Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Monitors electronic and voice communications for market abuse and regulatory breaches, escalates alerts, and supports surveillance framework optimization in capital markets.
Designs and operates scalable cloud infrastructures while integrating security practices into development and operations pipelines.
Design, implement, and optimize Microsoft Defender security solutions to protect enterprise systems while leading incident response and threat mitigation efforts.
Design and operate scalable cloud infrastructures while integrating security into development and operations, automating deployments and enforcing security standards across systems.
Designs and implements enterprise cybersecurity architecture, manages security tools and engineering teams, and ensures organizational protection from internal and external threats.
Investigates security incidents, conducts root cause analysis, manages breach notifications, and develops preventive measures to protect client data and systems.
Responds to and manages security incidents, investigates threats, and implements remediation measures for the organization.
Lead IT GRC Analyst shapes and manages NBCUniversal's security governance framework, develops secure configuration baselines, and translates security principles into actionable enterprise policies.
Design and implement enterprise identity and access management (IAM) solutions including SSO, Zero Trust, and MFA to reduce cyber risk across the organization.
Designs and implements enterprise identity and access management solutions, including SSO, Zero Trust, and MFA systems to reduce cyber risk across the organization.
Investigates complex security alerts and threats 24/7, leveraging threat intelligence and AI tools to detect and respond to sophisticated adversaries across customer endpoints and cloud systems.
Investigates security alerts and threat intelligence to detect and respond to cyberattacks across customer endpoints and cloud infrastructure 24/7.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Intern works on hands-on cybersecurity projects including vulnerability research, penetration testing, and security tool training under expert mentorship.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Intern works on hands-on cybersecurity projects, learning penetration testing, vulnerability research, and security tools under expert mentorship.
Investigates security alerts and threats 24/7, leveraging threat intelligence and AI tools to detect and respond to sophisticated attacks across customer endpoints and infrastructure.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and MFA bypass attacks to protect enterprise endpoints.