Japanese-Speaking Remote Jobs

Cybersecurity
1,120 jobs found. to receive daily emails with new job openings that match your preferences.
1,120 jobs found.

Set alerts to receive daily emails with new job openings that match your preferences.

Apply

📍 United States

🧭 Full-Time

💸 132000.0 - 172000.0 USD per year

🔍 Software Development

🏢 Company: Infinite Reality👥 101-250💰 $350,000,000 9 months agoMedia and EntertainmentWeb3Metaverse

  • Extensive DevOps & Security Experience: You bring 5+ years of hands-on experience in DevOps and security monitoring, with a strong focus on logging, monitoring, and incident response. Your background allows you to design, implement, and optimize observability frameworks that enhance system security and performance.
  • Incident Management Expertise: You have a proven track record of managing both security and operational incidents. From detection through resolution, you are adept at coordinating incident response efforts, leading post-incident reviews, and driving improvements to reduce future risks and downtime.
  • Scripting & Automation Skills: You are proficient in scripting languages like Python or Bash, and are passionate about automating repetitive tasks to increase operational efficiency. Your automation solutions help streamline workflows, improve response times, and reduce manual intervention.
  • Proficiency with Logging & Monitoring Tools: You have deep experience with tools like the ELK Stack, Splunk, Prometheus, and other observability platforms. Your expertise enables you to identify patterns, vulnerabilities, and trends in system health and security, empowering teams to act proactively.
  • Collaboration & Cross-Functional Teamwork: You excel at working across teams, engineering, IT, and security, helping foster a culture of observability and continuous improvement. Your ability to communicate technical concepts clearly ensures alignment across stakeholders with varying levels of technical expertise.
  • Strong Problem-Solving Skills: You thrive on solving complex issues, whether it’s a security breach or a system performance bottleneck. Your analytical mindset and experience with root cause analysis ensure that you can resolve problems efficiently and implement lasting solutions.
  • Design & Optimize Logging and Monitoring Systems: Lead the design and implementation of advanced logging and monitoring architectures, ensuring that system performance, security threats, and infrastructure health are captured in real-time. You will drive best practices in observability to ensure our systems are proactive, secure, and resilient.
  • Incident Response & Analysis: Own the full incident management lifecycle—from detection to resolution. Respond to both security and operational incidents, working across teams to minimize impact and quickly resolve issues. Lead post-incident analysis, identify root causes, and drive improvements to prevent future occurrences.
  • Develop Automation Solutions: Build and implement automation workflows to streamline alerting, incident detection, and response processes. You’ll reduce manual intervention and optimize workflows, helping teams respond more efficiently to system events and improve operational efficiency.
  • Collaborate with Cross-Functional Teams: Work closely with engineering, security, and operations teams to foster a culture of observability. Share best practices, establish clear protocols for incident detection and resolution, and ensure alignment across teams to improve overall system reliability.
  • Monitor Security & Operational Alerts: Establish and fine-tune alerting rules to ensure actionable, precise, and timely notifications for security and system performance events. You’ll ensure that alerts are well-defined and routed to the right teams, minimizing response time to critical issues.
  • Leverage Data for Continuous Improvement: Analyze logs and metrics to identify trends, anomalies, and potential security vulnerabilities. You’ll generate data-driven insights that help improve system health, performance, and security posture, contributing to ongoing process improvements.
  • Mentor and Coach: Provide guidance to junior engineers and colleagues, promoting best practices in monitoring, incident management, and automation. Lead by example to elevate the technical capabilities of the team and drive knowledge-sharing across the organization.

AWSDockerPythonBashCloud ComputingCybersecurityKubernetesMicrosoft AzureAPI testingAzureGrafanaPrometheusREST APICommunication SkillsAnalytical SkillsCollaborationCI/CDProblem SolvingRESTful APIsLinuxDevOpsTerraformComplianceAnsibleScripting

Posted about 3 hours ago
Apply
Apply
🔥 Cloud Security Engineer
Posted about 3 hours ago

📍 UK

🔍 Software Development

🏢 Company: Everway

  • 3+ years of experience in cloud security, with a strong focus on AWS and Azure.
  • Deep understanding of AWS security services, including IAM, Security Hub, GuardDuty, KMS, WAF, and S3 bucket ACLs and encryption.
  • Strong knowledge of AWS networking security, including VPCs, security groups, VPNs, and private link services.
  • Strong knowledge of Azure Defender, Sentinel, and Security Center.
  • Hands-on experience securing serverless architecture (e.g., AWS Lambda, API gateway) and containerized environments (e.g., Kubernetes).
  • Experience with cloud security monitoring, SIEM, and incident response.
  • Architect, implement, and manage security controls in AWS and Azure environments to protect cloud infrastructure, workloads, and data.
  • Conduct threat modeling and risk analysis to identify and remediate vulnerabilities.
  • Securely configure and audit cloud IAM policies, role-based access control (RBAC), and implement least-priviledge principles.
  • Familiar with cloud native compute, storage and security services, such as AWS Security hub, GuardDuty, CloudTrail, and Azure Monitor.
  • Work closely with DevOps and development teams to integrate security into CI/CD pipelines and cloud-native applications.
  • Investigate and respond to cloud security incidents, misconfigurations, and compliance gaps.

