<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>46d6bdd3-23c</externalid>
      <Title>Senior Backend Engineer (RoR), AST: Secret Detection</Title>
      <Description><![CDATA[<p>As a Senior Backend Engineer on the Secret Detection team, you&#39;ll help protect sensitive data by building services, scanning workflows, and remediation paths that prevent leaked secrets from reaching production.</p>
<p>Your work will contribute to the full secret management lifecycle, from push protection to pipeline-based scanning, validation, and auditability, so developers can move quickly without taking on avoidable security risk.</p>
<p>This is a strong opportunity if you want to work on security features with clear customer impact, improve detection quality, and help teams act when credentials, API keys, or other secrets are exposed.</p>
<p>You&#39;ll focus on backend systems that power Secret Detection across GitLab&#39;s DevSecOps platform, working closely with product management and engineering peers in an async-first environment.</p>
<p>In your first year, you&#39;ll contribute to core product capabilities, improve performance and result quality, and help shape technical direction through code reviews, RFCs, and proof of concepts.</p>
<p>Some examples of our projects:</p>
<ul>
<li>Prevent secret leaks in source code with GitLab Secret Push Protection</li>
<li>Verify validity of secret detection findings</li>
</ul>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Guide the design and implementation of backend features for GitLab Secret Detection in Ruby on Rails, GraphQL, and Go, delivering capabilities that improve coverage, reliability, or response time for secret detection workflows.</li>
<li>Build clean, well-tested, maintainable code that meets GitLab standards for reliability and performance, helping reduce regressions and maintain backend systems at scale.</li>
<li>Partner with product management and engineering peers to deliver backend capabilities that improve detection, validation, remediation, and audit trail coverage across the secret management lifecycle.</li>
<li>Improve detection quality by reducing false positives, strengthening secret validation workflows, and enabling faster, more effective remediation paths.</li>
<li>Contribute to code reviews, RFCs, and proof-of-concept work that guide technical approaches across the Secret Detection category.</li>
<li>Identify technical debt and operational inefficiencies, then propose and implement practical improvements.</li>
<li>Diagnose performance and optimization issues in backend systems and implement improvements that increase efficiency, scalability, and service reliability.</li>
<li>Work effectively in a globally distributed, async-first team while participating in planning, engineering discussions, and pairing when needed.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Experience building backend applications and services using Ruby on Rails, with working knowledge of GraphQL and interest in backend-focused product development.</li>
<li>Experience designing and delivering secure, maintainable systems that power production web applications at scale.</li>
<li>Knowledge of security concepts, common vulnerabilities, mitigation techniques, and secure coding practices.</li>
<li>Background developing or working with security tools or products, especially in areas related to code scanning or secret detection.</li>
<li>Experience investigating performance issues and improving backend reliability, efficiency, and maintainability.</li>
<li>Ability to work closely with cross-functional partners, including product, design, and technical writing, to deliver useful product outcomes.</li>
<li>Communicate clearly in writing and in conversation, especially in remote, async-first environments with distributed teams.</li>
<li>Bring transferable experience and a willingness to grow into parts of the security or Go stack.</li>
</ul>
<p><strong>About the Team</strong></p>
<p>The Secret Detection team owns GitLab&#39;s Secret Detection category, and we build the backend systems and related user workflows that help developers identify and mitigate exposed secrets as code is contributed.</p>
<p>We work with the broader security product suite while maintaining focused investment in secret scanning quality, validation, remediation, and developer experience.</p>
<p>Our work spans Rails and Go services, and we work primarily asynchronously across time zones as a globally distributed team.</p>
<p>Current opportunities include expanding coverage across the secret management lifecycle and improving result quality across the findings our tools detect.</p>
<p>For more on how we work, see the Team Handbook page.</p>
<p><strong>Benefits</strong></p>
<ul>
<li>Benefits to support your health, finances, and well-being</li>
<li>Flexible Paid Time Off</li>
<li>Team Member Resource Groups</li>
<li>Equity Compensation &amp; Employee Stock Purchase Plan</li>
<li>Growth and Development Fund</li>
<li>Parental leave</li>
<li>Home office support</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$117,600-$252,000 USD</Salaryrange>
      <Skills>Ruby on Rails, GraphQL, Go, Backend development, Security, Secure coding practices, Code scanning, Secret detection</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>GitLab</Employername>
      <Employerlogo>https://logos.yubhub.co/about.gitlab.com.png</Employerlogo>
      <Employerdescription>GitLab is an orchestration platform for DevSecOps, providing tools for developer productivity, operational efficiency, and security risk reduction.</Employerdescription>
      <Employerwebsite>https://about.gitlab.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/gitlab/jobs/8432262002</Applyto>
      <Location>Remote, Canada; Remote, Ireland; Remote, Israel; Remote, Netherlands; Remote, United Kingdom; Remote, US</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>1c3b4d6a-957</externalid>
      <Title>Senior Software Security Engineer</Title>
      <Description><![CDATA[<p><strong>About Anthropic</strong></p>
<p>Anthropic&#39;s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.</p>
<p><strong>About the Team</strong></p>
