Have a question?
Message sent Close

​This is a remote Technology Risk Analyst role focused on independently assessing and managing technology risks associated with third-party vendors and service providers. As a key member of the Digital Technology Risk Assurance team, this role drives the organization's overall risk posture by conducting comprehensive evaluations, identifying vulnerabilities, and ensuring continuous compliance within third-party relationships.

  • Location: Remote, United States.
  • Experience (Required): 2–4 years in technology risk, cybersecurity, audit, compliance, or third-party risk management.
  • Focus: Performing vendor risk assessments, due diligence, ongoing monitoring, and aligning all practices with major industry standards (NIST, ISO 27001).
  • Work Style: Proactive individual capable of tackling complex challenges with minimal guidance.

​Essential Functions: Vendor Lifecycle and Compliance

​The Analyst is responsible for the full lifecycle of technology risk assessment across third-party engagements.

  • Vendor Evaluation: Conduct in-depth evaluations of third-party vendors, encompassing their financial stability, operational performance, and adherence to regulatory compliance requirements.
  • Risk Identification and Mitigation: Proactively identify potential technology risks and vulnerabilities within third-party relationships, then develop and implement effective mitigation strategies and plans.
  • Continuous Monitoring: Implement and maintain continuous monitoring of third-party performance and compliance through regular audits, reviews, and performance assessments.
  • Cross-Functional Collaboration: Foster strong relationships with internal teams (procurement, legal, IT, and compliance) to ensure a unified approach to third-party risk management (TPRM).
  • Alignment: Ensure all TPRM practices are meticulously aligned with established industry standards (NIST, ISO 27001), regulatory requirements, and organizational goals.
  • Documentation: Maintain thorough, accurate, and up-to-date records pertaining to all TPRM processes and activities.

​Required and Preferred Qualifications

​The role requires foundational experience in risk frameworks and strong analytical skills.

  • Required Experience:
    • ​2–4 years in relevant fields (technology risk, cybersecurity, audit, compliance, or TPRM).
    • ​Experience performing vendor risk assessments, due diligence, and ongoing monitoring.
    • ​Working knowledge of risk frameworks (e.g., NIST, ISO 27001).
  • Preferred Experience:
    • ​3+ years of third-party risk management experience, including process or framework improvement.
    • ​Understanding of IT and cybersecurity concepts (cloud, network, application security).
    • ​Experience automating TPRM workflows or using GRC platforms (e.g., ServiceNow).
    • ​Experience managing the full vendor risk lifecycle (onboarding through offboarding).
  • Certifications (Preferred): Professional certifications such as CISA, CISM, CRISC, CISSP, CTPRA, or similar.

Job Features

Job CategoryInformation Technology, Security

​This is a remote Technology Risk Analyst role focused on independently assessing and managing technology risks associated with third-party vendors and service providers. As a key member of the Digi...View more

​This is a remote Security Compliance Analyst role at Three Sisters Federal, supporting the IHS (Indian Health Service) enterprise cybersecurity and compliance operations within the federal government contracting sector. This position is vital for implementing Zero Trust architecture, conducting vulnerability management, and ensuring adherence to federal security frameworks through monitoring, evaluation, and documentation.

  • Location: Remote.
  • Experience: Minimum 7 years of information security or compliance experience.
  • Education: Bachelor's degree in Cybersecurity, Computer Science, or related field.
  • Certification (Required): Security+ CE certification is required; CISSP or CISM is preferred.
  • Focus: Operating CDM tools (BigFix, Symantec, Palo Alto Prisma), managing vulnerabilities, RMF documentation (SSPs, Risk Assessments), and supporting audits based on FISMA and RMF standards.

​Key Responsibilities: Operations and Compliance

​The Analyst ensures the technical compliance and operational security health of critical IT systems for IHS.

  • CDM Tool Operation: Operate and maintain CDM security tools such as BigFix, Symantec, and Palo Alto Prisma.
  • Vulnerability Management: Conduct vulnerability scanning, analysis, and remediation tracking.
  • RMF & Documentation: Develop and maintain System Security Plans (SSPs), risk assessments, and monitoring reports.
  • Compliance & Audit: Support audit responses and continuous compliance activities, ensuring adherence to federal security frameworks and the implementation of Zero Trust architecture.
  • Security Standards: Ensure systems comply with DISA STIGs, RMF, and FISMA reporting requirements.

