Product Growth Hacker: TradFi - Stocks/Equities
Remote job
Crypto.com is expanding into stocks, equities trading, bridging the gap between traditional finance and digital assets. We're launching a platform that makes it as intuitive to trade equities as it is to trade crypto: starting with a mobile-first experience designed for global retail investors.
We're looking for a Growth Marketing Hacker to lead the go-to-market strategy, lifecycle programs, and product positioning for this new vertical. You'll work in close collaboration with product managers and growth to ensure every feature launch, campaign, and user experience is tightly aligned with user needs and business priorities. This is a rare opportunity to help define how the next generation engages with traditional markets.
Key Responsibilities
1. Strategy & Positioning- Partner up with product and strategy teams to own the roadmap for stocks and equities trading within the Crypto.com ecosystem.- Craft messaging that differentiates our offering across accessibility, fees, user experience, and cross-asset trading. Own positioning and briefs. - Define user personas (e.g. crypto-first investors, fintech users, traditional retail traders) and build tailored journeys to drive UA at target CAC.- Work closely with product managers and growth to align product direction with market insights and user behavior.
2. Launch Execution- Lead growth GTM for new features (e.g. fractional shares, commission-free trading, securities lending etc.)- Conceptualise integrated campaigns across email, in-app, paid media, content, and influencer channels to drive adoption, cross-sell and engagement. UA teams to execute.- Collaborate with regional marketing, compliance, and comms teams to ensure local relevance and impact.- Deliver high-conversion landing pages, onboarding flows, and campaign assets to improve CAC and trading volume.
3. Customer Insights & Market Intelligence- Conduct user interviews, surveys, and behavioral analysis to inform positioning and roadmap- Track and analyze competitors and emerging fintech trends to stay competitive.- Feed insights directly into product, growth, and creative strategy.
4. Growth & Retention- Build lifecycle and retention campaigns to drive trading activity, repeat engagement, and product education.- Coordinate cross-functionally with product, CRM, UA, design, partnerships, media and comms teams to ensure seamless, impactful launches and on-going adoption across sports and crypto ecosystems.- Conceptualise and create compliant reward systems, and streaks tied to market events and trading behavior.- Work with product and growth to continuously optimize the onboarding, funding, and trade execution experience.
5. Performance & Reporting- Work with the Head of Growth and Product to define KPIs across funnel metrics, retention, and campaign impact.- Use tools like GA4, Tableau, Mixpanel to analyze campaign performance and drive rapid iteration.- Share insights regularly with product, data, and leadership teams to guide growth priorities.
Requirements
3 to 5 years of experience in product marketing: ideally stocks/equities background
Proven success launching and scaling B2C products or platforms and growing adoption and revenue sustainably.
Excellent communication and copywriting skills: you can simplify complex ideas and tell stories that convert.
Highly collaborative, with experience working cross-functionally in fast-paced environments. Bias to action.
Analytical mindset with proficiency in marketing analytics and user research.
Experience in regulated industries or financial services is a plus.
Bonus: Crypto native or familiarity with community-led growth.
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
Auto-ApplyHead of Growth Hacking
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
Not only do we encourage folks from all ethnic groups, genders, sexuality, age, abilities, disability status and any other under-represented group to apply, but we prioritize a sense of belonging. We have 4 ERGs (Women, Disability, Queer, Minorities in Tech) who meet regularly with the People team. During your interviews and beyond, we ask & encourage anybody who needs an accommodation to request one from their recruiter.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
At Remote, we embrace AI as a valuable tool while prioritizing human creativity and authenticity. We look forward to meeting candidates who balance innovation with genuine expertise and experience. To learn more about Remote's AI guidelines check see here.
Please note we accept applications on an ongoing basis.
Auto-ApplyGrowth Hacker (REMOTE)
Remote job
Job DescriptionAbout Us
Were an AI-native startup backed by top-tier VCs (including Eric Schmidts fund). Our team includes Berkeley AI Lab researchers, MAANG engineers, and repeat founders.
Were building synthetic AI engineers for industrial users (mechanical, chemical, electrical, EPC). Our customers already include major global energy and manufacturing companies. After strong top-down traction, were now launching our product-led growth motion.
Role Overview
Were looking for a sharp, self-directed Growth Hacker / Growth Manager to own early lead generation and run fast PLG experiments. Youll work closely with product and GTM to find high-signal technical users, launch targeted campaigns, and optimize funnels for activation and adoption.
What Youll Do
Source & scrape high-intent leads from LinkedIn, Reddit, forums, conference lists, Slack/Discord
Launch and optimize outbound/email campaigns, referral loops, and landing page tests
Identify top user communities and seed early adoption
Suggest and run experiments for onboarding, signup, activation, and virality
Write clear, compelling copy for technical audiences
First 30 Days
Deliver 100+ qualified leads
Identify the top 5 user communities
Launch 3+ segmented outbound/cold email campaigns
Propose early PLG experiments for onboarding or landing pages
You Are
Smart, fast-moving, and self-directed
Experienced growing something from zero (newsletter, community, tool, etc.)
Comfortable operating without a playbook
Strong writer; bonus if you understand AI or engineering workflows
Youre Not a Fit If You
Need heavy structure or detailed direction
Prefer big teams or late-stage environments
Why Join Us
Elite peers and direct access to world-class engineers
Ownership & autonomybuild your own growth stack
Fast cycles, high visibility, and real impact
Meaningful upside as we scale
Who We Are: At OSARO, we're on a mission to empower industries with cutting-edge automation solutions that redefine the possibilities of supply chain and fulfillment operations. By harnessing the power of AI and advanced robotic vision systems, we help businesses streamline operations and achieve unprecedented efficiency. Join us as we create a world where technology not only drives productivity but also enhances the human experience in the workplace.