<p>The Security Engineering team protects Anthropic&#39;s AI systems and maintains the trust of our users and society. We define the authentication architecture for our training infrastructure, design the cryptographic foundations that protect model weights and training data, and drive the developer security program that shapes how engineers build and ship software.</p>
<p>The team works across several areas that collaborate closely: identity and secrets management, developer security and supply chain, infrastructure security, and secure frameworks. You will support one of these areas while contributing across others, with your focus shaped by your strengths and the team&#39;s priorities.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Build and maintain identity and secrets management systems, including credential issuance, rotation, and workload authentication across our multi-cloud environments</li>
<li>Contribute to cluster security controls including RBAC policies, namespace isolation, workload identity, and pod security</li>
<li>Implement and maintain cloud security controls including IAM, network segmentation, VPC architecture, and encryption across our multi-cloud and on-prem environments</li>
<li>Design and implement secure development frameworks and libraries that make secure coding the path of least resistance for our engineering teams, including service to service authentication, serialization libraries, and tool proxies.</li>
<li>Harden CI/CD pipelines against supply chain attacks through isolated build environments, signed attestations, dependency verification, and automated policy enforcement</li>
<li>Identify and remediate security gaps through code review, threat modeling, and hands-on debugging</li>
<li>Contribute to continuous cloud security posture management using infrastructure-as-code scanning, misconfiguration detection, and automated remediation</li>
</ul>
<p><strong>You may be a good fit if you have:</strong></p>
<ul>
<li>At least 5 years of software engineering experience implementing and maintaining security-relevant systems in production</li>
<li>Bachelor&#39;s degree in Computer Science or equivalent industry experience</li>
<li>Strong programming skills in Python or at least one systems language such as Go or Rust</li>
<li>Experience contributing to cloud security controls</li>
<li>A track record of taking ownership of problems end to end, from identifying the issue to shipping and monitoring the fix</li>
<li>Clear communication skills and the ability to work collaboratively across engineering teams</li>
<li>Low ego and high empathy, with a genuine interest in helping teammates succeed</li>
<li>Passion for AI safety and the role security engineering plays in building trustworthy AI systems</li>
</ul>
<p><strong>Strong candidates may also have:</strong></p>
<ul>
<li>Contributions to developer security tooling including SAST, dependency scanning, or secure build infrastructure</li>
<li>Familiarity with Kubernetes security primitives including RBAC, namespaces, network policies, and admission controllers</li>
<li>Experience with cloud security posture management tooling, infrastructure-as-code security scanning, or automated remediation</li>
<li>Experience with network security and isolation techniques including east-west controls, traffic inspection, and cloud network policy</li>
<li>Experience with eBPF for security monitoring and enforcement, or developing kernel security policies</li>
<li>Experience building secrets management or workload authentication systems, including familiarity with protocols such as OAuth 2.0, OIDC, SAML, or SPIFFE/SPIRE</li>
<li>Background building or operating security systems in environments that support research workflows and rapid iteration</li>
</ul>
<p><strong>Deadline to apply:</strong></p>
<p>None. Applications will be reviewed on a rolling basis.</p>
<p><strong>Logistics</strong></p>
<p><strong>Education requirements:</strong> We require at least a Bachelor&#39;s degree in a related field or equivalent experience. <strong>Location-based hybrid policy:</strong> Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.</p>
<p><strong>Visa sponsorship:</strong> We do sponsor visas! However, we aren&#39;t able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.</p>
<p><strong>We encourage you to apply even if you do not believe you meet every single qualification.</strong> Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you&#39;re interested in this work. We think AI systems like the ones we&#39;re building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.</p>
<p><strong>Your safety matters to us.</strong> To protect yourself from potential scams, remember that Anthropic recruiters only contact you from @anthropic.com email addresses. In some cases, we may partner with vetted recruiting agencies who will identify themselves as working on behalf of Anthropic. Be cautious of unsolicited messages or requests for sensitive information.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$320,000 - $405,000 USD</Salaryrange>
      <Skills>Python, Go, Rust, Cloud security controls, Kubernetes security primitives, Infrastructure-as-code scanning, Automated remediation, Code review, Threat modeling, Hands-on debugging, SAST, Dependency scanning, Secure build infrastructure, Network security and isolation techniques, eBPF for security monitoring and enforcement, Kernel security policies, Secrets management or workload authentication systems, OAuth 2.0, OIDC, SAML, SPIFFE/SPIRE</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Anthropic</Employername>
      <Employerlogo>https://logos.yubhub.co/anthropic.com.png</Employerlogo>
      <Employerdescription>Anthropic is a rapidly growing organisation focused on creating reliable, interpretable, and steerable AI systems. The company aims to build beneficial AI systems that are safe and beneficial for users and society.</Employerdescription>
      <Employerwebsite>https://job-boards.greenhouse.io</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/anthropic/jobs/4887959008</Applyto>
      <Location>San Francisco, CA | New York City, NY | Seattle, WA</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>