Sr Security Engineer
Remote job
Top Must Haves to Include in Submittal
Required: 4+ years of experience with a Senior Security Engineer Title.
Required: 4+ years of experience with active threat hunting, looking for potential attacks rather than just passively waiting for attacks
Required: Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures.
Required: 4+ years of experience with Microsoft Defender for Endpoint
Required: 4+ years of experience with Microsoft Sentinel (SIEM/SOAR)
Required: 4+ years of experience with Azure Security Center & Microsoft Purview Compliance Manager
Required: Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus.
Required: 3+ years of experience in Microsoft security technologies and tools such as Purview Information Protection
Required: 4+ years of experience with Managed Extended Detection and Response (MXDR)
Required: 9 out of 10 communication skills (must be able to understand everything they say and must have 10 out of 10 English comprehension. Accents are ok.)
Very Nice To Have: 2+ years of experience with red team/blue team exercises to test defenses and improve security operations.
Very Nice To Have: 2+ years of experience evaluating, influencing, and recommending technology and product direction
What does the company do Insurance
Location / Address: Orange, California
On-Site / Hybrid / Remote Fully Remote in any State in the US (PST Hours)
Reports To: Director of IT Infrastructure
Does this Position have Direct Reports No
COVDI19 Vax required No vaccination requirements
Accept Visa / H1b Sponsorship No (GC or USC only)
Schedule PST hours
Dress code Business Professional
Full Time Compensation
Base Salary: 120k-143k (could be flexible but would need approval)
Signing Bonus Potential: Potentially (would need approval)
Discretionary Bonus? Yes, they have an annual discretionary bonus but did not specify an exact percentage.
Annual Base Salary Merit Increase: Up to 4% per year
Stock: No
401k Match: 30% match up to 100% of IRS Annual Contribution Allotment
Relocation: No (fully remote role)
----------------------------------------------------------------------------
Minimum of 6+ years hands-on experience directly related to security (Minimum of 4 years as Sr. Level position)
Proactive hands-on threat hunting experience looking for potential attacks and identifying potential security risks
Deep experience and understanding of Microsoft Defender, Sentinel, Azure Security Center
Experience with Managed Extended Detection and Response (MXDR)
Security related certifications such as Certified Ethical Hacker (CEH), AZ-500 (Microsoft Azure Security Engineer) Certified Information Systems Security Professional (CISSP)
Reports to -- Director of IT Infrastructure
Perform active threat hunting, looking for potential attacks rather than just passively waiting for attacks
Perform red team/blue team exercises to test defenses and improve security operations.
Assists with vulnerability assessments, using provided security tools to identify system vulnerabilities
Design and implement security controls across cloud and on-premises environments
Create and maintain security monitoring and alerting solutions
Data Loss Prevention (DLP): Monitor DLP alerts, investigate incidents, and recommend actions to relevant teams to mitigate data breaches.
Assists in the planning and deployment of the companys cloud information security strategies
Manage Infrastructure and application security monitoring tools to detect and respond to security incidents in real-time
Participate in the development and improvement of the company's SDLC processes, ensuring security practices are integrated into all stages of product development
Responsible for evaluating, influencing, and recommending technology and product direction
Stay informed on the latest cybersecurity trends, emerging threats, attack techniques, and zero-day vulnerabilities affecting Microsoft environments and other relevant technologies.
On-site or remote regular attendance and punctuality are essential functions of the job.
Perform other business tasks or functions as assigned.
Qualifications
Knowledge, Skills & Abilities Required:
Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures.
Deep knowledge of Microsoft security solutions
o Microsoft Defender for Endpoint
o Microsoft Sentinel (SIEM/SOAR)
o Azure Security Center & Microsoft Purview Compliance Manager
o Microsoft Intune and Conditional Access Policies
Strong understanding of security principles and best practices
Strong knowledge and hands on experience with Data Loss Prevention
Hands-on experience in threat hunting
Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus.
Proficiency in Microsoft security technologies and tools such as Purview Information Protection, Defender for Cloud and Sentinel
Experience with Managed Extended Detection and Response (MXDR)
Proficient in Microsoft Office programs, including Word, Excel, PowerPoint, as well as Outlook.
Adhere to all PHI (Protected Health Information) and HIPAA (Health Insurance Portability and Accountability Act) guidelines.
Educational Requirements:
High School Diploma or equivalent required.
Bachelors degree in Computer Science, Cyber Security or equivalent experience required.
Minimum of six (6) years of hands-on experience in IT with a focus on security.
Physical Requirements:??Must be able to sit for extended periods and occasionally stand and walk. Must have adequate hearing for phone work. Vision requirements include close vision and the ability to adjust focus. Must be able to communicate effectively in English. Must be able to use a keyboard and other office equipment. Ability to lift up to 10 pounds occasionally.
“Benefit offerings include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits,
EAP program, commuter benefits, and 401K plan. Our program provides employees the flexibility to choose the type
of coverage that meets their individual needs. Available paid leave may include Paid Sick Leave, where required by
law; any other paid leave required by Federal, State, or local law; and Holiday pay upon meeting eligibility criteria.”
“Equal Opportunity Employer/Veterans/Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to *******************************************
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
• The California Fair Chance Act
• Los Angeles City Fair Chance Ordinance
• Los Angeles County Fair Chance Ordinance for Employers
• San Francisco Fair Chance Ordinance”
Smart Contract Security Engineer
Remote job
Our client is building the infrastructure for a more trustworthy internet.
We are looking for a Smart Contract Security Engineer. In this role, you wont just audit code, you'll shape the security model for high-value protocols and safeguard the trust of an entire ecosystem. You'll work at the intersection of cutting-edge research, high-stakes engineering, and adversarial thinking, building defences for decentralized systems.
