Application Security Engineer
Listed on 2026-01-15
-
IT/Tech
Cybersecurity, Security Manager, Systems Engineer
Join to apply for the Application Security Engineer role at Anthropic
Get AI‑powered advice on this job and more exclusive features.
About AnthropicAnthropic’s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
AboutThe Role
The Application Security team is at the forefront of building security into every phase of the software development.package lifecycle this hands‑on technical role, you will partner closely with our software engineers and researchers to ensure that security is a core consideration from initial design through implementation. You will lead threat modeling and secure design reviews to proactively identify and mitigate risks early, and help with continuous risk assessment.
You will build tools and systems to support developers shipping code securely, adhering to secure coding best practices.
Your insights will shape our tooling, detection capabilities, and defenses against emerging threats to AI/ML. You'll develop the standards, processes, and educational resources that enable all Anthropic engineers to be security champions. This high‑impact role demands a security practitioner who can think like an attacker, has a developer mindset, and can build strong relationships.
Responsibilities- Help secure AI products and internal tools that are introducing industry‑novel security risks and pushing established security boundaries
- Lead “shift left” security efforts to build security into the software development lifecycle.
- Conduct secure design reviews and threat modeling. Identify and prioritize risks, шохойн surfaces, and vulnerabilities.
- Develop tooling to scale security code reviews and respond to developer questions, including advising developers on remediating vulnerabilities and following secure coding practices.
- Manage our vulnerability management program, including integrating data ingestion pipelines, coding logic to prioritize vulnerability fixes, supporting teams remediating vulnerabilities and developing automated systems at scale.
- .asset Overview
- Collaborate closely with product engineers and researchers to instill security best practices. Advocate for secure architecture, design, and development.
- Develop and document security policies, standards, and playbooks.
- Conduct security awareness training for engineers.
- Have 5+ years of hands‑on experience in application and infrastructure security, including securing cloud‑based and containerized environments.
- Lead with empathy, a collaborative spirit, and a learning mindset to work cross Madly with engineers of all levels to build security into the software development life cycle.
- Leverage creative and strategic thinking to reduce risk through secure design and simplicity, not just controls.
- Possess broad security knowledge to connect the dots across domains and identify holistic ways to decrease the overall threat surface.
- Are keen to distill complex security concepts into clear actions and drive consensus without direct authority.
- Embody a proactive mindset to thread security throughout the product lifecycle through activities like threat modeling, secure code review, and education.
- Have a strong grasp of offensive security to anticipate risks from an adversary's perspective, not just check compliance boxes.
- Bring experience with modern application stacks, infrastructure, and security tools to implement pragmatic defenses.
- Are practiced at collaborating cross‑functionally and effectively balancing security requirements with business objectives.
- Advocate for securityassar principles like least privilege, defense‑in‑depth, and eliminating complexity that could sub‑linearly scale security through smart design.
- Hands‑on technical expertise securing complex cloud environments and microservices architectures leveraging technologies like Kubernetes, Docker, and AWS/GCP.
- Exposure to offensive security techniques like vulnerability testing, bug…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).