab&#39;s global zero trust architecture</li>\n</ul>\n<p>Key requirements include:</p>\n<ul>\n<li>Deep expertise in software supply chain security, including threat modeling for supply chain attack vectors, SLSA implementation and attestation systems, and SBOM generation and lifecycle management</li>\n<li>Strong knowledge of artifact signing and verification using the Sigstore ecosystem, including Cosign, Fulcio, Rekor, and in-toto attestations</li>\n<li>Experience designing and hardening CI/CD security, such as runner isolation, pipeline security controls, and secrets management in large-scale environments</li>\n</ul>\n<p>Preferred qualifications include:</p>\n<ul>\n<li>Background in distributed systems and infrastructure, including building resilient CI/CD platforms that process high pipeline volumes and optimizing performance for critical paths</li>\n<li>Practical experience with container security and Kubernetes security, including admission controllers, policy controllers, workload isolation, and registry hardening</li>\n<li>Proficiency in Go or Rust in a production environment, combined with expert-level understanding of CI/CD workflows and DevSecOps best practices</li>\n<li>Experience operating as a Principal or Staff Engineer across multiple development teams, providing architectural leadership and partnering with Engineering Managers and senior leaders</li>\n<li>Demonstrated capacity to clearly communicate complex problems and solutions</li>\n</ul>\n<p>Our Software Supply Chain Security stage engineering teams are responsible for authentication and access within GitLab. We also build features that help customers manage vulnerabilities, dependencies, security policies, and compliance frameworks across their organizations.</p>\n<p>The base salary range for this role&#39;s listed level is currently for residents of the United States only. This range is intended to reflect the role&#39;s base salary rate in locations throughout the US. Grade level and salary ranges are determined through interviews and a review of education, experience, knowledge, skills, abilities of the applicant, equity with other team members, alignment with market data, and geographic location. The base salary range does not include any bonuses, equity, or benefits.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_a3a1df2f-184","directApply":true,"hiringOrganization":{"@type":"Organization","name":"GitLab","sameAs":"https://about.gitlab.com/","logo":"https://logos.yubhub.co/about.gitlab.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/gitlab/jobs/8373553002","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$157,900-$338,400 USD","x-skills-required":["software supply chain security","threat modeling","SLSA implementation","attestation systems","SBOM generation","lifecycle management","artifact signing","verification","Sigstore ecosystem","Cosign","Fulcio","Rekor","in-toto attestations","CI/CD security","runner isolation","pipeline security controls","secrets management","distributed systems","infrastructure","container security","Kubernetes security","admission controllers","policy controllers","workload isolation","registry hardening","Go","Rust","CI/CD workflows","DevSecOps best practices"],"x-skills-preferred":["background in distributed systems and infrastructure","practical experience with container security and Kubernetes security","proficiency in Go or Rust in a production environment","expert-level understanding of CI/CD workflows and DevSecOps best practices","experience operating as a Principal or Staff Engineer across multiple development teams"],"datePosted":"2026-04-18T15:45:22.426Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote, Canada; Remote, Israel; Remote, Netherlands; Remote, United Kingdom; Remote, US"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"software supply chain security, threat modeling, SLSA implementation, attestation systems, SBOM generation, lifecycle management, artifact signing, verification, Sigstore ecosystem, Cosign, Fulcio, Rekor, in-toto attestations, CI/CD security, runner isolation, pipeline security controls, secrets management, distributed systems, infrastructure, container security, Kubernetes security, admission controllers, policy controllers, workload isolation, registry hardening, Go, Rust, CI/CD workflows, DevSecOps best practices, background in distributed systems and infrastructure, practical experience with container security and Kubernetes security, proficiency in Go or Rust in a production environment, expert-level understanding of CI/CD workflows and DevSecOps best practices, experience operating as a Principal or Staff Engineer across multiple development teams","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":157900,"maxValue":338400,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0ae6f8dc-4fd"},"title":"Staff Engineer, AI Security","description":"<p>Join the team as Twilio&#39;s next Staff Engineer, AI Security.</p>\n<p>As a Staff Engineer, AI Security on the AppSec team, you&#39;ll lead autonomous defense for the AI lifecycle. Build multi-agent frameworks and secure gateways while integrating real-time security gates and identity standards. By mentoring Security and R&amp;D to define the MLSecOps roadmap, you&#39;ll ensure a &#39;secure-by-default&#39; future for agentic workflows and resilient AI innovation.</p>\n<p>Responsibilities:</p>\n<p>Serve as the primary subject matter expert for all AI and machine learning security initiatives across security and R&amp;D.</p>\n<p>Design and manage AI gateways to provide a centralized control plane for authentication and authorization and rate limiting across all model and tool interactions.</p>\n<p>Build and maintain an autonomous security agentic framework that utilizes multi agent orchestration for end to end investigation and alert triage and remediation.</p>\n<p>Develop agentic identity models using OAuth 2.1 to propagate identity across trust boundaries and prevent the confused deputy problem.