{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/yara"},"x-facet":{"type":"skill","slug":"yara","display":"Yara","count":2},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_de3eafc7-e74"},"title":"Cloudforce One REACT Principal Consultant","description":"<p>About Us</p>\n<p>At Cloudflare, we are on a mission to help build a better Internet. We run one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>\n<p>Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>\n<p>About the Team</p>\n<p>Cloudforce One is Cloudflare&#39;s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs).</p>\n<p>About the Role</p>\n<p>We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors.</p>\n<p>Responsibilities</p>\n<p>As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.</p>\n<p>The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.</p>\n<p>Requirements</p>\n<p>Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms.</p>\n<p>You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang.</p>\n<p>Examples of desirable skills, knowledge and experience include:</p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience</li>\n<li>3+ years of previous experience in cyber security</li>\n<li>2+ years of Incident Response experience</li>\n<li>1+ years of customer-facing role</li>\n<li>Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists</li>\n<li>Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise</li>\n<li>Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs</li>\n<li>Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis</li>\n<li>Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations</li>\n<li>Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations</li>\n<li>Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies</li>\n<li>Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams</li>\n<li>Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups</li>\n<li>Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS</li>\n<li>Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)</li>\n<li>Understanding of MITRE ATT&amp;CK and NIST Cyber Security Frameworks standards and requirements</li>\n<li>In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems</li>\n</ul>\n<p>Bonus Points:</p>\n<ul>\n<li>Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system</li>\n<li>Proficient with Yara and writing rules to detect similar malware samples</li>\n<li>Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs</li>\n<li>Practical malware analysis experience with static, dynamic, and automated malware analysis techniques</li>\n<li>Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples</li>\n<li>Reverse engineering experience with APT malware with an understanding of common infection vectors</li>\n<li>Knowledgeable of current malware techniques to evade detection and obstruct analysis</li>\n<li>Experience writing malware reports on unique and interesting aspects of malware</li>\n<li>Experience with malware attribution</li>\n<li>Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration</li>\n<li>Familiarity with bash command line executables to conduct static analysis and investigate IOCs</li>\n</ul>\n<p>Travel requirements</p>\n<p>Ability to travel up to 20% of the time</p>\n<p>Position may require foreign and domestic travel, passport will be required</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_de3eafc7-e74","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Cloudflare","sameAs":"https://www.cloudflare.com/","logo":"https://logos.yubhub.co/cloudflare.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/cloudflare/jobs/7389902","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Digital Forensics","Incident Response","Cybersecurity","Network Forensic Analysis","Reverse Engineering","Malware Analysis","Cloud Incident Response","Communication","Network Protocols","Cloud Environments","MITRE ATT&CK","NIST Cyber Security Frameworks","Windows Operating Systems","Unix","Linux","Mac Operating Systems"],"x-skills-preferred":["Python","Golang","Yara","Source Code","Hex","Binary","Regular Expression","Data Correlation","Network Flow","System Logs","Static Analysis","Dynamic Analysis","Automated Malware Analysis","Malware Attribution","Indicator of Compromise","Infrastructure Enumeration","Bash Command Line Executables"],"datePosted":"2026-04-18T15:52:02.967Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Hybrid"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Digital Forensics, Incident Response, Cybersecurity, Network Forensic Analysis, Reverse Engineering, Malware Analysis, Cloud Incident Response, Communication, Network Protocols, Cloud Environments, MITRE ATT&CK, NIST Cyber Security Frameworks, Windows Operating Systems, Unix, Linux, Mac Operating Systems, Python, Golang, Yara, Source Code, Hex, Binary, Regular Expression, Data Correlation, Network Flow, System Logs, Static Analysis, Dynamic Analysis, Automated Malware Analysis, Malware Attribution, Indicator of Compromise, Infrastructure Enumeration, Bash Command Line Executables"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_18528dac-ae1"},"title":"Threat Collections Engineer","description":"<p><strong>About Anthropic</strong></p>\n<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>\n<p><strong>About the Role</strong></p>\n<p>We are looking for a Threat Collections Engineer to join our Threat Intelligence team. In this role, you will build the infrastructure that powers our threat discovery capabilities—integrating external data sources, developing detection systems for automated lead generation, and creating internal tooling that scales our investigators&#39; impact.