Full-Time

Principal Product Manager

Data

Posted on 5/25/2025

HackerOne

HackerOne

5,001-10,000 employees

Crowdsourced vulnerability hunting via ethical hackers

Compensation Overview

$190.8k - $265k/yr

No H1B Sponsorship

Seattle, WA, USA + 3 more

More locations: Washington, DC, USA | San Francisco, CA, USA | Austin, TX, USA

Remote

Candidates must be located within ~50 miles of Seattle, WA; San Francisco Bay Area; Austin, TX; or Washington, DC.

Category
Product (1)
Required Skills
LLM
Product Management
Machine Learning
Data Analysis
Requirements
  • 10+ years of experience in Product Management in high-growth tech/SaaS companies.
  • Proven track record of successfully developing products / platforms in high-growth businesses involving in-depth cross-functional collaboration and leadership across R&D and go-to-market functions.
  • Deep understanding of cybersecurity technologies and market trends.
  • Outstanding communication and leadership skills with a collaborative and team-oriented approach to identifying problems, determining potential solutions, and building consensus around your vision with internal and external stakeholders.
Responsibilities
  • Lead HackerOne development of data capabilities vision, strategy, and roadmap partnering with Design & Engineering in applying strategic perspective across all cross-functional facets of the business necessary to bring unique security insights to customers based on HackerOne’s vast vulnerability datasets.
  • Lead cross-functional GTM collaboration with customers across Product Marketing, Customer Success, and Customer Operations to discern customer challenges, drive adoption, and communicate thought leadership on data capabilities.
  • Refine and mature existing HackerOne platform data capabilities, such as Analytics and Reporting, Benchmarks, and Recommendations.
  • Develop and apply expertise in security analytics and vulnerability management to create product experiences that customers and hackers love, including through the application of AI across LLM and ML.
  • Evangelize the value of HackerOne’s data-powered security insights internally and externally as a subject matter expert via customer and prospect calls, product demos, webinars, roadmap briefings, and industry events.
  • Stay at the forefront of industry trends, the application of AI capabilities, and competitive developments to identify opportunities for disruptive innovation and positioning HackerOne as a market leader.
Desired Qualifications
  • Bachelor's degree in an application development-related field, such as Computer Science, Computer Engineering, etc. or a data science-related field, such as Math, Physics, etc.
  • MBA or data science-related Masters degree
  • Direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing and application security.
  • Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing.
  • Experience developing and bringing to market products and features delivering value from data, particularly underpinned by AI (LLM and/or ML).
  • Experience leading product development in cloud services and/or managed services businesses.
  • Experience leading product development for multi-product platformization value.

HackerOne runs a cybersecurity platform that helps organizations improve digital security by leveraging a global community of ethical hackers. It supports attack surface management, continuous asset testing, and security coverage validation, enabling clients to import asset data, have ethical hackers assess and rank risk, and adjust the scope of testing on demand. The platform provides 24/7 security coverage and scalable cost management, charging clients for platform access and the hackers’ services. This is complemented by proven penetration tests that reveal significant findings and demonstrate the value of a bug bounty program as part of a proactive security strategy. Compared with competitors, HackerOne combines a large, active community of researchers with flexible scope control and continuous asset monitoring to deliver ongoing risk reduction rather than one-off assessments.

Company Size

5,001-10,000

Company Stage

Series E

Total Funding

$159.4M

Headquarters

San Francisco, California

Founded

2012

Simplify Jobs

Simplify's Take

What believers are saying

  • AI-driven vulnerability discovery accelerates 4x faster than industry remediation pace.
  • Enterprise clients (Goldman Sachs, DoD, General Motors) face expanding attack surfaces requiring continuous testing.
  • Prompt injection attacks surged 540% YoY, creating urgent demand for agentic AI red teaming.

What critics are saying

  • Navia breach exposed 287 employees' SSNs via BOLA vulnerability, damaging security credibility.
  • Agentic AI systems introduce unpredictable attack surfaces traditional frameworks cannot contain.
  • Attackers now operate at near-zero cost using frontier AI models, eroding ethical hacker advantage.