This is a full-time position, fully remote or located with our primarily Seattle-based team.
What You Will Do
Lead design and security reviews of complex staking, reward distribution, and protocol contracts
Build tooling, fuzzers, and formal verification pipelines to identify vulnerabilities before attackers do
Collaborate directly with protocol researchers and engineers to harden new features from inception
Read, interpret, and refine formal verification specifications to ensure they capture critical security properties
Work closely with product and leadership teams to set on-chain strategy and roadmaps
This is a unique opportunity to create a new paradigm of permissionless innovation and have outsized impact on the protocol and broader ecosystem.
What You Will Bring
Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities
Experience with developer tools for smart contract development (e.g., Hardhat, Foundry)
Passion for collaborating with developers, security auditors, and stakeholders
Strong testing skills and experience with testing frameworks for smart contracts
Experience with production deployments of non-trivial protocols and associated security audits
Ability to collaborate with cross-functional and geographically remote teams
For more information, please contact **************************
Product Growth Hacker: TradFi - Stocks/Equities
Remote job
Crypto.com is expanding into stocks, equities trading, bridging the gap between traditional finance and digital assets. We're launching a platform that makes it as intuitive to trade equities as it is to trade crypto: starting with a mobile-first experience designed for global retail investors.
We're looking for a Growth Marketing Hacker to lead the go-to-market strategy, lifecycle programs, and product positioning for this new vertical. You'll work in close collaboration with product managers and growth to ensure every feature launch, campaign, and user experience is tightly aligned with user needs and business priorities. This is a rare opportunity to help define how the next generation engages with traditional markets.
Key Responsibilities
1. Strategy & Positioning- Partner up with product and strategy teams to own the roadmap for stocks and equities trading within the Crypto.com ecosystem.- Craft messaging that differentiates our offering across accessibility, fees, user experience, and cross-asset trading. Own positioning and briefs. - Define user personas (e.g. crypto-first investors, fintech users, traditional retail traders) and build tailored journeys to drive UA at target CAC.- Work closely with product managers and growth to align product direction with market insights and user behavior.
2. Launch Execution- Lead growth GTM for new features (e.g. fractional shares, commission-free trading, securities lending etc.)- Conceptualise integrated campaigns across email, in-app, paid media, content, and influencer channels to drive adoption, cross-sell and engagement. UA teams to execute.- Collaborate with regional marketing, compliance, and comms teams to ensure local relevance and impact.- Deliver high-conversion landing pages, onboarding flows, and campaign assets to improve CAC and trading volume.
3. Customer Insights & Market Intelligence- Conduct user interviews, surveys, and behavioral analysis to inform positioning and roadmap- Track and analyze competitors and emerging fintech trends to stay competitive.- Feed insights directly into product, growth, and creative strategy.
4. Growth & Retention- Build lifecycle and retention campaigns to drive trading activity, repeat engagement, and product education.- Coordinate cross-functionally with product, CRM, UA, design, partnerships, media and comms teams to ensure seamless, impactful launches and on-going adoption across sports and crypto ecosystems.- Conceptualise and create compliant reward systems, and streaks tied to market events and trading behavior.- Work with product and growth to continuously optimize the onboarding, funding, and trade execution experience.
5. Performance & Reporting- Work with the Head of Growth and Product to define KPIs across funnel metrics, retention, and campaign impact.- Use tools like GA4, Tableau, Mixpanel to analyze campaign performance and drive rapid iteration.- Share insights regularly with product, data, and leadership teams to guide growth priorities.
Requirements
3 to 5 years of experience in product marketing: ideally stocks/equities background
Proven success launching and scaling B2C products or platforms and growing adoption and revenue sustainably.
Excellent communication and copywriting skills: you can simplify complex ideas and tell stories that convert.
Highly collaborative, with experience working cross-functionally in fast-paced environments. Bias to action.
Analytical mindset with proficiency in marketing analytics and user research.
Experience in regulated industries or financial services is a plus.
Bonus: Crypto native or familiarity with community-led growth.
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
Auto-ApplyGrowth Hacker (REMOTE)
Remote job
Job DescriptionAbout Us
Were an AI-native startup backed by top-tier VCs (including Eric Schmidts fund). Our team includes Berkeley AI Lab researchers, MAANG engineers, and repeat founders.
Were building synthetic AI engineers for industrial users (mechanical, chemical, electrical, EPC). Our customers already include major global energy and manufacturing companies. After strong top-down traction, were now launching our product-led growth motion.
Role Overview
Were looking for a sharp, self-directed Growth Hacker / Growth Manager to own early lead generation and run fast PLG experiments. Youll work closely with product and GTM to find high-signal technical users, launch targeted campaigns, and optimize funnels for activation and adoption.
What Youll Do
Source & scrape high-intent leads from LinkedIn, Reddit, forums, conference lists, Slack/Discord
Launch and optimize outbound/email campaigns, referral loops, and landing page tests
Identify top user communities and seed early adoption
Suggest and run experiments for onboarding, signup, activation, and virality
Write clear, compelling copy for technical audiences
First 30 Days
Deliver 100+ qualified leads
Identify the top 5 user communities
Launch 3+ segmented outbound/cold email campaigns
Propose early PLG experiments for onboarding or landing pages
You Are
Smart, fast-moving, and self-directed
Experienced growing something from zero (newsletter, community, tool, etc.)