</p>\n<p>This is a foundational engineering role on a small, high-impact team. You will take projects from proof-of-concept to production, work closely with investigators to understand their needs, and help scale what may become a multi-person collections function.</p>\n<p><strong>Responsibilities:</strong></p>\n<ul>\n<li>Build automated detection systems that use disparate signals to identify abusive behaviour.</li>\n<li>Take systems from idea to proof-of-concept to production-grade with appropriate monitoring, documentation, and maintenance processes</li>\n<li>Develop and maintain YARA rule infrastructure, including tools for writing, validating, and testing rules against real data</li>\n<li>Create integrations with external threat intelligence platforms (e.g. VirusTotal, Censys, Urlscan) via MCP servers to enable multi-source correlation during investigations</li>\n<li>Build data pipelines that ingest intelligence from RSS feeds, CTI news sources, and partner sharing, using Claude to extract TTPs and generate targeted hunting queries</li>\n<li>Develop behavioural analytics capabilities using DBT-based frameworks and create searchable audit logging infrastructure</li>\n<li>Establish feedback loops with investigators to tune detection systems and reduce false positives</li>\n<li>Scrape and normalise data from external sources to feed threat detection and enrichment workflows</li>\n</ul>\n<p><strong>You may be a good fit if you:</strong></p>\n<ul>\n<li>Have strong coding proficiency in Python and SQL for building detection logic, data pipelines, and automation</li>\n<li>Have experience with data pipeline orchestration tools (Airflow, DBT, or similar)</li>\n<li>Have familiarity with threat intelligence concepts including IOCs, YARA rules, and threat correlation techniques</li>\n<li>Have experience integrating external APIs and building data ingestion systems</li>\n<li>Can translate investigator needs and workflows into technical requirements</li>\n<li>Are comfortable building v0 systems and iterating based on user feedback</li>\n<li>Have strong communication skills for working closely with non-engineering stakeholders</li>\n</ul>\n<p><strong>Strong candidates may also have:</strong></p>\n<ul>\n<li>Experience with threat intelligence sharing frameworks (e.g. MISP, STIX/TAXII)</li>\n<li>Background in cyber threat intelligence, security operations, or abuse detection</li>\n<li>Experience building MCP servers or similar tool integrations for AI systems</li>\n<li>Familiarity with web scraping and data extraction at scale</li>\n<li>Experience with behavioural analytics or anomaly detection systems</li>\n<li>Understanding of LLM capabilities and how to leverage them for automation</li>\n<li>A Top Secret Clearance</li>\n</ul>\n<p><strong>Deadline to apply:</strong></p>\n<p>None. Applications will be reviewed on a rolling basis.</p>\n<p><strong>Logistics</strong></p>\n<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>\n<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>\n<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.** Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</strong></p>\n<p><strong>Your safety matters to us.** To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you&#39;re ever unsure about a communication, don&#39;t click any links—visit anthropic.com/careers directly for confirmed position openings.</strong></p>\n<p><strong>How we&#39;re different</strong></p>\n<p>We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact — advancing our long-term goals of steerable, trustworthy AI — rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics as it does with computer science.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_18528dac-ae1","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5074937008","x-work-arrangement":"remote","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$300,000 - $320,000 USD","x-skills-required":["Python","SQL","Airflow","DBT","YARA rules","Threat intelligence","API integration","Data ingestion","Web scraping","Data extraction"],"x-skills-preferred":["MISP","STIX/TAXII","Cyber threat intelligence","Security operations","Abuse detection","LLM capabilities","Automation"],"datePosted":"2026-03-08T13:53:41.541Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, SQL, Airflow, DBT, YARA rules, Threat intelligence, API integration, Data ingestion, Web scraping, Data extraction, MISP, STIX/TAXII, Cyber threat intelligence, Security operations, Abuse detection, LLM capabilities, Automation","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":300000,"maxValue":320000,"unitText":"YEAR"}}}]}