Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Research and analyze blockchain security threats, vulnerabilities, and emerging attack vectors while contributing to proof-of-concept solutions and internal documentation.
Design and build automated vulnerability detection and remediation pipelines using AI-assisted tools to eliminate manual security ticketing and continuously harden cloud infrastructure.
Application security engineer who partners with engineering teams on secure code reviews, vulnerability management, and threat modeling throughout the SDLC.
Research and analyze blockchain security threats, emerging vulnerabilities, and Web3 incidents while contributing to threat modeling and security documentation.
Design and maintain security automation frameworks, cloud infrastructure, and identity management systems across AWS, Splunk, and Okta to strengthen defensive posture and scale SOC operations.
Analyzes blockchain technologies and Web3 security incidents, monitors emerging vulnerabilities, and contributes to threat modeling and research documentation.
Cloud Security Engineer designs, implements, and maintains security infrastructure and protocols for cloud-based systems at a fintech platform.
Designs and implements web security systems while providing consultancy on defense strategies against security attacks.
Analyzes security threats and detects anomalies as part of a threat intelligence team using AI-powered detection systems.
Leads CMMC compliance initiatives for DoD contractors by developing policies, writing security documentation, and managing audit-ready evidence across multiple client engagements.
Senior Manager leads security initiatives, manages GenAI security governance and architecture, oversees incident response and vulnerability management.
Conducts authorized penetration tests against Azure and Microsoft 365 environments to identify security weaknesses and validate remediation effectiveness.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, including firmware reverse engineering and hardware analysis.
Executes risk assessments and manages the risk intake process, identifying threats and evaluating controls to reduce enterprise uncertainty.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, performing firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and identifies emerging security threats to reduce organizational uncertainty and drive risk governance.
Conducts hands-on penetration testing and security assessments of IoT devices, industrial control systems, and automotive platforms, including firmware analysis and vulnerability identification.
Executes risk assessments, manages risk intake processes, and maintains the enterprise risk register to provide leadership with quantified visibility into organizational risks.
Designs and implements security detection and response systems to identify and mitigate threats across the organization's infrastructure.
Designs and implements a comprehensive business application security program across 200+ SaaS and cloud tools, establishing security standards and embedding security into procurement and lifecycle processes.