Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Conducts authorized penetration tests against Azure and Microsoft 365 environments to identify security weaknesses and validate remediation effectiveness.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, including firmware reverse engineering and hardware analysis.
Executes risk assessments and manages the risk intake process, identifying threats and evaluating controls to reduce enterprise uncertainty.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, performing firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and identifies emerging security threats to reduce organizational uncertainty and drive risk governance.
Conducts hands-on penetration testing and security assessments of IoT devices, industrial control systems, and automotive platforms, including firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and maintains the enterprise risk register to provide leadership with quantified visibility into organizational risks.
Design and implement security standards across identity, endpoints, and enterprise applications while partnering with IT teams to improve organizational security posture.
Penetration tester who plans and executes security tests across office networks, cloud infrastructure, and applications, then collaborates with engineering teams to remediate vulnerabilities.
Manages privacy program operations, ensures regulatory compliance (GDPR, CCPA), conducts risk assessments, and oversees third-party data protection within the organization.
Detects, investigates, and responds to security threats by hunting for anomalies, building detection models, and automating incident response across corporate and production environments.
Designs, implements, and maintains cloud security infrastructure and systems to protect organizational assets and data.
Secures AWS production environments by monitoring threats, responding to incidents, automating defenses, and building resilient infrastructure alongside engineering teams.
Develops and implements cybersecurity solutions, manages security infrastructure, and responds to threats to protect organizational systems.
Designs, implements, and maintains security controls across cloud environments to protect mission-critical systems.
Proactively hunts advanced threats by analyzing telemetry across endpoints, networks, and cloud environments to identify stealthy adversary activity and reduce dwell time.
Manages cyber security improvement initiatives end-to-end, leading stakeholder engagement and resource planning to strengthen organizational security posture and capabilities.
Develops and implements security practices for applications within a DevOps environment supporting Department of Justice software programs.
Builds and shapes security and compliance programs at a fast-scaling healthtech platform, establishing protocols and frameworks from the ground up.
Cyber Advisor assesses customer security posture after cyber incidents and implements technical hardening controls across cloud and on-premise infrastructure to reduce future risk.