This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Replit is the agentic software creation platform that enables anyone to build applications using natural language. With millions of users worldwide and over 500,000 business users, Replit is democratizing software development by removing traditional barriers to application creation. We are looking for a SOC Engineer to join our Security Operations team and help defend a fast-moving, cloud-native AI vibe-coding platform. In this role, you will stay on top of emerging threats—from 0-days and active exploitation campaigns to bug bounty findings and customer-reported issues—and rapidly determine their relevance and potential impact to Replit. You will conduct investigations, analyze signals across our environment, and collaborate with Security, SRE, and Engineering teams to develop and drive effective containment and mitigation strategies. This is a hands-on, investigative role requiring strong technical depth, understanding of modern software engineering and CI/CD systems, familiarity with cloud-native infrastructure (especially GCP), and the ability to work across multiple teams in a fast-paced environment.
Job Responsibility:
Continuously monitor emerging threats, including bad actor activity, 0-day vulnerabilities, public exploitation campaigns, bug bounty reports, and customer-reported security issues
Quickly assess the applicability of these threats to Replit’s cloud infrastructure, SaaS services, internal tooling, and platform components
Conduct targeted investigations to determine whether Replit is already impacted by a newly discovered threat, vulnerability, or exploit
Analyze logs, telemetry, and system behaviors using SIEM, metrics, Cloud Logging, and related tools
Identify gaps or weaknesses in existing detection or visibility and propose improvements
Research potential impact paths and develop mitigation strategies for confirmed or applicable threats
Partner closely with Security, SRE, and Engineering teams to coordinate and implement containment, patches, configuration updates, or code-level fixes
Document findings, mitigations, and follow-up actions clearly for internal teams
Requirements:
Strong understanding of software engineering fundamentals, including code structure, build systems, dependencies, and package ecosystems
Understanding of CI/CD pipelines and DevOps workflows
Solid knowledge of cloud architecture, especially Google Cloud Platform (GCP) services used in modern cloud-native deployments
Familiarity with SaaS architectures, identity systems, and integration patterns
Hands-on experience with SIEM, Cloud Logging, and log-based investigation workflows
Ability to perform investigations using log data, behavioral indicators, and threat intelligence
General understanding of vulnerability lifecycles, exploitability analysis, and common attack vectors
Nice to have:
Experience with threat intelligence, security research, or vulnerability analysis
Familiarity with Kubernetes, containers, serverless infrastructure, or modern distributed systems
Ability to write scripts or small tools for investigation or automation (Python, Go, Bash)
Experience working with bug bounty programs or coordinated vulnerability disclosure workflows
Experience in fast-paced, cloud-native, or AI/ML-driven environments