A leading security training provider is seeking a Senior Security Engineer for their content engineering team. This role supports security professionals, builds hands-on content, and integrates security into DevOps. Ideal candidates have over 5 years of experience in application security and are passionate about improving security practices. The position is remote-first with competitive compensation and benefits.
#J-18808-Ljbffr
A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform.
#J-18808-Ljbffr
$114k-163k yearly est. 1d ago
Security Researcher
Prelude 3.8
Remote job
Prelude Security is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode.
We are a small team of securityresearchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary
might
do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics.
Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware
Role
Prelude is seeking a Principal SecurityResearcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's endpoint protection platform.
As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Prelude's endpoint protection platform
Produce high-quality, public-facing securityresearch content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and static/dynamic reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Program analysis and performance profiling
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Working at Prelude
Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
$93k-129k yearly est. Auto-Apply 60d+ ago
Principal Research Analyst - Information Security
Isaca 4.5
Remote job
About ISACA ISACA (************** champions the global workforce advancing trust in technology. For more than 55 years, ISACA has empowered its community of 185,000+ members with the knowledge, credentials, training and network they need to thrive in fields like information security, governance, assurance, risk management, data privacy and emerging tech. With a presence in more than 190 countries and with nearly 230 chapters worldwide, ISACA offers resources tailored to every stage of members' careers-helping them to thrive in a rapidly changing digital landscape, drive trusted innovation and ensure a more secure digital world. Through the ISACA Foundation, ISACA also expands IT and education career pathways, fostering opportunities to grow the next generation of technology professionals. Overview
A Principal ResearchAnalyst - Information Security at ISACA leads the development, delivery, and continuous enhancement of high-quality forward-thinking content, guidance, and practitioner aids for their assigned area of expertise, ensuring alignment with ISACA's Professional Practices Program Strategy and industry standards. This role partners closely with business units, marketing, events teams, and ISACA leadership to integrate practice-area content consistently across conferences, webinars, publications, and other member-facing initiatives. Serving as a subject matter expert in their assigned practice area. This Principal ResearchAnalyst recruits, mobilizes, and guides volunteer SME groups to co-develop and validate content, while providing expert guidance throughout content and research project cycles. The position represents ISACA externally at industry events, panels, and webinars, evaluates conference proposals, and ensures presentations meet technical and strategic standards.
Additionally, the role supports knowledge advancement by responding to member inquiries, monitoring trends, and maintaining up-to-date expertise, and contributes to ISACA's brand and marketing efforts to strengthen organizational visibility and credibility. This position requires consistent demonstration of critical thinking, collaboration, strong communication, analytical skills, and the ability to manage multiple priorities, embodying ISACA's values of People First, Curiosity, Passion, and Collaboration.
Responsibilities
Content Leadership & Development
Lead the creation, review, and delivery of content including articles, audit programs, whitepapers, secondary research reports, and practitioner aids.
Ensure content aligns with ISACA's Professional Practices Program Strategy and industry standards.
Provide input on materials, frameworks, and references to maintain high-quality outputs.
Subject Matter Expertise & Volunteer Engagement
Serve as internal SME within assigned professional practice (e.g., audit, emerging tech, GRC, information security, privacy).
Recruit, mobilize, and manage volunteer SME groups to co-develop and validate ISACA content.
Provide guidance and leadership during content and research project cycles e.g., exam prep materials, journal articles.
External Representation & Thought Leadership
Represent ISACA at industry events, panels, podcasts, and webinars to promote the organization's research and frameworks.
Evaluate conference proposals and review final presentations for technical and strategic accuracy.
Knowledge Advancement & Inquiry Support
Respond to member and partner technical inquiries within area of practice.
Maintain up-to-date knowledge by attending professional seminars, reviewing literature, and monitoring trends.
Cross-Functional Collaboration
Partner with business units, marketing, and events teams to ensure consistent, relevant integration of practice-area content across conferences, webinars, podcasts, and publications.
Collaborate with ISACA leadership to align professional practice content with organizational messaging and priorities.
Strategic and Brand Support
Support ISACA's marketing and brand-building efforts through strategic communication and collaboration.
Participate in activities that foster partnerships and elevate ISACA's visibility and credibility in the global ecosystem.
Qualifications
Required Field of Study:
Bachelor's Degree in a relevant field of study from an accredited university, or an equivalent combination of education and experience.
Minimum Years of Experience Required:
Minimum of 8 years of experience in a similar role or capacity, with a demonstrated record of success.
Experience responding to stakeholder inquiries, providing expert guidance and practical interpretation of industry practices and trends.
Proven experience collaborating cross-functionally with business teams
Description of Minimum Experience Required:
Additional 5+ years of enterprise information security program experience; must include recent experience (within past 24 months) securing modern, hybrid enterprise environments.
Familiarity with common frameworks and taxonomies (NIST CSF, MITRE ATT&CK, ISO 27001, CIS controls)
Deep working knowledge of core cybersecurity domains (network, endpoint, IAM, cloud, application security, incident response)
Knowledge of cloud platforms and cloud control frameworks (AWS/Azure/GCP and cloud audit considerations)
Experience conducting secondary research and reporting
Track record of public-facing thought leadership: conference speaking, webinars, podcasts, or published articles
Required Competencies/Skills:
Vendor and market research - evaluating products, mapping capabilities, and performing competitive analysis
Critical thinking, collaboration, and cross-functional stakeholder engagement
Business writing
Proven ability to translate research into content deliverables: verbal presentations or written reports
Preferred Field of Study:
Master's Degree in Cybersecurity, Computer Science, Information Systems, or related field from an accredited university.
Preferred Years of Experience:
10+ years of experience in a similar role or capacity, with a demonstrated record of success.
Description of Preferred Experience:
Related experience in regulated industries (finance, healthcare, energy) or working with regulators and compliance programs
Direct involvement with procurement, implementation, and operationalization of AI technologies
Experience with threat intelligence, detection engineering, or malware/attack analysis
Experience performing threat modeling
Required Certifications:
CISM or CISSP
Travel of 15% or more may be required to attend industry conferences, professional events, workshops, and external meetings. Travel is primarily domestic, with occasional international travel depending on event participation and organizational priorities.
Equal Opportunity Employer (EEO) ISACA is proud to be an equal opportunity employer. ISACA is committed to building an environment of diversity, equity, and inclusion where equal employment opportunities are available to all applicants and employees without regard to race, color, religion, sex (including pregnancy and gender identity), national origin, age, ancestry, disability, genetic information, citizenship, sexual orientation, veteran status, marital status, familial status, military discharge status, or any other characteristic or status protected by federal, state, or local law. We support an inclusive workplace where employees excel based on merit, qualifications, experience, and ability. Posted Salary Range USD $109,138.00 - USD $163,759.00 /Yr. Benefits Information
Benefits Information available below:
ISACA Career Opportunities and Benefits
$109.1k-163.8k yearly Auto-Apply 50d ago
Remote Imperva Data Security SME
Wavestrong
Remote job
Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security consulting services. We pride ourselves on our best of breed security solutions and services that span a myriad of government, education and business verticals. Our staff is comprised of both certified technical and business professionals who can help you successfully navigate complexities of planning, design, implementation and management of securing data. Our approach is vendor agnostic giving our customers the freedom to choose the best customized security model for their business.
Requirements
We are looking for a Remote Imperva Data Security SME experienced with Imperva solutions to protect sensitive data across platforms. Key responsibilities include configuring and monitoring Imperva Data Security Fabric, managing data security controls, and collaborating to address vulnerabilities.
Qualifications:
Experience with Imperva Data Security Fabric (DSF), WAF and/or DAM
Knowledge of data protection regulations (e.g., GDPR, CCPA)
Proficiency in database security practices and security incident response.
Strong problem-solving and communication skills
$91k-128k yearly est. Auto-Apply 60d+ ago
CERTIFIED ETHICAL HACKER
Vikingcloud Inactive
Remote job
at VikingCloud
CERTIFIED ETHICAL HACKER About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information securityanalysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
$69k-112k yearly est. Auto-Apply 60d+ ago
CERTIFIED ETHICAL HACKER
Viking-Cloud
Remote job
About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information securityanalysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
$69k-112k yearly est. Auto-Apply 60d+ ago
Head of Growth Hacking
Remote-Referral Board
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
Please note we accept applications on an ongoing basis.
$69k-112k yearly est. Auto-Apply 60d+ ago
Growth Hacker
Osaro 4.2
Remote job
Who We Are: At OSARO, we're on a mission to empower industries with cutting-edge automation solutions that redefine the possibilities of supply chain and fulfillment operations. By harnessing the power of AI and advanced robotic vision systems, we help businesses streamline operations and achieve unprecedented efficiency. Join us as we create a world where technology not only drives productivity but also enhances the human experience in the workplace.
About the Role:
Are you a dynamic, socially savvy individual who thrives on building relationships and creating lasting connections? Do you have a knack for turning online interactions into meaningful conversations that drive business? If so, we want you to be our Social Intelligence Strategist!
In this role, you'll pivot away from traditional cold outreach and focus on leveraging social media platforms like LinkedIn and X (formerly Twitter) to engage with decision-makers at our target accounts. You'll be given a curated list of 20-25 ideal customer profiles (ICPs) to concentrate on, ensuring your efforts are focused and impactful.In this role, you will:
Engage: Connect, follow, and interact with key decision-makers within your target accounts through social media.
Strategize: Develop innovative strategies to showcase OSARO's automation solutions, tailoring approaches that resonate with potential clients' unique needs.
Educate: Share insights and content that highlight the value of our solutions, driving interest and engagement within your network.
Analyze: Track and analyze engagement metrics to refine your outreach strategies, ensuring continuous improvement.
Collaborate: Work closely with our sales and marketing teams to synchronize efforts and share best practices.
Key Responsibilities:
Achieving a target of 3-5 meaningful interactions per week with decision-makers.
Generating weekly engagement reports to gauge activity metrics and adjust strategies accordingly.
Utilizing tools like LinkedIn Sales Navigator and other analytics platforms to monitor and engage with leads strategically.
What makes the ideal candidate:
Connections & Network: ~5000+ LinkedIn Connections
Experience: You have 3-5 years of experience in enterprise and social selling, with a proven ability to engage prospects through digital channels.
Knowledge: Familiarity with the MEDDICC qualification framework is a plus, as is experience with automation technologies.
Relationship Builder: Your skills in social dynamics allow you to establish and nurture meaningful relationships that lead to new business opportunities.
Data-Driven: You have an analytical mindset and enjoy using data to inform your strategies and improve performance.
Creative Problem Solver: You're an out-of-the-box thinker with the ability to develop engaging content that attracts the right audience.
Ideal candidate will be in the Bay Area of California
Perks of Joining OSARO:
A collaborative company culture that promotes innovation and teamwork.
Opportunity to work with cutting-edge technology and industry-leading experts.
Comprehensive onboarding and continuous professional development programs to ensure your success in the role.
Clear paths for career advancement within OSARO.
Competitive salary with performance bonuses and equity options.
Comprehensive health, dental, and vision insurance.
Flexible time-off policy - take the time you need to recharge.
Join Us:
At OSARO, we value diversity and the unique perspectives every team member brings to the table. If you are excited about the opportunity to help redefine how industries use automation and drive change through innovative sales strategies, we want to hear from you!
Apply Now!
Let's revolutionize the future of automation together. If you're ready to take the next step in your career and make a real impact, we'd love to see your application :)
OSARO is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
More About OSAROOSARO is a San Francisco-based startup company building machine learning software for industrial automation, to power robots in logistics and material handling centers. Our vision is to develop a solution that enables industrial robots to perform diverse tasks in a wide range of environments. We are excited and driven to see the results of our efforts operating in the fast-growing field of autonomous material handling. We implement state-of-the-art techniques but constantly strive to build the simplest possible solution. OSARO is technique agnostic and always focused on the goal. We regularly review academic literature for novel strategies while steering clear of the hype. We're focused on delighting our customers with systems that work like magic.
Our markets are global. That's why OSARO employs a diverse team of experts in various fields from more than 15 countries, attracting talent from both innovative companies and the research labs of top-ranked engineering universities. We are naturally curious, love healthy debate, and respect varying points of view. At OSARO, we strive to be champions for equality. We believe we can serve as a model for diversity in the tech industry by emphasizing policies of nondiscrimination and inclusion at every step.
We are an equal opportunity employer who offers Health, dental, vision, and commuter benefits Generous, flexible vacation time Excellent paid parental leave policy with the option for additional reduced and unpaid leave The chance to work with robots!
The above full-time position is available immediately.
$71k-110k yearly est. Auto-Apply 60d+ ago
Head of Growth Hacking
Remote 4.1
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
Not only do we encourage folks from all ethnic groups, genders, sexuality, age, abilities, disability status and any other under-represented group to apply, but we prioritize a sense of belonging. We have 4 ERGs (Women, Disability, Queer, Minorities in Tech) who meet regularly with the People team. During your interviews and beyond, we ask & encourage anybody who needs an accommodation to request one from their recruiter.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
At Remote, we embrace AI as a valuable tool while prioritizing human creativity and authenticity. We look forward to meeting candidates who balance innovation with genuine expertise and experience. To learn more about Remote's AI guidelines check see here.
Please note we accept applications on an ongoing basis.
$72k-111k yearly est. Auto-Apply 60d+ ago
Growth Marketing Hacker
Alphapoint
Remote job
Growth Hacker / Marketer 100% Remote AlphaPoint is a financial technology company powering digital asset exchanges and brokerages worldwide. Through its secure, scalable, and customizable white label digital asset trading platform, AlphaPoint has enabled over 150 customers in 35 countries to launch and operate digital asset markets, as well as digitize assets. AlphaPoint and its award winning blockchain technology have helped startups and institutions discover and execute their blockchain strategies since 2013.Position Overview
AlphaPoint has set up an AI Lab to rapidly prototype and develop AI focused applications. We are seeking a highly creative, analytical, and performance-driven Growth Hacker to help promote and develop test marketing strategies of the MVP's and prototypes that the lab develops. You'll experiment across marketing channels, rapidly develop new tactics to acquire and retain users, and leverage data to guide your decisions. The ideal candidate thrives in a startup environment and has a proven track record of driving rapid user or revenue growth.Key Responsibilities
Develop and execute innovative, scalable growth strategies across multiple creative channels.
Design and run rapid A/B tests to optimize conversion funnels, landing pages, and onboarding processes
Use analytics tools to track KPIs, interpret performance data, and report actionable insights
Collaborate within AI Labs product, engineering, and design teams to drive user engagement and retention
Identify and execute new growth opportunities through traditional and non-traditional means.
Identify and research new channels to distribute products (reddit, discord, youtube, etc…)
Requirements
2-4+ years of experience in growth marketing, digital marketing, or a similar role
Proven track record of designing and executing successful growth campaigns
Leverage AI Tools in research in order to streamline and enhance every aspect of the AI marketing process. (research, content creation, execution, and analysis..)
Startup mindset: creative, resourceful, agile, data-obsessed, and outcome-driven
Preferred skills
Experience in Consumer and Enterprise Marketing
Diverse skillset across marketing strategies: Digital, Social, OOH, and other non-traditional methods
Prior involvement in viral or community-led growth strategies
What We Offer
Competitive compensation
Equity or stock options (if applicable)
A culture of autonomy, experimentation, and learning
Opportunity to make a real impact on company trajectory
$59k-94k yearly est. Auto-Apply 60d+ ago
Cyber Information Assurance Analyst SME
Chickasaw Nation Industries 4.9
Remote job
The Cyber Information Assurance Analyst SME provides IT support services for the Marine Corps Logistics Base by independently conducting complex security analyses of classified and unclassified systems for compliance with security requirements. Performs Command Cyber Readiness Inspections, vulnerability evaluations, and utilizing various security technologies and tools to assess the security posture of intricate computer systems and networks. Responsibilities include conducting vulnerability and risk analyses, participation in penetration studies, and defining security requirements for a range of computing systems. Recommends solutions to enhance security, gathers technical information to align with organizational goals, and offers technical analysis and advice to client executive management on system improvements, focusing on areas like information systems architecture, networking, and communication protocols. This position is on-site in the Albany, GA area.
Chickasaw Nation Industries, Inc. serves as a holding company with multiple subsidiaries engaged in several lines of business (Technology, Infrastructure & Engineering, Health, Manufacturing, Public Safety, Consulting, and Transportation) for the federal government and commercial enterprises. A portion of our profits is used to support Chickasaw citizens. We are proud to support the economic development and long-term viability of the Chickasaw Nation and its people. CNI offers premium benefits eligible on the first day of hire to full time employees; (Medical - Dental - Vision), Company Life Insurance, Short-Term and Long-Term Disability Insurance, 401(K) Immediate Vesting, Professional Development Assistance, Legal Aid Assistance Program, Family Planning / Fertility Assistance, Personal Time Off, and Observance of Federal Holidays.
As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act.
ESSENTIAL REQUIREMENTS
Secret Clearance is required and must be maintained for employment. Must be eligible for an IT-II upon assignment.
Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification.