What makes HackerOne unique

  • Combines agentic AI with 500,000+ validated real-world findings from largest researcher community.
  • h1 Validation uniquely addresses 76% YoY vulnerability surge with human-AI hybrid validation.
  • Integrated platform spans discovery, validation, prioritization, and remediation in single workflow.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Vision Insurance

Life Insurance

Disability Insurance

Unlimited Paid Time Off

Paid Vacation

Paid Sick Leave

Paid Holidays

Parental Leave

Employee Assistance Program

Digital First Stipend

Equity Stock Options

Retirement Plans

Leaves of Absence

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

0%

2 year growth

0%
SecurityScorecard
Mar 31st, 2026
AI is reshaping cyber risk in 2026: why boards must take ownership now.

AI is reshaping cyber risk in 2026: why boards must take ownership now. Cybersecurity leaders must accept a hard truth: AI has already broken the traditional model of defense in 2026. Attackers now operate faster, at lower cost, and at greater scalethan most organizations can handle. The only viable response is to rethink security as a continuous, business-driven risk function. This shift defined a recent panel at RSAC 2026 featuring Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks; Kara Sprague, CEO of HackerOne; Suzanne Brown, Director of Board Services at the New York Stock Exchange; and Margi Murphy, Reporter at Bloomberg. Their discussion focused on how AI is reshaping cyber risk, redefining the CISO role, and forcing boards to take direct ownership of security outcomes. The Executive Breakfast, 'Investing in Cybersecurity: What Boards Expect and Executives Deliver' was hosted by SecurityScorecard Chief Marketing Officer Claire Trimble, with support from sponsors Carahsoft, Armis, ServiceNow, and LockThreat GRC, whose partnership helped bring this executive discussion to life. AI has reduced the cost and time of cyberattacks to near zero. Sprague noted that AI has fundamentally changed how attacks are executed in 2026. It has reduced the cost of launching attacks while increasing their speed and effectiveness, forcing security teams to reevaluate their defenses. "The cost of an attack is approaching zero. Because now you have all of these... attackers who now are equipped with very easy access to very powerful models," Sprague said, noting attackers now use advanced reasoning agents to automate reconnaissance, exploitation, and lateral movement. "The onus is on all of us in this room to really recognize that that change has happened - and change the way that we're operating as defenders. We need to adopt continuous security mechanisms," Sprague said. Whitmore reinforced how quickly attacks now unfold, noting that attackers can move from initial access to full compromise or stealing data in just 72 minutes. "AI is creating this intense amount of speed by which the attackers are operating," Whitmore said. This acceleration forces a new reality. Sprague warned of what lies ahead: "The attack surface of the enterprise is expanding very, very rapidly," Sprague said. "We are going to face a wave of exposures and vulnerabilities that nobody in this room can actually comprehend. And what that means is that we all have to be prepared to rapidly scale out our defenses." This is not a distant risk. It is already unfolding. Organizations must prepare for a surge in exploitable weaknesses across both internal systems and third-party ecosystems. Cyber risk has escalated to a board-level, nation-state problem. The panel argued that cybersecurity has outgrown its technical roots. It now sits at the center of enterprise risk, shaped with geopolitical threats, regulatory pressure, and business survival. CISOs face an unprecedented challenge in this context, Whitmore noted: They must defend against nation-state actors, cybercriminals, and hacktivists at the same time. This shift has fundamentally changed expectations in the board room. Security leaders are not just hired to protect systems. They are safeguarding the continuity of the business under conditions that resemble modern warfare. At the same time, regulation has elevated cyber risk into the boardroom. The SEC's requirement to disclose material breaches within four days has made cybersecurity a direct governance issue. Boards must now understand and act on cyber risk as part of enterprise strategy, not as a technical update. This convergence exposes a critical flaw in how organizations approach security. Many boards still ask, "Are we secure?" Sprague reframed the core question boards should be asking: "Boards need to stop asking the question, 'Are we secure?' Because that answer is always no. And they need to start asking the question, 'What are the scenarios that could completely screw us over?'" Incident response and third-party risk remain major gaps. This mindset shift is one that boards need to make quickly in 2026. Cyber incidents now disrupt operations, halt revenue, and impact market confidence. The question is not whether an attack will happen, but how the organization will respond when it does. Boards must take ownership of that outcome. That means focusing on resilience, understanding worst-case scenarios, and making informed decisions about risk acceptance and investment. Brown noted that despite growing awareness, many boards still underestimate operational risk, third-party exposure, and incident response. "The board, where they fall down a lot is they ask... 'Are we prepared?' But then they neglect the incident response... I think that incident response is where they fall down," Brown said. "And the markets will react to that." Brown also emphasized that cyber incidents are no longer limited to data breaches, and boards need to right-size their conception of risk in order to get ahead of it and realize that third party compromises can amplify this risk. A single vendor failure can cascade across thousands of dependencies, halting business operations entirely, Brown noted, citing the Jaguar Land Rover incident. "It can be an operational breach [where] you cannot deliver your product." The Communication gap is still the biggest barrier. To close the gaps for boards and CISOs working to buy down risk in 2026, one unifying problem persists: Communication. Security teams often present dashboards filled with technical metrics, but these don't help boards make decisions, the panel concluded. Sprague explained that boards and CEOs actually need to ask: "How much money did you spend to remove how much risk?" Whitmore reinforced the need to translate technical data into business outcomes: Security leaders need to be "thinking about how we can more effectively communicate what's going on in the lens of the board audience." This means framing cybersecurity in terms of financial impact, operational disruption, and risk reduction. Without this shift, boards cannot act effectively. Brown advised CISOs and security leaders to stop focusing on technical findings and instead communicate risk in business terms. This includes driving digital transformation, influencing board decisions, and aligning security with enterprise outcomes. "You need to lift up your skill set to be more about enterprise strategy. So often I talk to CISOs who say they implemented something. The board's eyes are going to glaze over, they are not going to understand it, they're just not," Brown said. "And so what they're always looking for in a board member is adaptability, understanding enterprise across the business." Security is now a business survival function. AI has not just increased cyber risk. It has changed how risk behaves. Attacks scale faster, spread wider, and hit harder across your ecosystem. That shift leaves no room for outdated models. Annual assessments, siloed ownership, and technical reporting no longer support business decisions. Boards need clear answers on exposure, financial impact, and resilience. Security leaders cannot carry that burden alone. The CEO and board must own cyber risk as a core business function. That starts with visibility across internal systems and third-party relationships, where many of the most damaging failures begin. SecurityScorecard helps you quantify that risk in real time. You can track third-party exposure, identify weaknesses before attackers do, and translate findings into clear business impact. If you want to move from reactive defense to measurable risk ownership, start with the data your board actually needs. To strengthen resilience across your third-party ecosystem, request a demo today.

