Remote DevOps Engineer Jobs

Cybersecurity
1,128 jobs found. to receive daily emails with new job openings that match your preferences.
1,128 jobs found.

Set alerts to receive daily emails with new job openings that match your preferences.

Apply

📍 United States, Canada

🔍 Cybersecurity

  • 6+ years of experience in communications, public/media relations or related field.
  • Deep expertise in enterprise security.
  • Strong, existing connections with key security media outlets and influencers.
  • Proven ability to develop and execute communication strategies.
  • Experience working closely with executive spokespeople.
  • Exceptional messaging, storytelling, and writing skills.
  • Experience managing sensitive cybersecurity-related incidents from a media relations perspective.
  • Experience working cross-functionally across marketing organizations.
  • Ability to swiftly respond to industry developments and position 1Password appropriately in the media landscape.
  • Develop and maintain relationships with key security journalists and influencers.
  • Create and direct compelling content, including press releases and blog posts.
  • Develop media and speaking strategy for industry events.
  • Lead the development of rapid response strategies.
  • Support the Director, Communications & Social Media, in the execution of communications response plans.
  • Work closely with marketing, product, spokespeople, and our external agency partners.
  • Monitor and report on the effectiveness of communication strategies.

CybersecurityContent creationCommunication SkillsSEOWritten communicationAdaptabilityReportingCross-functional collaborationMarketingStrategic thinkingDigital MarketingData analytics

Posted 1 day ago
Apply
Apply

📍 US

🔍 Cybersecurity

🏢 Company: New Era Technology👥 1001-5000InternetInformation TechnologyAudio/Visual Equipment

  • Experience working with cybersecurity teams, ideally supporting change management or project management activities.
  • Relevant experience in change management related to transformation programs (stakeholder assessment, change impact analysis, organization design, communication planning and execution, training support and business readiness)
  • Familiarity with project management tools and processes.
  • Proven ability to work creatively and analytically in a problem-solving environment.
  • Ability to interact with leadership and staff at all levels.
  • Strong problem solving and root cause identification skills.
  • Excellent communication and interpersonal skills.
  • Proficiency with Microsoft Office applications (Outlook, PowerPoint, Word, Excel).
  • Assess the organization’s current change management posture.
  • Develop a change management strategy to support security-related programs and initiatives.
  • Implement change management processes and tools to support adoption of cybersecurity changes.
  • Contribute to practice-building efforts such as knowledge sharing and training.
  • Develop processes to measure progress and effectiveness of change management activities and business readiness.
  • The ability to effect change through business process engineering design, prevent change collisions at scale, and how ways of working are conducted for better efficiency and customer satisfaction.

Project ManagementCybersecurityCommunication SkillsProblem SolvingMicrosoft OfficeAgile methodologiesMS OfficeStakeholder managementChange Management

Posted 1 day ago
Apply
Apply

📍 Australia, New Zealand

🧭 Full-Time

🔍 Software Development

  • Experience (5-8 years+) in maintaining Cloud-based platform services where reliability and security are core goals
  • Proficient in one or more programming languages, and can directly contribute to the design and implementation of features (you will be programming)
  • Strong software engineering fundamentals; be able to hold court with principal-level engineers and significantly contribute to design documents and complex software architecture
  • Comfortable with computer science and engineering fundamentals: concurrency, data structures
  • Experience securing or building on on cloud-based environments (AWS, Google Cloud, Azure).
  • Directly input into vision-setting, strategy and planning for the team
  • Own the full lifecycle of features, from design docs and stakeholder alignment through implementation, testing, rollout, and maintenance
  • Champion adoption of security platform features across Canva’s engineering teams
  • Share learnings and key knowledge with the wider security group
  • Support services through on-call, building run books, running tabletop exercises, etc
  • Engage with stakeholder teams to anticipate future security engineering needs
  • Identify opportunities for cross-team collaboration to work on new ideas and improvements that help achieve our goals

