<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>f2e93c37-5a0</externalid>
      <Title>Staff Software Engineer, Anti-Abuse &amp; Security</Title>
      <Description><![CDATA[<p>The Anti-Abuse team is the front line defending Replit&#39;s platform from exploitation. We detect and shut down phishing deployments, prevent cryptomining on free-tier infrastructure, stop LLM token farming, and keep bad actors from weaponizing the platform against our users.</p>
<p>This is adversarial work: attackers adapt constantly, and we build the detection systems, heuristics, and automated responses that stay ahead of them.</p>
<p>What makes this role unique is the AI-native nature of Replit&#39;s platform. You&#39;ll work on problems that barely exist elsewhere: building guardrails for AI-generated code, detecting prompt injection attacks at scale, and using LLMs as a defensive tool against abuse.</p>
<p>If you want hands-on experience applying AI to security problems, this is one of the few places you can do it in production with real attackers. You&#39;ll own problems end-to-end, from identifying emerging abuse patterns to shipping the systems that stop them at scale.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Design and implement LLM guardrails that detect abuse scenarios in AI-generated code and agent interactions</li>
<li>Build AI-powered detection systems that use LLMs to identify malicious patterns, classify threats, and automate response decisions</li>
<li>Build and operate abuse detection systems that identify phishing, cryptomining, account takeover, and financial fraud across millions of daily user actions</li>
<li>Design automated response mechanisms that enforce platform policies without manual intervention</li>
<li>Own the full abuse response lifecycle: detection, investigation, enforcement, and handling appeals alongside Support and Legal</li>
<li>Analyze attack patterns using BigQuery and Hex, turning investigation findings into new detection rules</li>
<li>Maintain and extend internal detection tools (Slurper, Netwatch) that continuously monitor user activity</li>
<li>Integrate and tune security scanners (SAST, SCA) in CI pipelines with tight performance SLAs</li>
<li>Track abuse trends, measure detection effectiveness, and adapt defenses as attack patterns evolve</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>8+ years of experience in security engineering, anti-abuse, trust &amp; safety, or fraud detection</li>
<li>Strong programming skills in Python and/or TypeScript for building detection systems and automation</li>
<li>Experience with SQL and data analysis at scale (BigQuery, Snowflake, or similar)</li>
<li>Experience building or fine-tuning ML/LLM-based classifiers for security or abuse detection</li>
<li>Familiarity with prompt injection, jailbreaking, and other LLM-specific attack vectors</li>
<li>Ability to investigate complex abuse patterns and translate findings into automated defenses</li>
<li>Familiarity with common attack patterns: phishing infrastructure, account takeover, credential stuffing, resource abuse</li>
<li>Clear communication skills for working across Security, Support, Legal, and Engineering teams</li>
</ul>
<p><strong>Nice to Have</strong></p>
<ul>
<li>Experience at a platform company dealing with user-generated content or compute abuse (hosting providers, cloud platforms, developer tools)</li>
<li>Background in fraud detection, payment abuse, or financial crime</li>
<li>Familiarity with device fingerprinting, IP reputation, and email validation services</li>
<li>Experience with CI/CD security tooling (SAST, SCA, Dependabot, Snyk)</li>
<li>Knowledge of container security, Linux internals, or cloud infrastructure (GCP preferred)</li>
<li>Prior work with abuse reporting pipelines, trust &amp; safety tooling, or content moderation systems</li>
</ul>
<p><strong>Tools + Tech Stack for this role</strong></p>
<ul>
<li>Languages: Python, TypeScript, Go, SQL</li>
<li>Data: BigQuery, Hex</li>
<li>Detection tools: Slurper, Netwatch, Stytch (device fingerprint); ClearOut (email reputation)</li>
<li>CI/CD Security: Dependabot, Snyk, SAST/SCA scanners</li>
<li>Infrastructure: GCP, Kubernetes</li>
<li>Collaboration: Linear, Slack, Zendesk (for abuse reports)</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>Full time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$190K - $240K</Salaryrange>
