Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Oversees anti-fraud surveillance controls, analyzes trading activities and communications to detect suspicious behavior, and investigates fraud alerts in corporate banking operations.
Oversees anti-fraud surveillance and controls for trading activities, analyzing market data and communications to detect suspicious behavior and rogue trading.
Design and implement fraud prevention and authentication systems while partnering with product and engineering to embed security throughout the development lifecycle.
Design and implement fraud prevention and authentication systems while partnering with product and engineering teams to minimize financial losses and security risks.
Senior Security Engineer designs and architects security solutions for enterprise clients, provides technical guidance throughout project lifecycles, and manages security technology implementations across multiple platforms.
Designs and operates scalable cloud infrastructures while integrating security practices into development and operations pipelines.
Design, implement, and optimize Microsoft Defender security solutions to protect enterprise systems while leading incident response and threat mitigation efforts.
Design and operate scalable cloud infrastructures while integrating security into development and operations, automating deployments and enforcing security standards across systems.
Design and implement enterprise identity and access management (IAM) solutions including SSO, Zero Trust, and MFA to reduce cyber risk across the organization.
Designs and implements enterprise identity and access management solutions, including SSO, Zero Trust, and MFA systems to reduce cyber risk across the organization.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and MFA bypass attacks to protect enterprise endpoints.
Research and develop behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Researches emerging Windows identity threats and develops behavior-based detection methods to prevent attacks like Pass-the-Hash and MFA bypass.
Oversees anti-fraud surveillance controls for trading activities, analyzes alerts and communications to detect suspicious trading behavior, and investigates anomalies for fraud prevention.
Oversees anti-fraud surveillance controls for trading activities, analyzes suspicious transactions and communications to detect market integrity violations and internal fraud.