Remote Cyber security Jobs

245 results

Job listings

You will participate in the strategic design and development of our clients' information and IT security systems, provide consultation on technical, organizational and process-level security issues, and support the introduction and operation of ISMS systems, especially based on the ISO/IEC 27001 standard.

Principal Consultant, AI, Proactive Services (Unit 42)

Palo Alto Networks πŸŒπŸ›‘οΈπŸ”’
$151,000–$208,000
USD/year

The Principal Consultant, Artificial Intelligence (AI) for Proactive Services leads engagements on our AI team, assessing security risk in the development and use of AI models and tools across multiple frameworks and acts as a technical key team member in client engagements. They provide expert recommendations to enhance their AI security posture.

Principal Consultant, GRC, Proactive Services (Unit 42)

Palo Alto Networks πŸ›‘οΈπŸ’»πŸŒ
$151,000–$208,000
USD/year

Focused on leading our Governance, Risk, and Compliance team across a comprehensive portfolio of clients. Assess security risk across multiple frameworks and act as a technical key team member in client engagements. Be the client’s advocate for cybersecurity risk management and will provide strong recommendations.

Senior Penetration Tester

Strata Information Group β„ΉοΈπŸ’»πŸ›‘οΈ
$120,000–$130,000
USD/year
US 3w PTO

By joining our team, you will immediately start making a difference securing a wide range of organizations. Some of your key responsibilities may include: Performing different penetration tests for a variety of clients, identifying security weaknesses and developing mitigation strategies, communicating with clients and breaking down complex security topics, developing and delivering reports and presentations to both technical and non-technical audiences, and providing mentorship and fostering teamwork.

DevOps Engineer (Security)

Deutsche Telekom TSI Hungary Kft. πŸ’πŸ’»πŸ›‘οΈ

As a DevOps Engineer you will Manage and automate HSM and PKI systems for secure key operations, Implement MFA, least privilege access, and conduct security assessments Responsible Infrastructure & Automation using Terraform and Ansible for infrastructure, Deploy and maintain secure remote access (RDP, Jumpservers) with high availability Enhance access policies and integrate security into the SDLC Secure and manage CI/CD pipelines to meet compliance standards.

Security Specialist

Kojo πŸ’πŸ”¨πŸ—οΈ

This is an IC role that blends hands-on technical work with audit readiness, policy management, and risk oversight. As Kojo's Security Specialist, you’ll be the go-to expert for SOC 2, AWS security, incident response, and access control as the company grows. This position directly influences how security is built, enforced, and maintained across the infrastructure.

Senior DevSecOps

Nearsure πŸŒβœ¨πŸš€

As a Senior DevSecOps, you will bring a proven track record in designing complex, integrated security solutions and translate strategic security objectives into a robust, scalable, and actionable technical architecture. You will optimize cloud presence, performance, and security. You will also implement infrastructure and cloud solutions including computing, networking, routing, and security.

Director, Ransomware Detect & Respond

Halcyon πŸ›‘οΈπŸ€–πŸ“‘
$150,000–$180,000
USD/year

Halcyon is looking for an experienced Director to lead the 24/7/365 Security Operations Center, owning all aspects of continuous monitoring of our anti-ransomware platform. In this role, you will be responsible for ensuring real-time visibility into ransomware threats and guiding customers through detection and mitigation, requiring strategic thinking to establish scalable processes and build a high-performing team of SOC analysts to keep customers safe.

IT Security Manager - remote

Sterlington βš–οΈπŸ’πŸ€

The IT Security Manager role involves overseeing cybersecurity operations, ensuring compliance with security policies, and managing a team of security personnel. Responsibilities include maintaining data for cybersecurity reporting, escalating cybersecurity issues, ensuring cybersecurity procedures are well-documented, integrating security requirements into continuity planning, and evaluating security tool development.