Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Leads threat modeling, manages cloud security findings, and partners with engineering teams to secure platform infrastructure while exploring AI-driven security automation.
Security engineer maintains custody systems, hardens signing infrastructure, builds anti-scam tooling, and conducts security reviews for blockchain protocols and systems.
Product Security Engineer II leads threat modeling, investigates cloud security findings, and partners with engineering teams to secure platform infrastructure while leveraging AI for triage and automation.
Security engineer owns operational and software security for Sui blockchain systems, manages custody infrastructure, hardens signing paths, and responds to security incidents.
Owns operational and software security for blockchain infrastructure, managing custody systems, hardening signing paths, and conducting security reviews for sensitive components.
Cybersecurity Analyst protects organizational digital assets and infrastructure from security threats and vulnerabilities.
Manages information security compliance, risk assessments, and regulatory frameworks like ISO 27001 and NIST CSF to protect organizational assets.
Security Engineer owns and operates SOAR/SIEM platforms, builds automation playbooks, manages endpoint security, and responds to threats across the infrastructure.
Security Engineer owns and operates SOAR/SIEM platforms, builds automation playbooks, manages endpoint security tools, and responds to threats across the infrastructure.
Automates, secures, and monitors data integration and analytics platforms in a DoD cloud environment.
Designs and maintains cloud security infrastructure, builds DevSecOps tooling, and ensures secure deployment practices across enterprise systems.
Builds and maintains cloud security infrastructure, develops DevSecOps tooling, and ensures security compliance across enterprise SaaS environments.
Manages complex enterprise network infrastructure, troubleshoots network issues, handles incident/change management, and improves monitoring tools with focus on perimeter security and network architecture.
Designs, implements, and maintains cybersecurity systems and infrastructure to protect organizational assets and data.
Design and build automated vulnerability detection and remediation pipelines using AI-assisted tools to eliminate manual security ticketing and continuously harden cloud infrastructure.
Application security engineer who partners with engineering teams on secure code reviews, vulnerability management, and threat modeling throughout the SDLC.
Leads CMMC compliance initiatives for DoD contractors by developing policies, writing security documentation, and managing audit-ready evidence across multiple client engagements.
Conducts authorized penetration tests against Azure and Microsoft 365 environments to identify security weaknesses and validate remediation effectiveness.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, including firmware reverse engineering and hardware analysis.
Executes risk assessments and manages the risk intake process, identifying threats and evaluating controls to reduce enterprise uncertainty.