Job Description
<div class="content-intro"><h2><strong>About Anthropic</strong></h2>
<p>Anthropic’s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p></div><h2><strong>About the Role</strong></h2>
<p>We are looking for vulnerability researchers to help mitigate the risks that come with building AI systems. One of these risks is the potential for LLMs to enable adversaries to cause harm by automating the attacks that today are carried out by human cybercrime groups, but in the future may be easily carried out by humans misusing LLMs. We are hiring security specialists who are experienced at exploitation and remediation, and are interested in understanding how LLMs could cause harm in the future, so that we can better prepare for this future and mitigate these risks before they arise.</p>
<h2><strong>Responsibilities: </strong></h2>
<ul>
<li>Triage any vulnerabilities discovered, coordinate and assist the external and open-source community in remediation</li>
<li>Write scaffolds designed to automate typical traditional attack techniques to help clarify our defensive problem selection</li>
<li>Research how adversaries might mise-use LLMs to identify and exploit vulnerabilities at scale in the future</li>
<li>Develop promising defensive strategies that could mitigate the ability of adversaries to mis-use models in harmful ways</li>
<li>Work with a small, senior team of engineers and researchers to enact a forward-looking security plan</li>
</ul>
<h2><strong>You may be a good fit if you have: </strong></h2>
<ul>
<li>3+ years experience with pentesting, vulnerability research, or other offensive security experience</li>
<li>Senior-level knowledge in at least one related topic area (reverse engineering, network security, exploitation, physical security)</li>
<li>A history demonstrating desire to do the “dirty work” that results in high-quality outputs</li>
<li>Software engineering experience</li>
<li>Demonstrated success in bringing clarity and ownership to ambiguous technical problems</li>
<li>Proven ability to lead cross-functional security initiatives and navigate complex organizational dynamics</li>
</ul>
<h2><strong>Strong candidates may also have:</strong></h2>
<ul>
<li>Published research papers on computer security, language modeling, or related topics; or given talks at Defcon, Blackhat, CCC, or related venues</li>
<li>Familiarity with large language models and how they work; for example, you may have written agent scaffolds</li>
<li>Reported CVEs, or been awarded for bug bounty vulnerabilities</li>
<li>Contributed to open-source projects in LLM- or security-adjacent repositories</li>
</ul><div class="content-pay-transparency"><div class="pay-input"><div class="description"><p>The annual compensation range for this role is listed below. </p>
<p>For sales roles, the range provided is the role’s On Target Earnings ("OTE") range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role.</p></div><div class="title">Annual Salary:</div><div class="pay-range"><span>$320,000</span><span class="divider"></span><span>$405,000 USD</span></div></div></div><div class="content-conclusion"><h2><strong>Logistics</strong></h2>
<p><strong>Education requirements: </strong>We require at least a Bachelor's degree in a related field or equivalent experience.<strong><br><br>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong data-stringify-type="bold">Visa sponsorship:</strong> We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you ... (truncated, view full listing at source)