Comfortable operating without a playbook
Strong writer; bonus if you understand AI or engineering workflows
Youre Not a Fit If You
Need heavy structure or detailed direction
Prefer big teams or late-stage environments
Why Join Us
Elite peers and direct access to world-class engineers
Ownership & autonomybuild your own growth stack
Fast cycles, high visibility, and real impact
Meaningful upside as we scale
Head of Growth Hacking
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
Not only do we encourage folks from all ethnic groups, genders, sexuality, age, abilities, disability status and any other under-represented group to apply, but we prioritize a sense of belonging. We have 4 ERGs (Women, Disability, Queer, Minorities in Tech) who meet regularly with the People team. During your interviews and beyond, we ask & encourage anybody who needs an accommodation to request one from their recruiter.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
At Remote, we embrace AI as a valuable tool while prioritizing human creativity and authenticity. We look forward to meeting candidates who balance innovation with genuine expertise and experience. To learn more about Remote's AI guidelines check see here.
Please note we accept applications on an ongoing basis.
Auto-ApplyCERTIFIED ETHICAL HACKER
Remote job
at VikingCloud
CERTIFIED ETHICAL HACKER About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
Auto-ApplyCERTIFIED ETHICAL HACKER
Remote job
About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
Auto-ApplyHead of Growth Hacking
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
Please note we accept applications on an ongoing basis.
Auto-ApplyWho We Are: At OSARO, we're on a mission to empower industries with cutting-edge automation solutions that redefine the possibilities of supply chain and fulfillment operations. By harnessing the power of AI and advanced robotic vision systems, we help businesses streamline operations and achieve unprecedented efficiency. Join us as we create a world where technology not only drives productivity but also enhances the human experience in the workplace.
About the Role:
Are you a dynamic, socially savvy individual who thrives on building relationships and creating lasting connections? Do you have a knack for turning online interactions into meaningful conversations that drive business? If so, we want you to be our Social Intelligence Strategist!
In this role, you'll pivot away from traditional cold outreach and focus on leveraging social media platforms like LinkedIn and X (formerly Twitter) to engage with decision-makers at our target accounts. You'll be given a curated list of 20-25 ideal customer profiles (ICPs) to concentrate on, ensuring your efforts are focused and impactful.In this role, you will:
Engage: Connect, follow, and interact with key decision-makers within your target accounts through social media.
Strategize: Develop innovative strategies to showcase OSARO's automation solutions, tailoring approaches that resonate with potential clients' unique needs.
Educate: Share insights and content that highlight the value of our solutions, driving interest and engagement within your network.
Analyze: Track and analyze engagement metrics to refine your outreach strategies, ensuring continuous improvement.
Collaborate: Work closely with our sales and marketing teams to synchronize efforts and share best practices.
Key Responsibilities:
Achieving a target of 3-5 meaningful interactions per week with decision-makers.
Generating weekly engagement reports to gauge activity metrics and adjust strategies accordingly.
Utilizing tools like LinkedIn Sales Navigator and other analytics platforms to monitor and engage with leads strategically.
What makes the ideal candidate:
Connections & Network: ~5000+ LinkedIn Connections
Experience: You have 3-5 years of experience in enterprise and social selling, with a proven ability to engage prospects through digital channels.
Knowledge: Familiarity with the MEDDICC qualification framework is a plus, as is experience with automation technologies.
Relationship Builder: Your skills in social dynamics allow you to establish and nurture meaningful relationships that lead to new business opportunities.
Data-Driven: You have an analytical mindset and enjoy using data to inform your strategies and improve performance.
Creative Problem Solver: You're an out-of-the-box thinker with the ability to develop engaging content that attracts the right audience.
Ideal candidate will be in the Bay Area of California
Perks of Joining OSARO:
A collaborative company culture that promotes innovation and teamwork.
Opportunity to work with cutting-edge technology and industry-leading experts.
Comprehensive onboarding and continuous professional development programs to ensure your success in the role.
Clear paths for career advancement within OSARO.
Competitive salary with performance bonuses and equity options.
Comprehensive health, dental, and vision insurance.
Flexible time-off policy - take the time you need to recharge.
Join Us:
At OSARO, we value diversity and the unique perspectives every team member brings to the table. If you are excited about the opportunity to help redefine how industries use automation and drive change through innovative sales strategies, we want to hear from you!
Apply Now!
Let's revolutionize the future of automation together. If you're ready to take the next step in your career and make a real impact, we'd love to see your application :)
OSARO is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
More About OSAROOSARO is a San Francisco-based startup company building machine learning software for industrial automation, to power robots in logistics and material handling centers. Our vision is to develop a solution that enables industrial robots to perform diverse tasks in a wide range of environments. We are excited and driven to see the results of our efforts operating in the fast-growing field of autonomous material handling. We implement state-of-the-art techniques but constantly strive to build the simplest possible solution. OSARO is technique agnostic and always focused on the goal. We regularly review academic literature for novel strategies while steering clear of the hype. We're focused on delighting our customers with systems that work like magic.
Our markets are global. That's why OSARO employs a diverse team of experts in various fields from more than 15 countries, attracting talent from both innovative companies and the research labs of top-ranked engineering universities. We are naturally curious, love healthy debate, and respect varying points of view. At OSARO, we strive to be champions for equality. We believe we can serve as a model for diversity in the tech industry by emphasizing policies of nondiscrimination and inclusion at every step.
We are an equal opportunity employer who offers Health, dental, vision, and commuter benefits Generous, flexible vacation time Excellent paid parental leave policy with the option for additional reduced and unpaid leave The chance to work with robots!
The above full-time position is available immediately.
Auto-ApplyGrowth Hacker (Telecommute OK)
Remote job
We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications.
SlashDB clients reap between $35K-$75K a year in savings per developer.
Learn more about SlashDB at ******************
Job Description
This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game.
Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills:
Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation.
Develop and execute lead generation programs
Fill calendar with demo and webinar appointments
Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle
Reach out to industry bloggers, reporters, conferences and meetup organizers
Reach out to software consultancies with partnership opportunity
Manage website and blog content creation; write content if so inclined
Represent the company at trade shows and conferences
Add your best idea here: _______________________
Qualifications
You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options.