About the Role:
Are you a dynamic, socially savvy individual who thrives on building relationships and creating lasting connections? Do you have a knack for turning online interactions into meaningful conversations that drive business? If so, we want you to be our Social Intelligence Strategist!
In this role, you'll pivot away from traditional cold outreach and focus on leveraging social media platforms like LinkedIn and X (formerly Twitter) to engage with decision-makers at our target accounts. You'll be given a curated list of 20-25 ideal customer profiles (ICPs) to concentrate on, ensuring your efforts are focused and impactful.In this role, you will:
Engage: Connect, follow, and interact with key decision-makers within your target accounts through social media.
Strategize: Develop innovative strategies to showcase OSARO's automation solutions, tailoring approaches that resonate with potential clients' unique needs.
Educate: Share insights and content that highlight the value of our solutions, driving interest and engagement within your network.
Analyze: Track and analyze engagement metrics to refine your outreach strategies, ensuring continuous improvement.
Collaborate: Work closely with our sales and marketing teams to synchronize efforts and share best practices.
Key Responsibilities:
Achieving a target of 3-5 meaningful interactions per week with decision-makers.
Generating weekly engagement reports to gauge activity metrics and adjust strategies accordingly.
Utilizing tools like LinkedIn Sales Navigator and other analytics platforms to monitor and engage with leads strategically.
What makes the ideal candidate:
Connections & Network: ~5000+ LinkedIn Connections
Experience: You have 3-5 years of experience in enterprise and social selling, with a proven ability to engage prospects through digital channels.
Knowledge: Familiarity with the MEDDICC qualification framework is a plus, as is experience with automation technologies.
Relationship Builder: Your skills in social dynamics allow you to establish and nurture meaningful relationships that lead to new business opportunities.
Data-Driven: You have an analytical mindset and enjoy using data to inform your strategies and improve performance.
Creative Problem Solver: You're an out-of-the-box thinker with the ability to develop engaging content that attracts the right audience.
Ideal candidate will be in the Bay Area of California
Perks of Joining OSARO:
A collaborative company culture that promotes innovation and teamwork.
Opportunity to work with cutting-edge technology and industry-leading experts.
Comprehensive onboarding and continuous professional development programs to ensure your success in the role.
Clear paths for career advancement within OSARO.
Competitive salary with performance bonuses and equity options.
Comprehensive health, dental, and vision insurance.
Flexible time-off policy - take the time you need to recharge.
Join Us:
At OSARO, we value diversity and the unique perspectives every team member brings to the table. If you are excited about the opportunity to help redefine how industries use automation and drive change through innovative sales strategies, we want to hear from you!
Apply Now!
Let's revolutionize the future of automation together. If you're ready to take the next step in your career and make a real impact, we'd love to see your application :)
OSARO is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
More About OSAROOSARO is a San Francisco-based startup company building machine learning software for industrial automation, to power robots in logistics and material handling centers. Our vision is to develop a solution that enables industrial robots to perform diverse tasks in a wide range of environments. We are excited and driven to see the results of our efforts operating in the fast-growing field of autonomous material handling. We implement state-of-the-art techniques but constantly strive to build the simplest possible solution. OSARO is technique agnostic and always focused on the goal. We regularly review academic literature for novel strategies while steering clear of the hype. We're focused on delighting our customers with systems that work like magic.
Our markets are global. That's why OSARO employs a diverse team of experts in various fields from more than 15 countries, attracting talent from both innovative companies and the research labs of top-ranked engineering universities. We are naturally curious, love healthy debate, and respect varying points of view. At OSARO, we strive to be champions for equality. We believe we can serve as a model for diversity in the tech industry by emphasizing policies of nondiscrimination and inclusion at every step.
We are an equal opportunity employer who offers Health, dental, vision, and commuter benefits Generous, flexible vacation time Excellent paid parental leave policy with the option for additional reduced and unpaid leave The chance to work with robots!
The above full-time position is available immediately.
Auto-ApplyCERTIFIED ETHICAL HACKER
Remote job
at VikingCloud
CERTIFIED ETHICAL HACKER About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
Auto-ApplyCERTIFIED ETHICAL HACKER
Remote job
About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
Auto-ApplyHead of Growth Hacking
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
Please note we accept applications on an ongoing basis.
Auto-ApplyGrowth Marketing Hacker
Remote job
Growth Hacker / Marketer 100% Remote AlphaPoint is a financial technology company powering digital asset exchanges and brokerages worldwide. Through its secure, scalable, and customizable white label digital asset trading platform, AlphaPoint has enabled over 150 customers in 35 countries to launch and operate digital asset markets, as well as digitize assets. AlphaPoint and its award winning blockchain technology have helped startups and institutions discover and execute their blockchain strategies since 2013.Position Overview
AlphaPoint has set up an AI Lab to rapidly prototype and develop AI focused applications. We are seeking a highly creative, analytical, and performance-driven Growth Hacker to help promote and develop test marketing strategies of the MVP's and prototypes that the lab develops. You'll experiment across marketing channels, rapidly develop new tactics to acquire and retain users, and leverage data to guide your decisions. The ideal candidate thrives in a startup environment and has a proven track record of driving rapid user or revenue growth.Key Responsibilities
Develop and execute innovative, scalable growth strategies across multiple creative channels.
Design and run rapid A/B tests to optimize conversion funnels, landing pages, and onboarding processes
Use analytics tools to track KPIs, interpret performance data, and report actionable insights
Collaborate within AI Labs product, engineering, and design teams to drive user engagement and retention
Identify and execute new growth opportunities through traditional and non-traditional means.
