Technical Threat Investigator, Threat Intel Engineering - UK

OpenAI OpenAI · AI Frontier · London, United Kingdom · Security

This role involves investigating sophisticated threat actors targeting OpenAI's models and systems, building tooling and AI-assisted workflows to scale analysis, and translating findings into security improvements. The focus is on understanding adversary behavior, identifying misuse, and developing proactive defenses.

What you'd actually do

  1. Conduct deep, end-to-end investigations into sophisticated threat actors interacting with OpenAI’s models, products, and broader ecosystem.
  2. Think like an adversary — model attacker behavior, anticipate misuse patterns, and proactively hunt for, identify, and disrupt malicious activity.
  3. Leverage internal telemetry, OSINT, vendor data, and in-house safety systems to produce high-confidence findings on adversarial use of our models in cyber operations, platform abuse, and threats targeting OpenAI.
  4. Translate investigative findings into concrete improvements across detection, enforcement, intel, and safety pipelines.
  5. Build tooling, scripts, automations, and agentic workflows that scale investigative throughput and reduce manual effort.

Skills

Required

  • Experience in threat intelligence, incident response, offensive security, or a closely related field.
  • Solid experience investigating sophisticated threat actors, including model misuse, platform abuse, or other adversarial activity in complex environments.
  • A strong understanding of adversary behavior, infrastructure, and tradecraft, and the ability to apply that understanding to proactive investigations.
  • Demonstrated ability to independently drive deep technical investigations from ambiguous signals through to clear, actionable findings.
  • Experience using AI to extend or accelerate investigative workflows.
  • Strong scripting ability and comfort building lightweight automation, investigative tooling, or workflows that improve scale and repeatability.
  • Strong ability to leverage telemetry from diverse systems and vendors to drive investigations, including directly querying, extracting, and stitching together data where needed.
  • Strong written and verbal communication skills, especially the ability to translate technical investigations into high-signal outputs for diverse stakeholders.
  • Comfort operating independently in ambiguous, fast-moving problem spaces with minimal oversight.

What the JD emphasized

  • sophisticated threat actors
  • misuse our models
  • AI is integrated into their workflows
  • deep, end-to-end investigations
  • sophisticated threat actors
  • model misuse
  • adversary behavior
  • proactive investigations
  • using AI to extend or accelerate investigative workflows
  • lightweight automation
  • investigative tooling
  • agentic workflows

Other signals

  • investigate sophisticated threats
  • build tooling to scale and augment analysis
  • deliver intelligence that shapes security strategy
  • AI is integrated into their workflows
  • build and own lightweight tooling
  • automate where it matters
  • create AI-assisted workflows