IAM III and IAT II level certification is required.
Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
Seven (7) years IT experience
Five (5) years IA experience
Two (2) years of experience with DOD Vulnerability Management System
Command Cyber Readiness Inspection certification in at least one of the following areas:
Retina scan analysis o Operating Systems (Windows, Unix)
Boundary defense (network policy, router, firewall)
Internal defense (L2 switch, L3 switch)
DNS (policy, BIND/Windows)
HBSS (remote console, AV, ABM, PA, HIPS, ePO)
Traditional security (Common, Basic, NCV, SCV)
Wireless communications (BES, handhelds)
Strong analytical and problem solving skills for resolving security issues
Strong skills implementing and configuring networks and network components
Knowledge and understanding of DOD security regulations, DISA Security Technical Implementation Guides
Understanding of SCAP
Knowledge of and proficiency with: VULNERATOR; USCYBERCOM CTO Compliance Program; Wireless vulnerability assessment; Web Services (IIS, Apache, Proxy); Database (SQL Server, Oracle); Email Services (Exchange); Vulnerability Scans (NESSUS, SCCM); Knowledge of Phishing exercises; USB Detect; Physical Security.
Nice to have: DISA FSO certified CCRI Team Lead and have a certification in penetration testing, such as: Licensed Penetration Tester (LPT); Certified Expert Penetration Tester (CEPT); Certified Ethical Hacker (CEH); Global Information Assurance Certification Penetration Tester (GPEN); Familiarity with AUTOCHECKLIST Tool.
KEY DUTIES AND RESPONSIBILITIES
Essential Duties and responsibilities include the following. Other duties may be assigned.
Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements.
Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations.
Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks.
Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies.
Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers.
Recommends solutions to meet security requirements.
Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture.
Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves.
Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC. Competent to work at the highest level of all phases of information systems auditing.
EDUCATION AND EXPERIENCE
Seven (7) years of experience, or an equivalent combination of education/experience.
PHYSICAL DEMANDS
Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic.
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job.
EOE including Disability/Vet
CNI offers a comprehensive benefits package that includes:
Medical
Dental
Vision
401(k)
Family Planning/Fertility Assistance
STD/LTD/Basic Life/AD&D
Legal-Aid Program
Employee Assistance Program (EAP)
Paid Time Off (PTO) - (11) Federal Holidays
Training and Development Opportunities
Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI).
$48k-74k yearly est. Auto-Apply 2d ago
Growth Hacker (Telecommute OK)
Vt Enterprise 3.8
Remote job
We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications.
SlashDB clients reap between $35K-$75K a year in savings per developer.
Learn more about SlashDB at ******************
Job Description
This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game.
Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills:
Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation.
Develop and execute lead generation programs
Fill calendar with demo and webinar appointments
Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle
Reach out to industry bloggers, reporters, conferences and meetup organizers
Reach out to software consultancies with partnership opportunity
Manage website and blog content creation; write content if so inclined
Represent the company at trade shows and conferences
Add your best idea here: _______________________
Qualifications
You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options.
Key skills:
1-3 years of overall work experience in a growth, email marketing or product marketing role
Know how to measure effectiveness while avoiding over-analyzing
Know how not get ripped off on display advertising
Know how to avoid pitfalls with affiliate marketing
You are a super-connector
Bonus skills:
Dabbled in software development or participated in such projects
Additional Information
In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
$73k-100k yearly est. 60d+ ago
Information Security Compliance Senior Analyst
Crypto.com 3.3
Remote job
At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
About the Role
As our Security Compliance Senior Analyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities:
Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations
Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management
Provide complete and accurate responses to internal and third-party enquiries on security compliance
Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion
Design and manage necessary control and framework required to comply with international standards and US local regulations
Identify and drive process improvements for streamlining global security compliance operations
Qualifications:
3-5 years of experience in information security, privacy, IT audit or IT risk management related roles.
Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits.
Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements.
Ability to analyze and review US and Global privacy and information security compliance and provide guidance.
Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications
Experience leading compliance initiatives and working with auditors and/or external regulators
It's a plus if you:
Have experience in information security and privacy management in virtual assets, fintech, online services, platform services, or global services.
Have experience in establishing information security and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.)
