Security Researcher Jobs in the United States
PlanIT Group
Arlington, VA
Manages knowledge objects (fields, extractions, tags, event types, lookups, workflow actions, aliases, macros, and so on) – through automations, scripting, management server functions; to include .conf and .cfg files in scope of the last four Splunk Enterprise versions. This role demands deep expertise in Splunk system architecture, design, implementation, configuration and operational support in a hybrid on-prem Unix/Linux and cloud-based environment.
Snowflake Inc.
$173000 - $248400
Clyde Hill, WA
You'd be embedded as a key member of the cross-functional leads group, yet also be a part of a world-class team of tight-knit researchers with a culture of collaboration and knowledge sharing, where we continuously support and learn from each other in a safe and friendly environment. A key driver behind Snowflake's innovation is the commitment to putting customers first, and we're seeking an experienced user researcher who is looking to lead research efforts with the potential for outsized impact on our most strategic pillars.
Cloudflare
Austin, TX
Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare’s enterprise customers--at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
Cobalt
$55000 - $85000
Raleigh, NC
Perform technical authorship and quality control for the TPM organization by reviewing penetration testing findings and final reports to ensure accuracy and actionable remediation guidance. Pentesting Awareness: You understand the methodology of a penetration test (recon, scanning, exploitation), even if you haven't been a full-time pentester yet.
Henry Schein
Seattle, WA
Seek to deeply understand customer needs, pain points, and preferences to solve complex problems for our customers through comprehensive customer research and interviews. Unfortunately, Henry Schein One is unable to hire individuals residing in Alaska, North Dakota, Hawaii, West Virginia, Maryland, Delaware, Puerto Rico, or other US Territories at this time.
Adobe Inc.
Seattle, WA
Platform Engineering Approach: Proven experience in a software or security engineering role with a heavy focus on data modeling, systems integration, and building scalable internal tools. At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans.
ARSIEM
Annapolis Junction, MD
Minimum five (5) years of experience developing Windows applications using Visual Studio or .NET environments OR minimum five (5) years of experience developing UNIX applications using make files or comparable build environments. + Minimum three (3) leading projects that develop complex software, ensuring a collaborative environment, and configuration management, and Experience implementing software life cycle management (requirements, design, develop, test, validate, deploy).
Palo Alto Networks
$136000 - $219000
Santa Clara, CA
Research & Publication: Disseminate cutting-edge research findings and contribute to the security community by publishing results in technical blogs, industry white papers, and academic papers, particularly on topics related to malware analysis and AI for security. + Collaboration & Communication: Work closely with cross-functional teams, including other security services: threat prevention, internet security and IoT security, endpoint security to integrate and deliver sustainable and quality coverage and defense.
Palo Alto Networks
$157000 - $255000
Santa Clara, CA
Research & Publication: Disseminate cutting-edge research findings and contribute to the security community by publishing results in technical blogs, industry white papers, and academic papers, particularly on topics related to malware analysis and AI for security. + Collaboration & Communication: Work closely with cross-functional teams, including other security services: threat prevention, internet security and IoT security, endpoint security to integrate and deliver sustainable and quality coverage and defense.
Cloudflare
Austin, TX
Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare’s enterprise customers--at no cost. Work with team to define technical requirements for security productsResearch threats, exploits, and TTPs being defended against in products and work with engineers to create products that defend against them.
Oracle
$106300 - $223400
Olympia, WA
You will be responsible for designing, implementing and testing complex software, often times through reverse engineering, with the objective of identifying impactful security vulnerabilities across a variety of architectures and platforms but with a very specific focus of understanding advertisement capabilities in its entire scope, considering influencing operations, targeted delivery and other, threats. You must relish the challenge of findings critical vulnerabilities in complex software binaries through automation and manual practices, and have a love for diving deep into influencing operations, LLMs and complex decision-making algorithms.
Huntress
Columbia, MD
Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. Translate technical cybersecurity research results into social engineering attack learning scenarios that greatly improve security outcomes for nontechnical users.
OpenAI Inc.
$288000 - $500000
Seattle, WA
For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. You might thrive in this role if you have: Bachelor's degree in Criminal Justice, Cybersecurity, or a related field (or equivalent experience) and 8+ years of investigative experience in counterintelligence, insider risk, forensic investigations, cybersecurity, supply chain security, or related domains.
