Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Designs and implements cloud security controls, automation, and best practices across GCP/Kubernetes infrastructure while embedding security into the development lifecycle.
Monitor and investigate security alerts across SIEM/EDR platforms, triage incidents, and respond to threats using AI-assisted detection and analysis tools.
Manages privacy program operations, ensures regulatory compliance (GDPR, CCPA), conducts risk assessments, and oversees third-party data protection within the organization.
Detects, investigates, and responds to security threats by hunting for anomalies, building detection models, and automating incident response across corporate and production environments.
Cloud security engineer who designs and implements security controls, automation, and compliance measures across GCP/Kubernetes infrastructure to protect health data.
Designs, implements, and maintains cloud security infrastructure and systems to protect organizational assets and data.
Develops and manages identity and access management systems and policies within a healthcare organization's information security department.
Senior security engineer leads SOC design, threat detection, incident response, and mentors junior analysts while optimizing security monitoring across cloud environments.
Staff Infrastructure Engineer owns and operates corporate identity, endpoint, collaboration, and AI workflow systems, reporting to the CISO with direct responsibility for IT operations and security infrastructure.
Secures AWS production environments by monitoring threats, responding to incidents, automating defenses, and building resilient infrastructure alongside engineering teams.
Conducts ISO audits and compliance assessments to verify organizational adherence to security and quality standards.
Monitors and defends against cyber threats, analyzes security incidents, and implements defensive measures to protect organizational assets.
Develops and implements cybersecurity solutions, manages security infrastructure, and responds to threats to protect organizational systems.
Leads field security strategy and operations, manages security team initiatives, and ensures compliance across distributed locations.
Designs, implements, and maintains security controls across cloud environments to protect mission-critical systems.
Performs penetration testing on networks, web applications, and APIs to identify vulnerabilities and advises clients on security best practices.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.
Proactively hunts advanced threats by analyzing telemetry across endpoints, networks, and cloud environments to identify stealthy adversary activity and reduce dwell time.
Manages cyber security improvement initiatives end-to-end, leading stakeholder engagement and resource planning to strengthen organizational security posture and capabilities.
Designs and deploys AI-assisted security tooling for vulnerability triage, threat investigation, and incident response workflows.