Offensive Security Engineer

This listing is synced directly from the company ATS.

Role Overview

As a senior Offensive Security Engineer at Replit, you will lead advanced whitebox penetration testing efforts on our cloud-native platform, focusing on identifying systemic weaknesses and simulating adversarial attacks. You will collaborate closely with product teams to influence security design and prioritize high-risk findings, playing a critical role in ensuring the security of our AI-integrated development environment.

Perks & Benefits

This full-time remote role offers a flexible work environment with an in-office requirement of three days a week in Foster City, CA. Employees enjoy competitive salary and equity, a robust 401(k) program, comprehensive health benefits, and a monthly wellness stipend. The culture emphasizes autonomy, career growth, and inclusivity, encouraging applicants from diverse backgrounds.

Full Job Description

Replit is the agentic software creation platform that enables anyone to build applications using natural language. With millions of users worldwide, Replit is democratizing software development by removing traditional barriers to application creation.

About the role


We are looking for a senior-level Offensive Security Engineer to serve as a high-impact "adversary-in-residence" for Replit’s cloud-native platform. At Replit, security isn't just about perimeter defense; it’s about the integrity of the code that powers millions of environments.

In this role, you will lead advanced "whitebox" penetration testing engagements—diving deep into our source code to identify systemic weaknesses, logic flaws, and architectural gaps. You will simulate sophisticated adversary tactics across our web applications, APIs, and containerized infrastructure, ensuring that our AI-integrated development environment remains the most secure place for the world’s software to live.


What You'll Do

  • Lead Whitebox Penetration Testing: Execute end-to-end testing with full access to source code. You will perform manual code-level inspections to uncover complex logic flaws and authorization bypasses that automated tools miss.

  • Simulate Adversarial Attacks: Conduct Red and Purple team engagements across our cloud-native stack (K8s, Docker), simulating how a sophisticated actor might move from a code-level exploit to infrastructure-wide impact.

  • Secure AI-Enabled Systems: Perform offensive testing on LLM-backed applications and agentic AI workflows, focusing on prompt injection, data leakage, and abuse of AI-driven components.

  • Vulnerability Research & Chaining: Identify, exploit, and demonstrate realistic business risk by chaining vulnerabilities—from the application layer down through our internal trust boundaries.

  • Build Offensive Tooling: Contribute to internal security frameworks and build AI-assisted testing tools to automate the discovery of common bug classes while maintaining deep manual testing depth.

  • Partner with Engineering: Work closely with product teams and security architects to explain root causes, influence design guardrails, and triage high-priority findings from our Bug Bounty (HackerOne) program.

Required Skills & Experience

  • Experience: 7+ years of hands-on experience in penetration testing, offensive security, or vulnerability research.

  • Code Fluency: You are a practitioner of whitebox testing. You can navigate large codebases and have a deep understanding of modern application architectures and secure coding pitfalls.

  • Cloud-Native Context: You are comfortable in a cloud-native environment. While your focus is the code, you understand how it interacts with Kubernetes, Docker, and hybrid cloud infrastructure.

  • Engineering Skills: Strong proficiency in Go, Python, or TypeScript. You should be capable of writing custom scripts, payloads, and proof-of-concept exploits.

  • Adversarial Mindset: You enjoy the "hunt" and have a proven track record of manual exploitation beyond automated scanners.

  • Communicator: You can translate a complex code-level exploit into a clear narrative that helps engineering teams understand risk and prioritize fixes.

Bonus Qualifications

  • Public recognition on platforms like HackerOne or Bugcrowd.

  • Experience building or extending AI-based security testing tools.

  • Background in incident response or detection engineering from the defensive side.

  • Published CVEs or security research in the cloud-native or AI space.

This is a full-time role that can be held from our Foster City, CA office. The role has an in-office requirement of Monday, Wednesday, and Friday.

Full-Time Employee Benefits Include:

💰 Competitive Salary & Equity

💹 401(k) Program with a 4% match

⚕️ Health, Dental, Vision and Life Insurance

🩼 Short Term and Long Term Disability

🚼 Paid Parental, Medical, Caregiver Leave

🚗 Commuter Benefits

📱 Monthly Wellness Stipend

🧑‍💻 Autonomous Work Environment

🖥 In Office Set-Up Reimbursement

🏝 Flexible Time Off (FTO) + Holidays

🚀 Quarterly Team Gatherings

☕ In Office Amenities

Want to learn more about what we are up to?

  • Meet the Replit Agent

  • Replit: Make an app for that

  • Replit Blog

  • Amjad TED Talk

Interviewing + Culture at Replit

  • Operating Principles

  • Reasons not to work at Replit

To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world. We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially candidates from underrepresented and non-traditional backgrounds.

Similar jobs

Found 6 similar jobs

Browse more jobs in: