Remote Marketing Jobs

Cybersecurity
970 jobs found. to receive daily emails with new job openings that match your preferences.
970 jobs found.

Set alerts to receive daily emails with new job openings that match your preferences.

Apply
🔥 Systems Engineer
Posted 21 minutes ago

📍 North America

🧭 Full-Time

🔍 IT, cybersecurity

🏢 Company: Axlora

  • 1-3 years of experience within the IT, cybersecurity, compliance, devops/software engineering/site reliability or related field
  • Bachelors degree in Computer Science, Computer Engineering, IT, Systems Engineering, Cybersecurity or related field OR demonstrated technical competence and interest in rapidly learning new technologies
  • Implement technical controls to meet compliance standards such as SOC 2, ISO 27001, GDPR, and NIST 800-171 across customer tech stacks using technology such as Vanta, AWS, GCP, Azure, Addigy, Huntress, Google Workspace, Tailscale, etc.
  • Be organized using our project management systems to ensure customers meet timelines
  • Solve ad-hoc customer requests in a quick and competent manner
  • Communicate via Slack with customers in a way that is succinct, friendly, with authority, and proactive about taking work away from them

AWSProject ManagementCloud ComputingCybersecurityGCPAzureCommunication SkillsProblem SolvingCustomer serviceDevOpsComplianceScripting

Posted 21 minutes ago
Apply
Apply
🔥 SOC Analyst
Posted about 1 hour ago

📍 Ireland

🔍 Cybersecurity

🏢 Company: SonicWall

CybersecurityCommunication SkillsAnalytical SkillsProblem SolvingLinuxAttention to detailScripting

Posted about 1 hour ago
Apply
Apply

📍 United States

🔍 Software Development

  • Experience with Secrets Management in a corporate environment, large enterprise strongly preferred.
  • Knowledge of Secrets Management tools such as HashiCorp Vault, AWS KMS, Azure Key Vault, Beyond Trust.
  • Demonstrated experience architecting and guiding the deployment of enterprise-scale secrets management solutions, with hands-on familiarity a plus.
  • During recent history, candidate must have demonstrated exceptional ability to assess and communicate information security concepts and practices, with both business and IT stakeholders.
  • Requires in-depth knowledge of the systems development life cycle, client area’s functions and systems, and systems applications programs development technological alternatives.
  • Proven implementation of creative technology solutions that advance the business.
  • Relevant work experience is important for successful performance of this role due to the complexity of our global IT Security environment.
  • Information security qualification such as CISSP is preferred but not required.
  • Strong understanding of application security principles, including OWASP Top 10, SANS/CWE Top 25, and secure coding practices.
  • Expertise in secure session management, token handling, and authentication mechanisms (OAuth, SAML, OpenID Connect).
  • Knowledge of cryptographic practices, encryption protocols, and PKI management.
  • Experience with containerization (Docker, Kubernetes) and cloud platforms (AWS, Azure, GCP).
  • Familiarity with tools for code analysis (e.g., SonarQube, Veracode) and vulnerability scanning (e.g., Burp Suite, Nessus).
  • Understanding of DevSecOps practices, including securing CI/CD pipelines
  • Self-starter with the ability to work independently and manage multiple projects simultaneously.
  • Strong problem-solving and analytical skills with the ability to identify security risks and propose effective solutions.
  • Ability to work collaboratively in cross-functional teams and influence technical teams towards secure implementations.
  • Design and architect enterprise-grade secrets management solutions leveraging technologies such as HashiCorp Vault, AWS KMS, Azure Key Vault, or BeyondTrust.
  • Define reusable security architecture patterns and guardrails to enable consistent, secure implementation across high-risk business applications.
  • Drive secure-by-design initiatives by integrating security considerations early in the software architecture lifecycle and influencing enterprise architecture direction.
  • Represent security architecture in design authority boards and technical review councils, advocating for risk-based security controls.
  • Work with in-business IT customers, including application architects and engineers to evaluate application software and infrastructure designs, for the purpose of defining/designing application controls aligned with enterprise standards.
  • Define and drive the architecture and roadmap for enterprise-grade secrets management capabilities, including reference architectures, integration blueprints, and scalable deployment models.
  • Define application-specific security control architectures and produce design artifacts to guide secure implementation of business-critical systems.
  • Develop re-usable implementation guidance and design patterns based on previous engagements to scale the service
  • Work with information security leadership to develop strategies and plans to enforce security requirements and address identified risks in the infrastructure and applications.
  • Act as a security architecture liaison to IT delivery and engineering teams, embedding security principles into technical delivery and architecture review forums.
  • Support security aspects of business & IT initiatives by assisting in architecture, design, implementation, deployment, and operational transition of innovative & secure technology solutions.
  • Work with information security leadership to develop strategies and plans to enforce security requirements and address identified risks in the infrastructure.
  • Research, evaluate, design, test, recommend and plan the implementation of new or updated information security technologies.
  • Establish collaborative working relations with the Information Technology functions to ensure that solutions align with security architecture and business strategy.
  • Play an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned.
  • Complete remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed.
  • Research and assess new information security threats and recommend remedial actions.
  • Foster an information security culture through education, skill development, and implementation of effective information security processes and practices.
  • Understand and adhere to corporate standards regarding applicable Corporate and Divisional Policies, including code of conduct, safety, GxP compliance, data security, and the software development lifecycle
  • Matures and leverages relationships with affiliates, subsidiaries, vendors, and industry peers in accordance with Abbvie Values, Vendor Management Office, and Purchasing to further the mission, vision and goals of the organization.