Identify and research new channels to distribute products (reddit, discord, youtube, etc…)
Requirements
2-4+ years of experience in growth marketing, digital marketing, or a similar role
Proven track record of designing and executing successful growth campaigns
Leverage AI Tools in research in order to streamline and enhance every aspect of the AI marketing process. (research, content creation, execution, and analysis..)
Startup mindset: creative, resourceful, agile, data-obsessed, and outcome-driven
Preferred skills
Experience in Consumer and Enterprise Marketing
Diverse skillset across marketing strategies: Digital, Social, OOH, and other non-traditional methods
Prior involvement in viral or community-led growth strategies
What We Offer
Competitive compensation
Equity or stock options (if applicable)
A culture of autonomy, experimentation, and learning
Opportunity to make a real impact on company trajectory
Auto-ApplyGrowth Hacker (Telecommute OK)
Remote job
We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications.
SlashDB clients reap between $35K-$75K a year in savings per developer.
Learn more about SlashDB at ******************
Job Description
This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game.
Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills:
Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation.
Develop and execute lead generation programs
Fill calendar with demo and webinar appointments
Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle
Reach out to industry bloggers, reporters, conferences and meetup organizers
Reach out to software consultancies with partnership opportunity
Manage website and blog content creation; write content if so inclined
Represent the company at trade shows and conferences
Add your best idea here: _______________________
Qualifications
You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options.
Key skills:
1-3 years of overall work experience in a growth, email marketing or product marketing role
Know how to measure effectiveness while avoiding over-analyzing
Know how not get ripped off on display advertising
Know how to avoid pitfalls with affiliate marketing
You are a super-connector
Bonus skills:
Dabbled in software development or participated in such projects
Additional Information
In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
Senior Security Researcher
Remote job
About Us
Endor Labs is building the Application Security platform for the software development revolution. Modern software is complex and dependency-rich, making it increasingly difficult to pinpoint the risks that truly matter. Endor Labs solves this challenge by building a call graph of your entire software estate-enabling teams to clearly identify, prioritize, and fix critical risks faster.
Trusted by companies that are one or one hundred years old, Endor Labs secures code whether it was written by humans or AI, and whether it's 40-year old C++ code or cutting edge Bazel Monorepos. Endor Labs was founded by serial entrepreneurs Varun Badhwar and Dimitri Stiliadis, and is backed by leading VC firms such as Dell Technology Capital, Lightspeed, and Sierra Ventures.
About the Role
We are looking for a Senior Security Researcher to lead our offensive security research efforts in the domain of software supply chain security. This is a unique opportunity to work at the forefront of secure SDLC and software supply chain security, identifying zero-day vulnerabilities in software artifacts and CI/CD systems, analyzing attack trends, and influencing the next generation of security capabilities in our products.
This role requires deep technical expertise in vulnerability research, application security, reverse engineering, and offensive security techniques. The ideal candidate will also play a key role in publishing groundbreaking research through blogs, white papers, and speaking engagements at top security conferences.
How You'll Make an Impact
Conduct offensive security research on software supply chain threats, identifying and analyzing zero-day vulnerabilities.
Develop and refine exploit techniques to understand modern attack vectors targeting software supply chain through malicious code, 3rd party libraries, and CI/CD systems.
Work closely with Product Management to translate research findings into innovative security capabilities within Endor Labs' products.
Publish research findings through technical blogs, white papers, and industry-leading security conferences.
Collaborate with security engineers and developers to prototype and implement detection and mitigation strategies for emerging threats.
Contribute to the security community by developing open-source tools, methodologies, or frameworks that enhance software supply chain security.
Stay ahead of the latest threats, attacker methodologies, and evolving security trends to continuously refine our research efforts.
What You Bring to the Table
5+ years of experience in security research, vulnerability discovery, and offensive security.
Deep expertise in reverse engineering, exploit development, and software vulnerability analysis.
Strong understanding of software supply chain security, including package management systems, CI/CD pipelines, and dependency analysis.
Experience discovering and responsibly disclosing zero-day vulnerabilities.
Proven track record of publishing high-quality research or presenting at top security conferences (e.g., Black Hat, DEF CON, RSAC, BSides).
Proficiency in programming languages such as Python, Rust, or Go.
Strong analytical skills and the ability to conduct complex security research autonomously.
Excellent communication skills, both written and verbal, to convey technical concepts to diverse audiences.
Why Endor Labs
We're building at the intersection of developer productivity and security - one of the fastest-growing spaces in software. Our dev-loved platform has real ROI, strong momentum, and customers who care about doing things right. You get to work with a world-class team dedicated to pushing the boundaries of security research and directly influence the security of modern software supply chains.
At Endor Labs, we think big, start small, and learn fast. We take ownership, move with purpose, and always start with the customer's success. We debate with data, make the complex simple, and challenge each other with kindness and candor. We celebrate wins, learn from misses, and have fun along the way - because when our customers win, we all win.
Endor Labs is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. Even if you don't fit every requirement above, we believe in the power of diverse perspectives and experiences, so we encourage all talented individuals to apply-there's no one-size-fits-all here.
Auto-ApplyStaff Security Researcher
Remote job
BeyondTrust is a place where you can bring your purpose to life through the work that you do, creating a safer world through our cybersecurity SaaS portfolio.
Our culture of flexibility, trust, and continual learning means you will be recognized for your growth, and for the impact you make on our success. You will be surrounded by people who challenge, support, and inspire you to be the best version of yourself.
The Role
As a Staff Research Engineer, you'll drive the evolution of our identity security platform by combining cutting-edge security research with robust engineering practices. You'll work at the intersection of security domain expertise and software development, translating novel research findings into production-ready systems that protect our customers from sophisticated identity-based threats. This role offers the opportunity to shape the future of identity security through innovative research, scalable engineering solutions, and thought leadership in the security community.