​Qualifications and Desired Skills

​The role mandates experience with federal IT security regulations and specific security tools.

  • Required Certifications: Security+ CE is required; CISSP or CISM is preferred.
  • Federal Frameworks: Experience with DISA STIGs, RMF (Risk Management Framework), and FISMA reporting.
  • Desired Tools & Concepts:
    • Vulnerability Management (e.g., BigFix, SCAP).
    • SIEM/Monitoring (Splunk).
    • Cloud/Network Security (Palo Alto Prisma).
    • Compliance/Risk (RMF, NIST 800-53, Continuous Monitoring).
    • Architecture (Zero Trust).

Job Features

Job CategoryIT & Cybersecurity

​This is a remote Security Compliance Analyst role at Three Sisters Federal, supporting the IHS (Indian Health Service) enterprise cybersecurity and compliance operations within the federal governme...View more

​This is a full-time, 100% remote Cybersecurity Engineer role responsible for the comprehensive design, development, and integration of secure architectures for Military OneSource environments. The engineer ensures strict compliance with DoD and federal security frameworks, with a strong emphasis on AWS GovCloud and the Risk Management Framework (RMF) process.

  • Location: Remote (United States).
  • Clearance: Active Secret clearance is required.
  • Certification (Required): DoD 8570 certification at IAT Level III or IAM Level III (e.g., CASP+ CE, CISSP, CISM, CCSP).
  • Experience: Bachelor’s Degree and a minimum of five years of experience.
  • Focus: Designing secure AWS GovCloud architectures (IL4/IL5), implementing AWS-native security services, managing RMF artifacts (SSPs, POA&Ms), and ensuring compliance with DoD SRG, FedRAMP, and NIST 800-53.

​Responsibilities & Expertise: Architecture, Compliance, and Cloud Security

​The engineer acts as a core security architect, ensuring functional and compliant operation across hybrid cloud infrastructures.

​Cloud Architecture & Implementation

  • Design & Development: Develop and design secure and functional system architectures for on-premises and cloud environments, focusing on AWS GovCloud and FedRAMP-authorized services.
  • AWS Security Services: Implement and manage native AWS security services: Security Hub, GuardDuty, Inspector, CloudTrail, CloudWatch, Macie, Config, and IAM Access Analyzer to detect, monitor, and remediate risks.
  • Cryptography: Manage cryptographic key generation and lifecycle operations within AWS KMS and other approved key management systems, ensuring FIPS 140-3 encryption compliance.
  • Detection: Design and oversee intrusion detection and prevention architectures, leveraging AWS-native and DoD-approved tools (ACAS, HBSS, IDS/IPS).

​Compliance & Documentation

  • RMF & FedRAMP: Ensure full compliance with DoD Instruction 8510.01 (RMF for DoD IT), FedRAMP Moderate/High, and NIST SP 800-53 Rev 5 baselines.
  • Assessments: Conduct comprehensive system security, vulnerability, and Privacy Impact Assessments (PIAs). Evaluate inherited and shared controls from cloud service providers.
  • Artifacts: Produce and maintain technical documentation, including RMF artifacts, SSPs (System Security Plans), SARs, POA&Ms, and PIAs.
  • Continuous Monitoring (ConMon): Support ConMon activities through integration of ACAS scan results, AWS security alerts, and event-driven reporting.
  • Privacy Standards: Research and apply privacy standards, including HIPAA and the Privacy Act of 1974.
  • Zero Trust: Direct installation and configuration of security solutions, ensuring compliance with Zero Trust principles.

​Required Qualifications

  • Clearance & Citizenship: Active Secret clearance and U.S. Citizenship are mandatory.
  • Certification: DoD 8570 certification at IAT Level III or IAM Level III (e.g., CISSP, CISM).
  • Experience: Proven experience designing and implementing secure AWS architectures compliant with FedRAMP and DoD SRG IL4/IL5 requirements.
  • Technical Tools: Demonstrated expertise using AWS security services (listed above). Proficiency in vulnerability management and continuous monitoring tools (ACAS, Nessus, Splunk).
  • Frameworks: Strong working knowledge of FedRAMP, NIST SP 800-53 Rev 5, DoD Cloud Computing SRG, and RMF processes.
  • Communication: Excellent communication and technical writing skills for preparing compliance documentation.

