Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Leads implementation and monitoring of security controls, governance, and trust frameworks for AI systems across the organization, ensuring compliance with OWASP and NIST standards.
Principal-level security engineer who designs and implements AI security infrastructure, governs frontier AI model access, and ensures safe deployment of autonomous agents across the organization.
Designs and implements security architecture for AI systems, safeguards frontier model access, and ensures governance of AI integrations across production infrastructure.
Implements and monitors security controls, governance frameworks, and observability systems for AI/ML systems across the organization.
Principal-level security engineer who designs and implements AI security infrastructure, governs frontier model access, and ensures safe AI agent deployment across the organization.
Designs and implements security infrastructure for AI model access, agent deployment, data governance, and AI system safety across the organization.
Leads implementation and monitoring of security controls for AI systems, focusing on observability, behavioral monitoring, and governance across agentic and generative AI environments.
Principal-level security engineer responsible for securing AI infrastructure, models, and agent deployments across Life360's AI-native platform.
Senior engineer responsible for securing Life360's AI infrastructure, models, and integrations while ensuring safe access to frontier AI systems and governance of AI-native platform operations.
Analyzes vulnerable and malicious code, tracks emerging threats, and builds tools to detect and remediate malware across the WordPress ecosystem.
Designs, implements, and maintains cybersecurity systems and infrastructure to protect organizational assets and data.
Leads CMMC compliance initiatives for DoD contractors by developing policies, writing security documentation, and managing audit-ready evidence across multiple client engagements.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, including firmware reverse engineering and hardware analysis.
Conducts hands-on penetration testing and security assessments of IoT, industrial control systems, and automotive platforms, performing firmware analysis and vulnerability identification.
Conducts hands-on penetration testing and security assessments of IoT devices, industrial control systems, and automotive platforms, including firmware analysis and vulnerability identification.
Designs and implements security detection and response systems to identify and mitigate threats across the organization's infrastructure.
Leads corporate security initiatives including vulnerability management, security tool implementation, threat hunting, and incident response across cloud and IT infrastructure.
Develops and monitors security tools, manages cloud/IT infrastructure security, and leads incident detection and response efforts across the organization.
Develops and manages identity and access management systems and policies within a healthcare organization's information security department.
Conducts ISO audits and compliance assessments to verify organizational adherence to security and quality standards.