Please check out our page on X - *************************** - for an overview of our recent projects. This will help you determine if we're a good fit for you.
What You'll Do
Research & Innovation
Conduct original security research to identify emerging identity attack vectors and develop novel detection methodologies
Design and implement advanced analytics including rule-based systems, behavioral analysis, and machine learning models for threat detection
Expand and optimize our large-scale entitlement graph systems that map privilege escalation paths across customer environments
Develop proactive recommendation engines that identify security misconfigurations before they become attack vectors
Engineering & Implementation
Build production-grade security systems with emphasis on scalability, reliability, and performance optimization
Implement and maintain detection pipelines using PySpark, Spark SQL, and distributed computing frameworks
Design custom data representations (graphs, time-series, etc.) to support advanced analytical capabilities
Establish engineering best practices including comprehensive unit testing, automation, and CI/CD pipelines
Data Analysis & Optimization
Explore large-scale customer datasets using Spark and Databricks to validate detection hypotheses and uncover new threat patterns
Continuously monitor and tune detection algorithms based on real-world telemetry and performance metrics
Collaborate with data science teams to integrate machine learning models into production detection systems
Optimize system performance to handle massive data volumes efficiently
Leadership & Knowledge Sharing
Provide technical leadership and mentorship to product and engineering teams
Present research findings at industry conferences and security forums
Publish technical blogs and research papers to establish thought leadership
Collaborate with cross-functional teams to translate research insights into product roadmap priorities
What You'll Bring
Required Qualifications
Strong engineering background with proven experience developing and maintaining production security systems
Strong Python programming skills with experience in large-scale data processing
Proficiency in SQL and database optimization techniques
Experience working with SIEM tools, log analysis platforms, or similar security data systems
Knowledge of adversarial tactics, techniques, and procedures (TTPs) and corresponding defensive strategies
Experience in engineering event detection and response systems with focus on tuning and optimization
Preferred Qualifications
Big data processing experience with Apache Spark, Databricks, or similar distributed computing platforms
Background in security research with published findings or conference presentations
Knowledge of cloud security, containerization, and modern infrastructure technologies
Experience with graph databases and network analysis techniques
Familiarity with machine learning applications in cybersecurity
Track record of speaking at technical conferences or contributing to security research publications
Technologies You Should Know
Required
Python
SQL and database technologies
Distributed data processing frameworks
Preferred
Apache Spark / PySpark
Databricks platform
Graph databases and analysis tools
Cloud platforms (AWS, Azure, GCP)
Containerization technologies (Docker, Kubernetes)
Machine learning frameworks and libraries
What Makes This Role Unique
This position offers a rare opportunity to work at the cutting edge of identity security research while building systems that protect organizations worldwide. You'll have the freedom to pursue novel research directions, the resources to implement your ideas at scale, and the platform to share your expertise with the broader security community. We're looking for someone who thrives on solving hard problems, values engineering excellence, and wants to make a meaningful impact on the future of cybersecurity.
Better Together
Diversity. Inclusion. They're more than just words for us. They are the guiding values of how we build our teams, cultivate leaders, and create a culture where people feel connected.
We take care of our employees so they can take care of our customers. Customers who come from all walks of life just like us. We hire incredible people from diverse backgrounds because when we are different together, we are stronger together.
About Us
BeyondTrust is the global identity security leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.
Learn more at ********************
#LI-BS1
Auto-ApplySecurity Researcher
Remote job
Prelude Security is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode.
We are a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary
might
do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics.
Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware
Role
Prelude is seeking a Principal Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's endpoint protection platform.
As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Prelude's endpoint protection platform
Produce high-quality, public-facing security research content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and static/dynamic reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Program analysis and performance profiling
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Working at Prelude
Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
Auto-ApplyTechnical PM/Cyber Security Specialist (Remote)
Remote job
GovCIO is seeking a candidate for a Technical Project Manager/Cyber Security Associate to join our Health Informatics Product line, in the Office of Information Technology at the Department of Veterans Affairs. The candidate should have experience with a civil agency, preferably the Department of Veterans Affairs. The environment is dynamic, and client needs are often evolving. As such, servant leadership, problem-solving, process improvement, automation, modernization, optimization, technical delivery, Agile/SAFe, cyber security, rapid learning, and carrying the innovative mindset needed to lead our clients through conceptualization, technical delivery planning, and execution is critical in the support of product line operations. Additionally, this candidate will also support technical subject matter expertise in cyber security, VA architecture concepts, workflow, the CPI/HPI process, and managing program level initiatives and workload using SAFe methodologies and Atlassian toolsets such as Jira. This position is a US-based fully remote position with core hours of operation from Monday to Friday 8 AM to 5 PM ET.
Responsibilities
Provide Project Management and Jira Coordination for Operations Team
Leverage Cyber Security disciplines such as but not limited to CISSP, Security+, CISA, CISM, SSCP, in order to guide and govern the security standards and processes across an entire product line.
Provide Technical support for product teams as it relates to cyber security patterns and practices, ATO renewals, system monitoring and DevSecOps.
Translate technical development and cyber security issues into easily consumed language for senior leadership.
Assist in the ATO lifecycle including planning, submission, remediation, tracking and governance.
Establish and maintain process for managing and coordinating remediation of Product Line High Priority Incidents (HPI) and Critical Priority Incidents (CPI), includes driving process improvements and executive level reporting.
Translate complicated issues from multiple information sources into a clear point of view, and create a compelling, concise, and well-written narrative that can easily be consumed by senior leadership.
Establish and maintain process for Product Line SNOW ticket tracking and collaborate with SMEs to automate SNOW ticket tracking.
