TL;DR
Cybersecurity Landscape Analyst (AI, Cybersecurity): Monitors and interprets the evolving cyber threat landscape to understand its implications for hirify.global's products, customers, and the broader AI ecosystem, with an accent on analyzing attacker TTPs, threat-group behaviors, and real-world cyber innovation. Focus on stress-testing assumptions about AI misuse, identifying structural risk patterns, and translating external signals into strategic risk context for internal stakeholders.
Location: San Francisco and Washington, DC, USA. Candidates must currently hold or be eligible for a U.S. security clearance.
Salary: $178,200–$320,000 + Equity
Company
hirify.global is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.
What you will do
- Monitor and interpret the evolving cyber threat landscape, tracking emerging TTPs, attacker innovation, and ecosystem-level shifts relevant to AI systems.
- Analyze how state actors, criminal networks, and other groups are adapting AI tools or targeting AI infrastructure.
- Conduct structured external research and adversarial analysis, using competitive intelligence and scenario methods to explore potential AI exploitation.
- Develop forward-looking assessments of cyber threat evolution (6–24 months) and surface “unknown unknowns”.
- Translate external signals into strategic risk context, producing concise intelligence estimates and informing product, safety, security, and policy decision-making.
- Support product and ecosystem readiness by outlining plausible cyber-enabled misuse or targeting modes.
- Represent hirify.global in sensitive external engagements, communicating threat perspectives and aligning on shared risk trends.
Requirements
- Significant experience (typically 5+ years) in cybersecurity intelligence, strategic threat analysis, or national-level cyber risk assessment.
- Deep familiarity with cyber threat actors, intrusion tradecraft, vulnerability exploitation trends, and cybercrime ecosystems.
- Experience translating external threat reporting and OSINT into structured risk assessments and executive guidance.
- Comfort using adversarial thinking and foresight methodologies (e.g., horizon scanning, scenario planning, red-teaming).
- Ability to clearly distinguish intelligence analysis from operational security work and work effectively across that boundary.
- Excellent, credible communicator capable of distilling complex cyber threat dynamics into crisp, decision-relevant insights.
- Currently hold or are eligible for a U.S. security clearance.
Culture & Benefits
- Dedicated to developing AI that benefits all of humanity and created with safety and human needs at its core.
- Committed to encompassing and valuing diverse perspectives, voices, and experiences.
- Equal opportunity employer, committed to non-discrimination.
- Committed to providing reasonable accommodations to applicants with disabilities.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →