Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and MFA bypass attacks to protect enterprise endpoints.
Research and develop behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Researches emerging Windows identity threats and develops behavior-based detection methods to prevent attacks like Pass-the-Hash and MFA bypass.
Oversees anti-fraud surveillance controls for trading activities, analyzes alerts and communications to detect suspicious trading behavior, and investigates anomalies for fraud prevention.
Oversees anti-fraud surveillance controls for trading activities, analyzes suspicious transactions and communications to detect market integrity violations and internal fraud.
Architect and implement enterprise security controls for identity, endpoints, and infrastructure while leading detection and response for corporate environments.
Architect and maintain corporate security infrastructure including identity management, endpoint security, and cloud infrastructure across a global organization.
Design and implement identity, endpoint, and infrastructure security controls for a SaaS company's corporate environment, including Zero Trust architecture, EDR/XDR management, and vulnerability remediation.