Remote Cybersecurity Jobs - Work from Home & Online
Job Search Results
1 to 50 of 1,342 for Cybersecurity
Craft high-quality content on cybersecurity and tech solutions. Mentor writers, ensure SEO optimization, and maintain accurate product data. Collaborate with cross-functional teams to shape content strategies and grow brand reputation.
Lead Cybersecurity Engineer needed to support GENM-O's information systems and cybersecurity functions. Must ensure compliance with DoD IT policies, oversee security protocols, and lead cybersecurity efforts. Requires bachelor's degree, 10-15 years o..
Develop, execute, and maintain a risk-based and data-driven strategy and roadmap for cybersecurity policies and solutions. Analyze and identify opportunities for overall security. Manage multiple high-visibility and high-impact enterprise cybersecuri..
Lead and manage cybersecurity assessment and risk mitigation projects, review clients' business process and information security policies to identify risks, analyze clients' technology resources to identify risks associated with hardware, software, n..
Collaborate with cybersecurity capability leaders and technical teams to develop secure technical solution architectures. Design and implement secure cloud environments. Evaluate third-party solutions and ensure integration with company systems align..
Plan, develop, and organize cybersecurity training and awareness program strategy. Develop content, communications, and facilitate awareness for all training campaigns. Gather historical and statistical data to support product developments.
Develop cybersecurity training content and exercises, research and refine eLearning solutions, collaborate with team to develop learning objectives, conduct content development, and coordinate with component coordinators to make training available to..
Research, evaluate, and recommend information-security-related controls on systems and network device hardening practices. Develop and maintain network architecture and diagrams. Own the Vulnerability management solutions to validate systems are meet..
Continuously develop and implement security tools for secure cloud infrastructure. Assess security and monitor logs to identify vulnerabilities. Collaborate with teams and lead incident response and remediation efforts.
Establish and lead the industrial cybersecurity business development team, define sales processes and procedures, manage business development across the organization, hire and train business development team.
Establish and lead the industrial cybersecurity business development team, define sales processes and procedures, establish opportunity tracking and management, develop global business development strategy.
Establish and lead the industrial cybersecurity business development team. Optimize revenue growth by bringing in new customers and expanding existing customer relationships. Develop global business development strategy and manage sales performance, ..
Establish and lead the industrial cybersecurity business development team, define sales processes and procedures, manage business development across the organization, and hire, manage and develop the business development team.
Establish and lead the industrial cybersecurity business development team, define sales processes and procedures, establish opportunity tracking and management, develop global business development strategy.
Establish and lead the industrial cybersecurity business development team, optimize topline revenue growth by bringing in new customers and deepening existing customer relationships, manage all day-to-day activities.
Develop and maintain comprehensive cybersecurity metrics aligned with industry frameworks. Collaborate with stakeholders to tailor metrics. Design and produce reports and dashboards. Stay current with industry trends and best practices.
Accountable for communicating, planning, and providing leadership to a team. Provides subject-matter expertise and management within assigned area. Proactively identifies and manages process improvements. Leads cross-functional discussions/initiative..
Lead and manage the cybersecurity team. Provide strategic direction and guidance on cybersecurity initiatives. Develop and implement cybersecurity policies, procedures, and standards. Oversee incident response activities and stay updated on emerging ..
Work with product owners to analyze requirements, research, prototype, and develop cybersecurity features. Collaborate with leads to drive network security architecture evolution and design scalable solutions.
Lead and coach cross-functional cybersecurity teams in the use of Agile methodologies. Develop and maintain project plans, facilitate daily stand-up meetings, allocate resources, and identify potential risks. Establish clear communication with stakeh..
Lead cybersecurity teams using Agile and waterfall methods to achieve objectives. Develop project plans, facilitate Scrum meetings, allocate resources, identify risks, and communicate with stakeholders. Ensure project components meet cybersecurity st..
Lead cross-functional cybersecurity teams in Agile and waterfall methodologies. Manage project budgets, track expenses, and maintain accurate project documentation while ensuring compliance with cybersecurity standards.
Build and enhance a proven security platform, blend innovation and speed in a constantly evolving cloud environment, analyze new threats and offer deep insight through data-driven intel, collaborate with customers to help solve their toughest securit..
Lead Instructors at Correlation One deliver high-quality virtual instruction, conduct large synchronous online lectures on technical content, and collaborate with operations personnel to drive exceptional learning outcomes for 100 to 8,000+ diverse F..
Executing security control initiatives such as risk assessments, control assessments, and 3rd party risk assessments. Developing and implementing the cybersecurity risk management program. Collaborating with multiple levels of the organization to man..
Develop and deliver cybersecurity course material, conduct training sessions, evaluate student performance, and contribute to course content improvement. Requires degree, relevant certifications, teaching/training experience, and excellent communicat..