      <Skills>security engineering, anti-abuse, trust &amp; safety, fraud detection, Python, TypeScript, SQL, BigQuery, Hex, ML/LLM-based classifiers, prompt injection, jailbreaking, common attack patterns, phishing infrastructure, account takeover, credential stuffing, resource abuse, payment abuse, financial crime, device fingerprinting, IP reputation, email validation services, CI/CD security tooling, container security, Linux internals, cloud infrastructure, abuse reporting pipelines, trust &amp; safety tooling, content moderation systems</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Replit</Employername>
      <Employerlogo>https://logos.yubhub.co/replit.com.png</Employerlogo>
      <Employerdescription>Replit is an agentic software creation platform that enables anyone to build applications using natural language. It has millions of users worldwide.</Employerdescription>
      <Employerwebsite>https://replit.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ashbyhq.com/replit/75e69146-a092-43a1-b1d6-023d433d3ae7</Applyto>
      <Location>Foster City, CA (Hybrid) In office M,W,F</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>138b24e2-2bd</externalid>
      <Title>Senior Software Engineer, Anti-Abuse &amp; Security</Title>
      <Description><![CDATA[<p>Rewrite this job ad in your own words, matching the tone of voice of the original. Reuse the same section headings from the original ad (e.g. if the ad says &quot;Responsibilities&quot;, use that heading, not &quot;What you&#39;ll do&quot;).</p>
<p>Start with an opening paragraph (no heading): what the role is, who the company is, why it matters. If the ad mentions salary, include it here.</p>
<p>Rephrase bullet points in your own words while keeping the factual content. Combine related points where it makes sense.</p>
<p>For benefits/perks: gather them from anywhere in the ad into one section. If the ad mentions nothing about benefits, omit a benefits section entirely.</p>
<p>Do not invent information that is not in the original ad.</p>
<p><strong>About the role</strong> The Anti-Abuse team is the front line defending Replit&#39;s platform from exploitation. We detect and shut down phishing deployments, prevent cryptomining on free-tier infrastructure, stop LLM token farming, and keep bad actors from weaponizing the platform against our users. This is adversarial work: attackers adapt constantly, and we build the detection systems, heuristics, and automated responses that stay ahead of them.</p>
<p>What makes this role unique is the AI-native nature of Replit&#39;s platform. You&#39;ll work on problems that barely exist elsewhere: building guardrails for AI-generated code, detecting prompt injection attacks at scale, and using LLMs as a defensive tool against abuse. If you want hands-on experience applying AI to security problems, this is one of the few places you can do it in production with real attackers. You&#39;ll own problems end-to-end, from identifying emerging abuse patterns to shipping the systems that stop them at scale.</p>
<p><strong>In this role you will…</strong></p>
<ul>
<li>Design and implement LLM guardrails that detect abuse scenarios in AI-generated code and agent interactions</li>
<li>Build AI-powered detection systems that use LLMs to identify malicious patterns, classify threats, and automate response decisions</li>
<li>Build and operate abuse detection systems that identify phishing, cryptomining, account takeover, and financial fraud across millions of daily user actions</li>
<li>Design automated response mechanisms that enforce platform policies without manual intervention</li>
<li>Own the full abuse response lifecycle: detection, investigation, enforcement, and handling appeals alongside Support and Legal</li>
<li>Analyze attack patterns using BigQuery and Hex, turning investigation findings into new detection rules</li>
<li>Maintain and extend internal detection tools (Slurper, Netwatch) that continuously monitor user activity</li>
<li>Integrate and tune security scanners (SAST, SCA) in CI pipelines with tight performance SLAs</li>
<li>Track abuse trends, measure detection effectiveness, and adapt defenses as attack patterns evolve</li>
</ul>
<p><strong>Required skills and experience:</strong></p>
<ul>
<li>4+ years of experience in security engineering, anti-abuse, trust &amp; safety, or fraud detection</li>
<li>Strong programming skills in Python and/or TypeScript for building detection systems and automation</li>