Are a strong commitment to personal learning and development
Are detail minded with an analytical mindset
Have good communication skills with an ability to explain complex technical issues to non-technical business users
Have prior experience with project management
Have an interest and understanding of Blockchain and AI technologies
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
$81k-120k yearly est. Auto-Apply 7d ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
Musckids
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information SecurityAnalyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
Perform cyber security incident handling, tracking and reporting.
Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
Respond to relevant service requests received from end users (e.g. for investigation of security events).
Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
Conduct vulnerability assessments to identify security risks and report findings to system owners.
Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
Perform risk assessments and translate business requirements into effective security controls.
Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
Strong analytical and problem-solving skills with the ability to make decisions under pressure.
Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
Familiarity with cloud security (Azure, AWS) and identity management solutions.
Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
CISSP, CISM, GIAC, or equivalent.
Physical Requirements
Mobility & Posture
Standing: Continuous
Sitting: Continuous
Walking: Continuous
Climbing stairs: Infrequent
Working indoors: Continuous
Working outdoors (temperature extremes): Infrequent
Working from elevated areas: Frequent
Working in confined/cramped spaces: Frequent
Kneeling: Infrequent
Bending at the waist: Continuous
Twisting at the waist: Frequent
Squatting: Frequent
Manual Dexterity & Strength
Pinching operations: Frequent
Gross motor use (fingers/hands): Continuous
Firm grasping (fingers/hands): Continuous
Fine manipulation (fingers/hands): Continuous
Reaching overhead: Frequent
Reaching in all directions: Continuous
Repetitive motion (hands/wrists/elbows/shoulders): Continuous
Full use of both legs: Continuous
Balance & coordination (lower extremities): Frequent
Lifting & Force Requirements
Lift/carry 50 lbs. unassisted: Infrequent
Lift/lower 50 lbs. from floor to 36”: Infrequent
Lift up to 25 lbs. overhead: Infrequent
Exert up to 50 lbs. of force: Frequent
Examples:
Transfer 100 lb. non-ambulatory patient = 50 lbs. force
Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
Push patient stretcher one-handed = 25 lbs. force
Vision & Sensory
Maintain corrected vision 20/40 (one or both eyes): Continuous
Recognize objects (near/far): Continuous
Color discrimination: Continuous
Depth perception: Continuous
Peripheral vision: Continuous
Hearing acuity (with correction): Continuous
Tactile sensory function: Continuous
Gross motor with fine motor coordination: Continuous
Selected Positions:
Olfactory (smell) function: Continuous
Respirator use qualification: Continuous
Work Environment & Conditions
Effective stress management: Continuous
Rotating shifts: Frequent
Overtime as required: Frequent
Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$82k-116k yearly est. Auto-Apply 7d ago
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Latitude Inc.
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
$82k-116k yearly est. Auto-Apply 60d+ ago
Staff Information Security Analyst
Playstation 4.8
Remote job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information SecurityAnalyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 12d ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
MUSC (Med. Univ of South Carolina
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information SecurityAnalyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
* Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
* Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
* Perform cyber security incident handling, tracking and reporting.
* Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
* Respond to relevant service requests received from end users (e.g. for investigation of security events).
* Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
* Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
* Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
* Conduct vulnerability assessments to identify security risks and report findings to system owners.
* Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
* Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
* Perform risk assessments and translate business requirements into effective security controls.
* Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
* Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
* A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
* Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
* Strong analytical and problem-solving skills with the ability to make decisions under pressure.
* Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
* Familiarity with cloud security (Azure, AWS) and identity management solutions.
* Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
* Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
* Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
* CISSP, CISM, GIAC, or equivalent.
