<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>9bf55fe3-b2b</externalid>
      <Title>Detection &amp; Response Engineer</Title>
      <Description><![CDATA[<p>We are seeking a skilled and proactive Detection &amp; Response Engineer to join our security team. In this critical role, you will be responsible for detecting, investigating, and responding to security incidents across our cloud-native and AI-focused infrastructure.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Monitor and analyse security alerts and logs to identify potential threats and anomalies</li>
<li>Develop, implement, and maintain detection rules and correlation logic in our SIEM platform</li>
<li>Conduct thorough investigations of security incidents, performing root cause analysis and impact assessments</li>
<li>Lead incident response efforts, coordinating with relevant teams to contain and mitigate threats</li>
<li>Create and maintain incident response playbooks and runbooks</li>
<li>Perform regular threat hunting activities to proactively identify potential security risks</li>
<li>Develop and refine metrics and reporting to track the effectiveness of detection and response capabilities</li>
<li>Collaborate with other security teams to improve overall security posture and incident handling processes</li>
<li>Stay current with emerging threats, attack techniques, and defensive strategies in the cloud-native and AI domains</li>
</ul>
<p><strong>Basic Qualifications</strong></p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Cybersecurity, or a related field</li>
<li>3-5 years of experience in security operations, incident response, or a similar role</li>
<li>Strong understanding of cybersecurity principles, attack techniques, and defensive strategies</li>
<li>Proficiency in at least one scripting language (e.g., Python, Rust) for automation and tool development</li>
<li>Experience with SIEM platforms and log analysis tools</li>
<li>Familiarity with cloud environments (e.g., AWS, GCP, Azure) and their security features</li>
<li>Knowledge of network protocols, system administration, and common attack vectors</li>
<li>Strong analytical and problem-solving skills with attention to detail</li>
<li>Excellent communication skills and ability to work effectively under pressure</li>
</ul>
<p><strong>Preferred Skills and Experience</strong></p>
<ul>
<li>Relevant security certifications (e.g., GCIH, GCIA, SANS)</li>
<li>Experience with threat intelligence platforms and their integration into detection processes</li>
<li>Familiarity with AI/ML security implications, particularly those outlined in the OWASP LLM Top 10</li>
<li>Knowledge of software supply chain security and SBOM analysis</li>
<li>Experience with containerized environments and Kubernetes security</li>
<li>Experience in building custom security tools or integrations to enhance detection and response capabilities</li>
<li>Interest in leveraging AI to improve threat detection and automate response processes</li>
<li>Contributions to open-source security projects or threat research</li>
<li>Experience with digital forensics and malware analysis</li>
</ul>
<p><strong>Compensation and Benefits</strong></p>
<p>$200,000 - $340,000 USD</p>
<p>Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short &amp; long-term disability insurance, life insurance, and various other discounts and perks.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$200,000 - $340,000 USD</Salaryrange>
      <Skills>cybersecurity principles, attack techniques, defensive strategies, scripting language, SIEM platforms, log analysis tools, cloud environments, network protocols, system administration, common attack vectors, relevant security certifications, threat intelligence platforms, AI/ML security implications, software supply chain security, containerized environments, Kubernetes security, custom security tools, digital forensics, malware analysis</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>xAI</Employername>
      <Employerlogo>https://logos.yubhub.co/xai.com.png</Employerlogo>
      <Employerdescription>xAI€’s mission is to create AI systems that aid humanity in its pursuit of knowledge. The organisation is small and highly motivated.</Employerdescription>
      <Employerwebsite>https://www.xai.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/xai/jobs/4559148007</Applyto>
      <Location>Palo Alto, CA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>eeeb517e-3c5</externalid>
      <Title>Staff Security Engineer, Infrastructure</Title>
      <Description><![CDATA[<p>We&#39;re looking for a Staff Security Engineer, Infrastructure to secure the core systems that power our platform: GPU compute, multi-cloud environments, networking, and data pipelines. You&#39;ll operate across the full stack, from cloud and Kubernetes to identity, networking, and secrets, designing and implementing security controls that scale with a high-performance AI platform.</p>
<p>This role is highly hands-on and systems-oriented, sitting at the intersection of security, infrastructure, and distributed systems.</p>
