Remote Cyber security Jobs β€’ Risk Assessment

9 results

Job listings

AI Tutor - AI Safety

XAI πŸ€–πŸ§ πŸš€

As an AI Tutor specialized in safety, you will contribute to xAI's mission by training and refining Grok to implement strong safeguards against misuse and vulnerabilities. Responsibilities include providing labels, annotations, and inputs involving safety protocols, risk scenarios, and policy compliance. You will also collaborate with technical staff to develop tasks that improve AI's ability to detect and resist unsafe behaviors.

PCI Compliance Consultant

Avertium πŸ›‘οΈπŸ’»πŸ”’
US Unlimited PTO

Avertium is seeking a PCI subject matter expert for our Risk & Compliance consulting practice, someone with an active QSA certification and at least 3 years of experience in the payment card industry. The individual must have expert knowledge of the PCI-DSS and have conducted multiple assessments for Level 1 Merchants and Service Providers.

IT Audit – Consultant

Deloitte πŸ“ŠπŸŒπŸ’‘

This position is a member of Deloitte Ireland Risk Advisory, working remotely from South Africa, as a member of our Technology and Digital Risk team. As a consultant, there will be opportunities for you to explore experiences in IT Risk competencies such as IT Internal/External Audit, IT Risk Management and Third-Party Assurance related areas.

Security Analyst III

Rackspace Technology β˜πŸš€πŸŒ

Perform real-time monitoring and analysis of security events from multiple sources, identifying the source or cause and providing recommendations for secure infrastructure through policy, practices, risk management, engineering, and improved operations. Responsible for adhering to company security policies and procedures and any other relevant policies and standards as directed.

Platform Security Analyst - USCIS - Remote

ITC Federal πŸ’»πŸ’‘πŸ“ˆ

The Platform Security Analyst will manage and design platform security solutions across multi-cloud environments requiring expertise in platform security, security analysis, and risk management, with the ability to implement security controls that protect critical enterprise platforms while maintaining operational efficiency.

Cybersecurity Engineer/Analyst (Intermediate Level)

County of Fairfax πŸ’πŸ‘¨βš™

Implement, administer, and use cybersecurity tools, systems, and applications; develop policies, standards, and guidelines to ensure secure enterprise-wide operations, performance, and resiliency. Deploy, administer, and support security systems and infrastructure including endpoint protection, intrusion detection and prevention systems, and firewalls. Monitor and respond to cybersecurity related events and incidents. Conduct risk assessments and validate security controls.

Information Security Analyst

Valon πŸ”‘πŸ πŸ’

As a key security member at Valon, you will play a critical role in ensuring the security of our organization's systems, cloud infrastructure, products and data. This role is responsible for ensuring the company’s technical controls meet security compliance requirements, managing risks and remediation, supporting operational and monitoring efforts, and driving program management activities.

Lead Vulnerability Management

CNA 🏒🀝🌐
$97,000–$189,000
USD/year

Lead the transformation and acceleration of Vulnerability Management (VM) into a core information security strength at CNA. You will lead an enterprise-wide VM program and team, developing strategy, driving priorities and initiatives with partners, and managing vulnerabilities per organizational risk tolerance across on-premises and cloud environments. Role blends deep technical expertise with strategic leadership, ensuring vulnerabilities across our environment are identified, prioritized, and remediated in a timely manner.

Cyber Security Consultant

AtkinsRΓ©alis βš™οΈβš›οΈπŸ’‘

Provide Cyber Security advice and guidance for clients in β€˜business as usual’, technical refresh and new project environments. Apply technical knowledge, with creative and innovative thinking in a broad range of complex and non-routine contexts. Identify and establish good security governance to meet client business requirements. Perform Cyber Security risk assessments and determine the most cost-effective deployment of security controls and solutions.