HostingAdvice
Mar 25th, 2026
Prompt Injection attacks are still bad, still a hosting problem.

Prompt Injection attacks are still bad, still a hosting problem. Posted: 3/25/2026 Follow the HostingAdvice team for a daily dose of tech news, trending IT discussions, and interviews with the web's most innovative technologists. Follow Us: 1k 1k Key takeaways. When HackerOne released its state of cybersecurity report last year, it presented quite a few concerning figures - one of which being that prompt injection attacks have gone up 540% year over year. Today, attackers are still experimenting with (and succeeding at) manipulating AI systems through prompts at the fastest rate possible thus far. Prompt injection is one of the most common ways attackers get into AI systems. And with how much hosts are investing in AI, that means it's now also a hosting problem. What's actually happening. Prompt injections occur when someone (a hacker, cyberattacker, botnet, whatever you want to call them) tricks the model into ignoring the original rules assigned and doing something else (like accessing private information). The report urged hosting providers to go beyond prompt filtering and actually test whether their AI systems can be exploited the way bad actors are already doing it. And since hosts still have plenty to worry about, HackerOne launched Agentic Prompt Injection Testing to test exactly that. "Hosting providers aren't responsible for a customer's prompts or model logic - but they play a decisive role in limiting the blast radius when AI apps are manipulated," warns Sandeep Singh, a senior director at HackerOne. Admittedly, it's less about the tool itself and more about why something like this had to be built in the first place. It's very much in line with zero-trust thinking: Don't assume anything works the way it's supposed to. Always double-check. Now you have to test it. AI-powered systems and tools are so directly connected to data that it can take just one prompt mishap to cause an outage or breach. It may be happening more than you think. IBM found that about 1 in 8 organizations (13%) have already experienced an AI-related data breach. More telling is that nearly all of them admitted they didn't have proper AI access controls in place. When breaches did occur, 60% led to compromised data, 31% caused operational disruption, and 23% caused financial losses. Singh predicts auditors will expect hosts to actively test how AI systems react to being attacked, and not just rely on assuming everything will work as intended. As for how to do that, Singh has a few suggestions. "Providers will either offer native capabilities or partner integrations that help customers test AI systems under adversarial conditions and produce clear evidence of what can actually be exploited before it becomes an incident," he says. It's probably worth heeding that advice. Hosting providers are being pulled deeper into the AI security stack whether they like it or not. At this point, testing what a real attack looks like is really the only way to prepare.

News4Hackers
Mar 25th, 2026
HackerOne employee data leaked in major navinfo security breach.

HackerOne employee data leaked in major navinfo security breach. Post Views: 10 Employee data exposure highlights need for enhanced benefits provider security. On February 20, HackerOne, a prominent bug bounty platform and offensive security solutions provider, learned from Navia Benefit Solutions, its third-party benefits administrator, that employee data had been compromised in a recent data breach. The breach, which occurred between December 22, 2025, and January 15, 2026, resulted in the exposure of sensitive information, including names, dates of birth, Social Security numbers, phone numbers, addresses, and health plan details. Nearly 2.7 million individuals were affected by the breach, with 287 being employees of HackerOne. Details of the breach. * Date of breach: December 22, 2025 - January 15, 2026 * Affected information: * Names * Dates of birth * Social Security numbers * Phone numbers * Addresses * Health plan details * Number of affected individuals: 2.7 million * Number of HackerOne employees affected: 287 According to HackerOne: The breach was discovered on January 23 by Navia, which promptly initiated an investigation. Despite Navia stating that they are unaware of any attempted or actual misuse of the exposed information, the incident underscores the importance of robust security measures in benefits administration. HackerOne stated that it would conduct its own investigation into the incident and communicate closely with Navia to understand the circumstances surrounding the breach. The company also expressed its intention to evaluate Navia's privacy and security policies, with potential consequences if standards are not met. Risks associated with external parties. The data breach highlights the risks associated with entrusting sensitive information to external parties, emphasizing the need for enhanced security protocols in benefits administration. While the breach itself does not appear to have resulted in malicious activity, the incident serves as a reminder of the importance of vigilance and proactive security measures in protecting sensitive data. Related incidents. * Aisuru, a benefits administrator, reported a breach affecting over 670,000 individuals * The U.S. Department of Energy published a five-year energy security plan aimed at mitigating potential threats to the nation's energy infrastructure

Dolphin Publications
Mar 25th, 2026
HackerOne hit by data breach via third-party partner.

HackerOne hit by data breach via third-party partner. HackerOne has confirmed that employee personal data was leaked following a security incident at Navia, an external provider of employee benefits. The incident did not occur within HackerOne's own systems, but at the U.S. partner of which the company is a client. An official report to the U.S. regulator indicates that attackers gained access to Navia's systems between December 22, 2025, and January 15, 2026. The breach was discovered on January 23, followed by further analysis, and affected organizations were subsequently notified. It wasn't until mid-March that affected individuals were informed, reports BleepingComputer. A total of 287 HackerOne employees were affected by the data breach. While this is a relatively small number, the nature of the data underscores the potential risk. Only one of the affected individuals is located in the U.S. state of Maine, where the report was required to be filed. The stolen information consists of a combination of identifying and sensitive personal data. This includes names, addresses, phone numbers, and email addresses, as well as dates of birth and U.S. Social Security numbers. In addition, data on program participation and administrative data, such as enrollment and withdrawal dates, were accessed. In some cases, this also includes information about family members. According to the report, this was an external system breach in which unauthorized individuals exploited a vulnerability in the access control system. This allowed data to be accessed without the required permissions. The perpetrators of the attack are unknown, and no party has claimed responsibility. Risk of phishing and misuse remains high. Although there are no indications that financial data or claims systems have been compromised, the risk to those affected remains significant. The combination of personal data makes targeted phishing and other forms of social engineering plausible. Attackers can use this information to create credible messages or impersonate trustworthy parties. HackerOne therefore advises affected employees to be alert to suspicious communications and to closely monitor their accounts and financial data. It is also recommended to change passwords and security questions if they are related to the leaked information. Navia offers identity protection and credit monitoring through Kroll. Depending on the situation, this service can be utilized for up to two years. In this way, the service provider aims to limit the impact of the incident on those affected. The incident once again underscores the risks of relying on third parties to handle sensitive data. Even when an organization has its own security in place, vulnerabilities in its suppliers can still lead to data breaches with direct consequences for employees or customers.

