Requirements
- Bachelor’s degree in Computer Science, Engineering, Security, or a related technical field, or equivalent practical experience.
- Strong software engineering experience building and operating production systems.
- Strong coding skills in Python and Java.
- Strong SQL skills.
- Hands-on experience with cloud technologies and modern distributed systems.
- Experience building APIs, backend services, pipelines, automation tooling, or data-driven applications in production.
- Experience debugging, monitoring, and improving systems in production.
- Ability to translate ambiguous problems into concrete technical solutions.
Nice to Haves
- Experience in security engineering, cybercrime investigations, intelligence, trust and safety, fraud, abuse prevention, or adversarial research.
- A strong security research / hacker mindset: curiosity, technical depth, and the ability to understand attacker behavior, test assumptions, and identify practical weaknesses or opportunities for disruption.
- Experience investigating phishing, impersonation, credential theft, brand abuse, or digital identity attacks.
- Experience designing and building agentic systems, AI workflows, LLM-enabled tooling, or autonomous research and response capabilities.
- Experience building detection systems, enrichment pipelines, or automated investigative workflows.
- Experience working in fast-moving environments where engineers own delivery from concept through production.
What You'll Be Doing
- Build production systems in Python, Java, and SQL that detect, investigate, and respond to cybercrime and abuse.
- Design and deploy agentic systems, AI-powered workflows, and automation tooling for cybercrime research, enrichment, and protection.
- Build services, APIs, pipelines, and internal tools that convert cybercrime intelligence into scalable customer protections.
- Investigate phishing, brand abuse, digital identity crime, and related cybercrime patterns, then translate findings into durable engineering solutions.
- Develop and improve signals, decisioning logic, and protection workflows that measurably reduce abuse and improve response speed.
- Work with cloud technologies and distributed systems to deploy reliable, secure, and scalable capabilities.
- Partner with security, product, and engineering teams to move from cybercime identification to shipped protection with minimal handoffs.
- Own systems end to end: design, build, test, deploy, monitor, and improve.
- Maintain a high quality bar, including rapid response to production issues and strong operational discipline.
Perks and Benefits
This is an opportunity to build high-impact security capabilities in a domain where the landscape changes constantly. You will work on systems that combine engineering, cybercime research, cloud infrastructure, and AI-native automation to protect customers at scale. The direction of the team is toward building a cybercrime capability where automated systems continuously improve how cybercime is identified and protections are deployed.