Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Executes forensic analyses, restores data, and prepares investigation results for legal proceedings.
CSIRT engineer manages security threats across OVO's digital infrastructure, handling incident response and detection engineering while mentoring junior analysts.
Manages security controls, ensures ISO27001 & SOC 2 compliance, and handles customer security questionnaires and vendor assessments.
Tracks adversaries and produces original threat intelligence reports that inform the platform and drive business growth across multiple channels.
Produces original threat intelligence and research reports by tracking adversaries, monitoring underground forums, and translating technical findings for enterprise buyers.
Monitor and investigate security alerts across SIEM/EDR platforms, triage incidents, and respond to threats while using AI-driven tools to enhance detection and response workflows.
Manages technology risk and controls across IT operations, conducting audits and ensuring compliance with internal policies and regulatory standards.
Administers industrial security programs including personnel processing, compliance audits, investigations, and security training to meet DoD and NISPOM requirements.
Develops and optimizes SQL-based transaction monitoring rules to detect suspicious financial activities while collaborating with compliance and risk teams.
Deploys and operates security controls across cloud infrastructure, endpoints, networks, and data systems with emphasis on automation and Infrastructure as Code.
Manages security operations, incident response, vulnerability programs, and access controls across on-premises and cloud environments.
Manages identity and access management platforms, automates provisioning workflows, and integrates AI tools to secure cloud-native infrastructure.
IAM Engineer manages identity platforms and cloud-native security controls while automating workflows and integrating AI tools for identity ecosystem protection.
Enterprise Security Engineer develops and implements security controls strategies across multiple domains while leveraging automation and AI to reduce risk at enterprise scale.
Designs and manages identity ecosystems across cloud-native platforms, automates IAM workflows with scripting and AI tools, and implements security controls at scale.
IAM engineer manages identity platforms and cloud-native security infrastructure, automating workflows with scripting and AI tools to protect user identities at scale.
Designs and manages identity ecosystems across cloud-native platforms, automates IAM workflows with Python/Bash, and leverages AI tools to enhance security operations at scale.
Enterprise Security Engineer develops and implements security controls strategies, manages zero trust architectures, and automates enterprise-wide security solutions across multiple domains.
Audits smart contracts and blockchain code for security vulnerabilities and compliance issues.
Designs and implements cybersecurity measures to protect operational technology (OT) environments, manages legacy system modernization, and ensures compliance with security protocols across manufacturing facilities.