AWSCloud ComputingCybersecurityKubernetesSoftware ArchitectureAzureCommunication SkillsCI/CDRESTful APIsDevOpsJSONStrong communication skillsRisk Management

Posted about 1 hour ago
Apply
Apply

📍 India

🧭 Full-Time

🔍 Software Development

  • 5+ years of Product Management experience directing strategy and execution of SaaS, Enterprise or security products and/or 10+ years in IT Management 8+ years of increasing responsibility in related roles.
  • Experience with Unified Endpoint Management, specifically in managing Apple ecosystem of products, including Macs, iPhones, and iPads
  • Good knowledge of IT-related technologies such as osquery, compliance standards (NIST, CIS, SOC2, HIPAA), MDM, UEM or software management, threat detection, and cybersecurity.
  • Domain knowledge in security (Ex: Zero Trust, IAM, User Directories, Software defined perimeter, security policies etc.)
  • Solid understanding of end user device management technologies (i.e., VMware Workspace One, Apple Business Manager)
  • Migration experience from SCCM to Intune Microsoft Endpoint Manager, including co-management and hybrid configurations
  • Engage cross-functional stakeholder groups inside the company and work with customers to ensure our products to meet or exceed current and future needs
  • Collaborate closely with Software Architects, user experience and research, marketing, business analytics, and other cross functional teams to define products with great customer experience
  • Lead and complete efforts in defining outcomes, epics, user stories, business/technical requirements and apply customer knowledge to the software development process.
  • Alignment of the roadmap and application of our KPIs across products, as well as oversee execution and key outcomes related to device management for all our supported platforms.
  • Communicate the product vision by driving outbound communications around the product, as well as communicate to senior leadership across the Company, and customers around the World, through written and verbal efforts.

CybersecurityiOS DevelopmentMac OS XProduct ManagementProduct AnalyticsCI/CDDevOpsExcellent communication skillsCross-functional collaborationStakeholder managementSaaS

Posted about 1 hour ago
Apply
Apply
🔥 Account Executive
Posted about 2 hours ago

📍 USA

🧭 Full-Time

🔍 Sales

🏢 Company: Spearbit

  • 3+ years of experience in B2B sales, selling technology and/or security services
  • Proven track record of meeting and exceeding sales targets
  • Excellent communication, negotiation, and interpersonal skills
  • Strong organizational and time-management skills
  • Ability to work independently and as part of a team
  • Familiarity with the blockchain and cryptocurrency industry is a plus
  • Cybersecurity experience is a major plus
  • Identify and develop new business opportunities and build a sales pipeline
  • Build strong relationships with prospects and customers
  • Conduct sales presentations and demos to educate prospects about Spearbit's services
  • Understand customer needs and develop customized proposals
  • Negotiate and close deals, achieving sales targets and revenue goals
  • Collaborate with the marketing team to develop effective sales collateral
  • Maintain accurate and up-to-date records in the CRM system
  • Stay up-to-date on industry trends and competitor activity
  • Outbound sales via social media and other channels
  • Attending events 1-4 times per year