DanSec
Mar 25th, 2026
Cybersecurity brief - 2026-03-25.

Cybersecurity brief - 2026-03-25. 2026-03-25 Major Incidents or Breaches * HackerOne disclosed a data breach impacting hundreds of employees, following a compromise of its US benefits administrator, Navia. * Infinite Campus, a widely used K-12 student information system, warned of a data breach and extortion attempt, attributed to the ShinyHunters threat actor. * The Dutch Ministry of Finance confirmed a breach affecting internal systems, detected in the previous week. * QualDerm, a healthcare provider, suffered a breach impacting 3.1 million individuals, with personal, medical, and insurance data stolen. * Extortion group Lapsus$ claimed to have compromised AstraZeneca, including internal code repositories, credentials, and employee data. Newly Discovered Vulnerabilities * PTC Inc. warned of a critical remote code execution vulnerability affecting its Windchill and FlexPLM product lifecycle management solutions. * A critical Citrix NetScaler vulnerability was disclosed, allowing unauthenticated remote attackers to read sensitive information from memory. * Chrome 146 was released, addressing eight high-severity memory safety vulnerabilities across seven components. * Firefox 149 introduced a built-in VPN with a 50GB monthly data limit, enhancing privacy protections. * Researchers highlighted ongoing risks and vulnerabilities in IP KVM devices, following recent reports from Eclypsium. Notable Threat Actor Activity * TeamPCP continued its supply chain attacks, compromising the popular LiteLLM Python package on PyPI (versions 1.82.7-1.82.8) via a Trivy CI/CD compromise, embedding credential harvesters and affecting hundreds of thousands of developers. TeamPCP was also linked to attacks on Trivy, Checkmarx KICS, and VS Code plug-ins, as well as recent compromises of GitHub Actions workflows through stolen CI credentials. * A large-scale malvertising campaign has been leveraging tax-related search ads since January 2026, distributing rogue installers for ConnectWise ScreenConnect. The campaign uses a Huawei driver to disable endpoint detection and response (EDR) solutions. * The Ghost campaign was identified as distributing seven malicious npm packages aimed at stealing cryptocurrency wallets and credentials. * Ongoing phishing campaigns are targeting French-speaking enterprises with fake resumes, leading to the deployment of information stealers and cryptocurrency miners. * FBI and CISA, along with European agencies, warned of Russian threat actors hijacking Signal and WhatsApp accounts via scalable social engineering campaigns. * Scam compounds are hiring individuals to appear as "AI models" in deepfake video calls to facilitate fraud. Trends, Tools, or Tactics of Interest * The number of newly reported vulnerabilities is expected to exceed 100,000 this year, with a noted trend toward faster exploitation of zero-days. * Security researchers observed a rise in supply chain attacks targeting open-source software and developer tools, with AI-assisted campaigns distributing trojanized packages (e.g., OpenClaw Deployer on GitHub). * Increased use of credential-stealing malware targeting CI/CD pipelines and package repositories. * Attackers are using legitimate drivers (e.g., Huawei) to disable EDR in malware campaigns. * There is a continued increase in phishing campaigns leveraging social engineering and fake documentation (e.g., resumes) to gain initial access. * AI and agentic AI systems are being increasingly targeted, as evidenced by the McKinsey Lilli platform hack and discussions on the need for better governance and identity controls. * JPMorgan Chase reported the use of AI digital twins and digital fingerprints for advanced threat hunting and reducing false positives. * Endpoint security is being challenged by AI coding tools, which facilitate bypassing traditional defenses. * Surveillance systems are being targeted in geopolitical conflicts, as demonstrated by Israel's exploitation of Iran's camera network. Regulatory or Policy Developments * The US Federal Communications Commission (FCC) updated its Covered List to ban the sale of all new consumer routers manufactured outside the USA, citing security risks. * The US Department of Energy (DoE) published a five-year energy security plan (Project Armor) to harden critical energy infrastructure. * Microsoft proposed new identity and governance guardrails for agentic AI systems to address emerging threats from autonomous AI agents. * Gartner released its first Market Guide for Guardian Agents, highlighting the emergence of this security technology category. * A Russian national received an 81-month prison sentence for acting as an initial access broker for Yanluowang ransomware attacks.

INACTIVE