This is a 12-month+ contract position that is 100% remote. The role is dedicated to the secure deployment and governance of artificial intelligence across a large enterprise. You will act as the primary architect for securing AI agents, LLM integrations, and specialized platforms like Copilot Studio and Azure AI, ensuring that innovation does not come at the cost of data privacy or system integrity.
- Location: 100% Remote.
- Duration: 12-month+ contract.
- Focus: Designing security frameworks for AI, performing AI-specific threat modeling, and establishing governance for the lifecycle of AI agents.
- Core Ecosystem: Microsoft 365 (Copilot, Viva), Azure AI, Power Platform, and third-party LLM integrations.
Key Responsibilities: AI Strategy and Defense
The AI Architect must move beyond traditional infrastructure security to address the unique vulnerabilities inherent in machine learning and generative AI.
- AI Security Architecture: Develop security frameworks for Copilot Studio, Azure AI models, and Power Platform. Define access policies, logging, and monitoring specifically tuned for AI-enabled applications.
- Specialized Risk Management: Conduct assessments for AI-specific threats, including prompt injection, model drift, data leakage, and adversarial attacks.
- Governance & Privacy: Align AI usage with GDPR, CCPA, and internal data governance standards. You will bridge the gap between technical security and legal/compliance requirements.
- Secure Lifecycle Management: Define the "cradle-to-grave" standards for AI agents—from secure creation and prompt engineering best practices to monitoring and eventual retirement.
- Enterprise Integration: Partner with teams to securely embed AI into major operational platforms like ServiceNow, Oracle, and Microsoft Viva.
- Incident Response: Build specific incident response playbooks for AI-related events (e.g., an AI agent bypassing a security control or leaking sensitive data).
Required Technical Skills & Experience
This role requires a practitioner who understands both the "how" of AI deployment and the "how" of its exploitation.
- Platform Expertise: Strong hands-on experience with Microsoft Copilot Studio, Azure AI, and Power Platform security.
- Threat Vectors: Deep understanding of AI-specific vulnerabilities and secure prompt engineering techniques.
- Integration Knowledge: Familiarity with the security nuances of integrating AI into enterprise ecosystems (M365, ServiceNow, Oracle).
- Third-Party Evaluation: Proven experience assessing the security posture of third-party AI tools and providing go/no-go recommendations.
- Foundational Security: Solid background in Cloud Security Architecture, Identity and Access Management (IAM), and Data Protection.
Why This Role is Unique
This is a pioneer role. Most security teams are still reacting to AI; this architect is tasked with building the proactive governance structure that allows a company to use AI safely. You aren't just managing firewalls; you are managing model interpretability and adversarial defense, making this a high-value career pivot for traditional security architects.
Job Features
| Job Category | AI (Artificial Intelligence), Data |
This is a full-time, Fully Remote role within the Engineering department at Horizon3.ai. You will sit within the Rapid Response organization, reporting to the Director of Precision Defense. The role is a high-impact position designed for a seasoned expert who can translate complex vulnerability data from the NodeZero autonomous pentesting platform into actionable intelligence for customers and internal teams.
- Location: Remote (US).
- Experience Required: 8+ years in vulnerability analysis/research or cyber threat intelligence.
- Travel: Up to 5% for conferences or team meetings.
- Connection Requirement: Minimum 25Mbps broadband.
- Mission: To help organizations proactively find and verify exploitable vectors before attackers do, moving beyond "checkbox" security culture.
What You’ll Do: Intelligence, Research, and Communication
As the "eyes and ears" of the cybersecurity community for Horizon3.ai, you will bridge the gap between automated exploitation and human-led defense.
- Vulnerability Triage: Monitor public databases (CVE/CWE, NVD, CISA KEV) to stay current on emerging threats.
- Exploitation Analysis: Analyze NodeZero pentest outcomes to understand real-world customer exposure and inform research prioritization.
- Technical Publication: Research, document, and publish mitigation techniques. This includes writing blogs, white papers, and external-facing content about the most impactful vulnerabilities.
- Cross-Functional Support: Create internal content for Go-To-Market and Marketing teams. Collaborate with attack engineers to track product coverage for new zero-day or n-day threats.
- Threat Actor Tracking: Monitor threat actor behavior and trends to ensure NodeZero’s autonomous logic remains aligned with modern attacker TTPs.
What You’ll Bring: Expertise and Digital Presence
Horizon3.ai is looking for a "learn-it-all" with deep fluency in the vulnerability ecosystem and the ability to influence technical and non-technical stakeholders.
- Core Research Skills: Hands-on exposure to root-cause analysis, exploit reproduction, and PoC (Proof of Concept) evaluation.
- Ecosystem Fluency: Expert knowledge of EPSS (Exploit Prediction Scoring System), CVSS, and vendor advisory lifecycles.
