招聘
About Mercor
Mercor is defining the future of work. We partner with leading AI labs and enterprises to provide the human intelligence essential to AI development.
Our vast talent network trains frontier AI models in the same way teachers teach students: by sharing knowledge, experience, and context that can't be captured in code alone. Today, more than 30,000 experts in our network collectively earn over $2 million a day.
Mercor is creating a new category of work where expertise powers AI advancement. Achieving this requires an ambitious, fast-paced and deeply committed team. You’ll work alongside researchers, operators, and AI companies at the forefront of shaping the systems that are redefining society.
Mercor is a profitable Series C company valued at $10 billion. We work in-person five days a week in our San Francisco, NYC, or London offices.
You'll own application security at a company where the app layer is the highest-priority security surface. This is not a scan-and-triage role. You'll embed in the development lifecycle, review code for exploitable flaws, build security tooling into CI/CD, and drive vulnerability remediation across a platform serving 300K+ experts and enterprise clients processing sensitive AI training data.
We use AI heavily in our own security work. You should be comfortable building alongside AI code-gen tools, using LLMs to accelerate code review and threat modeling, and automating away the repetitive work that slows App Sec programs down. If you'd rather write a CodeQL query than file a Jira ticket, you'll fit in here.
We're in-person five days a week at our SF headquarters, with first Fridays remote.
What You'll Build:
-
Security review workflows embedded in the SDLC - PR-level analysis that catches auth bugs, injection flaws, and business logic errors before they ship
-
SAST/DAST pipelines integrated into CI/CD - shifting security left without slowing down deploys
-
Vulnerability management processes that prioritize by real exploitability, not CVSS score
-
Secure coding standards and guardrails that make the safe path the easy path for 50+ engineers
-
Threat models for new features and architecture changes - especially around AI data pipelines, payment flows, and multi-tenant boundaries
-
Bug bounty program operations - triaging Hacker One reports, validating findings, and driving fixes to closure
What We're Looking For
-
You've found and fixed real vulnerabilities in production applications - not just run scanners
-
Deep understanding of web application security: OWASP Top 10 is baseline, you think in terms of attack chains and business logic flaws
-
Strong in at least one of Python, TypeScript, or Go - you can read a PR and spot the auth bypass
-
Experience building or tuning SAST/DAST tooling (Semgrep, CodeQL, Snyk, Burp, or similar)
-
You understand modern web frameworks, APIs, and authentication patterns well enough to threat model them
-
Experience managing a vulnerability pipeline - from discovery through prioritization to verified remediation
-
5+ years of professional experience in application security, security engineering, or software engineering with a strong security focus
Bonus Points
-
Experience running or triaging a bug bounty program (Hacker One, Bugcrowd)
-
Offensive security skills - you've done penetration testing and can think like an attacker
-
Experience securing AI/ML applications - model serving APIs, training data pipelines, prompt injection defense
-
Familiarity with supply chain security - dependency scanning, registry firewalls (Socket, Snyk)
-
You've built custom security tooling that a team still uses
-
Contributions to open source security projects or published vulnerability research
Why Mercor
-
The problem is real. Application security at scale is hard - you'll build defenses that matter across a fast-moving platform.
-
AI-native App Sec. You'll use frontier AI tools daily - for code review, vulnerability analysis, and anything that benefits from an AI co-pilot.
-
Ownership from day one. You'll own the entire application security domain - from code review processes to CI/CD security to bug bounty operations.
-
See the future early. Working alongside AI labs means you'll understand frontier model capabilities months before the market.
Benefits
-
Equity ownership in a high-growth, profitable company
-
Relocation support to San Francisco, NYC, or London as needed
-
Housing support near our SF office
-
Daily meal stipend
-
Premium fitness membership at Equinox
-
Comprehensive health insurance
总浏览量
0
申请点击数
0
模拟申请者数
0
收藏
0
相似职位

Security Engineer, Application Security
OpenAI · San Francisco

Product Security Engineer
Chime · San Francisco, CA, USA

Software Engineer, Product Security
Notion · San Francisco, California

Over Night Security Officer
Four Seasons · San Francisco, California, United States of America

Safeguards Analyst, Account Abuse
Anthropic · San Francisco, CA
关于Mercor

Mercor
SeedMercor is an AI-powered platform that connects companies with vetted software engineers and technical talent through automated screening and matching processes.
1-50
员工数
San Francisco
总部位置
评价
4.0
10条评价
工作生活平衡
3.2
薪酬
3.5
企业文化
4.3
职业发展
3.4
管理层
4.2
72%
推荐给朋友
优点
Supportive management
Great team culture and collaboration
Good benefits and vacation policy
缺点
Heavy workload and overtime
Communication issues
Non-competitive pay
薪资范围
6个数据点
Mid/L4
Mid/L4 · Machine Learning Engineer
1份报告
$210,126
年薪总额
基本工资
$161,637
股票
-
奖金
-
$210,126
$210,126
面试经验
3次面试
难度
3.0
/ 5
录用率
67%
体验
正面 0%
中性 67%
负面 33%
面试流程
1
Application Review
2
AI Interview
3
Domain Expertise Assessment
4
Offer
常见问题
Domain Knowledge
Behavioral/STAR
Leadership Experience
Industry Expertise
新闻动态
After data breach, $10B valued startup Mercor is having a month - MSN
MSN
News
·
2d ago
The $10 Billion Startup Training AI to Replace the White-Collar Workforce - Bloomberg.com
Bloomberg.com
News
·
3d ago
Companies Just Learned a Brutal Lesson About Training AI to Do Human Jobs - Futurism
Futurism
News
·
4d ago
Inside Messy, Fast-Growing Mercor, Run By Youngest-Ever Self-Made Billionaires - Forbes
Forbes
News
·
4d ago