<p>Your primary responsibilities will be to:</p>
<ul>
<li>Build and harden infrastructure security by designing and implementing security controls across cloud infrastructure, Kubernetes and containerized workloads, networking, service meshes, and edge systems, CI/CD pipelines and deployment systems, and secure compute environments for GPU workloads and model execution.</li>
<li>Implement identity, secrets, and access controls, including machine identity and workload authentication, secrets management and encryption, least-privilege access, and short-lived credentials.</li>
<li>Protect model weights, inference endpoints, and customer data, design secure data access pathways and isolation mechanisms, and ensure safe multi-tenant execution environments.</li>
<li>Automate security guardrails directly into infrastructure and CI/CD, use Infrastructure-as-Code to enforce secure defaults, and continuously identify and remediate security gaps through automation.</li>
<li>Identify and mitigate risks across infrastructure layers, defend against both external attackers and insider threats, and drive projects like network isolation, encryption, and secure service communication.</li>
</ul>
<p>To succeed in this role, you&#39;ll need to have:</p>
<ul>
<li>8+ years in security engineering, infrastructure, or SRE.</li>
<li>Strong understanding of cloud security, networking fundamentals, Linux systems, and container security.</li>
<li>Experience building or securing production infrastructure at scale.</li>
<li>Deep knowledge of authentication and authorization systems, secrets management and cryptography basics, common vulnerabilities and attack vectors, and ability to design security controls across multiple layers.</li>
<li>Proficiency in at least one language, experience with Infrastructure-as-Code, and strong automation mindset.</li>
</ul>
<p>Nice to have experience with GPU infrastructure, multi-tenant platform isolation, service mesh architectures, and high-growth startup environments.</p>
<p>What makes this role unique is that you&#39;ll work on cutting-edge AI infrastructure security, secure GPU clusters, model execution, and real-time inference systems, have high ownership, and direct impact on developer trust and platform reliability.</p>
<p>Our security philosophy is to enable developers, automate everything, assume breach, and design for resilience.</p>
<p>In terms of compensation and benefits, we offer competitive salary, equity, full health, dental, and vision coverage, and opportunity to work on frontier AI infrastructure.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>cloud security, networking fundamentals, Linux systems, container security, Infrastructure-as-Code, authentication and authorization systems, secrets management and cryptography basics, common vulnerabilities and attack vectors, GPU infrastructure, multi-tenant platform isolation, service mesh architectures, high-growth startup environments</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>fal.ai</Employername>
      <Employerlogo>https://logos.yubhub.co/fal.ai.png</Employerlogo>
      <Employerdescription>fal.ai is a company that develops AI infrastructure.</Employerdescription>
      <Employerwebsite>https://fal.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/fal/jobs/4200560009</Applyto>
      <Location>San Francisco</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>b313e462-e65</externalid>
      <Title>Security Operations Engineer - Engine by Starling</Title>
      <Description><![CDATA[<p>At Engine by Starling, we are on a mission to find and work with leading banks all around the world who have the ambition to build rapid growth businesses, on our technology.</p>
<p>Engine is Starling&#39;s software-as-a-service (SaaS) business, the technology that was built to power Starling, and two years ago we split out as a separate business. Starling has seen exceptional growth and success, and a large part of that is down to the fact that we have built our own modern technology from the ground up.</p>
<p>This SaaS technology platform is now available to banks and financial institutions all around the world, enabling them to benefit from the innovative digital features, and efficient back-office processes that has helped achieve Starling&#39;s success.</p>
<p>As a company, everyone is expected to roll up their sleeves to help deliver great outcomes for our clients. We are an engineering led company and we’re looking for people who are will be excited by the potential for Engine’s technology to transform banking in different markets around the world.</p>
<p>Our purpose is underpinned by five values: Listen, Keep It Simple, Do The Right Thing, Own It, and Aim For Greatness.</p>
<p>Hybrid Working We have a Hybrid approach to working here at Engine - our preference is that you&#39;re located within a commutable distance of one of our offices so that we&#39;re able to interact and collaborate in person.</p>
<p>About the Role To support our growth, we are looking for talented and motivated SOC engineers to join our foundational in-house SOC team.</p>