Serve as management liaison for Sub-PL operations support teams, providing strategic direction, process improvement audits, governance, and technical cyber security monitoring and action support.
Collaborate with other teams (both internal and external) to provide implementation support for the Jira to SNOW interoperability initiative.
Understand and leverage monitoring tools such as SNOW and Splunk, as well as custom dashboards built in Power BI to provide reporting and ticket management functions to support VA Operations Program Manager decision making.
Support program management, governance, oversight, and executive level reporting.
Collaborate and provide requirements and guidance in the generation and sustainment of product line dashboards for operational metrics to include information data sources such as VASI, Product Scorecards, and other source data repositories; this uses multiple tools such as Power BI, Jira, Jira Align, etc.
Facilitate identification and enhance visibility of technical debt and work with Sub Product Line Operations stakeholders to reduce.
Provide guidance and direction to Sub Product Line Operations Leads to share and implement best practices and standardize operations Product Line wide.
Provide guidance and maintain product line alignment with VA, OIT, and OHI Technology policies and standards.
Improve the work value stream: remove tactical impediments, improve work process for more effective, consistent, and sustainable execution.
Manage competing priorities, handle research and response for all product line operations related data calls and provide ongoing progress reports.
Document and provide recommendations for technical operational management approaches and delivery on projects/products.
Manage parallel projects under a complex program while also providing cross functional program level support.
Create strategic roadmaps, with alignment to goals, operations plan, and OKRs.
Document, track, and monitor project, program, system, product, and various performance metrics and report progress with recommendations or innovative approaches for improvement, organizational maturity, and/or optimization.
Serve as an escalation point for customer concerns if/when they arise and identify appropriate resolutions to achieve client satisfaction in a timely manner.
Provide strategic and technical advice on product line performance through automation, continuous integration pipelines, and other means.
Understand existing processes and identify how to improve and streamline them to improve team efficiency and effectiveness.
Collect, analyze, manage, and report key Product Line execution status measures and metrics across all aspects of the Agile product development lifecycle and product line operations.
Support communications, program baseline support, strategic planning and analysis, data collection, quality reviews, risk management, scheduling, and overall management and technical delivery of assigned projects.
Monitor, track, and provide client reports on project schedule, work plan, risks, action items, key decisions, and budget to ensure the project meets targeted dates and goals.
Manages the technical delivery of a project through the design, implementation, and testing in accordance with project objectives.
Understand the client's business issues and data challenges; perform gap analysis and provide solution recommendations.
Conduct research, analyze information needs, and perform analysis to support the delivery of relevant artifacts including business process diagrams, reports, and presentations ensuring adherence to quality and cyber security standards.
Translate complicated issues from multiple information sources into a clear point of view, and create a compelling, concise, and well-written narrative that can easily be consumed by senior leadership.
Leverage excellent presentation development skills to synthesize complex information into succinct visualizations using PowerPoint and Visio
Qualifications
Required Skills and Experience
Bachelor's Degree in a Business, Engineering, or technical discipline plus 15 years of experience; 10 additional years of experience can be substituted for the degree requirement
Experience in managing multiple and concurrent mid-sized or large-scale software development projects.
Experience in the software development and/or product management lifecycle.
Experience in managing projects in the Department of Veterans Affairs
Experience in the Healthcare IT field
Intermediate proficiency in all of the major Microsoft Office Suite of tools.
Experience using Jira in an Agile or SAFe environment.
Familiarity and understanding of DevSecOps principles and best practices.
Experience in at least 2 of the 8 major cyber security domains, specifically in how it is managed in the public sector.
Experience providing cross-functional program level support
Experience creating and presenting executive summary presentations
Experience in risk management and mitigation strategies
Preferred Skills and Experience
Certified in at least one SAFe proficiency/discipline.
Project Management Professional - PMP Certified
Certified in at least one Cyber Security discipline such as but not limited to CISSP, Security+, CISA, CISM, SSCP, etc.
Understanding of Lean Six Sigma and LEAN principles and processes
Understanding VA technologies such as VistA, VPR, REST API SOAP
Familiarity with InterSystems products such as (Cache, IRIS, FHIR ODS, HS, HC)
Familiarity with the Electronic Health Record (EHR)
Experience in conflict management and servant leadership
Highly motivated and analytical; proven problem-solving abilities
Ability to demonstrate initiative, proactivity, and enthusiasm in a fast-paced environment
Willingness and ability to quickly learn new skills, new client environments, and grow domain expertise
Ability to conduct independent research in the root cause analysis and resolution of complex issues
Excellent planning, project oversight, risk management, prioritization, organization, attention to detail, leadership, and time management skills
Demonstrated strong facilitation and excellent verbal communication, oral presentation, analytical and written communication skills.
Clearance Required: Ability to obtain and maintain Public Trust/Suitability clearance at VA.
Company Overview
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range USD $130,000.00 - USD $145,000.00 /Yr.
Auto-ApplySecurity Analyst / Information Systems Security Officer (ISSO)
Remote job
Over the past 15 years, eTel has delivered essential solutions for the federal government by securing and managing data, providing scalable identity access, modernizing legacy systems, and building high-performance platforms. By integrating new technologies and ensuring reliable operations we help agencies stay prepared for future challenges As a premier technology solutions and services company to the US federal government, eTel possesses longstanding relationships across the federal civilian marketplace. Other customers include the broader Treasury Department, Commerce Department, and State Department.
eTel offers integrated CMMI Level 3 processes, tools, and techniques with innovative, cost-efficient, and secure solutions to address complex challenges. eTel also holds ISO 9001:2015, ISO/IEC 27001:2013, and ISO/IEC 20000-1:2018 certifications, and offers dedicated subject matter experts (SMEs) and thought leaders that possess a deep understanding of customers' environments and challenges.