AWSCloud ComputingCybersecurityKubernetesAzureCI/CDLinuxDevOpsTerraformNetworking

Posted about 3 hours ago
Apply
Apply

📍 United States

🏢 Company: Optiv_Careers

  • Primary expertise with one or more of our core Technology Areas – CrowdStrike/SentinelOne
  • Approximately 2-5 years of technical architecture experience
  • Thorough understanding of large scale environments
  • Knowledge of general security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance.
  • Expert knowledge of using Microsoft Office.
  • Participate in capacity planning and HW specification recommendation efforts.
  • Participate in all Technology deployment activities, connector configuration, custom rule development, workflow configuration and development, and third-party system integration.
  • Participate in User Acceptance Testing and bug-related engineering efforts.
  • Design and implement on specific technology build processes, code migration, and source control use.
  • Provide knowledge transfer and post production support activities as necessary.
  • Complete administrative project tasks like time and expense entry, status reporting, and project completion reporting.

CybersecurityCommunication SkillsTechnical support

Posted about 5 hours ago
Apply
Apply

📍 United States

🔍 Software Development

🏢 Company: Optiv_Careers

  • Expertise with implementation, administration, and maturation of Endpoint Detection and Response (EDR) Mobile Device Management (MDM) and Application Control technologies
  • Primary Expertise with Microsoft Defender and Intune (Microsoft On-Prem Services and Cloud Services)
  • Experience with CrowdStrike, SentinelOne, Tanium
  • Very knowledgeable of multiple security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance.
  • Strong understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS/IPS, etc.) and application programming/scripting languages (C, Java, Perl, Shell).
  • Strong understanding of regulatory requirements and compliance issues affecting clients related to privacy and data protection, such as PCI DSS, GLBA, Basel II, EU Data Protection Directive, International Cross Border, and U.S. State Data Privacy Laws.
  • Technical architecture experience integrating data protection software into clients' infrastructure; network architecture design, implementation and administration.
  • Work with customers to help them articulate their business requirements and how those requirements translate into security features and functionality.
  • Architect solutions to ensure that the customer's risk transformation requirements are met.
  • Assist with development of cyber engagement plans for customers which will enable them to execute upon strategies.
  • Rationalize different security solutions against requirements, risk, and constraints.
  • Undertake Threat, Vulnerability and Risk analysis methodologies/techniques and the interpretation/application of their output in the definition of Security Architectures.
  • Able to deliver and lead other consultants in complex projects
  • Able to present to large groups. Speaks as an authority.
  • Can handle difficult questions and consistently wins support from client audiences.

Cloud ComputingCybersecurityMicrosoft Active DirectoryMicrosoft AzureCommunication SkillsAnalytical SkillsPresentation skillsComplianceNetworkingRisk ManagementScripting

Posted about 5 hours ago
Apply
Apply

📍 Mid-Atlantic

💸 116000.0 - 170000.0 USD per year

🔍 Cybersecurity

  • Minimum 7 years full sales cycle experience selling enterprise cybersecurity technology solutions to an SLED Client based across the Mid-Atlantic.
  • A hunter by nature, with expertise in prospecting via a multi-channel approach including cold calling, channel partner relationships, LinkedIn outreach and networking
  • You have built relationships with senior cyber buyers and are able to leverage your existing network to gain introductions into new logos
  • A strategic seller, with expertise in account planning, you use a clear sales process (MEDDPICC preferred) to qualify and move deals through the pipeline to close
  • A history of consistent quota achievement and ability to deliver consistently against targets
  • Great understanding of a complex sales process and business drivers for enterprise clients
  • Meet sales quota and drive success: Conduct and execute detailed sales campaigns, achieving quarterly and annual sales targets with a robust, measurable sales process
  • Build a pipeline, leverage partners and network: Build a strong pipeline through proactive prospecting, strategic networking, and leveraging our growing list of partners
  • Cultivate strong client relationships: Cultivate and sustain valuable client relationships whilst skilfully navigating and closing complex enterprise deals
  • Develop deep customer insights: Develop comprehensive insights into customer use cases, internal decision-making processes, budget cycles, and other critical information
  • Master competitive analysis: Analyze the competitive landscape and understand customer needs in order to position Dataminr’s portfolio of solutions effectively to meet customer needs and stand out from the competition
  • Provide product feedback: Provide valuable feedback to cross-functional teams (Product, Engineering) to drive the continuous enhancement, updates and improvements of our products

