Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Staff engineer designs and hardens secure CI/CD pipelines, implements software supply chain security controls, and leads cloud-native security architecture for Kubernetes workloads.
Conducts penetration testing, vulnerability assessments, and security research across networks, cloud, web, and mobile applications while developing tools and reporting findings to stakeholders.
Leads compliance readiness initiatives, manages audits and remediation activities, and translates regulatory requirements into security controls across international teams.
Senior Application Security Engineer who conducts penetration testing, manages AppSec tooling, performs threat modeling, and hardens cloud infrastructure across products and applications.
Analyzes vulnerable and malicious code, tracks emerging threats, and builds tools to detect and remediate malware across the WordPress ecosystem.
Staff security engineer designs and hardens CI/CD pipelines, implements supply chain security controls, and secures cloud-native infrastructure on GCP/AWS.
Staff engineer designs and hardens secure CI/CD pipelines, implements supply chain security controls, and leads cloud-native security architecture for Kubernetes workloads on GCP/AWS.
Staff-level security engineer designs and hardens CI/CD pipelines, implements software supply chain controls, and secures cloud-native infrastructure for a supply chain security platform.
Staff-level security engineer designs and hardens CI/CD pipelines, implements supply chain security controls, and secures cloud-native infrastructure for open source software builds.
Monitors security events, investigates threats, and responds to incidents within a security operations center environment.
Intern performs threat hunting activities to identify and investigate security threats within systems and networks.
Designs, implements, and maintains cybersecurity systems and infrastructure to protect organizational assets and data.
Research and analyze blockchain security threats, vulnerabilities, and emerging attack vectors while contributing to proof-of-concept solutions and internal documentation.
Design and build automated vulnerability detection and remediation pipelines using AI-assisted tools to eliminate manual security ticketing and continuously harden cloud infrastructure.
Application security engineer who partners with engineering teams on secure code reviews, vulnerability management, and threat modeling throughout the SDLC.
Research and analyze blockchain security threats, emerging vulnerabilities, and Web3 incidents while contributing to threat modeling and security documentation.
Design and maintain security automation frameworks, cloud infrastructure, and identity management systems across AWS, Splunk, and Okta to strengthen defensive posture and scale SOC operations.
Analyzes blockchain technologies and Web3 security incidents, monitors emerging vulnerabilities, and contributes to threat modeling and research documentation.
Cloud Security Engineer designs, implements, and maintains security infrastructure and protocols for cloud-based systems at a fintech platform.
Designs and implements web security systems while providing consultancy on defense strategies against security attacks.