Replit is the agentic software creation platform that enables anyone to build applications using natural language. With millions of users worldwide and over 500,000 business users, Replit is democratizing software development by removing traditional barriers to application creation.
We are looking for a Security Operations Lead (SOC Lead) to build, mature, and operate our 24/7 detection and response capabilities across a modern cloud-native and AI-driven environment. This role leads the global SOC function—monitoring, SIEM ownership, detection engineering, alert triage, and operational readiness—while also evaluating and integrating emerging AI-based SOC products and autonomous response platforms.
You will oversee monitoring across multi-cloud environments (GCP primary, AWS/Azure secondary), Kubernetes, SaaS services, endpoints, developer tools, and AI workloads. You’ll collaborate closely with Cloud Security, Compliance/GRC, SRE, Platform Engineering, IT/Endpoint teams, and AI Infrastructure to ensure our detection strategy scales and stays ahead of evolving threats.
This is a hands-on leadership role perfect for someone who wants to shape the SOC of the future while solving complex challenges in a high-scale AI setting.
Lead, mentor, and scale a global SOC team responsible for 24/7 monitoring, alert intake, triage, correlation, and escalation.
Build operational rigor: processes, runbooks, SLAs, metrics, and quality standards for high-scale environments.
Cover monitoring across:
Cloud infrastructure (GCP, AWS, Azure)
Kubernetes/GKE/EKS/AKS clusters
SaaS platforms (Google Workspace, GitHub, Slack, Okta, etc.)
Endpoints (macOS, Linux, Windows) including EDR/XDR telemetry
Developer platforms + CI/CD pipelines
AI/ML systems and model-serving workflows
Evaluate, adopt, and integrate AI-native SOC technologies for triaging, detection, and correlation
Identify opportunities to automate triage, investigations, enrichment, and reporting.
Serve as the internal expert on the capabilities and limitations of AI-based SOC tooling.
Own the entire SIEM ecosystem—ingestion, normalization, correlation, enrichment, tuning, dashboards, and metrics.
Expand telemetry across:
Cloud logs, API logs, system events
SaaS audit logs and admin events
Identity providers (Okta, Google, Azure AD)
Endpoint EDR/XDR event streams
Standardize data schemas and improve detection signal quality across sources.
Develop high-fidelity detections for:
Cloud-native attacks
Identity threats and lateral movement
SaaS misconfigurations and privilege abuse
Endpoint malware/behavior anomalies
Insider threats and account takeover patterns
Use MITRE ATT&CK, MITRE Cloud Matrix, and threat intel to drive detection coverage.
Collaborate with Engineering, Cloud Security, and SRE to ensure telemetry supports detection use cases.
Lead day-to-day triage and threat analysis activities, ensuring accurate categorization and prioritization.
Drive complex investigations involving correlated events across cloud, SaaS, endpoints, and developer platforms.
Guide root cause analysis and work with owners to drive remediation and architectural improvements.
Continuously refine logic, reduce false positives, and improve signal quality.
Partner with Cloud Security on cloud posture and preventative controls.
Work with Compliance/GRC to support SOC 2, ISO 27001, and audit readiness.
Collaborate with SRE and Engineering to instrument new services with structured logs and detection hooks.
Coordinate with IT / Endpoint teams to ensure full endpoint telemetry and EDR response readiness.
Communicate threats, gaps, and trends to leadership and engineering stakeholders.
7+ years of experience in Security Operations, with 3+ years in a senior or lead capacity.
Experience leading or collaborating with 24/7 SOC environments (internal, hybrid, or MSSP).
Strong experience with SIEM platforms (Chronicle, Splunk, Elastic, Sentinel, Panther, etc.).
Deep understanding of:
Cloud security monitoring (GCP required; AWS/Azure preferred)
SaaS security monitoring (Okta, Google Workspace, GitHub, Slack, etc.)
Endpoint security telemetry (EDR/XDR tools such as CrowdStrike, SentinelOne, or Defender)
Kubernetes and container detection
Hands-on detection engineering skills, event correlation, threat hunting, and log analysis.
Familiarity with AI-based SOC platforms and LLM-driven detection/triage tools.