AWSBackend DevelopmentDockerSoftware DevelopmentSQLCloud ComputingCybersecurityDesign PatternsKubernetesData StructuresCI/CDRESTful APIsLinuxDevOpsTerraformSoftware Engineering

Posted 1 day ago
Apply
Apply

📍 United States

🔍 Cyber Security

🏢 Company: Optiv_Careers

  • 1-3 years’ experience implementing, administering, and support identity governance technologies and related infrastructure within SailPoint ISC
  • 1-3 years’ experience querying and binding objects in SailPoint ISC
  • 1-3 years’ experience with Active Directory objects, architecture, and back-end infrastructure
  • Strong troubleshooting and issue isolation skills
  • Experience remotely administering both Windows Server OS and Unix/Linux-based systems from a command line interface (MCSE and/or MS Azure certifications a plus)
  • Familiarity with diagnostic tools and analyzing data (Analyzing Error Logs)
  • 1-3 years’ proficiency with database querying languages and methods (SQL, MySQL, MongoDB, etc)
  • Familiarity with Web 2.0 data parsing methods and protocols (REST, SOAP, OpenAPI, XML, JSON, etc)
  • Familiarity with applicable scripting languages (Postman, Powershell, Beanshell, Javascript, Python, etc)
  • Must possess or be able to obtain SailPoint Certified Engineer certifications on hire
  • Serve as a primary technical responder for incidents and requests pertaining to various technologies including, but not limited to SailPoint ISC
  • Perform discovery audits and work with clients to develop certification and compliance campaigns and reporting
  • Collect logs, analyze failure situations, troubleshoot issues, and implement known solutions while maintaining established OLAs/SLAs
  • Document incident resolutions, RCA/RFOs, and SOPs, design specifications, and reference architectures as needed
  • Perform routine changes and maintenance including hotfix and security patching, device reboots, and configuration backups

SQLCybersecurityREST APILinuxTroubleshootingJSONScripting

Posted 1 day ago
Apply
Apply

📍 United States

🧭 Full-Time

💸 190000.0 - 225000.0 USD per year

🔍 Cybersecurity

🏢 Company: Huntress👥 251-500💰 $60,000,000 Series C almost 2 years agoSecurityInformation TechnologyCyber SecuritySoftware

  • 6+ years experience in a SOC, Incident Response, or Forensics role
  • Ability to explain possible complex alerts/events in a non-complex way, both written and verbal
  • Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team
  • Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis)
  • Demonstrated experience with Windows and/or MacOS as an attack surface
  • Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs)
  • Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts)
  • Strong experience with M365/Cloud attack techniques
  • Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or cybersecurity
  • Function as the lead liaison between the SOC and other Product and Research teams
  • Build automation to help reduce the workload on the SOC through report template creation
  • Own and complete investigative objectives associated with multi-host intrusions without assistance
  • Triage, investigate, and respond to alerts coming in from the Huntress platform
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat
  • Perform advanced malware analysis as part of investigating systems and identities
  • Investigate suspicious Microsoft M365 activity and provide remediations
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions
  • Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed
  • Contribute to detection efforts by helping to create or request net new detections as well as tuning detections
  • Provide technical mentorship of more junior team members
  • Contribute regularly to external facing Huntress content such as blogs, webinars, presentations, and speaking engagements