Veracode
Burlington, MA
2+ years of practical reverse-engineering or binary static-analysis experience, including familiarity with Abstract Syntax Trees (AST), reflection, or other code transformation approaches; compilers and associated tooling; and decompilers, disassemblers, and/or debuggers used in binary analysis. Actively participate in the software security community by attending and presenting at industry conferences, conducting and publishing original research, contributing articles to the Veracode blog and/or trade blogs and magazines, etc.
SecSrvr
Houston, TX
Excellent knowledge of web related technologies (Web applications, Web Services and Service Oriented Architectures) and of network/web related protocols. We are looking for an experienced Security Engineer who will analyze our software designs and implementations from a security perspective, in order to identify and resolve security issues.
OpenAI Inc.
$255000 - $405000
Seattle, WA
For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
OpenAI Inc.
$230000 - $385000
Seattle, WA
For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. Drive projects across OpenAI's technology stack with a focus on insider threats, ranging from access abuse and intellectual property theft to novel risks emerging within AI infrastructure.
Riverside Research Institute
$60000 - $120000
Lexington, Massachusetts
Research problems tackled in this position may involve systems software (e.g., real time operating systems (RTOS), secure hypervisors), computer architecture (e.g., tagged architectures), peripheral hardware (e.g., custom device drivers, FPGA hardware, bus protocols), compiler extensions (e.g., LLVM passes, custom backends) and/or program analysis (e.g., fuzzer implementation, symbolic execution). If you can see a forest made of weeds, if you know how to eat an elephant (hint: one bite at a time), or if you can explain virtual memory to your grandmother… you may have the right skills to join Riverside Research’s Secure and Resilient Systems group.
Riverside Research Institute
$95000 - $200000
Lexington, Massachusetts
Research problems tackled in this position may involve systems software (e.g., real time operating systems (RTOS), secure hypervisors), computer architecture (e.g., tagged architectures), peripheral hardware (e.g., custom device drivers, FPGA hardware, bus protocols), compiler extensions (e.g., LLVM passes, custom backends) and/or program analysis (e.g., fuzzer implementation, symbolic execution). The researcher will contribute to applied research projects from cradle to grave including: ideation (e.g., system architecture, technical proposal writing), planning (e.g., designing new methods and approaches), execution (e.g., prototyping, experimentation) and transition (e.g., publishing and/or briefing results).
MIT Lincoln Laboratory
$145200 - $170000
Lexington, MA
The final salary offered to a selected candidate will depend on various factors, including—but not limited to—the scope and responsibilities of the role, the candidate’s experience, skills and education/training, internal equity considerations and applicable legal requirements. Have opportunities to take on technical leadership roles, shape research directions, support and eventually lead program development, and drive strategic initiatives that advance the Laboratory’s mission and amplify its impact.
MIT Lincoln Laboratory
$145200 - $170000
Lexington, MA
The final salary offered to a selected candidate will depend on various factors, including—but not limited to—the scope and responsibilities of the role, the candidate’s experience, skills and education/training, internal equity considerations and applicable legal requirements. Have opportunities to take on technical leadership roles, shape research directions, support and eventually lead program development, and drive strategic initiatives that advance the Laboratory’s mission and amplify its impact.
Microsoft Corporation
$100600 - $199000
Redmond, WA
The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $131,400 - $215,400 per year.
Microsoft Corporation
$119800 - $234700
Redmond, WA
The Global Customer Success (GCS) organization, an organization within CE&S, is leading the effort to enable customer success on the Microsoft Cloud by harnessing leading, AI-powered capabilities and human expertise to deliver innovation solutions that accelerate business value, drive operational excellence and nurture long term loyalty. **Overview** With more than 45,000 employees and partners worldwide, the Customer Experience and Success (CE&S) organization is on a mission to empower customers to accelerate business value through differentiated customer experiences that leverage Microsoft's products and services, ignited by our people and culture.
Microsoft Corporation
$119800 - $234700
Redmond, WA
Qualifications** **Preferred Qualifications:** + 4+ years experience in cybersecurity, software development lifecycle, large-scale computing, modeling, and/or anomaly detection + 4+ years of professional experience in investigating or researching cyber threats, understanding attacker methodology, tools, and infrastructure + Excellent communication skills and investigative practices. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $158,400 - $258,000 per year.
