Monitor and interpret the evolving cyber threat landscape
Track emerging cyber TTPs, attacker innovation, threat-group behavior, and ecosystem-level shifts relevant to AI systems.
Analyze how state actors, criminal networks, hacktivists, and hybrid actors are adapting AI tools—or targeting AI infrastructure.
Identify structural risk patterns that may affect AI providers, customers, and downstream sectors.
Conduct structured external research and adversarial analysis
Use competitive intelligence, red-team style thinking, and scenario methods to explore how frontier AI capabilities could be exploited or targeted.
Develop forward-looking assessments of how cyber threats may evolve over 6–24 months.
Surface “unknown unknowns” and stress-test prevailing assumptions about attacker incentives, constraints, and capabilities.
Translate external signals into strategic risk context for cross-functional teammates
Produce concise, executive-ready intelligence estimates that articulate threat relevance, potential impact pathways, and confidence levels.
Develop priority questions and structured risk frames that inform product, safety, security, and policy decision-making.
Benchmark OpenAI’s risk posture against real-world incidents affecting other AI providers and adjacent technology sectors.
Support product and ecosystem readiness
Contribute to product reviews and safety readiness processes by outlining plausible cyber-enabled misuse or targeting modes grounded in external analysis.
Help shape practical mitigation considerations, with clear handoffs to operational and security teams that own implementation.
Represent OpenAI in sensitive external engagements
Serve as a credible analytical counterpart in engagements with a range of external partners.
Communicate OpenAI’s threat perspective and align on shared risk trends and emerging threat vectors.
Support collaboration in ways that complement—without duplicating—incident response, investigations, or core security operations functions.
Requirements
Have significant experience (typically 5+ years) in cybersecurity intelligence, strategic threat analysis, trust & safety, or national-level cyber risk assessment.
Demonstrate deep familiarity with cyber threat actors, intrusion tradecraft, vulnerability exploitation trends, and cybercrime ecosystems.
Have experience translating external threat reporting and OSINT into structured risk assessments and executive guidance.
Are comfortable using adversarial thinking and foresight methodologies (e.g., horizon scanning, scenario planning, red-teaming) to explore emerging threat vectors.
Can clearly distinguish between intelligence analysis and operational security work, and work effectively across that boundary.
Are an excellent, credible communicator capable of distilling complex cyber threat dynamics into crisp, decision-relevant insights.
Currently hold or are eligible for a U.S. security clearance.
Tech Stack
Cyber Security
Benefits
Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts
Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)
401(k) retirement plan with employer match
Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)
Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees
13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)
Mental health and wellness support
Employer-paid basic life and disability coverage
Annual learning and development stipend to fuel your professional growth
Daily meals in our offices, and meal delivery credits as eligible
Relocation support for eligible employees
Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.