- Exploitation Awareness: Understanding of how n-days propagate and the trends in PoC weaponization.
- Communication Mastery: Proven ability to publish security communications and present findings at major conferences (e.g., Black Hat, DEF CON, BSides).
Preferred & Nice-to-Have Skills
- Programming: Comfort writing Python for data analysis and automation.
- Data Visualization: Experience creating visualizations to illustrate broad vulnerability trends across environments.
- Community Presence: Active participation in social channels, community forums, or Bug Bounty/VDP programs.
- Media Savvy: Experience briefing reporters or analysts and handling live Q&A sessions.
Job Features
| Job Category | Data, Information Technology, Support Service |
This is a full-time, Remote role at OppFi, a tech-enabled financial platform. Despite the "III" designation, the role functions as a high-level operational and tactical contributor, blending Security Operations (SecOps) with Governance, Risk, and Compliance (GRC). The position is ideal for an analyst who wants to bridge the gap between technical incident response and strategic risk management within a highly regulated financial services environment.
- Location: Remote.
- Experience Required: 3–5 years of professional experience in Information Security or IT Risk Management.
- Reporting Line: Reports to the Manager, Security Operations.
- Focus: Security reviews for new tools, incident triage, SIEM tuning, and maintaining security governance dashboards.
- Industry Context: Regulated financial services (FFIEC, NIST frameworks).
What You Will Do: Risk Management & Technical Operations
The role is divided between proactive risk governance and reactive security monitoring, requiring a "whole-environment" view of security.
Information Security Risk & Governance
- Security Reviews: Own the assessment process for evaluating risks when introducing new applications or tools.
- Policy Development: Identify emerging compliance requirements and refresh policies/standards to align with NIST, ISO, or FFIEC.
- Governance Visibility: Design and maintain dynamic dashboards and scorecards to provide leadership with insights into governance activities.
Security Operations & Incident Support
- Monitoring & Triage: Act as a key responder for alerts from SIEM, EDR, and cloud logs. Gather data and escalate spicy incidents to senior engineers.
- Playbook Execution: Follow incident response playbooks for investigation, basic containment, and documentation.
- SIEM Tuning: Assist in the configuration and tuning of SIEM alerts and reports to reduce noise and improve detection logic.
- Log Analysis: Perform regular reviews of system logs to identify suspicious activity under the guidance of senior staff.
Required Technical Expertise and Qualifications
OppFi is looking for an analyst who understands the "defense-in-depth" philosophy and has hands-on experience with modern cloud-native security stacks.
- Core Experience: 3–5 years in SecOps, IR, or Vulnerability Management. Experience in financial services or healthcare is highly preferred.
- Framework Knowledge: Familiarity with FFIEC, NIST, COBIT, ITIL, or ISO control frameworks.
- Technical Stack:
- EDR: CrowdStrike, Defender for Endpoint, or SentinelOne.
- SIEM/SOAR: Sumo Logic, Splunk, or Azure Sentinel.
- CSPM: Wiz, Prisma, or Orca (Cloud Security Posture Management).
- Vulnerability Management: Qualys, Tenable, or Rapid7.
- Cloud & Networking: Foundational knowledge of AWS; basic understanding of Linux/Windows and TCP/IP networking.
- Threat Intelligence: Solid understanding of the MITRE ATT&CK framework.
- Certifications (Preferred): CompTIA CySA+, GCIH, GCIA, GSOC, or CISSP Associate.
Why This Role is Unique
This position is unique because it doesn't pigeonhole the analyst into a single silo. You are expected to be technical enough to tune a SIEM and investigate a cloud alert, but also professional enough to conduct a full security risk assessment for a new vendor. It offers a clear path toward security architecture or management by providing exposure to the GRC side of the house.
Job Features
| Job Category | Security, Support Service |
This is a full-time, 100% remote contract role supporting a large federal government agency (specifically indicated as the Department of Veterans Affairs / VA). The role focuses on the Assessment and Authorization (A&A) process to ensure systems obtain and maintain their Authorization to Operate (ATO).
- Location: Fully Remote.
- Pay Range: $38–$42 per hour.
- Start Date: 1/20/2026.
- Clearance: Requires passing a Public Trust Clearance and fingerprinting process.
- Experience Required: 1+ years in Information Assurance (IA) controls analysis and risk assessments.
- Core Frameworks: NIST SP 800-53, 800-37 (RMF), and CNSSI 1254.
The Challenge: ATO Lifecycle and Compliance
The primary responsibility is ensuring that government information systems, devices, and networks remain compliant with federal security standards through rigorous testing and documentation.
- A&A Leadership: Plan and coordinate teams to conduct assessments of systems and networks to identify vulnerabilities and risks.
- eMASS Management: Perform extensive work within eMASS (Enterprise Mission Assurance Support Service) packages to track compliance.
- Technical Testing: Test CCIs (Control Correlation Identifiers) and validate Security Plans.
- Vulnerability Analysis: Support VASCARs and the Security Control Assessor (SCA) in enforcing the Risk Management Framework (RMF).
- Boundary Evaluation: Identify and evaluate major applications and infrastructure based on specific accreditation boundaries.
Required Technical Skills and Experience
The agency is looking for an analyst with a foundational background in IA tools and a strong grasp of the NIST-based Risk Management Framework.
- Tool Proficiency: 1+ years of experience with Nessus, Nmap, Burp Suite, and vulnerability scanning tools.
- Environment Knowledge: Familiarity with Linux security (RHEL7) and AWS cloud security.
- Platform Experience: Working knowledge of eMASS.
- Regulatory Knowledge: Deep understanding of NIST SP 800-53 and 800-37 and associated VA cybersecurity policies.
- Defense-in-Depth: Knowledge of information security and assurance principles and their supporting technologies.
- Advisory Skills: Capable of providing feedback to the ISO and ISSO regarding risks and recommended courses of action.
Nice to Have
- VA Specifics: Prior experience with VA Cyber Security processes.
- Modern Infrastructure: Experience with Prisma Cloud/Twistlock and containerization.
- Documentation: Ability to write technical documents that are easily understood by non-technical stakeholders.
Job Features
| Job Category | Operations Management, Support Service |
This is a full-time, Exempt role at Meduit, a healthcare partner services firm. The position is highly focused on a hybrid of SOC operations and Data Governance, specifically tasking the analyst with the implementation and management of Microsoft Purview alongside traditional endpoint and vulnerability management tools.
- Location: Remote (United States).
- Salary Range: $80,000 to $95,000 USD (Budgeted range).
- Experience Required: 2 to 4+ years in cybersecurity or SOC operations.
- Networking Experience: At least 1 year of hands-on experience applying networking fundamentals (TCP/IP, DNS, Firewalls) to security investigations.
- Anticipated Start Date: 1/1/2026.
- Internet Requirement: Minimum 30MB download and 10MB upload speed.
Key Responsibilities: Data Protection and Alert Response
This role balances proactive data compliance with reactive incident response within a healthcare context.
- Microsoft Purview Ownership: Implement and manage Microsoft Purview for data protection, classification, and compliance.
- Incident Triage: Investigate security alerts originating from CrowdStrike Falcon, Azure Defender, and Rapid7 InsightIDR.
- Vulnerability Management: Review and prioritize system weaknesses using Rapid7 InsightVM.
- Identity & Access: Monitor Azure/Entra ID for identity security, including MFA and Conditional Access policies.
- Collaboration: Document all investigation and remediation steps while working with IT teams to resolve security gaps.
Required Technical Qualifications
The ideal candidate must hold specific Microsoft security certifications and demonstrate proficiency in a modern cloud-native security stack.
- Platform Expertise:
- Azure AD / Entra ID and Microsoft Defender for Cloud.
- CrowdStrike Falcon (Endpoint Protection).
- Rapid7 InsightVM / IDR (Vulnerability & SIEM).
- Microsoft Purview (Information Protection).
- Mandatory Certifications:
- SC-900 (Microsoft Security, Compliance, and Identity Fundamentals).
- SC-400 (Microsoft Information Protection Administrator).
- Core Fundamentals: Strong application of networking (TCP/IP, DNS, firewalls, VPNs) in threat analysis and incident investigation.
Preferred Qualifications
- Advanced Certifications: SC-200, SC-300, or AZ-500 (Azure Security Engineer Associate).
- Generalist Certifications: CompTIA Security+ or CySA+.
- Education: Bachelor’s degree in Cybersecurity, IT, or a related field.
Job Features
| Job Category | Data, IT & Cybersecurity, Software Engineering |
This is a high-level Senior Individual Contributor role within F5 Labs, the threat intelligence and thought leadership division of F5. This position is unique as it blends traditional threat research (web, API, bot, and DDoS) with a heavy focus on the security implications of Artificial Intelligence. You will be responsible for investigating how attackers use AI, how they target AI systems, and how F5 can leverage AI for defense.
- Location: Remote (locations listed include NY, VA, MA, and Toronto, Canada).
- Annual Base Pay: $156,800.00 - $235,200.00.
- Experience Required: ~10 years in cybersecurity or a closely related field.
- Focus: Adversarial ML/AI, LLM-powered applications, web/API threats, and public-facing thought leadership (blogs, podcasts, presentations).
- Technical Skillset: Expert Python/Jupyter skills, LLM API prototyping, and deep knowledge of web protocols (HTTP, REST, OAuth).
Primary Responsibilities: Investigation, Prototyping, and Evangelism
The role requires a "Full-Stack Researcher" who can find a signal in the noise, build a tool to prove the risk, and write a compelling story about it.
- AI Threat Analysis: Investigate and document adversarial ML/AI techniques, such as data poisoning, prompt injection, and model theft.
- Tool Building: Create LLM-based applications, prototypes, or datasets using frameworks like Model Context Protocol (MCP) and LangChain to demonstrate AI’s role in security.
- Adversarial Research: Analyze malicious traffic and attacker behavior, occasionally probing attacker infrastructure or managing honeypots.
- Thought Leadership: Translate complex technical findings into high-impact articles, reports, and visuals for F5 Labs.
- Public Representation: Represent F5 via webinars, podcasts, media interviews, and industry conferences (e.g., Black Hat, DEF CON, RSAC).
Core Skills and Qualifications
F5 is looking for a self-starter who can own a research project from the initial hypothesis to a viral blog post.
- Technical Breadth: Strong grasp of web, cloud, and API protocols (HTTP/S, REST, OAuth, DNS, TLS).
- Data Science for Security: Proficiency in Python and Jupyter notebooks; experience with SQL or BigQuery is a plus for analyzing massive telemetry datasets.
- AI/LLM Proficiency: Ability to prototype with LLM APIs and frameworks; familiarity with agent-based systems and orchestration.
- Communication: Excellent "storytelling with data" skills—the ability to make technical research accessible to a broad audience.
- Preferred Experience: Background in Threat Intelligence, Red Teaming, or Application-Layer defenses (WAF, Bot Defense, DDoS).
Why This Role is Unique
Unlike standard SOC or Analyst roles, this is a publication-driven position. You are not just defending a perimeter; you are shaping the global conversation on how AI is transforming the threat landscape. You have the autonomy to define your own research projects and build open-source tools that benefit the wider security community.
Job Features
| Job Category | AI (Artificial Intelligence), IT & Cybersecurity |
This is a full-time, Remote SOC Analyst II role at UST, a large digital transformation firm. Despite the "L2" title in the header, the requirements specifically look for L3-level experience to act as a high-tier escalation point for critical security incidents. The role focuses on deep-dive investigations, analyzing adversary TTPs, and performing proactive threat hunting across global client environments.
- Location: Remote (US Market).
- Compensation Range: $46,000 – $69,000 (Note: This is unusually low for the required L3 experience level).
- Experience Required: Minimum 3+ years of experience as a SOC L3 Analyst working within a Global SOC team.
- Focus: High-severity incident escalation, root cause validation, and identifying Advanced Persistent Threats (APTs) that evade automated detection.
- Technical Stack: SIEM platforms including QRadar, Sentinel, and Splunk.
The Opportunity: Advanced Analysis and Risk Mitigation
The L2/L3 Analyst is responsible for moving beyond basic alert triaging into complex forensic analysis and process improvement.
- Escalation & Investigation: Act as the primary escalation point for high and critical severity incidents, determining the potential impact and extent of compromise.
- Adversary Analysis: Analyze attack patterns and Tools, Techniques, and Procedures (TTPs) to map out the attack life cycle.
- Threat Hunting: Proactively hunt for Indicators of Compromise (IOCs) and signs of APTs using in-depth log analysis.
- Remediation Guidance: Provide recommendations for security control policy changes, security hygiene improvements, and vulnerability mitigation.
- Process Engineering: Identify gaps in existing security workflows and propose enhancements to incident response methodologies.
- Playbook Development: Experience in writing procedures, runbooks, and playbooks to standardize response efforts.
What You Need: Technical and Professional Requirements
The ideal candidate must be a "practical problem solver" with a deep background in global security operations and a strong command of enterprise SIEM tools.
- Core Experience: 3+ years in a Global SOC environment specifically at an L3 level.
- SIEM Expertise: Hands-on experience with major vendors: IBM QRadar, Microsoft Sentinel, and Splunk.
- Incident Response: Proven ability to gather evidence, validate root causes, and analyze compromise extent using client-specific security toolsets.
- Collaboration: Strong ability to work directly with a customer’s internal IT and security teams to resolve issues.
- Professionalism: Maintain high customer satisfaction through proactive and personal service.
Job Features
| Job Category | IT & Cybersecurity |
This is a full-time, Fully Remote Cloud Security Analyst role at KnowBe4, a global leader in security awareness training. The position functions as a "first responder" for the cloud ecosystem, focusing on real-time monitoring, incident management, and threat hunting across AWS and Azure environments. This role is highly operational, requiring a blend of defensive monitoring and offensive security thinking.
- Location: Fully Remote, United States.
- Salary Range: $80,000 - $85,000 (Base pay).
- Experience Required: 2+ years of hands-on experience in cloud security, InfoSec operations, or alert monitoring.
- Application Deadline: 12/30/2025.
- Focus: Triage and response for SIEM/CSPM alerts, incident containment, threat hunting using MITRE ATT&CK, and partnering with engineering for vulnerability remediation.
What You'll Do: Monitoring, Response, and Alert Engineering
The Analyst is the primary line of defense, ensuring that cloud alerts are translated into actionable intelligence and resolved through strong engineering principles.
- Security Monitoring & Response: Continuously triage alerts from SIEM, CSPM, and CWPP tools to distinguish real threats from noise.
- Incident Management: Lead cloud security investigations from initial detection through containment, eradication, and recovery.
- Threat Hunting: Proactively search log feeds for emerging attack patterns and perform root cause analysis on vulnerabilities.
- Alert Engineering: Build and refine security dashboards and alerts that reduce "alert fatigue" while surfacing critical signals.
- Security Validation: Conduct security reviews and penetration testing across cloud infrastructure to identify weaknesses.
- Infrastructure as Code (IaC): Partner with engineering to ensure findings are remediated using tools like Terraform or CloudFormation.
Required Technical Expertise and Qualifications
KnowBe4 is looking for a "builder" who uses modern tools (including AI) to automate security workflows and possesses a foundational understanding of both defensive and offensive security.
- Core Experience: 2+ years in security operations (SOC) or cloud security monitoring.
- Technical Domain Knowledge:
- Navigating AWS and/or Azure environments.
- Linux command line and basic scripting.
- Understanding of containers, APIs, and databases.
- Builder Mindset: Demonstrated ability to use AI-assisted development to write scripts and automate repetitive tasks.
- Experience with Terraform or CloudFormation is expected.
- Offensive Security: Familiarity with the OWASP Top 10 and common penetration testing concepts/tools.
- Soft Skills: Strong organizational skills to manage multiple simultaneous investigations and communicate findings to technical and non-technical stakeholders.
- Bonus Points:
- Certifications: AWS Security Specialty or Azure Security Engineer.
- Practical experience mapping alerts to the MITRE ATT&CK Framework.
- Degree in Computer Science or InfoSec.
Job Features
| Job Category | Cloud Engineering, Security |
This is a senior-level Individual Contributor (IC4) role within the Product Development category, reporting to the Chief of Staff to the CISO for Oracle Health & GIUs. This role is designed for a strategic professional who can build a unified performance measurement framework that translates raw technical data into executive-level risk insights.
- Location: Nashville, TN; Austin, TX; or Remote - United States.
- Salary Range: $97,500 – $199,500 per annum (plus bonus and equity).
- Experience Required: 7+ years in cybersecurity, analytics, or data-driven program management.
- Clearance: No security clearance required.
- Focus: Framework design, KPI standardization, and data normalization across a federated enterprise to support data-driven decision-making.
Key Responsibilities: Framework Design and Strategic Insights
The Architect serves as the primary engine for organizational clarity, ensuring that security leaders can track progress and prioritize investments based on validated data.
- Metric Framework Development: Design and maintain a unified metrics strategy aligned with strategic priorities and risk reduction.
- KPI Standardization: Define standardized KPIs across core security domains including Identity, Vulnerability Management, and Incident Response.
- Data Normalization: Partner across teams to source and validate data from various tools, ensuring a "single source of truth" for the enterprise.
- Executive Dashboarding: Design reports and dashboards tailored for both technical execution teams and high-level executive audiences.
- Data Governance: Establish ownership and quality control processes for data refresh cadences and metric accuracy.
- Business Translation: Translate complex technical trends, variance, and correlations into clear business insights for investment planning.
Required Technical Expertise and Qualifications
The successful candidate must balance deep analytical skills with a strong understanding of the cybersecurity landscape and enterprise frameworks.
- Core Experience: 7+ years in cybersecurity or data analytics. Experience in healthcare or a regulated industry is preferred.
- Analytics Proficiency: Strong proficiency in Oracle Analytics is a preferred skill for this role.
- Framework Knowledge: Understanding of common security frameworks such as NIST CSF, MITRE ATT&CK, and CIS Controls.
- Statistical Literacy: Familiarity with statistical concepts and the ability to interpret trends and correlations in security data.
- Communication: Exceptional ability to synthesize technical data into concise, compelling insights for non-technical stakeholders.
Job Features
| Job Category | Data, Healthcare, IT & Cybersecurity |
This is a full-time, Fully Remote IT Support Specialist role at Onebrief, an AI-powered workflow software company valued at $1.1B, specializing in solutions for military staffs. This role is a crucial member of the IT department, responsible for providing comprehensive technical support and managing IT operations from onboarding to system maintenance and security.
- Location: Remote.
- Compensation: $75.6K – $92.4K plus Equity.
- Clearance/Citizenship: US Citizenship is required.
- Experience Required: Minimum of 1 year of IT work experience in a help desk or IT support role in a startup environment.
- Travel: Ability to travel up to 10% of the time.
- Focus: Providing Tier 1, 2, and 3 IT support; managing assets (physical/digital); and performing system maintenance for various SaaS platforms (likely including Google Workspace, Slack, macOS, and Windows).
What You’ll Do: Full-Cycle IT Operations and Support
The Specialist handles a wide range of responsibilities, acting as the first point of contact while also performing system administration and process documentation.
- Frontline Support: Serve as the first point of contact for technical assistance. Liaise with internal users and external vendors to resolve technical issues.
- Tiered Support & RCA: Provide tier 1, 2, and 3 IT support, and conduct root cause analysis (RCA) when necessary.
- Lifecycle Management: Onboarding and off-boarding of employees, including new user training and managing access to various IT systems and applications. Manage company assets, both physical (laptops) and digital.
- System Maintenance & Security: System maintenance of various SaaS platforms. Conduct regular system audits and preventive maintenance. Adhere to and enforce company policies regarding cyber security.
- Documentation & Process: Codifying adhoc IT process and writing supporting documentation.
Required and Desired Qualifications
The ideal candidate is an ambitious self-starter with a background in fast-paced startup environments and familiarity with standard enterprise tools.
- Required Experience: Minimum of 1 year of IT work experience in a help desk or IT support role in a startup environment.
- Technical Knowledge: Strong knowledge of computer systems, networks, and commonly used software.
- Soft Skills: Excellent communication skills.
- Citizenship: US Citizenship required.
- Nice to Haves:
- 2 years of IT work experience or experience in a system administration role.
- Degree in computer science or an IT certification (e.g., CompTIA A+).
- Experience with macOS, Windows, Google Workspace, Slack, and other SaaS tools.
Job Features
| Job Category | Information Technology, Support Service, Technical Services |
This is a full-time Technical Support Specialist role at Tribute Technology, a company that provides software and technology solutions (B2B software and eCommerce) for the funeral industry, focusing on end-of-life celebrations. This is a crucial customer-facing support role that handles technical issues via phone, chat, and email, with a required background in web/SaaS support.
- Location: Fully Remote USA (Fully remote in North America).
- Experience Required:
- 2 - 3 years of experience in customer service support in an online, B2B or DTC environment.
- Minimum 2 years’ experience in a technical customer support capacity providing support for website or software products/services.
- Focus: Troubleshooting, diagnosing root causes, and resolving technical and non-technical issues for customers using the company's website or SaaS platforms.
- Technical Requirement: Hands-on experience with WordPress or other website platforms; Exposure to HTML, CSS, JS, JSON, XML, and MySQL is required.
Essential Duties and Responsibilities: Troubleshooting and Documentation
The Specialist is the primary responder for customer inquiries, ensuring system functionality and maximizing customer capabilities in an empathy-driven industry.
- Customer Interaction: Respond to new issues in a timely manner and proactively follow up. Acknowledge, evaluate, and resolve technical and non-technical customer support issues by phone, live chat, and email.
- Troubleshooting & Escalation: Troubleshoot reported issues to determine the root cause. Escalate issues to other teams and stakeholders when appropriate.
- Collaboration: Work collaboratively with the client-facing teams and customers. Actively participate in the testing of product features and enhancements.
- Documentation & Efficiency: Produce documentation for customer-facing and internal use (troubleshooting guides and FAQs). Identify repetitive tasks and implement efficiencies within the team.
- Moderation: Moderate contributions for appropriate content.
Required Experience and Technical Knowledge
The ideal candidate must have proven technical diagnostic ability, experience supporting web applications, and familiarity with core web technologies.
- Support Experience: Minimum 2 years in technical customer support for a website or software product/service. Experience with Software as a Service (SaaS) platforms or technical website support is required.
- Web Platforms: Hands-on experience with WordPress or other website platforms.
- Technical Diagnostic Ability: Proven technical/diagnostic ability along with the analytical ability to diagnose problems. Ability to understand complex technical systems and workflows.
- Web/Data Exposure (Required): Exposure to one or more of the following are required (proficiency is an asset): HTML, CSS, JS, JSON, XML, and MySQL.
- Communication: Excellent communication and interpersonal skills (verbal and written) in English.
- Tools: Proficient with basic skills in Internet, Excel, and Word.
Job Features
| Job Category | Software Engineering, Support Service, Technical Services |
This is a full-time, Fully Remote Technical Support and Operations Specialist role at Clayful, an early-stage EdTech startup focused on mental health support for students. This highly hands-on role is the technical backbone for the company, blending Tier 1 support with crucial system implementation, data management, and operational automation.