BlockchainCybersecuritySalesforceRESTful APIsAccount ManagementNegotiation skillsClient relationship managementSales experienceLead GenerationCRM

Posted about 2 hours ago
Apply
Apply
🔥 Senior Cyber Security Engineer
Posted about 11 hours ago

📍 United States

🧭 Full-Time

💸 110000.0 - 135000.0 USD per year

🔍 Software Development

🏢 Company: TherapyNotes.com

  • 8+ years of experience in cybersecurity engineering or related role.
  • Extensive experience designing and implementing security controls in cloud environments (preferably Azure and AWS).
  • Knowledge of security frameworks (NIST, ISO 27001, CIS) and compliance frameworks (HITRUST, PCI DSS).
  • Proven ability to conduct security assessments, vulnerability, management, and incident response.
  • Proficiency with network security technologies (firewalls, IDS/IPS, VPNs).
  • Strong understanding of OS platforms (Windows, Linux) and endpoint security.
  • Deep understanding and experience in managing and securing cloud infrastructure and cloud-based applications.
  • Experience with Application Security (OWASP, SAST, DAST).
  • Expert in the latest security principles, techniques, and standards.
  • Proficiency in various security systems: intrusion detection systems, anti-virus software, identity management systems, log management, content filtering, etc.
  • Hands-on management of enterprise-wide security tools and platforms including SIEM, DLP, EDR/XDR, and vulnerability management across hybrid environments (cloud and on-prem).
  • Monitor security alerts, respond to incidents, and manage escalations.
  • Participate in Incident Response on-call rotation.
  • Conduct threat analysis, vulnerability assessments, and risk evaluations.
  • Manage and secure identities in Microsoft Entra ID through Conditional Access and Entitlement Management.
  • Develop and implement strategies for Data Loss Prevention and identify gaps in DLP coverage.
  • Stay informed about the latest cyber threats, attack methodologies, and vulnerabilities to ensure TherapyNotes remains resilient against evolving risks.
  • Conduct periodic system and network configuration reviews to ensure compliance with security standards.
  • Collaborate with developmental teams to ensure security is continuously integrated into the Software Development Lifecycle (SDLC) and CI/CD pipeline.
  • Enforce secure coding standards and best practices to minimize vulnerabilities and to protect the confidentiality, integrity, and availability of our customer's data.
  • Identify and document cyber risks and manage mitigation, follow up on open security risks, and report issues to leadership.
  • Align Zero Trust principles with organizational security goals to ensure secure access to corporate resources, both on-premises and in the cloud.
  • Participate in audits and assessments, supporting governance, risk management, and compliance (GRC) efforts.