<p>In this pivotal role, you will be instrumental in supporting the development, implementation, and operating of our security monitoring, detection, and response capabilities, with a particular focus on our cloud environments.</p>
<p>You&#39;ll be at the forefront of responding to incidents and alerts, and helping shape the future of our security operations capabilities.</p>
<p>What you&#39;ll get to do:</p>
<p>Security Monitoring &amp; Alert Triage: Monitor security alerts and events generated by various security tools, perform triage and analysis of security incidents and anomalies, distinguishing between true positives and false positives.</p>
<p>Prioritise alerts based on severity, potential impact, and business criticality.</p>
<p>Incident Detection &amp; Response: Investigate security incidents thoroughly, leveraging logs from platforms, endpoints, applications, and other security tools.</p>
<p>Create and follow incident response playbooks and contribute to their continuous improvement.</p>
<p>Collaborate with Technology, Product and Engineering Teams to contain, eradicate, and recover from security incidents.</p>
<p>Document incident details, findings, and remediation steps accurately and comprehensively.</p>
<p>Additionally:</p>
<p>Stay informed about the latest cyber threats, attack techniques, and vulnerabilities, especially those targeting cloud environments.</p>
<p>Participate in proactive threat hunting activities using available tools and data sources.</p>
<p>Contribute to the optimisation, tuning, and maintenance of SOC tools.</p>
<p>Identify opportunities for automation to streamline security operations and enhance detection capabilities.</p>
<p>Maintain detailed records of security incidents, investigations, and remediation actions.</p>
<p>Requirements:</p>
<p>3+ years of hands-on experience in a Security Operations Center (SOC) or similar cybersecurity role.</p>
<p>Demonstrable experience with cloud security monitoring and incident response.</p>
<p>Familiarity with various attack vectors, threat intelligence frameworks (e.g., MITRE ATT&amp;CK).</p>
<p>A cyber/information security related degree and/or relevant cybersecurity qualifications would be beneficial e.g. CompTIA Security+, (ISC)² SSCP or CySA+</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Cloud security monitoring, Incident response, Threat intelligence, Attack vectors, Cybersecurity, Security operations center, SOC</Skills>
      <Category>Engineering</Category>
      <Industry>Finance</Industry>
      <Employername>Engine by Starling</Employername>
      <Employerlogo>https://logos.yubhub.co/starlingbank.com.png</Employerlogo>
      <Employerdescription>Engine by Starling is a software-as-a-service (SaaS) business that provides technology to banks and financial institutions.</Employerdescription>
      <Employerwebsite>https://www.starlingbank.com/engine/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://apply.workable.com/j/BDF61CB32E</Applyto>
      <Location>Cardiff</Location>
      <Country></Country>
      <Postedate>2026-03-20</Postedate>
    </job>
    <job>
      <externalid>f940647d-c39</externalid>
      <Title>SOC Engineer</Title>
      <Description><![CDATA[<p>We are looking for a SOC Engineer to join our Security Operations team and help defend a fast-moving, cloud-native AI vibe-coding platform. In this role, you will stay on top of emerging threats—from 0-days and active exploitation campaigns to bug bounty findings and customer-reported issues—and rapidly determine their relevance and potential impact to Replit.</p>
<p>This is a hands-on, investigative role requiring strong technical depth, understanding of modern software engineering and CI/CD systems, familiarity with cloud-native infrastructure (especially GCP), and the ability to work across multiple teams in a fast-paced environment.</p>
<p><strong>Responsibilities</strong></p>
<p><strong>Threat Awareness &amp; Rapid Assessment</strong></p>
<ul>
<li>Continuously monitor emerging threats, including bad actor activity, 0-day vulnerabilities, public exploitation campaigns, bug bounty reports, and customer-reported security issues</li>
</ul>
<ul>
<li>Quickly assess the applicability of these threats to Replit’s cloud infrastructure, SaaS services, internal tooling, and platform components.</li>
</ul>
<p><strong>Investigation &amp; Impact Analysis</strong></p>
<ul>
<li>Conduct targeted investigations to determine whether Replit is already impacted by a newly discovered threat, vulnerability, or exploit.</li>
</ul>
<ul>
<li>Analyze logs, telemetry, and system behaviors using SIEM, metrics, Cloud Logging, and related tools.</li>
</ul>
<ul>
<li>Identify gaps or weaknesses in existing detection or visibility and propose improvements.</li>
</ul>
<p><strong>Containment, Mitigation &amp; Cross-Team Collaboration</strong></p>
<ul>
<li>Research potential impact paths and develop mitigation strategies for confirmed or applicable threats.</li>
</ul>
<ul>