</p>\n<p>Help govern the AI augmented software development lifecycle by integrating real time security gates into the developer environment and CI/CD pipeline.</p>\n<p>Manage Agentic Security Solutions that secure AI lifecycle and manage AI workloads at runtime.</p>\n<p>Author company wide AI security standards and implement these security checks across Twilio&#39;s stack.</p>\n<p>Implement human in the loop checkpoints and transactional safety protocols for high impact or destructive agentic actions.</p>\n<p>Partner with engineering leadership to set the long term roadmap for identity centric security and automated posture management.</p>\n<p>Act as a knowledge multiplier by mentoring security engineers and developing secure by default paved road templates for R&amp;D teams</p>\n<p>Qualifications:</p>\n<p>8+ years of experience in security engineering with at least 3 years focused on AI or machine learning security operations (MLSecOps).</p>\n<p>Expertise in orchestrating multi-agent systems with AWS Strands, LangGraph, and CrewAI, specializing in runtime isolation, PII redaction, and defending against indirect prompt injection in agentic environments.</p>\n<p>Hands-on experience with AI-specific frameworks (e.g., MITRE ATLAS, MAESTRO, OWASP Top 10 for LLMs/Agents/MCP) to threat model and defend against a wide spectrum of risks, including direct/indirect prompt injection, training data poisoning, tool poisoning, and data exfiltration within agentic workflows.</p>\n<p>Proficiency in securing end-to-end AI pipelines, from data ingestion and training to model deployment and monitoring.</p>\n<p>Strong communication skills to translate complex AI risks into actionable business logic for stakeholders.</p>\n<p>Desired:</p>\n<p>Hands-on experience in modern application security tooling including SAST and SCA and DAST with experience adapting these tools to catch AI specific vulnerabilities like indirect prompt injection.</p>\n<p>Expertise in identity standards including OAuth 2.1 and PKCE.</p>\n<p>Experience with AI Red Teaming and conducting adversarial simulations against Large Language Models (LLMs) and agentic systems.</p>\n<p>Proficiency in at least one general programming language (Python, Go, etc) with experience in container security and workload isolation.</p>\n<p>Proven ability to operate with autonomy and drive high impact outcomes in ambiguous environments by identifying and executing on critical projects without predefined roadmaps or direct supervision.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0ae6f8dc-4fd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Twilio","sameAs":"https://www.twilio.com/","logo":"https://logos.yubhub.co/twilio.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/twilio/jobs/7821462","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["security engineering","AI and machine learning security","multi-agent systems","AWS Strands","LangGraph","CrewAI","runtime isolation","PII redaction","indirect prompt injection","AI-specific frameworks","MITRE ATLAS","MAESTRO","OWASP Top 10 for LLMs/Agents/MCP","end-to-end AI pipelines","data ingestion","training","model deployment","monitoring","strong communication skills"],"x-skills-preferred":["modern application security tooling","SAST and SCA and DAST","identity standards","OAuth 2.1","PKCE","AI Red Teaming","adversarial simulations","Large Language Models","container security","workload isolation"],"datePosted":"2026-04-18T15:44:10.579Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - Ireland"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"security engineering, AI and machine learning security, multi-agent systems, AWS Strands, LangGraph, CrewAI, runtime isolation, PII redaction, indirect prompt injection, AI-specific frameworks, MITRE ATLAS, MAESTRO, OWASP Top 10 for LLMs/Agents/MCP, end-to-end AI pipelines, data ingestion, training, model deployment, monitoring, strong communication skills, modern application security tooling, SAST and SCA and DAST, identity standards, OAuth 2.1, PKCE, AI Red Teaming, adversarial simulations, Large Language Models, container security, workload isolation"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_41528416-21c"},"title":"Staff+ Software Security Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Team</strong></p>\n<p>The Security Engineering team protects Anthropic&#39;s AI systems and maintains the trust of our users and society. We define the authentication architecture for our training infrastructure, design the cryptographic foundations that protect model weights and training data, and drive the developer security program that shapes how engineers build and ship software.</p>\n<p><strong>About the role:</strong></p>\n<ul>\n<li>Scope, design, and build complex security systems end to end, maintaining them through production and driving through ambiguous technical challenges with minimal oversight</li>\n<li>Identify systematic risks through threat modeling and risk assessment, then build the controls and infrastructure that address them</li>\n<li>Mentor engineers across the security team and broader engineering organisation, contribute to hiring, and grow security engineering culture at Anthropic</li>\n<li>Enable other teams to build their own security solutions by providing design pattern guidance and expanding security ownership beyond the security team</li>\n</ul>\n<p><strong>Developer security and supply chain</strong></p>\n<ul>\n<li>Build and advance our developer security program by embedding security practices into the software development lifecycle and developer workflows</li>\n<li>Harden CI/CD pipelines against supply chain attacks through isolated build environments, signed attestations, dependency verification, and automated policy enforcement</li>\n</ul>\n<p><strong>Identity and secrets management</strong></p>\n<ul>\n<li>Architect systems that protect sensitive assets including model weights, customer data, and training datasets</li>\n<li>Build and operate credential issuance, rotation, and workload authentication across our multi-cloud environments</li>\n</ul>\n<p><strong>Infrastructure security</strong></p>\n<ul>\n<li>Implement and maintain cloud security controls including IAM, network segmentation, VPC architecture, and encryption across our multi-cloud and on-prem environments</li>\n<li>Contribute to cluster security controls including RBAC policies, namespace isolation, workload identity, and pod security</li>\n<li>Contribute to continuous cloud security posture management using infrastructure-as-code scanning, misconfiguration detection, and automated remediation</li>\n</ul>\n<p><strong>Secure frameworks</strong></p>\n<ul>\n<li>Build critical security foundations including cryptographic frameworks, mTLS infrastructure, secure serialization, and authorization systems, designed to prevent entire classes of vulnerabilities and empower engineering teams to work securely without becoming security experts themselves</li>\n<li>Partner with product, research, infrastructure, and other security teams to ensure frameworks integrate smoothly with lower-layer security controls</li>\n</ul>\n<p><strong>You may be a good fit if you have:</strong></p>\n<ul>\n<li>At least 8 years of software engineering experience with deep security expertise, including leading complex security initiatives independently</li>\n<li>Bachelor&#39;s degree in Computer Science or equivalent industry experience</li>\n<li>Strong programming skills in Python or at least one systems language such as Go, Rust, or C/C++</li>\n<li>Deep understanding of identity systems, cryptographic primitives, and secrets management</li>\n<li>Working knowledge of Kubernetes security primitives including RBAC, namespaces, network policies, and service accounts</li>\n<li>Experience leading cross-functional security initiatives and navigating complex organisational dynamics</li>\n<li>Outstanding communication skills, translating technical concepts effectively across all levels of the organisation</li>\n<li>A track record of bringing clarity and ownership to ambiguous technical problems and driving them to resolution</li>\n<li>Low ego and high empathy, with a history of growing the engineers around you and supporting diverse, inclusive teams</li>\n<li>Passion for AI safety and the role security engineering plays in building trustworthy AI systems</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Designed or operated identity and secrets management systems for large-scale AI or cloud infrastructure</li>\n<li>Built security frameworks or libraries adopted across an engineering organisation</li>\n<li>Led a developer security program including supply chain security, secure build infrastructure, and SDLC integrations</li>\n<li>Built or secured CI infrastructure using Nix, Bazel, or Kubernetes-based deploy systems, with depth in toolchain issues, CI/CD pipelines, and developer workflow optimisation</li>\n<li>Implemented machine identity or workload authentication systems using SPIFFE/SPIRE, mTLS, or equivalent</li>\n<li>Understanding of Linux systems internals including namespaces, cgroups, and seccomp, and how these underpin container and workload isolation</li>\n<li>Contributed to the security architecture of multi-cloud environments including network segmentation, data protection, and access governance</li>\n<li>Experience with network security controls including admission controllers, CNI-level policy, service mesh security, and east-west traffic enforcement</li>\n<li>Experience building runtime security monitoring using eBPF or kernel security policies</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None, applications will be received on a rolling basis.</p>\n<p><strong>The annual compensation range for this role is listed below.</strong></p>\n<p>For sales roles, the range provided is the role’s On Target Earnings (&quot;OTE&quot;) range, meaning the total amount of money an employee is expected to earn in a year, including bonuses and other forms of compensation.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_41528416-21c","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5120512008","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"The annual compensation range for this role is listed below.\n\nFor sales roles, the range provided is the role’s On Target Earnings (\"OTE\") range, meaning the total amount of money an employee is expected to earn in a year, including bonuses and other forms of compensation.","x-skills-required":["Python","Go","Rust","C/C++","Kubernetes","RBAC","namespaces","network policies","service accounts","identity systems","cryptographic primitives","secrets management"],"x-skills-preferred":["Nix","Bazel","Kubernetes-based deploy systems","SPIFFE/SPIRE","mTLS","Linux systems internals","namespaces","cgroups","seccomp","container and workload isolation","multi-cloud environments","network segmentation","data protection","access governance","admission controllers","CNI-level policy","service mesh security","east-west traffic enforcement","runtime security monitoring","eBPF","kernel security policies"],"datePosted":"2026-03-08T13:52:38.657Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA | New York City, NY | Seattle, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Go, Rust, C/C++, Kubernetes, RBAC, namespaces, network policies, service accounts, identity systems, cryptographic primitives, secrets management, Nix, Bazel, Kubernetes-based deploy systems, SPIFFE/SPIRE, mTLS, Linux systems internals, namespaces, cgroups, seccomp, container and workload isolation, multi-cloud environments, network segmentation, data protection, access governance, admission controllers, CNI-level policy, service mesh security, east-west traffic enforcement, runtime security monitoring, eBPF, kernel security policies"}]}