Security Clearance: Secret or TS clearance (Mandatory). Candidates without active secret clearance will not be considered.
Citizenship: US Citizen (MUST)
Overview:
The Security Analyst / ISSO ensures CMS API Gateway's compliance with FISMA Moderate and ARS 5.1 controls, manages audits, and maintains continuous monitoring and security authorization artifacts.
Core Responsibilities:
Oversee implementation of FISMA, NIST 800-53, and ARS 5.1 controls.
Support continuous monitoring, vulnerability scans, POA&M management, and reporting.
Coordinate with CMS CISO and security teams on ATO documentation.
Respond to audits, penetration tests, and incident management activities.
Ensure encryption, identity management (Okta/OAuth2), and TLS configurations meet CMS standards.
Conduct risk assessments and security reviews for new APIs and integrations.
Required Experience:
7+ years in federal cybersecurity or ISSO roles.
Proven experience supporting CMS, HHS, or other FISMA-regulated agencies.
Familiarity with ARS 5.1, CMS BPSSM, and FedRAMP Moderate environments.
Hands-on knowledge of Splunk, Tenable, and SentinelOne or equivalent tools.
Certifications:
CISSP, CISM, or CAP (required).
Security+ CE or equivalent baseline (required).
AWS Security Specialty or Certified Cloud Security Professional (CCSP) preferred.
Location: Work will be primarily onsite in Washington, DC, or other designated sites. Remote work requires prior client approval. Local and occasional out-of-area travel may be required.
Commitment to Diversity -
eTelligent Group provides equal employment opportunities (EEO) to all applicants without regard to race, color, religion, gender, sexual orientation, gender identity, nations origin, age, disability, genetic information, marital status, amnesty, status as a covered veteran, and any other characteristic provided in accordance with applicable, federal, state and local laws.
Auto-ApplyHead of Cyber Exposure Management
Remote job
The Head of Global Risk Solutions (GRS) Cyber Insurance Risk Management is responsible for developing and implementing GRS' capability for risk-based oversight of Cyber re/insurance risk globally.
The role requires close working relationships with the GRS Office of Underwriting, and specifically the CUOs and Product Leader, claims, actuarial, and Risk Management teams across GRS and Corporate.
The successful candidate will have significant experience with Cyber underwriting standards, risk aggregation modelling techniques, accumulation management, and emerging risk identification and mitigation.
Responsibilities include:
Maintain and enhance the GRS Cyber “View of Risk,” which details the approved methodology and approach to Cyber risk measurement.
Lead strategic analysis and monitoring of Cyber exposures to provide insights into risk accumulations, market and risk trends and developments.
Coordinate with key stakeholders to identify, assess, and improve understanding of the Cyber accumulation scenarios or clash events that have the greatest potential to cause a material loss to GRS.
Advise key stakeholders on underwriting appetite, risk limits, underwriting guideline considerations and best practices, and other product management actions.
Perform independent underwriting and pricing quality reviews to evaluate adherence to GRS standards and guidance, assess the reasonableness of key assumptions and selections, and review for appropriate use of approved pricing tools.
Provide risk-based validation of loss models and new pricing tools including review of, and challenge to, key assumptions and parameters.
Contribute to knowledge sharing through participation on the Financial Lines Product Board, and other related underwriting and portfolio steering initiatives.
Provide, or contribute to, regular reporting to governance bodies (e.g. the GRS ERM Committee, the Financial Lines Product Board) as required.
Lead and contribute to Cyber projects and initiatives as required.
Coordinate with Underwriting and Operations to develop data standards that improve quality and breadth of the Cyber exposure information collected to facilitate transparent and informed risk taking.
Qualifications
Competencies typically acquired through a Bachelor`s degree in a quantitative field and 10+ years of relevant experience
Additionally, excellent quantitative analysis and modeling skills, and significant experience in an analytical capacity (eg financial analysis, product management, actuarial, underwriting, etc.) is highly preferred
Experience managing a team is required
Strong written and verbal communication skills in both formal and informal settings, as well as proven ability to effectively present technical concepts to non-technical individuals within and outside of the organization are highly preferred
Ability to foster and encourage teamwork and productive working relationships with stakeholders at all levels and across organizational lines required
#LI-JD1
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplySenior Information System Security Officer (ISSO)
Remote job
Full-time Description
MBL Technologies, Inc. offers a diverse set of management and technology consulting services to Federal government and commercial markets. Our solutions are tailored to support each client's mission, accounting for their unique needs and operating environments to ensure success. We bring the right people, capabilities, and expertise together to assist our clients with enabling their mission. Together our individual differences drive successful business results.
If you are transitioning from military to civilian life, have prior service, are a retired veteran, or a member of the National Guard or Reserves, or spouse of an active military service member, we encourage you to apply. Please visit our webpage for information on our policies and benefits for the military and veteran community.
Why Work with Us?
We trust, empower, and believe in our employees to soar to their fullest potential!
We offer a robust benefits package (medical, dental, vision, STD, Accident, Life, Hospital Insurance, FSA, HSA, 401K match, professional development stipend, etc.).
We love to have fun and give back to the community. Community Service and Employee Engagement events are atop our calendar events!
We genuinely like each other and champion everyone to achieve their own greatness!
MBL Technologies is seeking a highly skilled and experienced
Senior Information System Security Officer (ISSO)
in
support of a federal government agency. The role is critical to ensure the security and privacy of the federal agency's IT and Operational (OT) systems across on-premises and cloud environments. This role is contingent based on contract award.
