SOC Engineer at Replit monitoring and assessing emerging threats in cloud infrastructure and AI coding environments. Conducting investigations and collaborating with teams for mitigation strategies.
Responsibilities
Continuously monitor emerging threats including bad actor activity, 0-day vulnerabilities, public exploitation campaigns, bug bounty reports, and customer-reported security issues
Quickly assess the applicability of these threats to Replit’s cloud infrastructure, SaaS services, internal tooling, and platform components
Conduct targeted investigations to determine whether Replit is already impacted by a newly discovered threat, vulnerability, or exploit
Analyze logs, telemetry, and system behaviors using SIEM, metrics, Cloud Logging, and related tools
Identify gaps or weaknesses in existing detection or visibility and propose improvements
Research potential impact paths and develop mitigation strategies for confirmed or applicable threats
Partner closely with Security, SRE, and Engineering teams to coordinate and implement containment, patches, configuration updates, or code-level fixes
Document findings, mitigations, and follow-up actions clearly for internal teams
Requirements
Strong understanding of software engineering fundamentals including code structure, build systems, dependencies, and package ecosystems
Understanding of CI/CD pipelines and DevOps workflows
Solid knowledge of cloud architecture, especially Google Cloud Platform (GCP)
Familiarity with SaaS architectures, identity systems, and integration patterns
Hands-on experience with SIEM, Cloud Logging, and log-based investigation workflows
Ability to perform investigations using log data, behavioral indicators, and threat intelligence
General understanding of vulnerability lifecycles, exploitability analysis, and common attack vectors
Experience with threat intelligence, security research, or vulnerability analysis preferred
Familiarity with Kubernetes, containers, serverless infrastructure, or modern distributed systems preferred
Ability to write scripts or small tools for investigation or automation (Python, Go, Bash) preferred
Experience working with bug bounty programs or coordinated vulnerability disclosure workflows preferred
Experience in fast-paced, cloud-native, or AI/ML-driven environments preferred
Security Analyst managing network security tools to protect systems at Riachuelo. Collaborating with teams to ensure operational resilience and security compliance.
Security Operations Centre Analyst for Long View's IGS branch, focused on incident detection and response. Collaborating with teams to monitor, identify, and remediate security incidents.
Intermediate Security Operations Centre Analyst involved in IT security operations for a dynamic IT provider. Collaborating with internal teams for incident detection and response across various platforms.
Security Operations Lead overseeing global SOC operations and AI product integration at Replit. Leading monitoring and incident response across multi - cloud environments and AI workloads.
Cybersecurity Incident Response Engineer in Comcast's Security Incident Response Team mitigating threats and restoring environments following incidents. Working with advanced technologies to safeguard customers and infrastructure.
Director of Security Operations responsible for strategic leadership and operational excellence in security at Abridge. Leading teams focused on preventing, detecting, and responding to security threats.
Sr. Security Incident Response Engineer leveraging Splunk expertise to investigate security incidents at Autodesk. Monitoring and analyzing threats while collaborating with incident response teams.
Lead incident response efforts for a global fintech focusing on Microsoft E5 security capabilities and DLP. Drive detection, containment, and proactive security measures for the enterprise.
SOC Analyst I monitoring and responding to cybersecurity threats for Byline Bank. Assisting in protecting customer and business information with compliance and real - time threat management.