Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Conducts ISO audits and compliance assessments to verify organizational adherence to security and quality standards.
Monitors and defends against cyber threats, analyzes security incidents, and implements defensive measures to protect organizational assets.
Develops and implements cybersecurity solutions, manages security infrastructure, and responds to threats to protect organizational systems.
Leads field security strategy and operations, manages security team initiatives, and ensures compliance across distributed locations.
Designs, implements, and maintains security controls across cloud environments to protect mission-critical systems.
Performs penetration testing on networks, web applications, and APIs to identify vulnerabilities and advises clients on security best practices.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Proactively hunts advanced threats by analyzing telemetry across endpoints, networks, and cloud environments to identify stealthy adversary activity and reduce dwell time.
Manages cyber security improvement initiatives end-to-end, leading stakeholder engagement and resource planning to strengthen organizational security posture and capabilities.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Develops and implements security practices for applications within a DevOps environment supporting Department of Justice software programs.
Designs and implements secure web systems and infrastructure, managing security architecture for enterprise applications.
Builds and shapes security and compliance programs at a fast-scaling healthtech platform, establishing protocols and frameworks from the ground up.
Designs and operates security systems, manages access control and compliance frameworks, and drives risk management across the organization.
Cyber Advisor assesses customer security posture after cyber incidents and implements technical hardening controls across cloud and on-premise infrastructure to reduce future risk.
Build and shape security and compliance programs at a scaling healthtech platform, reporting to the Senior Manager of IT & Security.
Analyzes content for security vulnerabilities using pattern recognition and classification techniques in an AI context.
VP-level DevSecOps engineer designs and operates secure cloud infrastructure, CI/CD pipelines, and Kubernetes environments while leading security best practices across platform infrastructure teams.
Executes forensic analyses, restores data, and prepares investigation results for legal proceedings.
Designs, develops, and maintains security software solutions to protect banking systems and infrastructure from cyber threats.