Identify and track threat campaigns. Develop and maintain threat actor profiles. Monitor threat landscape for new tactics and procedures. Analyze malware and other threats. Manage intelligence requirements and support Cyber Defense and Engineering teams.
Design and deliver specialized and targeted cybersecurity trainings to both staff and customers. Continuously improve training paths and material, expand courses into new cybersecurity topics, and coordinate training delivery to ensure high customer ..
Responsible for coordinating, implementing, and delivering key projects in Information Security. Develop and maintain security policies, manage vendor relationships, and collaborate with stakeholders to improve efficiency and success.
Develop and update learning objectives and content for cybersecurity training. Collaborate with team members to create interactive eLearning solutions. Research and refine technical content. Coordinate with stakeholders to make training content available.
Develop and update learning objectives and content for cybersecurity training programs. Collaborate with team members to create interactive eLearning solutions. Research and refine technical content. Coordinate with stakeholders to ensure training ma..
Develop and update learning objectives, create training content, and collaborate with team members. Research and refine content for interactive eLearning solutions. Coordinate with trainers and subject matter experts to meet instructional requirements.
Teaching Assistants (TAs) play a critical role in teaching learners in a virtual Cybersecurity training program. TAs support synchronous sessions, provide office hours, grade submissions, and collaborate to improve the learner experience.
Develop and update learning objectives and content for cybersecurity training programs. Collaborate with team members to create engaging and technically accurate learning solutions. Research, refine, and apply content for interactive eLearning solutions.
Develop and update learning objectives, create interactive eLearning solutions, collaborate with team members, research and refine content, coordinate training content, administer processes and tools, consult with instructors, and produce media to su..
Develop and update learning objectives, create virtual practical exercises, research and refine content, coordinate with trainers and subject matter experts, and collaborate with technical developers to produce media that supports instructional goals..
Develop and update learning objectives and content for cybersecurity training programs. Collaborate with team members to create instructional materials and practical exercises. Research and refine content for interactive eLearning solutions.
Develop and update learning objectives and content for cybersecurity training programs. Collaborate with team members to create engaging and technically accurate learning solutions. Research and refine content for interactive eLearning courses.
Develop and update learning objectives, create training content, and collaborate with team members to design and develop instructionally sound learning solutions. Research and refine technical content for interactive eLearning solutions.
Conduct vulnerability assessments, collaborate with cross-functional teams to prioritize and remediate vulnerabilities, develop and maintain vulnerability management processes and procedures, monitor security alerts and advisories related to vulnerab..
Analyze and deliver authoritative cyber and technology analysis for publication. Commission articles, edit submissions, and manage external contributors. Attend daily meetings and represent the company in engagements with clients and media.
Design and author interactive lessons, quizzes, and projects. Think pedagogically to break down technical concepts into digestible exercises. Collaborate with the Curriculum team to craft learning outcomes and build a compelling learner experience.
Write technical documentation for IT solutions, including operational and compliance guides. Translate federal regulations into policy. Collaborate with stakeholders to maintain information system documentation aligned with security standards.
Design and implement security solutions for clients, identify upsell opportunities, and stay up-to-date on industry trends. Collaborate with internal teams and maintain client relationships. Minimum 5 years of experience in information security required.
Develop and maintain technical IT/cybersecurity capabilities for safeguarding information systems and applications. Assist in designing, planning, testing, and implementing cybersecurity technology projects. Analyze basic information and make decisio..
Seeking a Territory Account Manager with 3-5 years of sales experience to own and coordinate all aspects of the sales cycle, build and execute a Territory Plan, and communicate Optiv's value proposition to clients.
Seeking a Territory Account Manager with 3-5 years of sales experience to own and coordinate all aspects of the sales cycle, build and execute a Territory Plan, and communicate Optiv's value proposition to clients.
Develop new business and expand existing accounts to help organizations solve modern cybersecurity challenges. Own and coordinate all aspects of the sales cycle, build and execute a territory plan, and communicate Optiv's value proposition to clients..
Classify files as malicious or benign, analyze and detect malware, identify potentially unwanted programs, analyze new cyberthreats and techniques, improve automatic classification systems, create technical reports on new malware.
Monitor and analyze security events, investigate threats, and respond to security alerts and incidents. Develop and maintain SOC playbooks, automate SIEM and SOAR tasks, and assist in building and tuning SIEM/SOAR tooling.
Job Summary
- Salary:
$70,000 - $85,000 USD Annually
- Location:
Work from Anywhere
- Type:
Full-time
- Categories:
- Company:
- Job Details:
Uncover the Best Remote Opportunities
- Only Legit Listings:Zero ads, zero scams, all quality.
- Leave the Work to Us:Our team works tirelessly to verify listings.
- Streamlined for You:Remote-specific filters for an easier job hunt.