CybersecuritySalesforceCommunication SkillsMicrosoft OfficeRESTful APIsNegotiationNetworkingAccount ManagementClient relationship managementCross-functional collaborationSales experienceLead GenerationCRMSaaS

Posted about 5 hours ago
Apply
Apply
🔥 Senior Customer Engineer
Posted about 7 hours ago

📍 United States

🧭 Full-Time

💸 140000.0 - 180000.0 USD per year

🏢 Company: Material Security👥 51-100💰 $100,000,000 Series C almost 3 years agoManagement Information SystemsEmailCyber SecurityNetwork SecuritySoftware

  • 5+ years of experience in a customer facing post-sales or implementation role such as technical enterprise customer engineering or technical account management role; cybersecurity or identity management experience is a plus.
  • Technical skills and knowledge / industry experience relevant to use cases/environments (sold, implemented and or managed security products, domain expertise in security, cloud email, IT, Google/Office 365, SSO, etc.).
  • Our Customer Success Managers can stand toe-to-toe with our world-class product and design teams to design, build, and enhance the best user experiences.
  • Ability to multitask and efficiently handle multiple competing priorities, escalating when necessary while being highly organized, detail oriented, and having great time management skills.
  • Have sincere empathy for the customer and a commitment to delving deep into the challenges they present or experience; our Customer Success Managers have a natural tendency to take on new and unique customer asks/requirements.
  • The best candidates are smart, hard-working, competitive, and not afraid to fail.
  • Ability to contribute directly to the following teams: Sales, Product and Engineering
  • Should be able to learn new tools & technologies quickly, and be able to communicate the product and problem space fairly deeply
  • Build and nurture strong relationships with our customers to help them get as much value out of our products as possible.
  • Provide advanced product-level technical expertise, leading account setup, complex deployments and resolving intricate technical challenges
  • Work with the sales team to build account plans that move the customers forward through each stage of the customer journey.
  • Thoroughly understand our customers’ business needs, organizational structure, profile, product usage, and risks.
  • Organize value-focused executive business reviews (EBR) at least once per year with each customer.
  • Communicate frequently with customers about new features and roadmaps, and find opportunities for expanding which Material products are used.
  • Lead customer escalations, and coordinate with internal teams and resources to ensure timely and effective resolution
  • Aggregate customer product feedback, translate, and prioritize new features for product and engineering teams, advocating for the customer when needed.
  • Execute cross-functional projects involving Engineering, Sales, Partnerships, and IT/Security.
  • Customer Engineers are product experts, technical advisors, and customer advocates

Project ManagementCloud ComputingCybersecurityProduct OperationsCross-functional Team LeadershipCommunication SkillsCustomer serviceRESTful APIsAccount ManagementTroubleshootingSales experienceTechnical supportCustomer supportCustomer SuccessSaaS

Posted about 7 hours ago
Apply
Apply

📍 Poland

🔍 Entertainment

🏢 Company: Netflix👥 10000-100000

  • 5+ years of experience as a Security Engineer with hands on experience in Digital Forensics and Incident Response (MacOS and Cloud)
  • 2+ years of demonstrated experience in Incident Management as a Security Incident Commander responding to large scale security incidents
  • Hands-on experience analyzing disparate log sources as part of security investigations
  • Python experience and familiarity with deploying code in a continuous integration and continuous delivery, cloud-based environment
  • Actively lead security incident response as an Incident Commander and investigator
  • Apply lessons learned as part of the post-incident review process in order to improve incident handling and resolution

