Get the latest on global AI regulations, legal risk, and safety-by-design strategies. Read the Report
Protect your AI applications and agents from attacks, fakes, unauthorized access, and malicious data inputs.
Control your GenAI applications and agents and assure their alignment with their business purpose.
Proactively test GenAI models, agents, and applications before attackers or users do
The only real-time multi-language multimodality technology to ensure your brand safety and alignment with your GenAI applications.
Ensure your app is compliant with changing regulations around the world across industries.
Proactively identify vulnerabilities through red teaming to produce safe, secure, and reliable models.
Detect and prevent malicious prompts, misuse, and data leaks to ensure your conversational AI remains safe, compliant, and trustworthy.
Protect critical AI-powered applications from adversarial attacks, unauthorized access, and model exploitation across environments.
Provide enterprise-wide AI security and governance, enabling teams to innovate safely while meeting internal risk standards.
Safeguard user-facing AI products by blocking harmful content, preserving brand reputation, and maintaining policy compliance.
Secure autonomous agents against malicious instructions, data exfiltration, and regulatory violations across industries.
Ensure hosted AI services are protected from emerging threats, maintaining secure, reliable, and trusted deployments.
Remote/ Remote
The role involves conducting in-depth open-source (OSINT) and web intelligence (WEBINT) research to identify, analyze, and assess a wide range of online threats and harmful activities across platforms. This may include work in Child Safety, focusing on detecting and analyzing child sexual abuse material (CSAM) and grooming indicators; Hate Speech and Extremism, involving the tracking of radicalization trends, hate groups, and violent ideologies; Counterterrorism, centered on identifying terrorist propaganda and networks; Organized Crime, which includes investigating illicit trade, fraud, and trafficking operations; and Platform Integrity and Manipulation, aimed at uncovering coordinated inauthentic behavior, influence operations, and misinformation campaigns.
Key Responsibilities
Additional Requirements