Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Leads field security strategy and operations, manages security team initiatives, and ensures compliance across distributed locations.
Designs, implements, and maintains security controls across cloud environments to protect mission-critical systems.
Performs penetration testing on networks, web applications, and APIs to identify vulnerabilities and advises clients on security best practices.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Proactively hunts advanced threats by analyzing telemetry across endpoints, networks, and cloud environments to identify stealthy adversary activity and reduce dwell time.
Manages cyber security improvement initiatives end-to-end, leading stakeholder engagement and resource planning to strengthen organizational security posture and capabilities.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Develops and implements security practices for applications within a DevOps environment supporting Department of Justice software programs.
Designs and implements secure web systems and infrastructure, managing security architecture for enterprise applications.
Builds and shapes security and compliance programs at a fast-scaling healthtech platform, establishing protocols and frameworks from the ground up.
Designs and operates security systems, manages access control and compliance frameworks, and drives risk management across the organization.
Cyber Advisor assesses customer security posture after cyber incidents and implements technical hardening controls across cloud and on-premise infrastructure to reduce future risk.
Build and shape security and compliance programs at a scaling healthtech platform, reporting to the Senior Manager of IT & Security.
Analyzes content for security vulnerabilities using pattern recognition and classification techniques in an AI context.
VP-level DevSecOps engineer designs and operates secure cloud infrastructure, CI/CD pipelines, and Kubernetes environments while leading security best practices across platform infrastructure teams.
Executes forensic analyses, restores data, and prepares investigation results for legal proceedings.
Designs, develops, and maintains security software solutions to protect banking systems and infrastructure from cyber threats.
Designs, implements, and maintains network security infrastructure and protocols to protect organizational systems and data from threats.
Senior security practitioner administers enterprise security platforms, responds to incidents, manages compliance, and improves security operations across multiple domains.
CSIRT engineer manages security threats across OVO's digital infrastructure, handling incident response and detection engineering while mentoring junior analysts.