<li>Partner closely with Security, SRE, and Engineering teams to coordinate and implement containment, patches, configuration updates, or code-level fixes.</li>
</ul>
<ul>
<li>Document findings, mitigations, and follow-up actions clearly for internal teams.</li>
</ul>
<p><strong>Required Skills &amp; Experience</strong></p>
<ul>
<li>Strong understanding of software engineering fundamentals, including code structure, build systems, dependencies, and package ecosystems—enabling effective partnership with Engineering teams.</li>
</ul>
<ul>
<li>Understanding of CI/CD pipelines and DevOps workflows, enabling collaboration with Infrastructure and DevOps teams.</li>
</ul>
<ul>
<li>Solid knowledge of cloud architecture, especially Google Cloud Platform (GCP) services used in modern cloud-native deployments.</li>
</ul>
<ul>
<li>Familiarity with SaaS architectures, identity systems, and integration patterns for effective collaboration with Cloud Security teams.</li>
</ul>
<ul>
<li>Hands-on experience with SIEM, Cloud Logging, and log-based investigation workflows.</li>
</ul>
<ul>
<li>Ability to perform investigations using log data, behavioral indicators, and threat intelligence.</li>
</ul>
<ul>
<li>General understanding of vulnerability lifecycles, exploitability analysis, and common attack vectors.</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>Experience with threat intelligence, security research, or vulnerability analysis.</li>
</ul>
<ul>
<li>Familiarity with Kubernetes, containers, serverless infrastructure, or modern distributed systems.</li>
</ul>
<ul>
<li>Ability to write scripts or small tools for investigation or automation (Python, Go, Bash).</li>
</ul>
<ul>
<li>Experience working with bug bounty programs or coordinated vulnerability disclosure workflows.</li>
</ul>
<ul>
<li>Experience in fast-paced, cloud-native, or AI/ML-driven environments.</li>
</ul>
<p><strong>What We Value</strong></p>
<ul>
<li>Curiosity &amp; initiative: Strong desire to understand attacker behaviors, emerging threats, and how they apply to real-world systems.</li>
</ul>
<ul>
<li>Speed &amp; analytical rigor: Ability to quickly assess high-risk vulnerabilities with clear, evidence-based reasoning.</li>
</ul>
<ul>
<li>Collaboration: Comfort working across cross-functional teams spanning Security, SRE, Engineering, and Infrastructure.</li>
</ul>
<ul>
<li>Clear communication: Ability to explain findings, risks, and mitigation strategies to stakeholders at all levels.</li>
</ul>
<ul>
<li>Ownership mindset: Takes initiative to drive investigations, improvements, and remediations to completion</li>
</ul>
<ul>
<li>Continuous learning: Passion for staying up to date on new vulnerabilities, exploit trends, and cloud-native security best practices.</li>
</ul>
<p><strong>Full-Time Employee Benefits Include:</strong></p>
<p>💰 Competitive Salary &amp; Equity</p>
<p>💹 401(k) Program with a 4% match</p>
<p>⚕️ Health, Dental, Vision and Life Insurance</p>
<p>🩼 Short Term and Long Term Disability</p>
<p>🚼 Paid Parental, Medical, Caregiver Leave</p>
<p>🚗 Commuter Benefits</p>
<p>📱 Monthly Wellness Stipend</p>
<p>🧑‍💻 Autonomous Work Environment</p>
<p>🖥 In Office Set-Up Reimbursement</p>
<p>🏝 Flexible Time Off (FTO) + Holidays</p>
<p>🚀 Quarterly Team Gatherings</p>
<p>☕ In Office Amenities</p>
<p><strong>Want to learn more about what we are up to?</strong></p>
<ul>
<li>Meet the Replit Agent</li>
</ul>
<ul>
<li>Replit: Make an app for that</li>
</ul>
<ul>
<li>Replit Blog</li>
</ul>
<ul>
<li>Amjad TED Talk</li>
</ul>
<p><strong>Interviewing + Culture at Replit</strong></p>
<ul>
<li>Operating Principles</li>
</ul>
<ul>
<li>Reasons not to work at Replit</li>
</ul>
<p>To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world. We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$180K – $250K</Salaryrange>
      <Skills>software engineering fundamentals, CI/CD systems, cloud-native infrastructure, GCP services, SaaS architectures, identity systems, integration patterns, SIEM, Cloud Logging, log-based investigation workflows, vulnerability lifecycles, exploitability analysis, common attack vectors, threat intelligence, security research, vulnerability analysis, Kubernetes, containers, serverless infrastructure, modern distributed systems, Python, Go, Bash, bug bounty programs, coordinated vulnerability disclosure workflows, fast-paced, cloud-native, AI/ML-driven environments</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Replit</Employername>
      <Employerlogo>https://logos.yubhub.co/replit.com.png</Employerlogo>
      <Employerdescription>Replit is a software creation platform that enables anyone to build applications using natural language. With millions of users worldwide, Replit is a leading provider of cloud-native AI vibe-coding platforms.</Employerdescription>
      <Employerwebsite>https://jobs.ashbyhq.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ashbyhq.com/replit/54051fe0-045f-46b1-a2b8-a730575b05eb</Applyto>
      <Location>Foster City, CA</Location>
      <Country></Country>
      <Postedate>2026-03-07</Postedate>
    </job>
  </jobs>
</source>