AWSCloud ComputingCybersecurityLDAPAzureCI/CDComplianceRisk ManagementScripting

Posted about 11 hours ago
Apply
Apply

📍 United States

💸 116600.0 - 159900.0 USD per year

🔍 Cyber Security

🏢 Company: Optiv_Careers

  • 6+ years operational experience assessing, reviewing, and remediating infrastructure vulnerabilities, CVE’s, and risks
  • Knowledge of third-party software vulnerabilities, security threat landscape, especially network and server threats
  • Knowledge of cyber security threats and risks, vendor computing environments, basic systems, and network technologies
  • Experience with and understanding of CVE’s and CVSS scores
  • Knowledge of compensating controls and mitigating factors
  • Knowledge of Information Security frameworks, guidelines, and standard methodologies
  • Knowledge of the Windows and / or Linux operating systems
  • Knowledge and understanding of Cybersecurity controls and logging and monitoring tools
  • Expertly interact with all levels of personnel
  • Excellent verbal and written communication skills
  • Strong in problem solving and analytical skills
  • Ability to work on multiple projects by prioritizing and results oriented approach
  • Good teammate with flexibility required for support operations
  • Be well versed in the cyber threat landscape; have an advanced understanding and knowledge of what tactics and techniques are being used by adversaries; have an advanced understand and knowledge of what security controls and/or telemetry data is available to detect these tactics and techniques; and be familiar with cyber security incident response terminology, processes, and techniques
  • Moderate to complex investigations (multiple tools) including endpoint, UEBA, public cloud, SAAS and packet analysis
  • Security use case design recommendations for threat detection
  • Threat response activities such as quarantining host and other common response playbook activities
  • Proactive threat hunting using multiple client tools
  • Process development and documentation
  • Application of threat intelligence to improve detection and response capabilities
  • Extensive experience with the MITRE @ttack framework and associated tactics
  • Extensive alert triage and endpoint investigations using technologies such as EDR
  • Phishing analysis
  • Malware analysis (does not include reverse engineering)
  • MITRE attack framework expertise and understanding of common attack tactics used by threat actors
  • Provide recommendations on tuning of security detection platforms and use cases to improve accuracy of detection
  • Knowledge AWS, Azure, GCP cloud service technology
  • Basic fraud and insider threat specific investigation skills
  • Knowledge of metrics and reporting with the use of data visualization tools such as Tableau
  • Demonstrable data analytics skills
  • Must have a passion for data analysis
  • Operate independently in a geographically dispersed team, while maintaining situational awareness and keeping the team up to date
  • Perform security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques
  • Detect incidents through proactive “hunting” across security-relevant data sets
  • Thoroughly document incident response analysis activities
  • Review investigations conducted by more junior analysts to ensure quality standards are met
  • Develop new, repeatable methods for finding malicious activity across the networks
  • Provide recommendations to enhance detection and protection capabilities
  • Regularly present technical topics to technical and non-technical audiences
  • Develop and follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of information security incidents
  • Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment
  • Provide assistance to other security teams
  • Continually develop new technical skills and push overall team capabilities forward
  • Engage with and mentor other team members
  • Work with other teams on major engineering and architecture initiatives
  • Be innovative with their understanding of attack methodologies, malware analysis, malicious toolkits, and how those may manifest within various security technologies
  • Advanced proactive threat hunting
  • Understands advanced adversary emulation concepts
  • Advanced use case design for insider threat, operational, threat detection and response
  • Review of defensive and detective controls to reduce client attack surface

AWSCloud ComputingCybersecurityData AnalysisGCPTableauAzureData visualizationScripting

Posted about 11 hours ago
Apply
Apply
🔥 Sr. Threat Analyst | Remote, USA
Posted about 11 hours ago

📍 United States

🧭 Full-Time

🔍 Information Security

🏢 Company: Optiv_Careers

  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation
  • Data analysis using SIEM, Database tools, and Excel
  • Experience troubleshooting security devices and SIEM
  • IDS monitoring/analysis with tools such as Sourcefire and Snort
  • Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus
  • Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
  • Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening
  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
  • Understanding of root causes of malware and proactive mitigation
  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
  • Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware”
  • Documenting and reporting on potential security incidents
  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits
  • Provide analysis on various security enforcement technologies
  • Perform knowledge transfers, document, and train clients regarding mitigation of identified threats
  • Provide ongoing recommendations to peers and customers on tuning and best practices
  • Actively research current threats and attack vectors being exploited in the wild
  • Actively work with analysts and perform investigations on escalations
  • Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach
  • Provide gap analysis for clients to better their security posture
  • Maintain and develop SOPs for threat analyst team
  • Develop and maintain Playbooks and runbooks
  • Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team
  • Training of new analysts on security and tools
  • Create and maintain Content Catalog based on security essentials and the evolving threat landscape
  • Provide quality assurance (QA) review of security alerts handled by Team members

SQLCybersecurityData AnalysisCommunication SkillsAnalytical SkillsCustomer serviceLinuxWritten communicationTeamworkReportingTroubleshootingJSONScripting

Posted about 11 hours ago
Apply
Apply

📍 United States

🔍 Cybersecurity

🏢 Company: Keeper Security, Inc.

  • 2+ years of software sales experience working in or selling to Managed Services Providers (MSP)
  • Salesforce experience
  • Experience managing full sales cycle
  • Understanding of Managed Services Partners and the platforms they operate to provide product to their end user customers
  • Thrive in a supportive but independent workplace with the opportunity to grow as our organization grows
  • Proactively target new Managed Services Partners through prospecting and lead generation campaigns by phone and emails
  • Manage active relationships with MSPs and be able to answer pricing, resources, and sometimes technical questions, or direct to the appropriate Keeper resource
  • Manage full sales cycle
  • Clearly differentiate between KeeperMSP’s offerings and competing solutions
  • Manage your schedule to include both existing relationship expansion and also new MSP prospecting
  • Prioritize channel partnerships and distribution relationships, utilizing 3 tier distribution models
  • Effectively articulate and demonstrate the Keeper MSP platform to prospective new partners
  • Prospect within current partners and cross-sell leveraging new products
  • Keep a solid understanding of MSPs within the larger Channel landscape
  • Maintain contractual documentation for your MSPs
  • Participate in cold call/role play activities and shadow cold calls with colleagues
  • Utilize additional sales resources to target and identify new business targets
  • Leverage Salesforce.com database to accurately reflect pipeline and account activity
  • Facilitate the proposal review process for new business opportunities
  • Support Senior MSP representatives within your region