PythonSQLCloud ComputingCybersecurity*NixCI/CDRESTful APIs

Posted about 9 hours ago
Apply
Apply

📍 Canada

💸 125000.0 - 215000.0 CAD per year

🔍 Cybersecurity

🏢 Company: crowdstrikecareers

  • 3+ years in Cybersecurity focused role.
  • Customer empathy and ability to guide customers towards desired outcome.
  • Excellent customer-facing communication skills including verbal and written.
  • Partner with CrowdStrike teams to troubleshoot and resolve customer issues.
  • Adept in Windows, Linux, and MAC operating systems.
  • Experience or demonstrated knowledge of threat detection and incident response.
  • Bachelor's degree in Technology and/or Cybersecurity or relevant experience.
  • Cybersecurity certifications from reputable organizations such as SANS, ISC2 or equivalent.
  • Assess customer’s Falcon environment and ensure alignment with Falcon Complete standards.
  • Provide Falcon Complete customers with recommendations that align to improved security.
  • Create and recommend remediation for components of CrowdStrike products that may lead to improved security posture.
  • Contact customers directly upon identification of misalignment with Falcon Complete standards.
  • Document, update, and resolve all customer related issues in accordance with established procedures and SLAs.
  • Develop and provide customers with service reports and stats as requested.
  • Partner with internal teams to ensure customer satisfaction.
  • Liaise with support team to help troubleshoot and coordinate efforts to resolve technical issues.

CybersecurityMac OS XCommunication SkillsCustomer serviceLinuxTeamworkChange ManagementCustomer Success

Posted about 9 hours ago
Apply
Apply

📍 United States of America

💸 73500.0 - 131250.0 USD per year

🔍 Healthcare

🏢 Company: vspvisioncareers

  • Bachelor’s degree in related field or equivalent experience
  • Minimum of 3 years of management experience with responsibilities for hiring, training, assigning work, and managing performance of direct reports
  • Comprehensive knowledge of primary technology area, preferably within healthcare environment
  • Ability to regularly exercise discretion and independent judgment in the performance of job duties
  • Develop, implement, and maintain IAM solutions, including identity provisioning, access control, authentication, and authorization mechanisms.
  • Design IAM workflows, policies, and procedures to ensure secure access management using Sailpoint or similar tools
  • Manage user onboarding, offboarding, and role changes, ensuring adherence to security policies and compliance requirements.
  • Automate user provisioning and deprovisioning processes to enhance efficiency.
  • Define and enforce access control policies, including role-based access control (RBAC), least privilege principle, and segregation of duties (SoD).
  • In-depth knowledge of identity and access management concepts, such as SSO, role-based access control, and identity federation.
  • Experience with identity and access management tools, such as Sailpoint, Active Directory, LDAP, and Azure AD.
  • Strong understanding of authentication protocols, such as SAML, OAuth, and Kerberos.
  • Experience responding to IAM-related incidents, investigate security breaches, and root cause analysis.
  • Provide management within responsible technical area through operations and change-the-business.
  • Provide direction to the team on a daily basis
  • Address and navigate technical issues, anticipating and preventing impending issues
  • Problem solve beyond the scope of an individual team member to optimal outcome
  • Consistently meet commitments within expected timeframe with minimal direction
  • Partner with deliverable stakeholders inform others of technical impediments, updates, and progress in relationship to timelines or SLAs
  • Provide detailed technology functional planning supporting the overlaying strategies of GTS and business direction for technical infrastructure, architecture, application systems, and/or related business processes within technical functional area, and ensure proper functioning, and cohesive implementation
  • Drive and adopt incremental and step function change within technical groups and adjacencies
  • Engage in planning to meet operational, daily, and quarterly goals; plan and execute department-level technical projects
  • Determine and develop best technical practices sometimes in relation to business procedures
  • Identify and mitigate operational and strategic risk
  • Engage Team and Peers in technical opportunity identification
  • Remain current on new technology and methods to ensure state-of-the-art and cost-effective solutions to business processes
  • Coordinate training to ensure all departmental staff have appropriate skill sets and receive appropriate information/instruction
  • Ensure effective communications are maintained across technical functional areas and externally as necessary; where appropriate involve senior level management, and employees in plans, and keep up to date on progress towards meeting goals
  • Monitor expenses to ensure technical area’s costs are with established levels

SQLCybersecurityLDAPOAuthRESTful APIsLinuxComplianceRisk ManagementChange Management

Posted about 11 hours ago
Apply
Apply

📍 United States

🧭 Full-Time

🏢 Company: Rula👥 251-500💰 Series C 9 months agoPersonal HealthMental HealthAddiction TreatmentHealth InsuranceWellnessHealth CareHome Health Care

  • 4+ years of experience as an infrastructure security or cloud security engineer
  • 3+ years of AWS engineering experience (security or non-security role)
  • Experience using an AWS SDK for Python, Javascript, or Go
  • Experience using Infrastructure-as-Code tools, such as Terraform or CloudFormation
NOT STATED

AWSPythonAWS EKSCloud ComputingCybersecurityKubernetesTerraform

Posted about 12 hours ago
Apply
Shown 10 out of 1120

Ready to Start Your Remote Journey?

Apply to 5 jobs per day for free, or get unlimited applications with a subscription starting at €5/week.