Key skills:
1-3 years of overall work experience in a growth, email marketing or product marketing role
Know how to measure effectiveness while avoiding over-analyzing
Know how not get ripped off on display advertising
Know how to avoid pitfalls with affiliate marketing
You are a super-connector
Bonus skills:
Dabbled in software development or participated in such projects
Additional Information
In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
Senior Staff Security Researcher
Remote job
Senior Staff Security Researcher Who We Are
Cobalt was founded on the belief of a fundamental human aspiration: the desire to live better and safer. It all started in 2013, when our founders realized that pentesting can be better. Today our diverse, fully remote team is committed to helping organizations of all sizes with seamless, effective and collaborative Offensive Security Testing that empower organizations to OPERATE FEARLESSLY and INNOVATE SECURELY.
Our customers can start a pentest in as little as 24 hours and integrate with advanced development cycles thanks to the powerful combination of our SaaS platform coupled with an exclusive community of testers known as the Cobalt Core. Accepting just 5% of applicants, the Cobalt Core boasts over 400 closely vetted and highly skilled testers who jointly conduct thousands of tests each year and are at the forefront of identifying and helping remediate risk across a dynamically changing attack surface.
Cobalt is an Equal Opportunity Employer and we strive to build a diverse and inclusive workforce at our company. At Cobalt we aspire to engage with diverse individuals, communities, and organizations in order to continue to nurture our unique rich diverse culture. Join our team, and be your true self to do your best work.
Description
We are looking for a passionate, driven, self-starter to join our team as a Senior Security Researcher. You will help update and create new methodologies by performing research.
What You'll Do
Innovate Service Offerings: Create and shape cutting-edge security service offerings, complete with methodologies and checklists that redefine industry standards.
Global Collaboration: Collaborate with a global network of 450+ top-tier penetration testers, sharing knowledge and pushing the boundaries of offensive security.
Deep-Dive Research: Immerse yourself in security research, uncovering emerging threats, vulnerabilities, and exploits before they make headlines.
Exploit Development: Build and refine proof-of-concept (PoC) exploits, developing mitigation strategies that make a real difference.
Thought Leadership: Publish groundbreaking research in whitepapers, blogs, and industry conferences to solidify your expertise.
Community Engagement: Engage with the security community to stay at the forefront of industry trends while exchanging insights with fellow experts.
Tool Development: Develop and refine security tools, enhancing research capabilities and advancing the craft of ethical hacking.
Industry Presence: Attend security conferences and participate in events like Defcon's hacking villages.
You Must Have
Experience: 10+ years of penetration testing or relevant experience.
Red teaming and IoT experience
Research Background: Prior experience in security research.
Technical Proficiency:
DevSecOps: Proven experience integrating security practices within DevOps workflows.
CI/CD Pipelining: Hands-on experience with Development CI/CD pipelining and automation.
Deployment: Demonstrated capability for deploying independent projects from conception to production.
Adaptability: Multi-tasking skills and the flexibility to adjust to changing priorities on the fly.
Communication: Strong written and verbal communication skills, with experience presenting or speaking at security events.
Drive: No one needs to push you to excel; it's just who you are.
Passion: A genuine passion for staying ahead of security trends, participating in CTFs, and engaging in ongoing research.
Nice to Have
Experience building service offerings.
Presented research at cybersecurity conferences.
Published technical papers for cybersecurity.
Why You Should Join Us
Grow in a passionate, rapidly expanding industry operating at the forefront of the Pentesting industry
Work directly with experienced senior leaders with ongoing mentorship opportunities
Earn competitive compensation and an attractive equity plan
Save for the future with a 401(k) program (US)
Benefit from medical, dental, vision and life insurance (US)
Leverage stipends for:
Wellness
Work-from-home equipment & wifi
Learning & development
Make the most of our flexible, generous paid time off and paid parental leave
Pay Range Disclosure
Cobalt is committed to fair and equitable compensation practices. The salary range for this role is ($143,000 - $214,000) per year + equity + benefits. A candidate's salary is determined by various factors including, but not limited to, relevant work experience, skills, and certifications. The salary range may differ in other states and may be impacted by proximity to major metropolitan cities.
Cobalt (the "Company") is an equal opportunity employer, and we want the best available persons for every job. The Company makes employment decisions only based on merit. It is the Company's policy to prohibit discrimination in any employment opportunity (including but not limited to recruitment, employment, promotion, salary increases, benefits, termination and all other terms and conditions of employment) based on race, color, sex, sexual orientation, gender, gender identity, gender expression, genetic information, pregnancy, religious creed, national origin, ancestry, age, physical/mental disability, medical condition, marital/domestic partner status, military and veteran status, height, weight or any other such characteristic protected by federal, state or local law. The Company is committed to complying with all applicable laws and providing equal employment opportunities. This commitment applies to all persons involved in the operations of the Company regardless of where the employee is located and prohibits unlawful discrimination by any employee of the Company.
Cobalt is an E-Verify employer. E-Verify is an Internet-based system operated by the Department of Homeland Security (DHS) in partnership with the Social Security Administration (SSA). It allows participating employers to electronically verify the employment eligibility of their newly hired employees in the United States.
Auto-ApplyCyber Defense Analyst (Level 2 / 3rd Shift)
Remote job
**Description:** Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations \(C2Ops\) Team in a highly visible enterprise environment that provides security operations center \(SOC\) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets\.
Key Responsibilities:
- Serve as the initial point of contact for security operations floor activities
- Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
- Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
- Provide network forensic and intrusion detection support for high\-technology investigations
- Document cyber incident analysis thoroughly at an operational level
- Support the detection, response, mitigation, and reporting of cyber incidents
- Maintain consistent and effective communication across the team
- Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks\. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential\.