CybersecurityMicrosoft .NETAzureMentoringLinuxScripting

Posted 2 days ago
Apply
Apply

📍 United States

🧭 Internship

💸 20.0 USD per hour

🏢 Company: Worldly👥 11-50

  • Strong verbal and written communication skills
  • Ability to work independently and as part of a team
  • Proactive problem-solving mindset
  • Analytical thinking and attention to detail
  • Ability to adapt to new tools and technologies quickly
  • Technology: Python, SQL, AWS, Git, TensorFlow, Tableau, Jupyter Notebooks
  • Developing and testing software solutions to improve system functionality and performance
  • Analyzing large datasets to identify trends, insights, and areas for improvement
  • Assisting in building and optimizing machine learning models for predictive analytics
  • Supporting data engineering tasks, such as data cleaning, transformation, and structuring
  • Researching and implement best practices in AI/ML, cybersecurity, or cloud infrastructure
  • Collaborating with engineers and data scientists to design scalable solutions
  • Writing clean, efficient code and documentation to support team projects
  • Conducting performance testing and debugging to improve application efficiency
  • Assisting in securing cloud-based systems and mitigating potential security risks
  • Presenting findings and recommendations to the technology team

AWSPythonSoftware DevelopmentSQLCybersecurityGitMachine LearningTableauData engineeringTensorflow

Posted 2 days ago
Apply
Apply

📍 United States

💸 145000.0 - 160000.0 USD per year

🔍 Software Development

🏢 Company: Harness

  • At least 7 years of relevant industry experience in roles such as systems engineer, security engineer, cloud security specialist, or site reliability engineer.
  • Expert-level professional knowledge in enterprise applications and infrastructure.
  • Extensive experience working in a cloud-native environment, with proficiency in platforms like AWS, GCP, and Azure.
  • Familiarity with industry regulations and compliance certifications, including ISO 27001, SOC 2, FedRAMP, and SOX.
  • A desire to contribute to a high-growth environment and take a leading role in building new programs from the ground up.
  • Strong attention to detail and a willingness to ask questions when uncertain.
  • Comfort with ambiguity, with a proactive approach to bringing clarity in uncertain situations.
  • Take a leading role in the design of the next level of secure operations for Harness' cloud and business infrastructure
  • Take charge of implementing and overseeing security tooling, encompassing the detection and alerting systems for identifying malicious activity and insecure configurations
  • Utilize automation to effectively manage and enhance the security posture of Harness' multi-cloud Kubernetes-based infrastructure
  • Use Harness CI/CD to integrate security processes like vulnerability management into the SDLC
  • Contribute to the development, review, and implementation of technical security and compliance-related engineering requirements across global Engineering teams
  • Detect, respond, and mitigate security related events and incidents.
  • Collaborate with fellow Developers and Product Managers to analyze and implement security standards, methods, and architectures

AWSCloud ComputingCybersecurityGCPKubernetesAzureCI/CDRESTful APIsLinuxDevOpsTerraformComplianceAnsibleScripting

