About the job
About Anthropic
At Anthropic, we are dedicated to developing AI systems that are reliable, interpretable, and steerable. Our goal is to ensure that AI serves as a safe and beneficial tool for users and society alike. Our rapidly expanding team comprises passionate researchers, engineers, policy experts, and business leaders who collaborate to create beneficial AI technologies.
About the Team
The Security Engineering team at Anthropic is committed to safeguarding our AI systems and upholding user trust. We establish the authentication architecture for our training infrastructure, design cryptographic systems to protect model weights and training data, and oversee a developer security program that influences how our engineers create and deploy software.
This team operates across various interconnected domains: identity and secrets management, developer security and supply chain, infrastructure security, and secure frameworks. You will take ownership of one or two of these domains while also contributing to others, with your area of focus influenced by your expertise and the team's objectives. This role primarily involves greenfield projects, allowing you to help shape the architectural landscape.
About the Role:
- Design, scope, and implement complex security systems from start to finish, ensuring their maintenance in production while navigating ambiguous technical challenges with minimal supervision.
- Identify systematic risks through comprehensive threat modeling and risk assessment, subsequently developing the necessary controls and infrastructure to mitigate these risks.
- Mentor engineers within the security team and the wider engineering organization, participate in the hiring process, and foster a robust security culture at Anthropic.
- Empower other teams to develop their own security solutions by offering design pattern guidance and expanding security ownership beyond the security team.
Developer Security and Supply Chain
- Enhance our developer security program by integrating security practices into the software development lifecycle and developer workflows.
- Fortify CI/CD pipelines against supply chain threats through isolated build environments, signed attestations, dependency verification, and automated policy enforcement.
Identity and Secrets Management
- Design systems that safeguard sensitive assets, including model weights, customer data, and training datasets.
- Establish and maintain credential issuance, rotation, and workload authentication across our multi-cloud environments.