**Basic Qualifications:**
\- Active Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph\.
\- Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs\.
\- Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 1\+ years of professional experience; or no years of professional experience with a related master's degree\.
\- Experience with standard security and network environment tools and applications \(Splunk, Trellix ePO, ACAS/Tenable\.sc, Tanium, Microsoft Sentinel\) for use in supporting the detection, response, mitigation, and reporting of cyber incidents\.
\- Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations\.
**Desired Skills:**
\- Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph\.
\- Knowledge of other security disciplines and how they impact and interact with information system security\.
\- Experience with Splunk and the ability to write queries, create dashboards\.
\- Experience with QMulos Products\.
\- Experience with using and building Tanium products\.
\- Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis\.
\- Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system\.
\- Recognized cloud proficiency and experience with Cloud Security \(CCSP, AWS, CSA, CompTIA Cloud\+, CCSK, or others\)\.
\- Experience working in an Information System Security Operations Center conducting incident response and recovery\.
\- Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures\.
**Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\.
**Clearance Level:** Top Secret with Investigation or CV date within 5 years
**Other Important Information You Should Know**
**Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\.
**Ability to Work Remotely:** Part\-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility\. The specific weekly schedule will be discussed during the hiring process\.
**Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\.
**Schedule for this Position:** 4x10 hour day, 3 days off per week
**Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.**
**The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.**
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\.
If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\.
**Experience Level:** Experienced Professional
**Business Unit:** CORPORATE HEADQUARTERS
**Relocation Available:** Possible
**Career Area:** Cyber Security
**Type:** Full\-Time
**Shift:** Third
Staff Security Researcher
Remote job
BeyondTrust is a place where you can bring your purpose to life through the work that you do, creating a safer world through our cybersecurity SaaS portfolio.
Our culture of flexibility, trust, and continual learning means you will be recognized for your growth, and for the impact you make on our success. You will be surrounded by people who challenge, support, and inspire you to be the best version of yourself.
The Role
As a Staff Research Engineer, you'll drive the evolution of our identity security platform by combining cutting-edge security research with robust engineering practices. You'll work at the intersection of security domain expertise and software development, translating novel research findings into production-ready systems that protect our customers from sophisticated identity-based threats. This role offers the opportunity to shape the future of identity security through innovative research, scalable engineering solutions, and thought leadership in the security community.
Please check out our page on X - *************************** - for an overview of our recent projects. This will help you determine if we're a good fit for you.
What You'll Do
Research & Innovation
Conduct original security research to identify emerging identity attack vectors and develop novel detection methodologies
Design and implement advanced analytics including rule-based systems, behavioral analysis, and machine learning models for threat detection
Expand and optimize our large-scale entitlement graph systems that map privilege escalation paths across customer environments
Develop proactive recommendation engines that identify security misconfigurations before they become attack vectors
Engineering & Implementation
Build production-grade security systems with emphasis on scalability, reliability, and performance optimization
Implement and maintain detection pipelines using PySpark, Spark SQL, and distributed computing frameworks
Design custom data representations (graphs, time-series, etc.) to support advanced analytical capabilities
Establish engineering best practices including comprehensive unit testing, automation, and CI/CD pipelines
Data Analysis & Optimization
Explore large-scale customer datasets using Spark and Databricks to validate detection hypotheses and uncover new threat patterns
Continuously monitor and tune detection algorithms based on real-world telemetry and performance metrics
Collaborate with data science teams to integrate machine learning models into production detection systems
Optimize system performance to handle massive data volumes efficiently
Leadership & Knowledge Sharing
Provide technical leadership and mentorship to product and engineering teams
Present research findings at industry conferences and security forums
Publish technical blogs and research papers to establish thought leadership
Collaborate with cross-functional teams to translate research insights into product roadmap priorities
What You'll Bring
Required Qualifications
Strong engineering background with proven experience developing and maintaining production security systems
Strong Python programming skills with experience in large-scale data processing
Proficiency in SQL and database optimization techniques
Experience working with SIEM tools, log analysis platforms, or similar security data systems
Knowledge of adversarial tactics, techniques, and procedures (TTPs) and corresponding defensive strategies
Experience in engineering event detection and response systems with focus on tuning and optimization
Preferred Qualifications
Big data processing experience with Apache Spark, Databricks, or similar distributed computing platforms
Background in security research with published findings or conference presentations
Knowledge of cloud security, containerization, and modern infrastructure technologies
Experience with graph databases and network analysis techniques
Familiarity with machine learning applications in cybersecurity
Track record of speaking at technical conferences or contributing to security research publications
Technologies You Should Know
Required
Python
SQL and database technologies
Distributed data processing frameworks
Preferred
Apache Spark / PySpark
Databricks platform
Graph databases and analysis tools
Cloud platforms (AWS, Azure, GCP)
Containerization technologies (Docker, Kubernetes)
Machine learning frameworks and libraries
What Makes This Role Unique
This position offers a rare opportunity to work at the cutting edge of identity security research while building systems that protect organizations worldwide. You'll have the freedom to pursue novel research directions, the resources to implement your ideas at scale, and the platform to share your expertise with the broader security community. We're looking for someone who thrives on solving hard problems, values engineering excellence, and wants to make a meaningful impact on the future of cybersecurity.
Better Together
Diversity. Inclusion. They're more than just words for us. They are the guiding values of how we build our teams, cultivate leaders, and create a culture where people feel connected.
We take care of our employees so they can take care of our customers. Customers who come from all walks of life just like us. We hire incredible people from diverse backgrounds because when we are different together, we are stronger together.
About Us
BeyondTrust is the global identity security leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.
