Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Executes risk assessments and manages the risk intake process, identifying threats and evaluating controls to reduce enterprise uncertainty.
Executes risk assessments, manages risk intake processes, and identifies emerging security threats to reduce organizational uncertainty and drive risk governance.
Executes risk assessments, manages risk intake processes, and maintains the enterprise risk register to provide leadership with quantified visibility into organizational risks.
Secures AWS production environments by monitoring threats, responding to incidents, automating defenses, and building resilient infrastructure alongside engineering teams.
Leads field security strategy and operations, manages security team initiatives, and ensures compliance across distributed locations.
Designs and operates security systems, manages access control and compliance frameworks, and drives risk management across the organization.
CSIRT engineer manages security threats across OVO's digital infrastructure, handling incident response and detection engineering while mentoring junior analysts.
Manages security controls, ensures ISO27001 & SOC 2 compliance, and handles customer security questionnaires and vendor assessments.
Leads secure design reviews, threat modeling, and code reviews while building AppSec tooling and AI agents to embed security into product development.
Senior Application Security Engineer leads secure design reviews, threat modeling, and code reviews while building AppSec tooling and AI agents to embed security into product development.
Senior Application Security Engineer leads secure design reviews, threat modeling, and code reviews while building AppSec tooling and AI agents to embed security into product development.
Leads the Office of the CISO, manages a team of security analysts, and oversees continuous improvement of information security capabilities and governance.
Leads the Office of the CISO, manages information security analysts, and drives continuous improvement of security capabilities and governance for a digital bank.
Leads cybersecurity operations, incident response, and compliance initiatives while providing senior technical expertise and mentorship to engineering teams.
Administers Microsoft Sentinel, develops detection rules and KQL queries, and manages enterprise security operations within a virtual SOC environment.
Senior engineer manages and deploys Forescout compliance and network security solutions, with occasional on-site support at military installations.
Manager leads client delivery across security and compliance engagements (SOC, HITRUST, ISO 27001, PCI-DSS) while managing relationships, staffing, and team development.
Manages security operations, incident response, vulnerability programs, and access controls across on-premises and cloud environments.
Serves as primary cybersecurity liaison to customers for device security issues and acts as the main point of contact for GEHC Services cybersecurity support.
Lead security framework design and process improvement initiatives, assess existing security controls, and implement vulnerability management enhancements across the organization.