SOC Engineer at Replit monitoring and assessing emerging threats in cloud infrastructure and AI coding environments. Conducting investigations and collaborating with teams for mitigation strategies.
Responsibilities
Continuously monitor emerging threats including bad actor activity, 0-day vulnerabilities, public exploitation campaigns, bug bounty reports, and customer-reported security issues
Quickly assess the applicability of these threats to Replit’s cloud infrastructure, SaaS services, internal tooling, and platform components
Conduct targeted investigations to determine whether Replit is already impacted by a newly discovered threat, vulnerability, or exploit
Analyze logs, telemetry, and system behaviors using SIEM, metrics, Cloud Logging, and related tools
Identify gaps or weaknesses in existing detection or visibility and propose improvements
Research potential impact paths and develop mitigation strategies for confirmed or applicable threats
Partner closely with Security, SRE, and Engineering teams to coordinate and implement containment, patches, configuration updates, or code-level fixes
Document findings, mitigations, and follow-up actions clearly for internal teams
Requirements
Strong understanding of software engineering fundamentals including code structure, build systems, dependencies, and package ecosystems
Understanding of CI/CD pipelines and DevOps workflows
Solid knowledge of cloud architecture, especially Google Cloud Platform (GCP)
Familiarity with SaaS architectures, identity systems, and integration patterns
Hands-on experience with SIEM, Cloud Logging, and log-based investigation workflows
Ability to perform investigations using log data, behavioral indicators, and threat intelligence
General understanding of vulnerability lifecycles, exploitability analysis, and common attack vectors
Experience with threat intelligence, security research, or vulnerability analysis preferred
Familiarity with Kubernetes, containers, serverless infrastructure, or modern distributed systems preferred
Ability to write scripts or small tools for investigation or automation (Python, Go, Bash) preferred
Experience working with bug bounty programs or coordinated vulnerability disclosure workflows preferred
Experience in fast-paced, cloud-native, or AI/ML-driven environments preferred
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.