Key Responsibilities:
Lead Risk Management Framework (RMF) activities across the system development lifecycle (SDLC)
Develop and maintain system authorization artifacts (SSPs, POA&Ms, ATO packages)
Support continuous monitoring, vulnerability remediation, and independent assessments
Collaborate with system owners, project teams, and stakeholders to implement responsive security controls
Analyze and report on cybersecurity risks related to:
Artificial Intelligence (AI)
DevSecOps
Zero Trust Architecture
Citizen Development (LCNC platforms)
Supply Chain Risk Management (SCRM)
Maintain and enhance the ISSO Program Guide and ensure alignment with FDIC policies and NIST standards
Deliver recurring reports: Weekly/Monthly Status, Quarterly Lessons Learned, CISA Analysis, FedRAMP POA&M, etc.
Ensure compliance with FISMA, FedRAMP, and other federal cybersecurity regulations
Required Qualifications:
7-10+ years of experience in cybersecurity and information assurance
Deep expertise in:
NIST RMF (SP 800-37, SP 800-53, SP 800-137)
FedRAMP standards and cloud platforms (Azure, M365, Salesforce, ServiceNow)
DevSecOps, CI/CD pipelines, Infrastructure as Code (IaC)
Security testing tools (SAST, DAST, SCA)
Identity and access management (SAML, OAUTH, OIDC, PKI)
Network security, SIEM, endpoint protection, vulnerability management
Familiarity with OSCAL, CVE, CWE, CVSS formats
Excellent communication and documentation skills
U.S. Citizenship and eligibility for High-Risk background investigation
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and/or Certified in Governance, Risk, and Compliance (CGRC/CAP) preferred.
MILITARY OCCUPATIONAL SPECIALTY CODES (MOS codes):
170A, 170D, 17A, 17B, 17C, 17D, 24B, 25B, 47D, 94F, IT, 17 5309, 6203, 9735, 9740, 9890, 9891
CORPORATE CITIZEN:
MBL Technologies' vision is to make a positive difference - for our people, our customers, and our communities. As such, a commitment to service and excellence has been woven into the very fabric of our culture. MBL employees demonstrate a willingness to consistently go above and beyond and strive for excellence in all we do - championing, protecting, and celebrating the core business through the mission, vision, and values. All are expected to be good corporate citizens, supporting one another and internal corporate initiatives to build a stable business platform and ensure lasting company success.
Benefits:
MBL Technologies offers a competitive salary adjusted for candidate qualifications partnered with an industry-leading benefits package. This package includes incentive plans with corporate and individual-based performance bonuses, 401K, PTO, remote work, health and wellness programs, employee discounts, and learning and development reimbursement.
EEO STATEMENT:
MBL Technologies is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, or protected veteran status.
Information System Security Officer II - Mid-Level
Remote job
At The One 23 Group, our mission is to set the benchmark for excellence in government services. We empower our clients in the Department of Defense, intelligence community, and federal civilian sectors to excel with our advanced capabilities. Our dedication lies in fostering a people-first culture, underpinned by steadfast ethical principles. Embracing innovative technologies and process improvements, we are steadfast in our journey toward a future that is both bright and transformative.
Our expertise spans consulting and analytics, digital workplace solutions, and cyber compliance. With our global footprint, we place a strong emphasis on nurturing our people and culture, which forms the core of our successful strategies in leadership and financial management. We pride ourselves on our extensive experience and effective approach, ensuring that we lead with both innovation and integrity.
Responsibilities
Contractor to provide cyber security management, oversight, and customer support for maintaining the continuity of DHS Management Information System compliance in accordance with DHS, National Institute of Standards and Technology (NIST), and other applicable Federal standards. This Position is 100% Remote.
Applies specialized knowledge of sensitive system Cybersecurity requirements and Privacy Act requirements.
Applies specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with NIST's Risk Management Framework and the Federal Risk and Authorization Management Program (FedRAMP).
Applies specialized knowledge and experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, Federal Information Processing Standards (FIPS, and NIST guidelines.
Applies knowledge of DHS Information Security Policy Directives and Handbooks is preferred.
Applies knowledge and experience with standard IA concepts, practices, and procedures. Working independently to solve problems quickly and completely.
Applies specialized experience with three (3) of the four (4) following criteria is required:
Vulnerability scanning execution, assessment, and analysis.
Operating system and network knowledge (i.e., Local Area Networks [LAN] and Wide Area Networks [WAN]).
Information security and assurance principles (e.g., Defense-in-depth) and associated supporting technologies.
Application security, database security, and network security.
Possess ability to assess and weigh current and evolving security threats in an operational environment.
Possess good oral and written communication skills.
Team player who can collaborate with multiple stakeholders to arrive at the best solution.
Qualifications
Master's degree and 4 years of Cybersecurity & Federal Information Security Modernization Act (FISMA) experience, or a Bachelor's Degree and 5 years of Cybersecurity & FISMA experience or a total of 7 years of Cybersecurity & Federal Information Security Modernization Act (FISMA) experience
Must be a US citizen with ability to obtain/maintain a Top Secret clearance
Possesses
one (1) of the following professional security certifications
or
can be obtained within six (6) months of hire:
Certified Information System Security Professional (CISSP)
CompTIA Advanced Security Practitioner (CASP)
Certified Information Systems Auditor (CISA)
Certified Ethical Hacker (CEH)
Systems Security Certified Practitioner (SSCP)
Certified Information Security Manager (CISM)
GIAC Information Security Professional (GISP)
GIAC Security Leadership (GSLC)
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplyInformation Systems Security Officer (ISSO)
Remote job
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyInformation System Security Officer (ISSO)
Remote job
[ABOUT ISTARI DIGITAL]Istari is a digital engineering software company enabling our customers to turn the physical world into the digital to accomplish their specific mission or business objectives. Istari was founded with the vision of making open, scalable digital engineering ecosystems a reality - where new technologies and systems are created digitally, free from the real-world constraints of costs and schedules. We are creating the world's best engineering model sharing platform, allowing our customers to simply and securely integrate their models across different engineering disciplines, organizations, and security levels.
