This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Security Engineer on Detection & Response, you’ll help protect OpenAI’s most sensitive assets– including our intellectual property, customer data, and the infrastructure that supports them– by building and operating the systems we use to detect suspicious activity and respond effectively when it matters. You’ll work across endpoints, identity, cloud, hyperscale compute infrastructure, and datacenter-adjacent layers, partnering closely with security teams and infrastructure owners to define the telemetry and response requirements we need and building tooling and automation where it delivers the most leverage.
Job Responsibility:
Build and evolve Detection & Response capabilities across OpenAI’s infrastructure, products, and research environments
Engineer detection pipelines and tooling: develop rule lifecycle management, measurement/quality loops, tuning processes, and safe rollout patterns
Automate response and investigations by building workflows that reduce toil and improve time-to-understand/time-to-contain
Partner with other Security teams and system/infrastructure owners to ensure new systems ship with the right telemetry, threat models, and response playbooks
Define D&R requirements and drive visibility across endpoints, identity, SaaS, cloud, Kubernetes
Evaluate and respond to emergent security concerns in a frontier AI lab environment
Requirements:
Have hands-on threat detection and/or incident response experience, including building detections, running investigations, and improving operational playbooks
Understand modern adversary tradecraft (TTPs) and can translate it into practical detection strategies and response actions
Bring a threat modeling mindset. You can evaluate new infrastructure or features, identify D&R implications and turn that into concrete requirements
Have experience working in Kubernetes/containerized environments, including building detections from cluster telemetry and understanding common failure and attack modes
Are comfortable reasoning about lower-level infrastructure and datacenter risks, such as firmware/BMC surfaces, network segmentation/telemetry, and hard-to-observe control paths
Have experience across major cloud platforms (Azure, AWS, GCP, OCI), and can design cloud-agnostic detection approaches where possible
Like building automation that replaces repetitive D&R work
Are energized by new problem areas at a forward-leaning technology company
Communicate clearly and collaborate well across teams
Are comfortable with scripting and enjoy using AI/agent tooling to accelerate investigations and automation