Learn more at ********************
#LI-BS1
Auto-ApplyAI Security Researcher
Remote job
Shape the Future of Cybersecurity with Us Are you driven by deep curiosity, bold innovation, and the desire to transform cutting-edge AI research into real-world cybersecurity impact? Join Cynet, an established yet rapidly growing cybersecurity startup, where you'll help build next-generation AI-powered security products from the ground up. You'll be part of a small, elite, cross-disciplinary team working closely with security researchers, R&D engineers, data engineers, and product leaders.
Here, you're not just joining a company, you're stepping into a place where you can envision, build, and deploy foundational AI technologies that protect organizations worldwide. You will have the rare opportunity to drive innovation end-to-end, shape our future technology, and create AI systems that make a real difference in defending against modern cyber threats.
This is a role for someone who wants to put their soul into their craft, someone hungry to learn fast, experiment boldly, and turn ambitious ideas into production-ready AI solutions.
What will you do
* Drive innovation by combining deep security research with modern AI techniques to build impactful, customer-facing security capabilities.
* Build and refine intelligent generative AI agents that drive automated cybersecurity reasoning, investigation workflows, and threat analysis.
* Extend and enhance our next-generation AI antivirus engine by designing new feature representations, building file parsers, and developing ML models end-to-end.
* Engineer and implement core parser and model components in C++ and Python to seamlessly integrate into the Cynet Endpoint Agent and platform infrastructure.
* Use Cynet's ML experimentation pipelines to run experiments, optimize performance, and deliver production-ready detection models.
* Serve as the cybersecurity expert within the Data Science team, guiding threat modeling, malware understanding, and security-driven AI design decisions.
Requirements
* 5+ years of hands-on cybersecurity research experience.
* Proven experience working with EDR, malware analysis, threat detection, and security tooling.
* Proficiency in C, C++, and Python with strong debugging abilities.
* Solid understanding of Windows internals, including low-level OS concepts.
* Experience with static and dynamic analysis, reverse engineering, and real-world threat investigations.
* A scientific, data-driven approach to problem-solving, from ideation through experimentation and production.
* Strong understanding of statistical concepts and ML feature engineering techniques.
* Experience analyzing large-scale datasets using SQL, Spark, or similar tools.
Preferred / Nice to Have
* Certifications or academic background in Data Science / Machine Learning / AI.
* Experience with ML frameworks and experimentation environments.
* Experience with generative models, agentic reasoning, or building LLM-based AI systems.
* Familiarity with cloud security, DevOps tooling, or MLOps practices.
You are
About Us
Cynet is a leader in threat detection and response, designed to simplify security for organizations of all sizes. Our mission is to empower lean security teams and their partners with an AI-powered, unified platform that autonomously detects, protects, and responds to threats - backed by 24×7 security experts.
With a Partner First mindset, we focus on helping customers and partners stay protected, operate confidently, and achieve their goals. Our vision is to give every organization true cybersecurity peace of mind, providing fast, accurate protection without the noise or complexity.
This role follows a hybrid work model in countries where Cynet has offices (Israel, USA), while being fully remote in England, Poland, Italy, and Germany.
Security Researcher
Remote job
Prelude Security is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode.
We are a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary
might
do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics.
Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware
Role
Prelude is seeking a Principal Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's endpoint protection platform.
As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Prelude's endpoint protection platform
Produce high-quality, public-facing security research content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and static/dynamic reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Program analysis and performance profiling
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Working at Prelude
Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
Auto-ApplyInformation Systems Security Officer (ISSO)
Remote job
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyInformation System Security Officer II - Mid-Level
Remote job
At The One 23 Group, our mission is to set the benchmark for excellence in government services. We empower our clients in the Department of Defense, intelligence community, and federal civilian sectors to excel with our advanced capabilities. Our dedication lies in fostering a people-first culture, underpinned by steadfast ethical principles. Embracing innovative technologies and process improvements, we are steadfast in our journey toward a future that is both bright and transformative.
Our expertise spans consulting and analytics, digital workplace solutions, and cyber compliance. With our global footprint, we place a strong emphasis on nurturing our people and culture, which forms the core of our successful strategies in leadership and financial management. We pride ourselves on our extensive experience and effective approach, ensuring that we lead with both innovation and integrity.
Responsibilities
Contractor to provide cyber security management, oversight, and customer support for maintaining the continuity of DHS Management Information System compliance in accordance with DHS, National Institute of Standards and Technology (NIST), and other applicable Federal standards. This Position is 100% Remote.
Applies specialized knowledge of sensitive system Cybersecurity requirements and Privacy Act requirements.
Applies specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with NIST's Risk Management Framework and the Federal Risk and Authorization Management Program (FedRAMP).
Applies specialized knowledge and experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, Federal Information Processing Standards (FIPS, and NIST guidelines.
Applies knowledge of DHS Information Security Policy Directives and Handbooks is preferred.
Applies knowledge and experience with standard IA concepts, practices, and procedures. Working independently to solve problems quickly and completely.
Applies specialized experience with three (3) of the four (4) following criteria is required:
Vulnerability scanning execution, assessment, and analysis.
Operating system and network knowledge (i.e., Local Area Networks [LAN] and Wide Area Networks [WAN]).
Information security and assurance principles (e.g., Defense-in-depth) and associated supporting technologies.
Application security, database security, and network security.
Possess ability to assess and weigh current and evolving security threats in an operational environment.
Possess good oral and written communication skills.
Team player who can collaborate with multiple stakeholders to arrive at the best solution.
