Staff Software Engineer, Enterprise Platform

Replit Replit · Enterprise · Foster City, CA · Hybrid · Engineering

Staff Software Engineer, Enterprise Platform at Replit, focusing on building infrastructure for large organizations to run Replit within their security and compliance boundaries. This involves designing and implementing deployment flexibility, networking, authorization, and data controls.

What you'd actually do

  1. Build enterprise deployment infrastructure: Design and implement single-tenant and dedicated deployment options, enabling customers to run Replit with the isolation guarantees their security posture requires.
  2. Implement private networking capabilities: Build VPC peering, private connectivity, and static IP configurations that allow enterprises to integrate Replit into their existing network architectures.
  3. Design authorization services: Build the authorization infrastructure that enforces custom enterprise policies; enabling fine-grained access controls, custom permission models, and policy enforcement that integrates with customers' existing identity and governance systems.
  4. Ship data protection features: Implement bring-your-own-key (BYOK) encryption, customer-managed keys, and data residency controls that give enterprises ownership over their most sensitive data.
  5. Develop infrastructure automation: Write Terraform modules and automation that enable reliable, repeatable enterprise deployments across regions and configurations.

Skills

Required

  • 7+ years of experience in Infrastructure Engineering, Platform Engineering, or similar roles.
  • Strong programming skills in Go, Typescript or Python; you write high-quality, well-tested code.
  • Experience with Kubernetes and cloud-native technologies in production environments.
  • Solid understanding of cloud networking: VPCs, peering, private connectivity, load balancers, DNS.
  • Experience with infrastructure as code (Terraform) and configuration management.
  • Familiarity with authentication and authorization systems: OAuth/OIDC, RBAC/ABAC models, policy enforcement.
  • Familiarity with security and encryption fundamentals: TLS, encryption at rest, key management concepts.
  • Strong debugging skills with an ability to trace issues across distributed systems.
  • Excellent written communication; you can explain technical tradeoffs clearly to both engineers and non-technical stakeholders.

Nice to have

  • Experience with Google Cloud Platform (GCP) services, networking, and IAM.
  • Experience building multi-tenant or single-tenant SaaS infrastructure.
  • Familiarity with enterprise compliance frameworks (SOC 2, FedRAMP, HIPAA) and how they translate to infrastructure requirements.
  • Experience with customer-managed encryption keys (CMEK/BYOK) implementations.
  • Background in developer platforms, cloud IDEs, or developer productivity products.

What the JD emphasized

  • security and compliance boundaries
  • single-tenant architectures
  • private connectivity
  • custom policy enforcement
  • customer-managed encryption
  • security posture
  • existing network architectures
  • existing identity and governance systems
  • customer-managed encryption keys (CMEK/BYOK) implementations