<li>Experience with SQL and data analysis at scale (BigQuery, Snowflake, or similar)</li>
<li>Experience building or fine-tuning ML/LLM-based classifiers for security or abuse detection</li>
<li>Familiarity with prompt injection, jailbreaking, and other LLM-specific attack vectors</li>
<li>Ability to investigate complex abuse patterns and translate findings into automated defenses</li>
<li>Familiarity with common attack patterns: phishing infrastructure, account takeover, credential stuffing, resource abuse</li>
<li>Clear communication skills for working across Security, Support, Legal, and Engineering teams.</li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li>Experience at a platform company dealing with user-generated content or compute abuse (hosting providers, cloud platforms, developer tools)</li>
<li>Background in fraud detection, payment abuse, or financial crime</li>
<li>Familiarity with device fingerprinting, IP reputation, and email validation services</li>
<li>Experience with CI/CD security tooling (SAST, SCA, Dependabot, Snyk)</li>
<li>Knowledge of container security, Linux internals, or cloud infrastructure (GCP preferred)</li>
<li>Prior work with abuse reporting pipelines, trust &amp; safety tooling, or content moderation systems</li>
</ul>
<p><strong>Tools + Tech Stack for this role</strong></p>
<ul>
<li><strong>Languages:</strong> Python, TypeScript, Go, SQL</li>
<li><strong>Data:</strong> BigQuery, Hex</li>
<li><strong>Detection tools:</strong> Slurper, Netwatch, Stytch (device fingerprint); ClearOut (email reputation)</li>
<li><strong>CI/CD Security: Dependabot, Snyk, SAST/SCA scanners</strong></li>
<li><strong>Infrastructure: GCP, Kubernetes</strong></li>
<li><strong>Collaboration: Linear, Slack, Zendesk (for abuse reports)</strong></li>
</ul>
<p><strong>This role may</strong> _<strong>not</strong>_ <strong>be a fit if</strong></p>
<ul>
<li>You prefer deep security research over building operational detection systems</li>
<li>You want to focus on vulnerability management, pentesting, or bug bounty triage (that&#39;s our Security team)</li>
<li>You&#39;re looking for a role with predictable, well-defined problems rather than constantly adapting to adversarial behavior</li>
<li>You prefer working in isolation rather than partnering closely with Support, Legal, and cross-functional teams</li>
<li>You&#39;re uncomfortable making enforcement decisions that affect real users</li>
</ul>
<p>_This is a full-time role that can be held from our Foster City, CA office. The role has an in-office requirement of Monday, Wednesday, and Friday._</p>
<p><strong>Full-Time Employee Benefits Include:</strong> 💰 Competitive Salary &amp; Equity 💹 401(k) Program with a 4% match ⚕️ Health, Dental, Vision and Life Insurance 🩼 Short Term and Long Term Disability 🚼 Paid Parental, Medical, Caregiver Leave 🚗 Commuter Benefits 📱 Monthly Wellness Stipend 🧑‍💻 Autonomous Work Environment 🖥 In Office Set-Up Reimbursement 🏝 Flexible Time Off (FTO) + Holidays 🚀 Quarterly Team Gatherings ☕ In Office Amenities</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$190K – $240K</Salaryrange>
      <Skills>security engineering, anti-abuse, trust &amp; safety, fraud detection, Python, TypeScript, SQL, BigQuery, Hex, ML/LLM-based classifiers, prompt injection, jailbreaking, common attack patterns, phishing infrastructure, account takeover, credential stuffing, resource abuse, experience at a platform company, fraud detection, payment abuse, financial crime, device fingerprinting, IP reputation, email validation services, CI/CD security tooling, container security, Linux internals, cloud infrastructure</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Replit</Employername>
      <Employerlogo>https://logos.yubhub.co/replit.com.png</Employerlogo>
      <Employerdescription>Replit is a software creation platform that enables anyone to build applications using natural language. With millions of users worldwide, Replit is democratizing software development by removing traditional barriers to application creation.</Employerdescription>
      <Employerwebsite>https://jobs.ashbyhq.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ashbyhq.com/replit/5bdadf61-7955-46e8-8fdf-bd69818358b7</Applyto>
      <Location>Foster City, CA</Location>
      <Country></Country>
      <Postedate>2026-03-07</Postedate>
    </job>
  </jobs>
</source>