Microsoft Corporation
$139900 - $274800
Redmond, WA
Our team, the core machine learning and data science team, is responsible for building ML, LLM, and automation solutions that defend over a billion end users and enterprises from cybersecurity attacks through Microsoft Defender AntiVirus, Microsoft Defender Endpoint Detection and Response, and Network Protection products. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond._ **Responsibilities** + Investigate, analyze, and learn from ongoing cybersecurity attacks in order to develop durable detection and prevention solution/strategies across the kill-chain or product/OS enhancements.
Microsoft Corporation
$100600 - $199000
Redmond, WA
Qualifications** **Required/minimum qualifications:** + Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 1+ year(s) experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 2+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR equivalent experience. Our team, the core machine learning and data science team, is a cross-discipline team responsible for building ML, LLM, and automation solutions that defend over a billion end users and enterprises from cybersecurity attacks through Microsoft Defender AntiVirus, Microsoft Defender Endpoint Detection and Response, and Network Protection products.
OpenAI Inc.
$325000 - $325000.01
Seattle, WA
For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. Within the OpenAI Security organization, our IT team works to ensure our team of researchers, engineers, and staff have the tools they need to work comfortably, securely, and with minimal interruptions.
OpenAI Inc.
$325000 - $405000
Seattle, WA
For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In this role, you will: Architect and implement production-grade security services (e.g., auth services, access brokers, secure proxies, key-management infrastructure) that provide strong guarantees across hardware, operating systems, Kubernetes, networks, and CI/CD.
OpenAI Inc.
$325000 - $405000
Seattle, WA
For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. Leveraging your strong engineering skills, you will collaborate with cross-functional teams to develop, deploy, and maintain robust software solutions that support our security and detection capabilities.
Microsoft Corporation
$119800 - $234700
Redmond, WA
Additional or preferred qualifications** + Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 8+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR equivalent experience. **Qualifications** **Required/minimum qualifications:** + Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR equivalent experience.
Microsoft Corporation
$139900 - $274800
Redmond, WA
These requirements include, but are not limited to the following specialized security screenings: + Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter **Additional or preferred qualifications** + Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 5+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 8+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 12+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR equivalent experience. **Qualifications** **Required/minimum qualifications** + Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR equivalent experience.
Veracode
Burlington, MA
Powered by trillions of lines of code scans and a proprietary AI-generated remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Strong understanding of various machine learning algorithms, including supervised and unsupervised learning, reinforcement learning, and neural networks.
Microsoft Corporation
$119800 - $234700
Redmond, WA
Own end-to-end lifecycle from hypothesis to productionization **Qualifications** **Required/minimum qualifications:** + Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection + OR equivalent experience. + 3+ years building anomaly detections over large-scale telemetry, including Baselines, time-series aggregates, and behavioral modeling, High-volume log analytics and query optimization (e.g., KQL/ADX or equivalent), Designing alert funnels and triage logic to reduce noise.
HackerOne Inc.
Seattle, WA
A proven track record of successfully launching and scaling technical products / platforms in high-growth businesses involving in-depth cross-functional collaboration and leadership across R&D and go-to-market functions. Demonstrated ability to shape and drive AI adoption and strategy across domains by re-architecting security products, processes, and platforms around AI-embedding AI into how solutions are designed, built, and operated to deliver transformative protection against emerging AI threats.
HackerOne Inc.
Seattle, WA
A proven track record of successfully launching and scaling technical products / platforms in high-growth businesses involving in-depth cross-functional collaboration and leadership across R&D and go-to-market functions. Demonstrated ability to shape and drive AI adoption and strategy across domains by re-architecting security products, processes, and platforms around AI-embedding AI into how solutions are designed, built, and operated to deliver transformative protection against emerging AI threats.
HackerOne Inc.
San Francisco, CA
A proven track record of successfully launching and scaling technical products / platforms in high-growth businesses involving in-depth cross-functional collaboration and leadership across R&D and go-to-market functions. Demonstrated ability to shape and drive AI adoption and strategy across domains by re-architecting security products, processes, and platforms around AI-embedding AI into how solutions are designed, built, and operated to deliver transformative protection against emerging AI threats.
HackerOne Inc.
Seattle, WA
Industry leaders, including Anthropic, Crypto.com, General Motors, Goldman Sachs, Lufthansa, Uber, UK Ministry of Defence, and the U.S. Department of Defense, trust HackerOne to safeguard their digital ecosystems. The HackerOne Platform unites agentic AI solutions with the ingenuity of the world's largest community of security researchers to continuously discover, validate, prioritize, and remediate exposures across code, cloud, and AI systems.