Qualifications
Master's degree and 4 years of Cybersecurity & Federal Information Security Modernization Act (FISMA) experience, or a Bachelor's Degree and 5 years of Cybersecurity & FISMA experience or a total of 7 years of Cybersecurity & Federal Information Security Modernization Act (FISMA) experience
Must be a US citizen with ability to obtain/maintain a Top Secret clearance
Possesses
one (1) of the following professional security certifications
or
can be obtained within six (6) months of hire:
Certified Information System Security Professional (CISSP)
CompTIA Advanced Security Practitioner (CASP)
Certified Information Systems Auditor (CISA)
Certified Ethical Hacker (CEH)
Systems Security Certified Practitioner (SSCP)
Certified Information Security Manager (CISM)
GIAC Information Security Professional (GISP)
GIAC Security Leadership (GSLC)
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplyInformation System Security Officer (ISSO)
Remote job
[ABOUT ISTARI DIGITAL]Istari is a digital engineering software company enabling our customers to turn the physical world into the digital to accomplish their specific mission or business objectives. Istari was founded with the vision of making open, scalable digital engineering ecosystems a reality - where new technologies and systems are created digitally, free from the real-world constraints of costs and schedules. We are creating the world's best engineering model sharing platform, allowing our customers to simply and securely integrate their models across different engineering disciplines, organizations, and security levels.
At Istari, we are passionate about our mission of creating the world's first open and scalable industrial metaverse. Whether our customers are designing prototypes, performing virtual testing, or training AI and autonomy for complex systems, we know that going digital will save them time, resources, and reduce their environmental impact.
While we are a distributed team with most team-members working remotely, we place an emphasis on staying connected and collaborative, prioritizing in-person opportunities to build trust as a team. At Istari, we still believe that trust is best built in-person. To do this, we have an engineering headquarters in Cambridge, MA for focused technical development and several times per year we gather for an off-site that allows us to develop our professional skills and our team relationships.
[VALUES]At Istari, we live by our values, which include:
Purposeful AutonomyWe value letting people self-organize and self-motivate. Our flat structure and lack of meeting clutter are meant to empower individuals and teams to be proactive.Our autonomy is measured, goal-oriented, and results-driven - not meandering. Clear objectives help us prioritize our time.
Smart TransparencyWe believe in honest-but-kind communication, transparency, and open-door policies. We love learning about challenges and tackling them early, not hearing good or bad news late. We share work-in-progress across our team. Fast feedback keeps autonomy purposeful.
Continual CuriosityAt Istari, we love learning to do things ourselves. We ask, read, share, teach - even watch YouTube videos - to learn new skills to solve problems. When we make breakthroughs, we write them down. Writing focuses ideas, helps us learn, and helps us share.
Equal Opportunity Istari is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
We are seeking a highly experienced and knowledgeable Information System Security Officer (ISSO) to join our Cybersecurity team. The ISSO will serve as a principal advisor on all matters, technical and otherwise, involving the cybersecurity of information systems under their purview. This role requires a deep understanding of cybersecurity principles, practices, and frameworks, as well as the ability to develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, both on premises and in cloud environments. The ISSO will work closely with various stakeholders across the organization to ensure the confidentiality, integrity, and availability of our information systems.Key Responsibilities
Serve as the principal advisor on all matters involving the cybersecurity of assigned information systems.
Develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, including JSIG, NIST 800-171, NIST 800-53, CMMC, and ITAR.
Conduct risk assessments and identify vulnerabilities in information systems.
Develop and implement security controls to mitigate identified risks.
Monitor and evaluate the effectiveness of security controls.
Develop and deliver cybersecurity awareness training to employees.
Investigate security incidents and breaches.
Maintain security documentation, including system security plans (SSPs), risk assessments, and incident reports.
Stay up-to-date with the latest cybersecurity threats and vulnerabilities.
Collaborate with the engineering and customer success teams to ensure secure implementation and configuration of systems.
Required Qualifications
Active Top Secret Security Clearance, with SCI eligibility.
Minimum of 5 years of experience in a relevant field.
Deep understanding of cybersecurity principles, practices, and frameworks, including JSIG, NIST 800-171, NIST 800-53, ITAR, ISO, and CMMC.
Experience with risk assessments, vulnerability identification, and security control implementation.
Experience with security incident investigation and response.
Excellent communication and collaboration skills, with the ability to effectively communicate with both technical and non-technical audiences.
Strong analytical and problem-solving skills.
Relevant certifications (e.g., Sec+, CISSP, CISM).
Must be a US citizen living within the United States.
Preferred Qualifications
Bachelor's degree in computer science, information systems, or a related field.
Experience with SOC compliance and audits.
BENEFITSWe offer highly competitive benefits, including:
Health and Family- Medical/Dental/Vision- Employee Premiums are 100% Company Paid- Life Insurance- Flexible Work Hours - Unlimited Paid Time Off (PTO) with federal government holidays
Financial- Competitive Compensation - 401k - Company Stock Options- Home Office Setup Budget
Learning- Reimbursement for approved trainings and subscriptions- Conferences (travel, lodging, and fees)
Note - some benefits are not available to interns or contractors.
Thank you for your interest in Istari. Expect to hear back from us soon with next steps.
Auto-ApplyInformation System Security Officer
Remote job
MILITARY FRIENDLY & PREFERRED - HOH SPONSOR
The Information Systems Security Officer (ISSO) is responsible for supporting the full lifecycle of security assessment and authorization (A&A) activities for information systems. The ISSO ensures that assigned systems comply with federal cybersecurity standards and maintain their Authority to Operate (ATO) through continuous monitoring and documentation.
The ISSO will be responsible for developing and providing risk assessments, Security Control Assessments (SCA), A&A documentation and various reports, based on NIST guidelines and client's policies, procedures and request. The ISSO will be responsible for providing security recommendations on any system changes or new technologies, analysis on vulnerability scans, conducting continuous monitoring activities, and provide mitigation recommendations for any risks or threats.