CybersecuritySalesforceSales experienceLead GenerationCRM

Posted about 11 hours ago
Apply
Apply

📍 United States

🧭 Full-Time

💸 150000.0 - 215000.0 USD per year

🔍 Software Development

🏢 Company: Vannevar Labs

  • 5+ years of full stack software developer or site reliability engineer experience
  • Experience building with AWS architecture
  • Experience deploying code to classified infrastructure
  • Experience with Kubernetes
  • Located in Hawaii, San Diego, Seattle, or able to travel to one of those locations 2x/month
  • Familiarity with the Risk Management Framework (RMF) process for obtaining an Authority to Operate (ATO)
  • Minimum Secret clearance
  • Develop applications to be hosted on classified networks
  • Implement DevSecOps practices for software deployment
  • Implement critical security controls to meet accreditation standards for the Department of Defense
  • Provide hands on keyboard support to deploy software on classified networks
  • Implement logging + monitoring solutions for debugging complex software systems
  • Work with Information Systems Security Mangers (ISSMs), Information System Security Officers (ISSOs) and Authorizing Officials (AOs) to accredit a microservice container architecture for classified cloud.
  • Work with internal developer teams to ensure timely patching of software vulnerabilities and code security best practices

AWSBackend DevelopmentDockerPythonSoftware DevelopmentCybersecurityFull Stack DevelopmentKubernetesReact.jsTypeScriptREST APICI/CDDevOpsTerraformMicroservicesNodeJS

Posted about 12 hours ago
Apply
Shown 10 out of 970

Ready to Start Your Remote Journey?

Apply to 5 jobs per day for free, or get unlimited applications with a subscription starting at €5/week.

Why Remote Marketing Jobs Are Best Found Through Our Platform

We’ve developed a well-thought-out service for home job matching, making the searching process easier and more efficient.

AI-powered Job Processing and Advanced Filters

Our algorithms process thousands of offers postings daily, extracting only the key information from each listing. This allows you to skip lengthy texts and focus only on the offers that match your requirements.

With powerful skill filters, you can specify your core competencies to instantly receive a selection of job opportunities that align with your experience. 

Search by Country of Residence

For those looking for fully remote jobs in their own country, our platform offers the ability to customize the search based on your location. This is especially useful if you want to adhere to local laws, consider time zones, or work with employers familiar with local specifics.

If necessary, you can also work remotely with employers from other countries without being limited by geographical boundaries.

Regular Data Update

Our platform features over 40,000 remote work offers with full-time or part-time positions from 7,000 companies. This wide range ensures you can find offers that suit your preferences, whether from startups or large corporations.

We regularly verify the validity of vacancy listings and automatically remove outdated or filled positions, ensuring that you only see active and relevant opportunities.

Job Alerts

Once you register, you can set up convenient notification methods, such as receiving tailored job listings directly to your email or via Telegram. This ensures you never miss out on a great opportunity.

Our job board allows you to apply for up to 5 vacancies per day absolutely for free. If you wish to apply for more, you can choose a suitable subscription plan with weekly, monthly, or annual payments.

How to Start Your Online Job Search Through Our Platform?

To begin searching for home job opportunities, follow these three steps:

  1. Register and complete your profile. This process takes minimal time.
  2. Specify your skills, country of residence, and the preferable position.
  3. Receive notifications about new vacancy openings and apply to suitable ones.

If you don't have a resume yet, use our online builder. It will help you create a professional document, highlighting your key skills and achievements. The AI will automatically optimize it to match job requirements, increasing your chances of a successful response. You can update your profile information at any time: modify your skills, add new preferences, or upload an updated resume.