Get new jobs by email
$40 per hour
We are looking for experienced cybersecurity professionals to join our team to help train AI models. In this role, you will evaluate AI-generated security content, solve technical cybersecurity problems, and provide feedback to improve how AI systems reason about real-...SuggestedHourly payFull timePart timeRemote work$78 - $83 per hour
...cybersecurity incidents, managing scope, timelines, and documentation. Maintain situational awareness and provide timely updates to SOC leadership, cybersecurity engineering teams, and external stakeholders. Collaborate with cloud, network, identity, and system...SuggestedHourly payWork at office- ...refresh activities and cybersecurity risk framework alignment. Lead compliance and certification initiatives including ISO 27001, SOC 2, audit readiness, and remediation validation. Manage Third-Party Risk Management (TPRM) programs including vendor assessments,...SuggestedRemote work
- ...Job Role: Cyber Security SOC Program Manager Location: Remote Role Duration: Long Term Contract Role Overview, The Program Manager CBO vSOC will lead delivery of cybersecurity and SOC operations programs in support of the Congressional Budget Office. This role requires...SuggestedLong term contractContract workWork at officeRemote workWorldwide
- ...Management Consulting. 7 years of managerial experience. Technical Literacy - Ability to understand GRC (Governance, Risk, and Compliance), SOC operations, and cloud security architecture without needing to be a practitioner. Operational Excellence - Proven track record of...SuggestedFor contractorsWork at officeImmediate startShift work
- ...workflows, and Data Protection project plans. Enable logging, monitoring, and telemetry flows to support operational visibility and SOC integration. Data Security Posture Management (DSPM) - Evaluation Support Assist with hands?on evaluation of DSPM platforms,...SuggestedPermanent employmentFull timeContract workFor contractorsTraineeshipImmediate startRemote work
- ...governance models, risk management strategies, compliance architectures, and control frameworks based on standards such as ISO 27001, NIST, SOC 2, PCI-DSS, and GDPR. Collaborates with cybersecurity, cloud, infrastructure, audit, and business teams to ensure secure and...Suggested
- ...Develop and implement strategies to mitigate risks. Ensure compliance with relevant industry standards and regulations (e.g., GDPR, HIPAA, SOC 2, AI Act) within Gen AI environments. Establish and enforce security policies and procedures. Advocate for and implement security...SuggestedRelocation
- ...premises hypervisors and multi-cloud environments, ensuring consistent policy enforcement. Threat Detection & Response: Partner with the SOC to develop high-fidelity detection logic. Build SOAR playbooks that automate the isolation of compromised cloud workloads or on-...Suggested
- ..., code reviews, and development standards. Integrate cybersecurity tools, APIs, SIEM, and SOAR platforms. Collaborate with SOC, infrastructure, cloud, and security teams. Support vulnerability remediation and secure coding practices. Mentor and guide...SuggestedRemote work
- ...differential privacy and federated learning Strong background in AI-driven cybersecurity, including UEBA, SOAR automation, and autonomous SOC architectures Advanced detection engineering, including detection-as-code and SIEM optimization at scale Deep expertise in...SuggestedContract workRemote work
- ...GitOps workflows, and IDEs such as Visual Studio Code. Experience with GoLang. Familiarity with compliance frameworks such as SOC 2, NIST, or GDPR. Experience mentoring junior engineers or leading small-to-medium technical initiatives. For applications...Suggested
- ...Experience designing JML automation at enterprise scale ~ Familiarity with regulated environments and compliance frameworks such as SOC 1, SOC 2, SOX, and NYDFS ~ Proven ability to produce architecture artifacts (solution designs, data flows, sequence diagrams,...Suggested
- ...organization's data or IT systems. Must Have Minimum 2 years hands on experience in at least one (1) of the following areas: SOC Analyst Threat hunting Detection engineering Network Security engineering Experience in client facing...Suggested
- ...metrics (accuracy, latency, bias, cost). Ensure all pipelines and models meet security, privacy, and compliance standards (HIPAA, SOC 2). Write clean, testable code; create unit, integration, and performance tests for all critical ML components. Partner...Suggested
- ...Compliance Operations: Drive IT adherence to critical healthcare and data security frameworks, specifically maintaining HIPAA and SOC 2 compliance across all systems. Cross-functional Collaboration: Partner with Engineering, Product, and executive leadership to align...For contractors
$94.2k
...HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits IT / Information security risk advisory experience Governance Risk and Compliance (GRC)...For contractorsLocal areaRemote work- ...reviewing C. Contributions to open-source AI security projects or frameworks. Expertise in one or more compliance frameworks: SOC 2, PCI, HIPAA, FedRAMP (800-53), ISO 27001. EDB is committed to supporting our employees' overall well being by offering a range of...Remote work
$135.9k - $201.13k
...designers to implement PPA (Power, Performance, Area) data to create design kits. Create systems to optimize SRAM memory solutions for SoC designers. Develop new solutions to meet emerging market needs for semiconductor IP. What we're looking for: ~ Bachelor'...InternshipWork from home$184k - $230k
...What Helps You Stand Out ~ You have experience with security in healthcare or other highly regulated space. Examples: HIPAA, HITRUST, SOC 2, PCI, FedRamp experience from an operational response standpoint. We are committed to building a diverse team of Datavanters...$80.2k - $111.3k
...rapidly respond to sophisticated adversarial tactics. The Senior Engineer develops and deploys scalable countermeasures, enhances SOC tooling and integrations, and implements advanced detection and response programs to defend against complex attacks. This role also mentors...Contract workWork experience placementWork at office