Posted 2 days ago
Apply
Apply

📍 Canada

🧭 Temporary

🏢 Company: J.D. Power👥 501-1000Market ResearchAnalyticsSoftware

  • 5+ years of experience as a Senior Project Manager overseeing the implementation of cyber security projects in a complex environment.
  • Strong working knowledge of new security tools implementation, network security and Audits
  • Experience managing projects which involve 3rd party managed services.
  • Having a CISSP, CISM and/or GSEC certificate is a desirable asset.
  • Experienced with hybrid (Waterfall and Agile) project, management principles along with a demonstrated ability to lead distributed teams consisting of technologists and business representatives toward increased agility over time
  • Experience as a member of a high performing team working in a fast-paced enterprise software development environment while demonstrating a strong ability to balance multiple priorities and respond to urgent issues and changes in product priorities.
  • Ability to understand the line of business, product/project domain and its relationship to the overall client portfolio. Strong understanding of development process (full SDLC), including an understanding of applicable IT Infrastructure and regulatory directives
  • Superior analytical, evaluative and problem-solving abilities. Ability to analyze and identify problems, evaluate alternatives, find a solution; and make informed decisions
  • Ability to manage approval and sign-off, allocate project resources, and manage priorities and schedule conflicts to enable efficient decision making
  • Ability to use active listening skills to read situations quickly, settle disputes equitably, and negotiate agreements. Looks for a win-win agreement that can be understood and accepted by the project team
  • Communicate timely, tactfully, concisely, and candidly, simplify jargon and make required stakeholders aware of all issues. Encourage interactive communication; be receptive to both positive and constructive feedback, and listen to team members and customers
  • Manages key relationships with internal & external executive, business and vendor teams. Understand who the stakeholder is and what the stakeholder's needs are; to be able to set realistic expectations and to reach an agreement with the business from the project onset
  • Proficient PC skills using Microsoft Tools. Ability to understand and apply established policies and procedures, corporate tools and technical requirements
  • Effective negotiator using positive win/win strategy, applying negotiation skills with internal and external stakeholders, team members, and vendors
  • Effectively leverages technical and business expertise to optimize team delivery
  • Ability to travel based on assigned project
  • Develop/manage full-scale project plans and communication documents using appropriate tools provided
  • Work on security projects portfolio: Deliver enhancements, migrations, and implementation projects with a focus on IT security.
  • Logically organize the work, so it is executed effectively and managed to the schedule
  • Initiate resource requests and update as required. Make optimal use of resources
  • Track, manage, update and control issues. Understand how to assess, document and manage internal and external project risks; develop contingencies and mitigation plans
  • Maintain focus on budget and communicate or escalate if estimated costs are at risk. Understand and manage potential budget impact per contractual obligations and SLAs. Understand how to use project management tools and techniques related to cost planning and estimating. Understand and explain the root causes for variance
  • Clearly understand the scope, identify changes early, and execute change approval procedures
  • Set achievable project objectives; maintain a positive outlook; take responsibility; make decisions; and provide constructive feedback. Can strategize, inspire and motivate team members to achieve a common goal
  • Work on multiple projects simultaneously with teams located in different time zones
  • Ensure project documents are completed, labelled and stored
  • Coach, mentor, motivate and supervise project team members and contractors and influence positive action and accountability. Within a team structure, understand and know how to share information and best practices, delegate responsibility and promote support and interaction. Maintain a high level of trust with team members
  • Project status reports are prepared and reviewed as required with appropriate details and distributed weekly
  • Consistently communicate project expectations to team members and stakeholders
  • Operational management in ensuring quality planning, delivery & execution of the project
  • Manages key relationships with internal & external executives, business, procurement and vendor teams

Project ManagementAgileCybersecurityProject CoordinationCommunication SkillsActive listeningRisk ManagementTeam managementStakeholder managementChange ManagementBudget management

Posted 2 days ago
Apply
Apply

📍 Japan

🔍 Electronic Security, CCTV, Telecom, Cybersecurity or IoT-related

🏢 Company: Alarm.com👥 251-500💰 $425,000,000 Post-IPO Debt 10 months agoInternetWirelessInternet of ThingsSecurity

  • 2+ years work experience in technical support and/or account management
  • Language requirements – must speak Japanese at professional, fluent in English
  • Electronic Security, CCTV, Telecom, Cybersecurity or IoT-related industry experience is a plus
  • The ability to communicate with customers and vendors, both in writing and verbally in a clear, professional manner
  • A highly motivated self-starter who is able to operate independently
  • Excellent people skills; natural customer service orientation and disposition – candidate must enjoy working with clients and supporting internal customers in the organization
  • Excellent problem-solving skills
  • The ability and commitment to meet deadlines, even during high volume periods
  • Proficiency with Microsoft Outlook, Excel, Word, and PowerPoint
  • Ability to travel up to 50%
  • Build and maintain strong technical relationships with key accounts in the APAC region, guided by our international business development team.
  • Assist with pre-sales engineering needs for key prospects and facilitate entry into new markets.
  • Serve as a technical escalation point for any potential issues in the region.
  • Conduct product introduction, installation, and training sessions for our business partners.
  • Gather feedback from partners and their customers to enhance our product offering for the local market.
  • Represent Alarm.com at various industry events alongside the business development team.
  • Stay updated on new Alarm.com product and feature releases to efficiently respond to partner inquiries.
  • Identify product and feature improvements based on feedback from key partners, tailored for local markets.
  • Travel across the APAC region to engage with strategic dealer partners.