RESPONSIBILITIES:
Lead and conduct Pre-Security Assessment and Authorization (A&A) activities, including stakeholder identification, change request submissions, appointment memorandums, and IT Security Kickoff meetings.
Supports the ISBO in day-to-day IT security activities.
Assists the ISBO with reviews of the security posture of the system and report any findings to the ISBO, CISO, and the AO.
Conduct Information System Categorization by identifying information types, completing FIPS-199 assessments, and facilitating Business Impact Analyses (BIA), Privacy Threshold Analyses (PTA), and Privacy Impact Assessments (PIA).
Develop and maintain system security documentation, including:
System Administration Plan (SAM)
Configuration Management Plan (CMP)
IT Contingency Plan (ITCP)
Information Security Continuous Monitoring (ISCM) Plan
Incident Response Plan (IRP)
Security Assessment Report (SAR)
System Security Plan (SSP)
Coordinate initial and annual ITCP testing in collaboration with the OCIO Business Continuity and Disaster Recovery (BCDR) Office.
Develop and manage inter-agency agreements and documentation such as MOUs, MOAs, ISAs, IT Security Waivers, and Risk Acceptance Memorandums.
Document and maintain Security Control Implementation details, ensuring updates are made according to required frequency.
Coordinate vulnerability and compliance scans, Security Control Assessments (SCA), and track remediation efforts with the IT Security Test Team.
Manage and update Plan of Action and Milestones (POA&M) entries, submitting remediated findings for closure.
Prepare and present SAR to Authorizing Officials to obtain or renew ATO.
Perform Information Security Continuous Monitoring (ISCM) activities to ensure ongoing compliance and security posture of systems.
Develop and update project schedule, including A&A / SCA task and milestones, task dependencies, and personnel resources.
Conduct A&A activities and tasks and obtain ATO in line with NIST and client guidance and directives.
Determining the baseline IT Security requirements for IT Systems, identifying system boundaries, determining information categories, assisting with FIPS-199.
Ensure that IT Systems are operated, used, maintained, and disposed of in accordance with internal security policies and practices.
Enforce security policies and safeguards on all personnel having access to the IT System for which the ISSO has responsibility.
Ensure users and system support personnel have the required authorization and need-to-know; have been indoctrinated; and are familiar with internal security practices before access to the IT System.
Implement security controls based on IT System FIPS categorization.
Document security control implementation in the system's Security Plan using the client's GRC tool.
Document system's risk assessment per client directives and requirements.
Review and monitoring system security and audit logs.
Develop and maintain Plan of Actions and Milestones (POA&Ms) for IT systems.
Update A&A documentation and artifacts on a regular basis (e.g. annually, after approved change).
QUALIFICATIONS:
A minimum of five (5) years of demonstrated experience in the Information Security or IT field.
Demonstrates a proficiency with developing, maintaining and managing SA&A packages.
Experience with developing and managing POA&M's.
Strong problem solving and analysis skills, self-motivated, and able to work and communicate in a team environment.
Strong understanding of federal cybersecurity frameworks (e.g., NIST RMF, FIPS-199, FISMA).
Experience in developing and maintaining security documentation and plans.
Possess experience conducting CPT's.
Experience conducting audit log reviews.
Technical experience with conducting vulnerability management, compliance scanning, and providing mitigation techniques.
Excellent communication and coordination skills with technical and non-technical stakeholders.
Ability to manage multiple systems and projects simultaneously in a dynamic environment.
Excellent communication (written and verbal) skills.
CERTIFICATION:
A minimum of at least one (1) certification that meet DOD 8570 IAT Level II (e.g., Security+, GSEC, CASP) requirements or any equivalent or more advanced.
CLEARANCE:
Client Suitability and Public Trust
LOCATION and HOURS:
Location: Primary location is at Zermount HQ (Arlington, VA) and the Client Site (Washington, D.C.). Remote work is authorized.
Onsite work at the primary location., may be occasionally required.
Hours of Operation (Business Hours): 8:00 am ET - 5:30 pm ET
Information Systems Security Officer Skill Level 3
Remote job
TO BE CONSIDERED FOR THIS POSITION YOU MUST CURRENTLY HAVE AN ACTIVE TS/SCI WITH POLYGRAPH SECURITY CLEARANCE WITH THE FEDERAL GOVERNMENT. (U.S. CITIZENSHIP REQUIRED).
Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management for information system security software, hardware, and finnware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include SSPs, Risk Assessment Reports, C&A packages, and SRTMs. Supports security authorization activities in compliance with NIST RMF.
The Level 3 ISSO shall possess the following capabilities:
Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives
Provide daily oversight and direction to contractor ISSOs
Serve as an ISSM
Qualifications: Fifteen (15) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least three (3) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. Bachelor's degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with IAM Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's degree.
Compensation:
We are committed to providing fair and competitive compensation. The salary range for our positions vary depending on accepted contractual position skill level. These salaries fall within the range of $78,000 to $275,000 per year. This range reflects the compensation offered across the locations where we hire. The exact salary will be determined based on the candidate's work location, specific role, skill set, and level of expertise.
Benefits:
We offer a comprehensive benefits package, including:
Health Coverage: Medical, dental, and vision insurance
Additional Insurance: Basic Life/AD&D, Voluntary Life/AD&D, Short and Long-Term Disability, Accident, Critical Illness, Hospitalization Indemnity, and Pet Insurance
Retirement Plan: 401(k) plan with company match
Paid Time Off: Generous PTO, paid holidays, parental leave, and more
Wellness: Access to wellness programs and mental health support
Professional Development: Opportunities for growth, including tuition reimbursement
Additional Perks:
Flexible work arrangements, including remote work options
Flexible Spending Accounts (FSAs)
Employee referral programs
Bonus opportunities
Technology allowance
A diverse, inclusive, and supportive workplace culture