
New
About RemoteMoreAt RemoteMore, we empower developers to find meaningful remote jobs. That’s why we connect the best remote developers with companies from all around the world. Join us in our mission today!RemoteMore currently works with 2000+ remote companies.
Posted 4 days ago
Identify unauthorized access
Gather evidence of monitoring
Posted 9 days ago
Safeguard the modern workplace from evolving cyber threats.
Utilize AI technology to proactively address security challenges.
Posted 9 days ago
Train AI systems for security weaknesses
Conduct ethical code injection attacks
Posted 24 days ago
Effectively interact with Field Sales, Cloud Team, and Line of Business decision-makers.
Develop and leverage all lead sources (personal and partner contacts, inbound leads, events, and outbound prospecting) to generate meaningful pipeline.
Posted 26 days ago
- Implement security measures to protect Figma's design platform - Conduct security assessments to
dentify vulnerabilities - Respond to and mitigate security incidents - Ensure compliance with
Posted 31 days ago
* Oversee information security controls compliance * Conduct technical assessments and
Collaborate with stakeholders to maintain security posture * Drive infosec audits and ensure
Posted 31 days ago
Ensure secure application and system architectures are in place Collaborate with teams to integrate
security into design processes Perform threat modeling and evaluate potential risks Maintain
Posted 35 days ago
Interact with decision-makers | Identify qualified sales opportunities | Maintain detailed records
Achieve revenue objectives | Work with resellers and
Posted 35 days ago
Train AI systems, Identify security weaknesses, Ethical hacking, Cloud security, Compensation based
on
Posted 40 days ago
Understand customer pain points, Educate decision-makers, Create strategic plans, Overachieve
e goals, Collaborate with Sales
Posted 43 days ago
- Design and implement scalable security solutions - Lead collaborative design and implementation -
Implement automated security processes - Provide specification documentation - Conduct routine
Posted 53 days ago
Improve product security posture through threat modeling and secure implementation Enhance security
assurance activities such as pentests and vulnerability assessments Drive security tool adoption
Posted 63 days ago
. Enhance cybersecurity measures through proactive security assessments. •
. Conduct penetration testing to identify vulnerabilities and threats. •