CybersecurityIoTCommunication SkillsProblem SolvingCustomer serviceRESTful APIsAccount ManagementTrainingSales experienceTechnical support

Posted 2 days ago
Apply
Apply

📍 United States

🧭 Full-Time

💸 150000.0 - 175000.0 USD per year

🔍 Data Security

🏢 Company: Virtru👥 101-250💰 $60,000,000 Series C about 3 years agoSecuritySaaSPrivacyInformation TechnologyCyber SecuritySoftware

  • 8+ years of product marketing leadership in enterprise-grade security or data protection solutions
  • Proven ability to bridge complex security concepts for diverse audiences
  • Strong understanding of enterprise security architecture, data protection models, zero trust principles, and regulatory compliance frameworks (CMMC, GDPR, FedRAMP, HIPAA, ITAR)
  • Technical aptitude with experience developing API/developer-focused marketing strategies, content, and engagement programs
  • Successful execution of 8+ large-scale software product launches with comprehensive commercialization strategies
  • Demonstrated ability to create differentiated value propositions and messaging in competitive security markets
  • Experience building comprehensive technical sales tools, including white papers, battle cards, product demonstrations, and more.
  • Outstanding communication capabilities across various formats (presentations, whitepapers, webinars, technical documentation)
  • Strong orientation to data-driven decision-making with experience in pricing strategy and key SaaS metrics analysis
  • Experience monitoring security market trends and conducting comprehensive competitor analysis
  • Create strategic insights into how we can impact potential customers.
  • Develop product positioning and messaging that differentiates our data security solutions.
  • Serve as a critical liaison between Product, Sales, and Marketing to ensure seamless product strategy execution.
  • Develop strategies to drive adoption and engagement within technical communities.
  • Design and manage ongoing enablement initiatives that equip Sales and channel partners.
  • Oversee the monitoring and operational reporting of the competitive landscape.

Business IntelligenceCybersecurityProduct ManagementSalesforceProduct DevelopmentStrategyProduct AnalyticsAPI testingContent creationCI/CDAgile methodologiesRESTful APIsLinuxMarket ResearchMarketingStakeholder managementStrategic thinkingDigital MarketingCustomer SuccessSaaS

Posted 2 days ago
Apply
Shown 10 out of 1128

Ready to Start Your Remote Journey?

Apply to 5 jobs per day for free, or get unlimited applications with a subscription starting at €5/week.

Why Remote DevOps Engineer Jobs Are Becoming More Popular

The remote work from home is increasingly in demand among computer and IT professionals for several reasons:

  • Flexibility in time and location.
  • Collaboration with international companies.
  • Higher salary levels.
  • Lack of ties to the office.

Remote work opens up new opportunities for specialists, allowing them to go beyond geographical limits and build a successful remote IT career. This employment model is transforming traditional work approaches, making it more convenient, efficient, and accessible for professionals worldwide.

Why do Job Seekers Choose Remoote.app?

Our platform offers convenient conditions for finding remote IT jobs from home:

  • localized search — filter job listings based on your country of residence;
  • AI-powered job processing — artificial intelligence analyzes thousands of listings, highlighting key details so you don’t have to read long descriptions;
  • advanced filters — sort vacancies by skills, experience, qualification level, and work model;
  • regular database updates — we monitor job relevance and remove outdated listings;
  • personalized notifications — get tailored job offers directly via email or Telegram;
  • resume builder — create a professional VC with ease using our customizable templates and AI-powered suggestions;
  • data security — modern encryption technologies ensure the protection of your personal information.

Join our platform and find your dream job today! We offer flexible pricing — up to 5 applications per day for free, with weekly, monthly, and yearly subscription plans for extended access.