New RJRP now shows Market-Observed Roles alongside verified postings — scored by our Hiring Activity algorithm. How it works →
🔍
Market-Observed Role 🔍 Observed Very Active (80-100)
This role was detected through Replit's hiring system and hasn't been verified directly by the employer. Our algorithm scored it as Very Active (80-100) based on freshness, specificity, and company patterns. What does this mean? →

Offensive Security Engineer

Replit
🔍 Observed
81
Hiring Activity Score
Very Active (80-100)
  • Base score
  • Posted 1 days ago
  • has location, quality description (4978 chars)
  • 52 new listings in 30d (×0.98 age 1d)
  • 7 skills
  • High confidence (90%)
  • Direct ATS (ashby)
How the Hiring Activity Score works →
Foster City, CA First seen 1 day, 4 hours ago Last seen 4 hours, 33 minutes ago Ashby
Apply on Ashby Search Google for This Role

ATS links often expire — Google search finds the latest posting

Job Description

Replit is the agentic software creation platform that enables anyone to build applications using natural language. With millions of users worldwide, Replit is democratizing software development by removing traditional barriers to application creation. ABOUT THE ROLE We are looking for a senior-level Offensive Security Engineer to serve as a high-impact "adversary-in-residence" for Replit’s cloud-native platform.

At Replit, security isn't just about perimeter defense; it’s about the integrity of the code that powers millions of environments. In this role, you will lead advanced "whitebox" penetration testing engagements—diving deep into our source code to identify systemic weaknesses, logic flaws, and architectural gaps. You will simulate sophisticated adversary tactics across our web applications, APIs, and containerized infrastructure, ensuring that our AI-integrated development environment remains the most secure place for the world’s software to live.

WHAT YOU'LL DO - Lead Whitebox Penetration Testing: Execute end-to-end testing with full access to source code. You will perform manual code-level inspections to uncover complex logic flaws and authorization bypasses that automated tools miss. - Simulate Adversarial Attacks: Conduct Red and Purple team engagements across our cloud-native stack (K8s, Docker), simulating how a sophisticated actor might move from a code-level exploit to infrastructure-wide impact.

  • Secure AI-Enabled Systems: Perform offensive testing on LLM-backed applications and agentic AI workflows, focusing on prompt injection, data leakage, and abuse of AI-driven components. - Vulnerability Research & Chaining: Identify, exploit, and demonstrate realistic business risk by chaining vulnerabilities—from the application layer down through our internal trust boundaries. - Build Offensive Tooling: Contribute to internal security frameworks and build AI-assisted testing tools to automate the discovery of common bug classes while maintaining deep manual testing depth.
  • Partner with Engineering: Work closely with product teams and security architects to explain root causes, influence design guardrails, and triage high-priority findings from our Bug Bounty (HackerOne) program. REQUIRED SKILLS & EXPERIENCE - Experience: 7+ years of hands-on experience in penetration testing, offensive security, or vulnerability research. - Code Fluency: You are a practitioner of whitebox testing.

You can navigate large codebases and have a deep understanding of modern application architectures and secure coding pitfalls. - Cloud-Native Context: You are comfortable in a cloud-native environment. While your focus is the code, you understand how it interacts with Kubernetes, Docker, and hybrid cloud infrastructure.

  • Engineering Skills: Strong proficiency in Go, Python, or TypeScript. You should be capable of writing custom scripts, payloads, and proof-of-concept exploits. - Adversarial Mindset: You enjoy the "hunt" and have a proven track record of manual exploitation beyond automated scanners.
  • Communicator: You can translate a complex code-level exploit into a clear narrative that helps engineering teams understand risk and prioritize fixes. BONUS QUALIFICATIONS - Public recognition on platforms like HackerOne or Bugcrowd. - Experience building or extending AI-based security testing tools.
  • Background in incident response or detection engineering from the defensive side. - Published CVEs or security research in the cloud-native or AI space. This is a full-time role that can be held from our Foster City, CA office.

The role has an in-office requirement of Monday, Wednesday, and Friday. Full-Time Employee Benefits Include: 💰 Competitive Salary & Equity 💹 401(k) Program with a 4% match ⚕️ Health, Dental, Vision and Life Insurance 🩼 Short Term and Long Term Disability 🚼 Paid Parental, Medical, Caregiver Leave 🚗 Commuter Benefits 📱 Monthly Wellness Stipend 🧑‍💻 Autonomous Work Environment 🖥 In Office Set-Up Reimbursement 🏝 Flexible Time Off (FTO) + Holidays 🚀 Quarterly Team Gatherings ☕ In Office Amenities Want to learn more about what we are up to? - Meet the Replit Agent https://www.youtube.com/watch?v=IYiVPrxY8-Y - Replit: Make an app for that https://www.youtube.com/watch?v=4zd9hzngFwY - Replit Blog https://blog.replit.com/ - Amjad TED Talk https://youtu.be/kCudFI4tcpg?si=l4ViCejV_f2RZkDi Interviewing + Culture at Replit - Operating Principles https://blog.replit.com/operating-principles - Reasons not to work at Replit https://blog.replit.com/reasons-not-to-join-replit To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world.

We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially candidates from underrepresented and non-traditional backgrounds.

Skills

rust kubernetes go docker typescript python aws
Job Information
  • Company:
    Replit
  • Location:
    Foster City, CA
  • Job Type:
    Full-Time
  • Work Location:
    Remote
  • Experience Level:
    Senior
  • Source:
    Ashby
  • Status:
    Active
Activity Score
81 /100
Very Active (81)

Higher scores indicate more likely active hiring based on listing freshness, company activity, and other signals. Learn more →

More from Replit
+
🔍

We now show two types of job listings

Same commitment to real jobs. More opportunities for you. Here's how it works.

✓ Verified Employer-Verified Posts

These jobs were posted directly to RJRP by the employer. The company has been verified through our multi-step process. This is our gold standard — the employer is real, the job is real, and you can apply with confidence.

✓ 100% employer verified
🔍 Observed Market-Observed Roles

These roles were detected through employer hiring systems like Workday. They haven't been verified by the employer directly, so we score each one using our Hiring Activity Score — an algorithm that analyzes freshness, specificity, company hiring patterns, and more to estimate whether the role is actively being filled.

📊 Only high-scoring listings are shown

Our promise hasn't changed. We will never show you a listing we can't stand behind. Market-observed roles must pass our scoring threshold before they appear on RJRP. Anything that looks like a ghost job, a talent pipeline, or a dead listing gets filtered out — you'll never see it.