Strong understanding of identity security, OAuth/OIDC, and API telemetry patterns.
Experience with SOAR and scripting (Python, Go, Bash).
Knowledge of MITRE ATT&CK, cloud kill chains, behavioral detections, and detection lifecycle management.
Experience with UBA/UEBA, ML-driven anomaly detection, or autonomous remediation systems.
Previous experience at a high-growth tech company.
Security certifications (GCIH, GCIA, GCTI, GCDA, GCFA, etc.).
Operational excellence: Building reliable, scalable SOC systems.
Analytical rigor: Capable of making sense of large, complex, multi-source telemetry.
Leadership: Mentorship and guidance of analysts and engineers.
Adaptability: Comfortable evaluating and integrating next-gen AI-based SOC tools.
Clear communication: Able to articulate risk, incidents, and recommendations to both technical and executive audiences.
Automation mindset: Focused on reducing manual toil via SOAR, scripting, and AI augmentation.
Curiosity: Passion for learning, experimenting, and staying ahead of evolving threats—especially those targeting cloud-native and AI systems.
This is a full-time role that can be held from our Foster City, CA office. The role has an in-office requirement of Monday, Wednesday, and Friday.
Full-Time Employee Benefits Include:
💰 Competitive Salary & Equity
💹 401(k) Program
⚕️ Health, Dental, Vision and Life Insurance
🩼 Short Term and Long Term Disability
🚼 Paid Parental, Medical, Caregiver Leave
🚗 Commuter Benefits
📱 Monthly Wellness Stipend
🧑💻 Autonoumous Work Environement
🖥 In Office Set-Up Reimbursement
🏝 Flexible Time Off (FTO) + Holidays
🚀 Quarterly Team Gatherings
☕ In Office Amenities
Want to learn more about what we are up to?
Interviewing + Culture at Replit
To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world. We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially candidates from underrepresented and non-traditional backgrounds.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Lead and scale a cloud-first IT organization at Replit, owning device management, identity, SaaS tooling, helpdesk, office technology, and IT controls to support a fast-growing, distributed AI company.
Cyberhaven is looking for a Senior Business Systems Analyst to own and optimize Salesforce and the GTM toolset, driving data quality, automation, and scalable processes for Sales, Marketing, and Customer Success.
Manage and optimize enterprise Oracle databases in a fully remote role supporting mission-critical, compliance-driven systems.
Lead process discovery, design, and automation (Workato/other iPaaS) to streamline workflows, ensure compliance with HIPAA, and drive operational efficiency for Array Behavioral Care’s remote U.S. teams.
Lead technology strategy and delivery for a high-profile savings program, providing architecture, governance, and operational oversight across cross-functional teams.
Support U.S. government intelligence operations as a Digital Network Exploitation Analyst performing exploitation analysis, target development, and network/security advisory duties for Prime Time Consulting.
Lead and grow a high-performing Salesforce platform team while contributing hands-on technical expertise to drive scalable GTM systems and reliable Sales/Service Cloud solutions at Patch My PC.
Global Dimensions seeks a Junior Cyber Systems Analyst with TS/SCI to perform cyber kill‑chain analysis, adversary COA development, and intelligence production in support of USMC acquisition programs in Quantico, VA.
Lead and scale a cloud-first IT organization at Replit, owning device management, identity, SaaS tooling, helpdesk, office technology, and IT controls to support a fast-growing, distributed AI company.
Experienced endpoint security engineer needed to deploy and optimize AV/EDR, CAASM, and vulnerability management tools for a NYC-based IT consulting firm.
RRD seeks an entry-level IT Support Engineer in Phoenix to build, maintain, and troubleshoot Windows and Mac endpoints while providing excellent desk-side customer support and following ITSM processes.
Senior Network Engineer needed to lead design, administration, and security of a 20+ site network using Meraki, Cisco, Azure Firewall, and automation tools in a hybrid US role.
Provide hands-on, part-time I.T. support at Genz-Ryan's Burnsville office handling help desk requests, equipment setups, server and account administration, and asset management.
Create software together seamlessly from any location across the globe, using any device, without wasting time on setup.
9 jobs