At Istari, we are passionate about our mission of creating the world's first open and scalable industrial metaverse. Whether our customers are designing prototypes, performing virtual testing, or training AI and autonomy for complex systems, we know that going digital will save them time, resources, and reduce their environmental impact.
While we are a distributed team with most team-members working remotely, we place an emphasis on staying connected and collaborative, prioritizing in-person opportunities to build trust as a team. At Istari, we still believe that trust is best built in-person. To do this, we have an engineering headquarters in Cambridge, MA for focused technical development and several times per year we gather for an off-site that allows us to develop our professional skills and our team relationships.
[VALUES]At Istari, we live by our values, which include:
Purposeful AutonomyWe value letting people self-organize and self-motivate. Our flat structure and lack of meeting clutter are meant to empower individuals and teams to be proactive.Our autonomy is measured, goal-oriented, and results-driven - not meandering. Clear objectives help us prioritize our time.
Smart TransparencyWe believe in honest-but-kind communication, transparency, and open-door policies. We love learning about challenges and tackling them early, not hearing good or bad news late. We share work-in-progress across our team. Fast feedback keeps autonomy purposeful.
Continual CuriosityAt Istari, we love learning to do things ourselves. We ask, read, share, teach - even watch YouTube videos - to learn new skills to solve problems. When we make breakthroughs, we write them down. Writing focuses ideas, helps us learn, and helps us share.
Equal Opportunity Istari is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
We are seeking a highly experienced and knowledgeable Information System Security Officer (ISSO) to join our Cybersecurity team. The ISSO will serve as a principal advisor on all matters, technical and otherwise, involving the cybersecurity of information systems under their purview. This role requires a deep understanding of cybersecurity principles, practices, and frameworks, as well as the ability to develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, both on premises and in cloud environments. The ISSO will work closely with various stakeholders across the organization to ensure the confidentiality, integrity, and availability of our information systems.Key Responsibilities
Serve as the principal advisor on all matters involving the cybersecurity of assigned information systems.
Develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, including JSIG, NIST 800-171, NIST 800-53, CMMC, and ITAR.
Conduct risk assessments and identify vulnerabilities in information systems.
Develop and implement security controls to mitigate identified risks.
Monitor and evaluate the effectiveness of security controls.
Develop and deliver cybersecurity awareness training to employees.
Investigate security incidents and breaches.
Maintain security documentation, including system security plans (SSPs), risk assessments, and incident reports.
Stay up-to-date with the latest cybersecurity threats and vulnerabilities.
Collaborate with the engineering and customer success teams to ensure secure implementation and configuration of systems.
Required Qualifications
Active Top Secret Security Clearance, with SCI eligibility.
Minimum of 5 years of experience in a relevant field.
Deep understanding of cybersecurity principles, practices, and frameworks, including JSIG, NIST 800-171, NIST 800-53, ITAR, ISO, and CMMC.
Experience with risk assessments, vulnerability identification, and security control implementation.
Experience with security incident investigation and response.
Excellent communication and collaboration skills, with the ability to effectively communicate with both technical and non-technical audiences.
Strong analytical and problem-solving skills.
Relevant certifications (e.g., Sec+, CISSP, CISM).
Must be a US citizen living within the United States.
Preferred Qualifications
Bachelor's degree in computer science, information systems, or a related field.
Experience with SOC compliance and audits.
BENEFITSWe offer highly competitive benefits, including:
Health and Family- Medical/Dental/Vision- Employee Premiums are 100% Company Paid- Life Insurance- Flexible Work Hours - Unlimited Paid Time Off (PTO) with federal government holidays
Financial- Competitive Compensation - 401k - Company Stock Options- Home Office Setup Budget
Learning- Reimbursement for approved trainings and subscriptions- Conferences (travel, lodging, and fees)
Note - some benefits are not available to interns or contractors.
Thank you for your interest in Istari. Expect to hear back from us soon with next steps.
Auto-ApplySenior Information Systems Security Officer (ISSO) Norfolk, VA
Remote job
Watershed Security, is a Veteran Owned Small Business with over 20 years' Cybersecurity and Government Contracting experiencing. Watershed is looking for a Senior Information Systems Security Officer (ISSO) to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidates will have experience coordinating and enacting required security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
REQUIRED QUALIFICATIONS
Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Must have at least one of the following active certifications: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP,
Years of Experience: 6 years practical experience in a cybersecurity or A&A related field.
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Clearance Level: SECRET; US Citizen.
Ability to possibly provide onsite support in Philadelphia, PA or Norfolk, VA. Some/all remote work may be an option, however the norm will be onsite support. This will be dependent upon customer needs and classification level of work being performed.
Some travel may be required.
Experience with the Navy RMF Process Guide (RPG), and Navy A&A tools such as ACAS, eMASS and eMASSter.
Proficient with Microsoft Office Suite (Word, Excel, Teams, Project). Self Starter; detail oriented; able to brief senior level staff.
DESIRED QUALIFICATIONS
Experience supporting 10 or more Navy Packages (achieving and/or maintaining ATO)
Experience with the NAVSEA RMF Business Rules
Contingent upon award
PAY RANGE
Final salary is influenced by factors such as location, contract labor categories, experience, skills, education, and certifications. Watershed offers competitive compensation, medical and dental benefits, educational reimbursement, 401K plans with matching, 15 days of PTO to start and 11 paid holidays per year. The proposed salary range for this position is: $70,000.00 - $100,000.00 USD.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-Apply