Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Develops and manages identity and access management systems and policies within a healthcare organization's information security department.
Senior security engineer leads SOC design, threat detection, incident response, and mentors junior analysts while optimizing security monitoring across cloud environments.
Staff Infrastructure Engineer owns and operates corporate identity, endpoint, collaboration, and AI workflow systems, reporting to the CISO with direct responsibility for IT operations and security infrastructure.
Secures AWS production environments by monitoring threats, responding to incidents, automating defenses, and building resilient infrastructure alongside engineering teams.
Conducts ISO audits and compliance assessments to verify organizational adherence to security and quality standards.
Monitors and defends against cyber threats, analyzes security incidents, and implements defensive measures to protect organizational assets.
Develops and implements cybersecurity solutions, manages security infrastructure, and responds to threats to protect organizational systems.
Leads field security strategy and operations, manages security team initiatives, and ensures compliance across distributed locations.
Designs, implements, and maintains security controls across cloud environments to protect mission-critical systems.
Performs penetration testing on networks, web applications, and APIs to identify vulnerabilities and advises clients on security best practices.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Proactively hunts advanced threats by analyzing telemetry across endpoints, networks, and cloud environments to identify stealthy adversary activity and reduce dwell time.
Manages cyber security improvement initiatives end-to-end, leading stakeholder engagement and resource planning to strengthen organizational security posture and capabilities.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Develops and implements security practices for applications within a DevOps environment supporting Department of Justice software programs.
Designs and implements secure web systems and infrastructure, managing security architecture for enterprise applications.
Builds and shapes security and compliance programs at a fast-scaling healthtech platform, establishing protocols and frameworks from the ground up.
Designs and operates security systems, manages access control and compliance frameworks, and drives risk management across the organization.
Cyber Advisor assesses customer security posture after cyber incidents and implements technical hardening controls across cloud and on-premise infrastructure to reduce future risk.
Build and shape security and compliance programs at a scaling healthtech platform, reporting to the Senior Manager of IT & Security.