SOC Engineer at Replit monitoring and assessing emerging threats in cloud infrastructure and AI coding environments. Conducting investigations and collaborating with teams for mitigation strategies.
Responsibilities
Continuously monitor emerging threats including bad actor activity, 0-day vulnerabilities, public exploitation campaigns, bug bounty reports, and customer-reported security issues
Quickly assess the applicability of these threats to Replit’s cloud infrastructure, SaaS services, internal tooling, and platform components
Conduct targeted investigations to determine whether Replit is already impacted by a newly discovered threat, vulnerability, or exploit
Analyze logs, telemetry, and system behaviors using SIEM, metrics, Cloud Logging, and related tools
Identify gaps or weaknesses in existing detection or visibility and propose improvements
Research potential impact paths and develop mitigation strategies for confirmed or applicable threats
Partner closely with Security, SRE, and Engineering teams to coordinate and implement containment, patches, configuration updates, or code-level fixes
Document findings, mitigations, and follow-up actions clearly for internal teams
Requirements
Strong understanding of software engineering fundamentals including code structure, build systems, dependencies, and package ecosystems
Understanding of CI/CD pipelines and DevOps workflows
Solid knowledge of cloud architecture, especially Google Cloud Platform (GCP)
Familiarity with SaaS architectures, identity systems, and integration patterns
Hands-on experience with SIEM, Cloud Logging, and log-based investigation workflows
Ability to perform investigations using log data, behavioral indicators, and threat intelligence
General understanding of vulnerability lifecycles, exploitability analysis, and common attack vectors
Experience with threat intelligence, security research, or vulnerability analysis preferred
Familiarity with Kubernetes, containers, serverless infrastructure, or modern distributed systems preferred
Ability to write scripts or small tools for investigation or automation (Python, Go, Bash) preferred
Experience working with bug bounty programs or coordinated vulnerability disclosure workflows preferred
Experience in fast-paced, cloud-native, or AI/ML-driven environments preferred
Cyber Security Specialist protecting digital estate from threats at the University of Edinburgh. Focused on identifying and mitigating cyber risks while supporting teaching and research services.
Cybersecurity Incident Response Analyst detecting and responding to cyber threats at NOV. Collaborating using AI tools to enhance cybersecurity operations across IT, cloud, and OT environments.
Lead Specialist in Security Operations, enhancing detection engineering and incident response at Pearson. Collaborate with teams and drive process improvements in a high - paced environment.
Security Engineer II at AvidXchange enhancing security operations and incident response. Collaborating with teams to develop, tune and improve security monitoring and automation capabilities.
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.
Lead Cybersecurity Analyst responsible for technical leadership of a 24x7 SOC team at AT&T. Drive operational standards, incident response, and continuous improvement initiatives.
Senior Security Operations Center Analyst protecting computer systems and data through investigation and incident response. Collaborating with IT leaders and mentoring junior analysts in security operations.