Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
CSIRT engineer manages security threats across OVO's digital infrastructure, handling incident response and detection engineering while mentoring junior analysts.
Manages security controls, ensures ISO27001 & SOC 2 compliance, and handles customer security questionnaires and vendor assessments.
Leads secure design reviews, threat modeling, and code reviews while building AppSec tooling and AI agents to embed security into product development.
Senior Application Security Engineer leads secure design reviews, threat modeling, and code reviews while building AppSec tooling and AI agents to embed security into product development.
Senior Application Security Engineer leads secure design reviews, threat modeling, and code reviews while building AppSec tooling and AI agents to embed security into product development.
Leads the Office of the CISO, manages a team of security analysts, and oversees continuous improvement of information security capabilities and governance.
Leads the Office of the CISO, manages information security analysts, and drives continuous improvement of security capabilities and governance for a digital bank.
Leads cybersecurity operations, incident response, and compliance initiatives while providing senior technical expertise and mentorship to engineering teams.
Administers Microsoft Sentinel, develops detection rules and KQL queries, and manages enterprise security operations within a virtual SOC environment.
Senior engineer manages and deploys Forescout compliance and network security solutions, with occasional on-site support at military installations.
Manager leads client delivery across security and compliance engagements (SOC, HITRUST, ISO 27001, PCI-DSS) while managing relationships, staffing, and team development.
Manages security operations, incident response, vulnerability programs, and access controls across on-premises and cloud environments.
Serves as primary cybersecurity liaison to customers for device security issues and acts as the main point of contact for GEHC Services cybersecurity support.
Lead security framework design and process improvement initiatives, assess existing security controls, and implement vulnerability management enhancements across the organization.
Manages RMF compliance and cybersecurity implementation for DoD AWS systems, ensuring security standards and overseeing cyber controls in a DevOps environment.
Lead large-scale cyber and operational resilience transformation programmes for financial institutions, driving strategy, compliance, and business development.
Lead operational resilience and cyber risk assessments for financial services clients, advising on regulatory frameworks and designing resilience governance models.
Principal Consultant designs and delivers cyber resilience strategies, frameworks, and operational resilience programs for financial services organizations aligned with regulatory requirements.
Lead operational resilience and cyber risk assessments for financial services clients, advising on regulatory frameworks and designing governance models to mitigate technology and third-party risks.
Intern develops cybersecurity expertise through hands-on projects in AI security, IoT, embedded systems, and critical infrastructure under mentorship from industry professionals.