Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Cloud Security Engineer designs, implements, and maintains security infrastructure and protocols for cloud-based systems at a fintech platform.
Designs and implements web security systems while providing consultancy on defense strategies against security attacks.
Analyzes security threats and detects anomalies as part of a threat intelligence team using AI-powered detection systems.
Leads CMMC compliance initiatives for DoD contractors by developing policies, writing security documentation, and managing audit-ready evidence across multiple client engagements.
Senior Manager leads security initiatives, manages GenAI security governance and architecture, oversees incident response and vulnerability management.
Conducts authorized penetration tests against Azure and Microsoft 365 environments to identify security weaknesses and validate remediation effectiveness.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, including firmware reverse engineering and hardware analysis.
Executes risk assessments and manages the risk intake process, identifying threats and evaluating controls to reduce enterprise uncertainty.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, performing firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and identifies emerging security threats to reduce organizational uncertainty and drive risk governance.
Conducts hands-on penetration testing and security assessments of IoT devices, industrial control systems, and automotive platforms, including firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and maintains the enterprise risk register to provide leadership with quantified visibility into organizational risks.
Designs and implements security detection and response systems to identify and mitigate threats across the organization's infrastructure.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, establishing security standards and embedding security into procurement and lifecycle processes.
Design and implement security standards across identity, endpoints, and enterprise applications while partnering with IT teams to improve organizational security posture.
Penetration tester who plans and executes security tests across office networks, cloud infrastructure, and applications, then collaborates with engineering teams to remediate vulnerabilities.
Leads corporate security initiatives including vulnerability management, security tool implementation, threat hunting, and incident response across cloud and IT infrastructure.
Develops and monitors security tools, manages cloud/IT infrastructure security, and leads incident detection and response efforts across the organization.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, shifting security left into procurement and lifecycle management.
Designs and implements cloud security controls, automation, and best practices across GCP/Kubernetes infrastructure while embedding security into the development lifecycle.