- Location: Remote.
- Company Stage: Early-stage EdTech startup.
- Focus: Bridging customer-facing support and internal operations. Key duties include technical troubleshooting, implementing systems for new school partners, managing student/staff data (adhering to FERPA/HIPAA), and optimizing workflows using tools like Zapier and Salesforce.
- Environment: Dynamic, ambiguous, requiring high responsiveness and ownership.
What You’ll Do: Technical Backbone and Operational Excellence
This role is responsible for ensuring the reliability and scalability of Clayful's service delivery by maintaining technical systems and improving efficiency.
- Technical Support & Troubleshooting: Serve as the first line of response for technical challenges. Investigate root causes, escalate issues, and maintain detailed documentation to prevent recurrence.
- Implementation Support: Support the setup and configuration of Clayful systems for new school/district partners. This includes technical onboarding, validating data, communicating discrepancies, and rigorously adhering to a step-by-step launch process.
- Data Management: Roster student and staff data with precision, ensuring security adherence (especially FERPA and HIPAA). Build and manage automations that move data between platforms while maintaining integrity.
- Operational Excellence & Automation: Become an expert in current workflows and tooling (Zapier, Salesforce, Sheets). Design, maintain, and optimize workflows to automate processes and improve efficiency. Identify and implement solutions for cross-functional friction points.
- Reporting: Create and maintain reporting and dashboards using Salesforce, Google Sheets, and tools like Coefficient.
Key Traits and Skills
The ideal candidate is a highly responsive, detail-oriented problem solver comfortable with a wide array of support and operations tools.
- Mindset: Highly responsive (Slack is the command center), thrives in reactive work, and is a curious problem solver. Comfortable making pragmatic decisions (Intentional).
- Technical Savviness: Comfortable with Zapier, Slack, Salesforce, Google Sheets, APIs, and troubleshooting tools. Able to navigate technical issues and code light solutions when needed. Understands how systems fit together (diagnosis, debug, and improvement).
- Process & Detail: Detail-Oriented in execution and documentation. Takes ownership and meets deadlines consistently (Dependable Team Player).
- Communication: Clear Communicator who cuts through noise with concise, high-quality communication, adapting to technical or non-technical audiences.
- Mission: Mission-Driven and inspired by making a meaningful difference in students’ lives.
Job Features
| Job Category | Operations Management, Support Service, Technical Services |
This is a full-time Technical Support Specialist I role at Greenstone, a market leader in providing specialized software solutions for the agribusiness community. This position is the first line of support, with a primary focus on troubleshooting and resolving issues related to the AGRIS Accounting application.
- Location: Remote, United States.
- Travel: Occasionally required, expected up to 10% for customer meetings or conferences.
- Support Tier: Tier 1/Initial Contact, focused on triaging and providing preliminary troubleshooting.
- Focus: Supporting core accounting functions (inventory, AR, AP, GL) within the AGRIS application, requiring knowledge of accounting and agribusiness principles.
- Required Education: Bachelor’s degree in Business, Management, Accounting, or a technical discipline (Agriculture, Computer Science, or IT).
- Preferred Experience: 1–3 years in customer support/call center environment.
Job Overview: Accounting Support for Agribusiness
The specialist will serve as the go-to problem solver for customers, blending technical support skills with domain-specific knowledge of agriculture business operations.
- Primary Application Focus: AGRIS Accounting application.
- Technical Scope: Help customers tackle challenges in key business areas: inventory management, accounts receivable, accounts payable, and general ledger.
- Daily Responsibilities: Handling incoming requests, triaging cases, and providing preliminary troubleshooting via phone and email.
- Documentation: Ensure customer issues are resolved within specified target resolution times. Document customer communication and case resolution on each case in the CRM system (Salesforce.com).
- Knowledge Creation: Create knowledgebase articles and customer training materials, including videos or answers for the customer forum.
- Domain Knowledge: Must have Knowledge of agribusiness and Knowledge of accounting and finance principles.
Key Skills and Preferred Qualifications
The role prioritizes soft skills—especially patience, organization, and customer service—alongside a relevant educational background.
- Customer Service: Outstanding customer service skills. Attentiveness and patience. Ability to answer a high volume of calls and/or emails daily.
- Problem Solving: Strong problem-solving and research skills to find solutions when one is not immediately apparent.
- Operational Skills: Excellent multi-tasking abilities, able to prioritize accordingly. Time-management skills. Comfortable presenting to small groups.
- Tools: Can work within Microsoft Suite.
- Preferred Experience/Certification:
- 1 – 3 years’ experience working in a customer support or call center environment.
- Certified Public Accountant / Accounting or Finance degree (highly preferred).
