As a Technical Threat Investigator at OpenAI, you will help defend the company from a full spectrum of threats β from nation-state actors and cybercrime groups to adversaries attempting to misuse our models. In this role, youβll conduct deep investigations into adversary operations, track sophisticated threat actors, produce high-signal reporting, build agentic workflows, and collaborate across the security org and wider company.
Job listings
This role involves leading customers in cloud native technology, performing client consulting, internal labs projects, and contributing to Open Source projects. You will define security architectures for cloud infrastructure platforms and CI/CD pipelines, using Threat Modelling, Proof of Concepts, and High and Low Level Designs. Familiarity with Agile, SCRUM or XP and development experience with Python is desired.
As a Red Team Security Engineer, you will work with Threat Intelligence, Detection & Response and Application Security teams to ensure that Canva is prepared and able to effectively respond to real-world threats. At the moment, this role is focused on: Planning, designing, and executing sophisticated threat scenarios that emulate realistic adversary techniques to identify vulnerabilities and response gaps in Canvaβs product, platform and infrastructure.
The Application Security Analyst joins GuidePointβs elite team of Application Security experts to deliver services, which involves performing engagements, communicating with clients, delivering comprehensive reports, and providing thought leadership within the Application Security space. You will spend your time focusing on challenging projects and solving complex problems, while relying on your experience, adaptability, and creativity to protect their business applications and mature their Application Security capabilities.
Seeking an experienced information security engineer to architect, deploy, and operate a secure application infrastructure that aligns with business needs. You will be responsible for supporting operational innovation and providing security direction to the business to elevate the companyβs security posture. Oversee Engineering areas of vulnerability scanning, certificate management, and data analysis of security monitoring outputs.
The Managed Services Security Analyst II is responsible for security solutions for clients and will demonstrate the capacity to consistently meet and exceed client expectations representing and reinforcing the Cyderes brand. Perform deep dive investigations into security threats, understand and implement MITRE mapping to identify customers current security posture.
We are seeking an experienced security professional to drive complex initiatives that safeguard our organization's sensitive data and critical systems. In this role, you will lead the design and implementation of advanced security protocols and work closely with cross-functional teams to uphold and enforce enterprise-wide security standards. As part of a leading health insurance provider, you will play a key role in protecting member information and ensuring compliance with industry regulations in an ever-evolving threat landscape.
Come to work each day with an inclusive and collaborative Business technology team! As an Security Engineer in AbbVie Business Technology Solutions (BTS), youβll have opportunities to contribute to the digital transformation of a leading biopharma company, helping to create solutions that impact patients and their communities for the better.
As a Staff Software Security Engineer on the Detection & Response Engineering team, you will work to build advanced security tools and processes around our advanced observability platform to catch and stop advanced threats to our platform, employees, and customers. You will work across all areas of the stack, do cutting-edge development, detection research, and response automation, and contribute these learnings back to the wider security community.
The Cybersecurity Analyst will conduct initial triage and analysis on cybersecurity alerts and threats which have been detected, threat hunting activities to proactively identify vulnerabilities, investigate and work with IT Operations members to remediates security vulnerabilities and threats. The incumbent ensures corporate security measures are effective in mitigating threats and risks.