Computer Security Jobs - Remote Work From Home & Flexible
Welcome to remote, part-time, freelance, and flexible Computer Security jobs! Often called security engineers, the jobs you'll find listed below deal with the security of computer networks and information. Computer security jobs require people with advanced skills, education, and training in systems administration,... More
Welcome to remote, part-time, freelance, and flexible Computer Security jobs! Often called security engineers, the jobs you'll find listed below deal with the security of computer networks and information. Computer security jobs require people with advanced skills, education, and training in systems administration, computers and information technology, and information security infrastructure. Security engineers are tasked with designing and evaluating and maintaining information security solutions, firewall systems, risk assessment, and crisis management. Companies hiring for computer security jobs come from industries like gaming, IT consulting, government, education, business solutions, engineering, communications, transportation, and many others. Security engineer is a very common job title for computer security jobs, and you'll also find job titles like information system assurance specialist, security system engineer, data protection engineer, security manager, incident response consultant, and network security advisor. See below for the latest flexible and remote computer security jobs!
-
New! YesterdayWork cross collaboratively with front- and back-end development teams, Legal, IT Security and Compliance, and Business Systems to ensure that together we have the right combination of systems and policies, tools and automation to identify and protect...
-
New! YesterdayDraft customer-facing security documentation, white papers, FAQs, and website content with an aim toward driving velocity in the sales cycle. Assist with the development of customer-facing security assurance content that details our security...
-
New! YesterdayWrite infrastructure as code using CloudFormation or similar. You should see different technologies as a means to an end and be well practiced at hunting for a solution through unfamiliar domains. Drive the evaluation, integration and testing of new...
-
New! YesterdayEnsure that our customers & their data are protected by strong baseline security, in partnership with our information security teams. Identify relevant security standards and certifications to meet (and exceed) customer expectations for the markets in...
-
New! YesterdayLead the company's external risk assessment and audit process, further improving the company's security posture. Use security risk assessments, penetration test results, and threat models to estimate risk levels for prioritizing. Maintain company risk...
-
New! YesterdayOversee the day-to-day operations of a team that builds and operates security infrastructure and tooling at scale. Maintain a 24x7 on-call rotation for critical internal services. Support the Secure remote Access (VPN, Bastion Hosts, SSH) and Secrets...
-
New! 2 days agoPlan, develop, and implement corporate privacy initiatives, partnering with Security, Technology, Legal, and other stakeholders. This position will manage individual project priorities, deadlines and deliverables. Work closely with stakeholders to...
-
FeaturedNew! 2 days agoDesign and engineer IAM solutions. Perform hands-on development of IAM solution. Configure and support IAM vendor products. Manage implementations and releases via CI/CD strategies. Usage of technologies such as Neo4J, LDAP, .NET/Java development...
-
New! 2 days agoLead our SIEM efforts, including managing the overall platform, integrating log collection across multiple tools, and working with our Security Operations team to build detection patterns and alerts. Build dashboards and data visualizations...
-
New! 2 days agoLead the Enterprise Incident Management service globally and ensure there is follow-the-sun coverage provided across all time zones supported by the business. Drive Incident Management Strategy (people, process, and technology) to drive transformation.
-
New! 2 days agoWe're looking for someone who is technically inclined, able to navigate and partner with complex organizations successfully to drive alignment, organize planning activities, and drive sustained process improvements.
-
New! 2 days agoThe scope of influence includes partnering with product development and infrastructure teams. You will influence through leading deep technical architecture discussions with product architects, product managers, and software engineers.
-
New! 2 days ago2+ years experience in the cybersecurity profession. A passion for the cybersecurity industry and community, and a desire to impact lives and business outcomes. A passion for teaching and an ability to explain complex technical concepts to beginners.
-
New! 2 days agoWork with cross-functional teams to develop and implement secure DevOps practices that meet industry standards and regulatory compliance requirements. Conduct periodic security audits, assessments, and risk analyses to identify vulnerabilities and...
-
New! 2 days agoAnalyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. Bachelor's degree in Cybersecurity, Network Engineering, Information Technology, Management Information Systems or...
-
New! 3 days agoSupport, maintain & improve our Security SDLC by building strong relationships & being deeply embedded within product, infrastructure, platform & software engineering teams.Leverage an extreme automation mindset to build security controls into workflows.
-
New! 3 days agoOperate and maintain our vulnerability assessment tools. Set scanning schedules, run scans, and verify results. Support mitigation and remediation of vulnerability findings. Organize and report scan results to eliminate false positives and duplicate...
-
New! 3 days agoDevelop & implement information security policies & procedures that comply with industry standards & regulatory requirements.Conduct risk assessments and vulnerable assessments to identify potential security threats & develop mitigation strategies.
-
New! 3 days agoPrepare Privacy Threshold Analyses (PTA); System of Records Notices (SORN); Privacy Impact Assessments (PIA); and Privacy Act (PA) statements to analyze new or proposed changes to existing technology, sharing agreements, and programs to identify...
-
New! 3 days agoResponsible to define areas of responsibility including resource allocations, influencing sponsors and managing work prioritization. They play an active role in making decisions involving human resources, technical and financial resources necessary to...
-
New! 3 days agoEstablish the governance framework for information security to provide assurance that information security strategies are consistent with applicable laws and regulations. Identify key security initiatives and programs through a risk based approach.
-
New! 3 days agoPlan, research, and develop security architecture for the product domain. Define roadmaps to support security and product goals. Create conceptual and logical architecture designs. 5+ years of architecture experience. 3+ years of information security...
-
New! 3 days agoProvide technical leadership to guide strategic customers to successful implementations on Unity Catalog and Delta Sharing, ranging from advisory and design to deployment to troubleshooting. 3+ years experience in a customer-facing technical role with...
-
New! 4 days agoYou will provide world-class product support to customers through our various support channels (online portal, phone, chat), ranging from basic Q&A to complex problem resolution. You will maintain active ownership and communication with customers on...
-
New! 4 days agoManage underwriting activity, working with insurance brokers to negotiate pricing, coverages and other terms as we profitably build and grow our book of business. In line with underwriting standards, collaborate with Security Engineers to review...
-
New! 4 days agoConsult with developers to ensure the security of the platform and its components, and identify solutions or approaches to ensure that the software is being developed and deployed securely. Implement security technology to protect the company against...
-
New! 4 days agoDefine and implement the Security Risk Management approach. Establish KRIs, KPIs, and create dashboards and reports. Participate in the design and implementation of the Data Protection Program. Participate in key customer audits, contract reviews, and...
-
New! 4 days agoLead internal and external stakeholders to understand business objectives & advise on complex mitigation strategies during the incident response work. Oversee cross-functional incident response teams & lead members during security events.
-
New! 4 days agoOversee the Privileged Access Management development team and services including privileged IDs for employee and partner accounts acting as escalation point as required. Work with teams to integrate various application with CyberArk for password...
-
New! 4 days agoServe on a team who partners with customers, helping them understand the full scope of information available and make informed decisions about their security program. Tailor communication to the customer's level of expertise, providing education.
-
New! 4 days agoAs a cloud security engineer on the Security Team, you'll work closely with software engineers, product managers, and designers, to ensure that our infrastructure is secure. You'll work on major technical projects with large data volumes, lead the...
-
New! 4 days agoPartner with Engineering and Ops leadership to evolve the security maturity of the development lifecycle including the integration of modern security controls, standards, and processes into all phases of software design and development. Identify and...
-
New! 4 days agoPartner with assigned business units to understand their use of data, and their processing activities, and to assist in the planning and strategy regarding new uses of data. Provide data privacy compliance consultation to IGT's global business units...
-
New! 4 days agoResponsible for the administration, implementation, and management of SailPoint Identity IQ. Including upgrading and patching of the environment. Develop Debugs and Implements built-in and custom SailPoint connectors. Can develop SailPoint integrations...
-
New! 4 days agoResearching, interviewing, and working cross-functionally with SMEs and customers to translate product capabilities and convey value. Owning the production of self-service, modular interactive demos for use on the website, our community, social media...
-
FeaturedNew! 4 days agoManage complicated cross-platform cases. Work with vendors, integrators, and 3rd parties. Work independently as well as work collaboratively within a team environment and with a virtual team. Provide network assistance in person, remotely & via phone.
-
New! 4 days agoAs a Senior Manager, you will be responsible for managing T&S support agents and providing feedback to help them grow within their career. You will review and own case escalations. You will also closely monitor and identify different issues and...
-
New! 4 days agoImprove/refine existing Sales Programs & Operations reporting policies and procedures. Provide Weekly/Monthly updates and forecast insights to Sales and Sales Operations on key activity within their Sales Team and Theater. Lead analysis of business.
-
New! 5 days agoIntegrate security technologies and best practices into everything built from infrastructure and automation to Containers and Serverless functions. Implement IaC scanning tools within the CI/CD Pipelines. Perform implementation of CNAPP and CSPM tools...
-
New! 5 days agoPropose, plan, lead, and execute Red Team operations based on realistic threats to the organization. Automate attack techniques, creating custom tooling for specific operations and contributing to general-purpose open source tools. Deploy and manage...
-
New! 5 days agoPerform vulnerability and penetration testing, documenting findings with reproducible steps and remediation methodologies. Focus on automation to improve testing and remediation efficiency. Develop, share, and maintain tools and scripts for penetration...
-
New! 6 days agoEnsure efficient operations between MDR teams stack. Make integrations where needed or benefit Coalition MDR and client stacks. Evaluate, test, implement, and operate endpoint, cloud, and network-based security tools to enhance Infosec's monitoring.
-
Featured1 week agoThis role will include hands on engineering and development of IAM solutions as well as support of vendor products primarily related to Secrets Management. An ideal candidate will have strong engineering skills and ability to help manage product suite.
-
1 week agoCreating and executing on strategic roadmaps for corporate security that's prioritized based on business needs, risk and shifting priorities - e.g. Enterprise wide DLP program that covers endpoints, SaaS, and Cloud resources; VDI Infrastructure best...
-
1 week agoResponsible for our CI/CD pipelines, testing & overall infrastructure. Managing our security and compliance needs from an engineering perspective. 3+ years of management experience with previous hands-on software development experience.
-
1 week agoEstablish frameworks to measure and report on the cyber risk and resiliency of critical components to the Canadian Financial System. Working with different architecture and design techniques (e.g., object-oriented, top-down, structured analysis and...
-
1 week agoAssess the impact of security events by leveraging host, cloud and network-based indicators and evidence to deliver actionable incident escalations. 3+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team.
-
8 days agoBuild and operate cloud's security systems for automated detections and responses as code using DevOps tools and practices in Azure and AWS. Proactively identify risks & malicious activity in our cloud infrastructure and systems. Analyze systems.
-
8 days agoServe as the primary subject matter expert and leader on all aspects of compliance, governance, and risk management. Provide regular reports to the Head of Product Security and as required, with internal or external entities. Serve as the primary...
-
8 days agoIdentify vulnerabilities, missing patches, and misconfigurations across our cloud, on-premise, and employee infrastructure and ensure there is a scalable approach to prioritizing fixes for any issues identified.