Explore exciting security career opportunities! Whether you're a security officer, cybersecurity analyst, or security consultant, our platform connects you with positions in various industries, including finance, technology, and government. Join us today to find fulfilling roles and protect organizations from threats in the ever-evolving security landscape!
9 jobs for Daisy Data Displays in Remote
Job Description: Create and deliver technical product presentations to prospective customers. Gather customer technical requirements to ensure proposed solutions align to goals and needs. Lead product evaluations and custom product configurations. Design evaluation test plans with customers and guide the process to successful outcomes. Require...
Job Description: Act as the Subject Matter Expert (SME) for Endpoint Detection and Response (EDR) tools/process including optimizing configurations/policies, developing custom threat detection rules, and proactively improving Deel’s overall security posture for remote endpoints (Mac and Windows) and cloud assets (Eg, VMs). Configure, manage, and ...
Job Description: Own AI behavior monitoring: Define what trustworthy and untrustworthy AI behavior looks like, and ensure it is measurable in production. Own AI observability standards: Establish telemetry, tracing, logging, and alerting requirements for AI systems and agentic workflows. Own control validation for agentic systems: Verify that gu...
Job Description: Implement and manage identity security controls within Entra ID, including Conditional Access, MFA, and access governance Support enforcement of least privilege, role-based access control (RBAC), and privileged identity management (PIM) Monitor identity-related risks, sign-in activity, and access anomalies, and respond to potent...
Job Description: Design and develop detection logic and security rules to identify threats, suspicious behaviors, and misconfigurations across SaaS applications. Research SaaS platforms (e.g., Google Workspace, Microsoft 365, Salesforce, Slack, etc.) to understand security models, APIs, and potential attack surfaces. Translate real-world attack ...
Job Description: Design and implement security control architectures and reference implementation patterns aligned with ISO 27001:2022 Engineer and maintain assigned security controls across domains like Identity, Endpoint, Workloads, and Data Develop, maintain, and operationalize security standards, baselines, and reference architectures Perfo...
Job Description: Design, develop, and integrate web application offensive security content into the NodeZero platform Design, develop, and integrate novel attack capabilities into the NodeZero platform, including offensive security tooling and AI-enhanced techniques. Research and implement AI-driven methods for vulnerability detection, exploitat...
Job Description: Lead the hands-on configuration of GCP SCC and Wiz for new customers, ensuring all high-fidelity security findings are correctly ingested into Google SecOps. Ensure technical accuracy in parser creation and UDM mapping to maintain the highest quality of security data. Write custom YARA-L detection rules to correlate cloud postur...
Job Description: Serve as the primary escalation point and subject matter expert for the most complex and high‑risk remediation issues across infrastructure, cloud, containers, applications, and code Provide advanced technical guidance on remediation paths, exploitability assessment, scanning output interpretation, and multi‑layered False Positiv...