Johnson Controls Jobs in Remote

Engineering jobs in the UK cover a wide spectrum, including roles in civil, mechanical, electrical, and software engineering. Opportunities range from designing infrastructure to developing cutting-edge technology. Engineers may work in construction, energy, aerospace, or IT sectors. Key skills involve problem-solving, technical expertise, and project management. The industry demands adaptability to technological advancements and a commitment to safety standards. Challenges include tight project deadlines and staying abreast of evolving technologies. Despite these challenges, engineering jobs in the UK remain vital for innovation and infrastructure development, offering diverse career paths and contributing significantly to the country's economic growth.

38 jobs for Johnson Controls in Remote

Job Description: Participate as a Regional Service Team member responsible for providing the best service for our customers across the USA Manage all resources and logistics required to perform services and maintenance activities on customers' site/property Support execution of retrofit projects including installation, power up, and commissionin...

Job Description: Participate as a Regional Service Team member responsible for providing the best service for our customers across the USA Manage all resources and logistics required to perform services and maintenance activities on customers' site/property. Execute retrofit projects including installation, power up, and commissioning of excitat...

Job Description: Design and implement security control architectures and reference implementation patterns aligned with ISO 27001:2022 Engineer and maintain assigned security controls across domains like Identity, Endpoint, Workloads, and Data Develop, maintain, and operationalize security standards, baselines, and reference architectures Perfo...

Job Description: Execute on milestones for end-to-end SecOps & Threat initiatives in accordance with the Security roadmap Identify and respond to complex security incidents, including system compromise, intrusion attempts, and/or denial of service attacks by conducting continuous monitoring, vulnerability assessments, and log analysis Engage ven...

Job Description: Design and maintain SAP authorization concepts and role structures aligned with business processes and least-privilege principles Build and maintain master, derived, composite, and business roles for S/4HANA, ECC, and Fiori applications Configure and operate SAP GRC Access Control (ARA, ARM, BRM, EAM), including ruleset manageme...

Job Description: Design and operate cloud networking architectures including VPC/VNet, subnets, routing, and security groups. Build transit hub topologies using AWS Transit Gateway, Azure Virtual WAN, or GCP Network Connectivity Center. Design and implement hybrid connectivity using Direct Connect, ExpressRoute, Cloud Interconnect, and VPN. Arc...

Job Description: Own the FHIR R4 data model design — resource profiling, extensions, search parameters, and terminology bindings for the GLP-1 clinical domain Architect and implement the HealthLake data layer including ingest pipelines, FHIR API configuration, and query optimization Lead the Supabase-to-HealthLake migration — mapping the existin...

Job Description: Conduct deep technical discovery in selected strategic accounts to assess platform readiness, evaluate constraints, and identify high-value adoption opportunities across GitLab and GitLab Duo Agent Platform. Lead architecture and delivery design for complex enterprise environments where platform migration, regulated requirements,...

Job Description: Own AI behavior monitoring: Define what trustworthy and untrustworthy AI behavior looks like, and ensure it is measurable in production. Own AI observability standards: Establish telemetry, tracing, logging, and alerting requirements for AI systems and agentic workflows. Own control validation for agentic systems: Verify that gu...

Job Description: Implement and manage identity security controls within Entra ID, including Conditional Access, MFA, and access governance Support enforcement of least privilege, role-based access control (RBAC), and privileged identity management (PIM) Monitor identity-related risks, sign-in activity, and access anomalies, and respond to potent...

An unhandled error has occurred. Reload 🗙