Physical Requirements
* Mobility & Posture
* Standing: Continuous
* Sitting: Continuous
* Walking: Continuous
* Climbing stairs: Infrequent
* Working indoors: Continuous
* Working outdoors (temperature extremes): Infrequent
* Working from elevated areas: Frequent
* Working in confined/cramped spaces: Frequent
* Kneeling: Infrequent
* Bending at the waist: Continuous
* Twisting at the waist: Frequent
* Squatting: Frequent
* Manual Dexterity & Strength
* Pinching operations: Frequent
* Gross motor use (fingers/hands): Continuous
* Firm grasping (fingers/hands): Continuous
* Fine manipulation (fingers/hands): Continuous
* Reaching overhead: Frequent
* Reaching in all directions: Continuous
* Repetitive motion (hands/wrists/elbows/shoulders): Continuous
* Full use of both legs: Continuous
* Balance & coordination (lower extremities): Frequent
* Lifting & Force Requirements
* Lift/carry 50 lbs. unassisted: Infrequent
* Lift/lower 50 lbs. from floor to 36": Infrequent
* Lift up to 25 lbs. overhead: Infrequent
* Exert up to 50 lbs. of force: Frequent
* Examples:
* Transfer 100 lb. non-ambulatory patient = 50 lbs. force
* Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
* Push patient stretcher one-handed = 25 lbs. force
* Vision & Sensory
* Maintain corrected vision 20/40 (one or both eyes): Continuous
* Recognize objects (near/far): Continuous
* Color discrimination: Continuous
* Depth perception: Continuous
* Peripheral vision: Continuous
* Hearing acuity (with correction): Continuous
* Tactile sensory function: Continuous
* Gross motor with fine motor coordination: Continuous
* Selected Positions:
* Olfactory (smell) function: Continuous
* Respirator use qualification: Continuous
* Work Environment & Conditions
* Effective stress management: Continuous
* Rotating shifts: Frequent
* Overtime as required: Frequent
* Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$65k-92k yearly est. 6d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
$50k-77k yearly Auto-Apply 13d ago
Information Security Data and Risk Analyst
Ivanti 4.5
Remote job
Are you an experienced Security Data and Risk Analyst that wants to develop and create awareness around security-relevant key performance and key risk indicators? At Ivanti, we work passionately and authentically, striving to win together and make a real impact for our customers and each other. Join us to elevate your career and help deliver innovative solutions in a dynamic, empowering environment.
Why this role matters
As the Security Data and Risk Analyst, you will generate enterprise visibility, awareness and understanding of major risk and security issues in a comprehensive and easily consumed manner to support the corporate objectives and especially the reduction of risk. You will be a leader in our Information Security Group which is a global team of experienced professionals dedicated to ensuring the security of Ivanti's products, corporate and production networks, environments, and of course, its data
What you'll do:
Lead the execution of multiple functions: Taking ownership of and creating awareness around security-relevant key performance and key risk indicators
Develop automation for data gathering, analysis and presentation using Python and Go
Educate as well as inform audiences of a wide variety of security and risk expertise, including building libraries of material to support understanding of benefits and costs of security management.
Generating insights and supporting information for decisions to be made including wrangling data from complex data sets and data sources
Create dynamic dashboards and presentations
Articulate risk and risk management as realistic, measurable harm; Create dynamic dashboards and presentations
Support the Security Governance and executive workstreams, including analysis and presentations materials.
Coordinate, chair and present data to management, leadership and C-suite stakeholders in their languages.
What you will bring:
Minimum of a bachelor's degree, preferably in information systems or data analytics.
4+ years' experience with Python or Go automation and scripting
2+ experience with Risk Management
1 years' experience with Risk Modeling
4+ years Data Analytics experience
Familiarity with information security and security terms
Experience conducting reporting operations such as presentations, metrics, dashboards, KPIs, KRIs, OKRs.
1 year experience executing/leading project management efforts in a technology-related arena.
Can show evidence has created effective KPIs, KRIs and OKRs and a means to measure and report each.
Experience with cloud, onprem, corporate, remote, solutions/products dev and transformative environments.
Ability to articulate themes from: NIST, ISO, SOC 2, FedRAMP, GDPR and DORA, and Security, Privacy principles.
Preferred knowledge or certification in 1 or more of the following: CISSP, CISA/CISM, or CRISC or PMP
Why Ivanti?
Friendly flexible working model: Empower excellence whether you're at home or in the office and support work-life balance.
Competitive compensation & total rewards: Including health, wellness, and financial plans tailored for you and your family.
Global, diverse teams: Collaborate with talented people from 23+ countries.
Learning & development: Grow your skills with access to best-in-class learning tools and programs.
Equity & belonging: We value every voice. Your story helps inform our solutions for a changing world.
What drives us
Ivanti's mission is to elevate human potential within organizations by managing, protecting and automating technology for continuous innovation.
It is through diverse and inclusive hiring, decision-making, and commitment to our employees and partners that we will continue to build and deliver world-class solutions for our customers.
To learn more about Ivanti's
Mission and Core Values.
Inclusion at Ivanti
Ivanti is proud to be an Equal Opportunity Employer. We're committed to building a diverse team and fostering an inclusive environment where everyone belongs. We welcome applicants from all backgrounds and walks of life.
Need adjustments during the process? Reach out to ***************** we're happy to help.
#LI-Remote