Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, including firmware reverse engineering and hardware analysis.
Executes risk assessments and manages the risk intake process, identifying threats and evaluating controls to reduce enterprise uncertainty.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, performing firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and identifies emerging security threats to reduce organizational uncertainty and drive risk governance.
Conducts hands-on penetration testing and security assessments of IoT devices, industrial control systems, and automotive platforms, including firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and maintains the enterprise risk register to provide leadership with quantified visibility into organizational risks.
Designs and implements security detection and response systems to identify and mitigate threats across the organization's infrastructure.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, establishing security standards and embedding security into procurement and lifecycle processes.
Design and implement security standards across identity, endpoints, and enterprise applications while partnering with IT teams to improve organizational security posture.
Penetration tester who plans and executes security tests across office networks, cloud infrastructure, and applications, then collaborates with engineering teams to remediate vulnerabilities.
Leads corporate security initiatives including vulnerability management, security tool implementation, threat hunting, and incident response across cloud and IT infrastructure.
Develops and monitors security tools, manages cloud/IT infrastructure security, and leads incident detection and response efforts across the organization.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, shifting security left into procurement and lifecycle management.
Designs and implements cloud security controls, automation, and best practices across GCP/Kubernetes infrastructure while embedding security into the development lifecycle.
Monitor and investigate security alerts across SIEM/EDR platforms, triage incidents, and respond to threats using AI-assisted detection and analysis tools.
Manages privacy program operations, ensures regulatory compliance (GDPR, CCPA), conducts risk assessments, and oversees third-party data protection within the organization.
Detects, investigates, and responds to security threats by hunting for anomalies, building detection models, and automating incident response across corporate and production environments.
Cloud security engineer who designs and implements security controls, automation, and compliance measures across GCP/Kubernetes infrastructure to protect health data.
Designs, implements, and maintains cloud security infrastructure and systems to protect organizational assets and data.
Develops and manages identity and access management systems and policies within a healthcare organization's information security department.