Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Designs and implements security detection and response systems to identify and mitigate threats across the organization's infrastructure.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, establishing security standards and embedding security into procurement and lifecycle processes.
Design and implement security standards across identity, endpoints, and enterprise applications while partnering with IT teams to improve organizational security posture.
Penetration tester who plans and executes security tests across office networks, cloud infrastructure, and applications, then collaborates with engineering teams to remediate vulnerabilities.
Leads corporate security initiatives including vulnerability management, security tool implementation, threat hunting, and incident response across cloud and IT infrastructure.
Develops and monitors security tools, manages cloud/IT infrastructure security, and leads incident detection and response efforts across the organization.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, shifting security left into procurement and lifecycle management.
Designs and implements cloud security controls, automation, and best practices across GCP/Kubernetes infrastructure while embedding security into the development lifecycle.
Monitor and investigate security alerts across SIEM/EDR platforms, triage incidents, and respond to threats using AI-assisted detection and analysis tools.
Manages privacy program operations, ensures regulatory compliance (GDPR, CCPA), conducts risk assessments, and oversees third-party data protection within the organization.
Detects, investigates, and responds to security threats by hunting for anomalies, building detection models, and automating incident response across corporate and production environments.
Cloud security engineer who designs and implements security controls, automation, and compliance measures across GCP/Kubernetes infrastructure to protect health data.
Designs, implements, and maintains cloud security infrastructure and systems to protect organizational assets and data.
Develops and manages identity and access management systems and policies within a healthcare organization's information security department.
Senior security engineer leads SOC design, threat detection, incident response, and mentors junior analysts while optimizing security monitoring across cloud environments.
Staff Infrastructure Engineer owns and operates corporate identity, endpoint, collaboration, and AI workflow systems, reporting to the CISO with direct responsibility for IT operations and security infrastructure.
Secures AWS production environments by monitoring threats, responding to incidents, automating defenses, and building resilient infrastructure alongside engineering teams.
Conducts ISO audits and compliance assessments to verify organizational adherence to security and quality standards.
Monitors and defends against cyber threats, analyzes security incidents, and implements defensive measures to protect organizational assets.
Develops and implements cybersecurity solutions, manages security infrastructure, and responds to threats to protect organizational systems.