HackerOne Inc.
Seattle, WA
As an innovative leader in the PTaaS market, HackerOne provides top quality vulnerability findings commonly missed by traditional pentesting approaches for measurable risk reduction with best-in-class time-to-value and conjoined platform-based value with our market-leading Bug Bounty product line. Lead cross-functional GTM collaboration with customers across Product Marketing, Customer Success, and Customer Operations to discern customer challenges, drive adoption, and communicate thought leadership on PTaaS offerings.
HackerOne Inc.
Seattle, WA
As an innovative leader in the PTaaS market, HackerOne provides top quality vulnerability findings commonly missed by traditional pentesting approaches for measurable risk reduction with best-in-class time-to-value and conjoined platform-based value with our market-leading Bug Bounty product line. Lead cross-functional GTM collaboration with customers across Product Marketing, Customer Success, and Customer Operations to discern customer challenges, drive adoption, and communicate thought leadership on PTaaS offerings.
Microsoft Corporation
$119800 - $234700
Redmond, WA
Our work combines security expertise with advanced data processing and modeling techniques-including large-scale streaming analytics and graph-based representations-to enable near-real-time detection of sophisticated attacks. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $158,400 - $258,000 per year.
Accenture Federal Services
Herndon, VA
The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is:$113,500—$234,900 USDWhat We BelieveAs a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland.
KPMG LLP
Seattle, WA
Demonstrate AI penetration testing findings to technical and non-technical audiences, including live demos, and collaborate with engineering, development, and security teams to lead remediation discussions and advise on secure AI model development and deployment best practices. If you're looking for a firm with a strong team connection where you can be your whole self, have an impact, advance your skills, deepen your experiences, and have the flexibility and access to constantly find new areas of inspiration and expand your capabilities, then consider a career in Advisory.
Cellebrite
Remote, VA
iPhones and other iOS devices present tough challenges from a forensics perspective and involve hardware-backed encryption (SiDP), secure crypto coprocessor (SEP), and secured boot chain (SecureROM). Thousands of public safety organizations, intelligence agencies and businesses rely on Cellebrite’s digital forensic and investigative solutions—available via cloud, on-premises and hybrid deployments—to close cases faster and safeguard communities.
HackerOne Inc.
Seattle, WA
Build components and services that integrate agentic AI design patterns-such as orchestration, memory systems, RAG, long-horizon tasks, and LLM-based models-into the HackerOne platform, applying an AI-First approach to improve vulnerability detection and security automation. The HackerOne Platform unites agentic AI solutions with the ingenuity of the world's largest community of security researchers to continuously discover, validate, prioritize, and remediate exposures across code, cloud, and AI systems.
HackerOne Inc.
Seattle, WA
Build components and services that integrate Agentic AI design patterns like AI Orchestration, Memory systems, RAG, Long horizon tasks, LLM-based models into the HackerOne platform, applying an AI-First approach to enhance vulnerability detection and security automation. The HackerOne Platform unites agentic AI solutions with the ingenuity of the world's largest community of security researchers to continuously discover, validate, prioritize, and remediate exposures across code, cloud, and AI systems.
HackerOne Inc.
Seattle, WA
You will execute towards the defined Community strategy and manage oversight of programs that help hackers learn, connect, and thrive, expanding ambassador impact, elevating community experiences, and deepening long-term engagement. Industry leaders, including Anthropic, Crypto.com, General Motors, Goldman Sachs, Lufthansa, Uber, UK Ministry of Defence, and the U.S. Department of Defense, trust HackerOne to safeguard their digital ecosystems.
CrowdStrike, Inc.
$195000 - $290000
Redmond, WA
This is a hybrid role based near either our Sunnyvale, CA (CA Bay Area), Redmond, WA (Seattle, WA Area) or Austin, TX offices, with an expectation of approximately two days per week in-office to foster collaboration with other team members within the teams. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
HackerOne Inc.
Seattle, WA
Multiply Your Impact by leading, mentoring, and developing Engineering Managers and senior engineers, building scalable systems and practices that allow teams to deliver AI-powered solutions consistently and independently. In this role, you will empower Engineering Managers and senior engineers, shape how applied AI is delivered responsibly, and ensure teams consistently translate AI innovation into reliable, customer-impacting products.