- Broad knowledge of the AGRIS suite of Products.
Job Features
| Job Category | Software Engineering, Support Service, Technical Services |
This is a full-time, entry-level Support Engineer I role at Cleo, a company focused on providing software solutions, likely in the data integration or B2B/EDI space (implied by the high client retention rate and focus on communication protocols). This position is the initial point of contact for technical issues, focusing on software troubleshooting, licensing, installation, and meeting defined SLAs.
- Location: Remote - US.
- Compensation: $55,000 to $65,000 annually.
- Experience Required: Bachelor’s Degree or 1+ years of Technical Support work experience.
- Focus: Providing initial contact, diagnosing basic issues related to software installation/configuration, managing queues, and escalating urgent problems.
- Technical Requirement: Experience with Communication Protocols (HTTP / SMPT / FTP / SSHFTP).
What You Will Be Doing: Initial Contact, Troubleshooting, and SLA Management
The Support Engineer I is crucial for providing a top-tier customer experience by efficiently handling and resolving initial technical inquiries.
- Customer Contact: Provide initial contact with customers via phone, email, or remote access, ensuring top-tier customer service.
- Troubleshooting: Troubleshoot and develop technical solutions related to software licensing, installation, configuration, and general operation for customers.
- Queue Management: Monitor assigned customer queues and provide appropriate responses to meet stated SLAs.
- Escalation: Escalate urgent problems requiring more in-depth knowledge to the next level of engineers.
- Knowledge Utilization: Leverage the Solution Center effectively, including the knowledge base, to assist and inform customers.
- Communication: Provide appropriate, relevant verbal and written content to customers.
Required Qualifications and Technical Knowledge
The role requires foundational knowledge across operating systems, networking, and common communication protocols.
- Experience/Education: Bachelor’s Degree or 1+ years of Technical Support work experience.
- Soft Skills: Strong Customer Service Experience.
- Technical Foundation:
- General Operating System Knowledge.
- General Networking knowledge.
- General Software Knowledge (Installation, Configuration, Migration, Removal).
- Communication Protocol experience (HTTP / SMPT / FTP / SSHFTP).
Job Features
| Job Category | Data, Software Engineering, Support Service, Technical Services |
This is a full-time, remote (United States) Technical Support Engineer role at Chainguard, a company focused on securing the software supply chain using hardened open-source software (Chainguard Images). This role requires deep technical skills in the cloud-native ecosystem to troubleshoot complex, enterprise-level issues.
- Location: Remote, United States (Targeting West region for time zone coverage).
- Experience Required: 3+ years supporting enterprise customers; 3+ years with Linux, Docker, and Kubernetes.
- Focus: Triage, investigation, and annihilation of complex customer issues involving containers, Kubernetes, DevOps tools, and software supply chain security.
- Key Duty: Participating in an on-call rotation for after-hours, weekend, and holiday support.
- Benefits Highlight: 100% Covered Health Insurance for employee and dependents, 10-year option exercise window for equity, and flexible PTO.
What You'll Do: Container Troubleshooting and Customer Advocacy
The engineer functions as a frontline technical expert, investigator, and translator, ensuring the customer's success with Chainguard Images.
- Frontline & Investigation: Triage, investigate, reproduce, manage, and annihilate complex customer issues involving Chainguard Images.
- Communication & Translation: Keep customers (and your SLAs) happy and informed. Bridge the tech lingo divide by explaining things clearly to both technical and non-technical audiences.
- Escalation & Feedback: Engage the Engineering team when necessary. Push bugs, feature requests, and hidden gremlins up to Engineering and Go-To-Market (GTM) teams.
- Documentation & Autonomy: Create detailed write-ups of new issues and contribute helpful Knowledge Base articles. Prioritize your own queue and proactively guide issues to resolution.
- Availability: Participate in an on-call rotation for after-hours, weekend, and holiday support.
Required Technical Expertise and Qualifications
The successful candidate must possess deep experience in containerization, cloud environments, and the modern DevOps toolchain, comparable to a senior role despite the title.
- Core Experience:
- 3+ years supporting enterprise customers.
- 3+ years under your belt with Linux, Docker, and Kubernetes ("You dream in containers").
- DevOps Toolchain: Comfortable in the DevOps warzone: experience with CI/CD, Linux, GitHub, Helm Charts, Terraform, and Open source.
- Cloud Platforms: Experience with AWS, Azure, or GCP (AWS EKS experience is a plus).
- Certifications (Kudos): Extra credit if you bring a KCNA or CKA certification.
- Security (Kudos): Experience with security frameworks, software supply chain security, or vulnerability scanning.
- Soft Skills: Deliver top-tier customer experiences with stellar written and verbal communication. Cross-functional harmony maker.
Job Features
| Job Category | Support Service, Technical Services |