Job Features

Job CategoryCloud Engineer, IT & Cybersecurity

​This is a full-time, 100% remote Cybersecurity Engineer role responsible for the comprehensive design, development, and integration of secure architectures for Military OneSource environments. The ...View more

​This is a full-time Information Security Engineer role at Akerman, a premier law firm, seeking a technically adept professional to thrive at the intersection of security engineering, governance, and client assurance. The ideal candidate will lead and maintain the organization’s ISO 27001 and SOC 2 Type II programs, manage client security audits, and automate processes using AI-powered GRC platforms.

  • Location: Miami, FL, USA.
  • Experience: 7+ years of experience in Information Security Engineering, Risk Management, or Compliance.
  • Core Focus: Implementing and maintaining ISO 27001 ISMS and SOC 2 Type II (Security, Availability, Confidentiality principles), managing client audit responses, and performing vendor risk management.
  • Tools: Proficiency with AI-powered GRC automation platforms (e.g., Archer, Drata, Vanta).

​Key Responsibilities: Governance, Assurance, and Engineering

​The engineer drives compliance programs, manages assurance activities with clients and vendors, and supports security operations.

  • Compliance Leadership: Lead and maintain the organization’s ISO 27001 Information Security Management System (ISMS) and SOC 2 Type II programs, ensuring continuous compliance.
  • Audit Response: Coordinate and respond to client security audits and vendor security assessments, ensuring timely and accurate delivery of evidence. Work closely with internal teams (Legal, HR, IT) to track remediation.
  • GRC Automation: Use AI-powered GRC tools (Drata, Vanta, Archer) to automate control monitoring, risk assessments, and compliance reporting.
  • Policy & Standards: Develop and maintain security policies, procedures, and technical hardening standards mapped to ISO 27001 Annex A, NIST CSF, and CIS Controls.
  • Vendor Risk: Participate in third-party vendor reviews, performing due diligence and tracking remediation activities.
  • Security Support: Support cloud and on-premises security posture improvement across AWS, Azure, and/or GCP environments, and support the full incident response process.

​Desired Qualifications and Framework Knowledge

​The role requires extensive experience with major regulatory frameworks and security assurance processes.

  • Required Experience: Hands-on experience implementing or maintaining ISO 27001 and SOC 2 Type II. Proven experience responding to client security questionnaires and conducting vendor security assessments.
  • Framework Expertise: Deep understanding of security frameworks: ISO 27001, NIST CSF, SOC 2, CIS Controls, and GDPR/CCPA principles.
  • System Knowledge: Strong understanding of SIEM, EDR, vulnerability management, and access control systems.
  • Preferred Certifications (Any Combination): CISSP, CISA, CRISC, CCSP, OSCP, GCIH.

Job Features

Job CategoryIT & Cybersecurity

​This is a full-time Information Security Engineer role at Akerman, a premier law firm, seeking a technically adept professional to thrive at the intersection of security engineering, governance, an...View more

Remote
United States
Posted 2 months ago

​This is a remote Penetration Testing Analyst role on the Global Services team, focused on helping clients improve their security posture by performing comprehensive technical testing and delivering tactical reports. The role is heavily focused on hands-on attacking, high-quality report writing, and client communication, including assisting Managed Services teams with triage and incident response.

  • Location: Remote, United States.
  • Experience: 3+ years in an active technical security role, with previous technical security consulting experience preferred.
  • Education/Certification: Bachelor's degree (Computer Science or related) or equivalent experience. Certifications like GPEN, CPTS, or OSCP are required.
  • Focus: Performing internal/external network penetration testing, web application and API testing, social engineering, developing executive briefings, and translating complex technical concepts for non-security personnel.

​Primary Responsibilities: Hacking, Reporting, and Client Delivery

​The analyst's duties span from hands-on exploitation to crucial client-facing reporting and communication.

  • Technical Testing: Perform technical testing against a variety of targets, including:
    • Network penetration testing (internal, external, and wireless).
    • Web application and API testing.
    • Social engineering (on-premise and electronic).
  • Advanced Hacking: Enjoy attacking networks and hacking custom protocols implemented in embedded devices.
  • Reporting & Quality: Consistently produce high-quality reports, perform peer-review of colleagues' work, and help develop Executive Briefings.
  • Client Communication: Deliver timely reports to clients and external stakeholders, and be capable of translating technical concepts to non-security personnel.
  • Managed Services Support: Work with various Managed Services teams to deliver day-to-day tactical reports, triage alerts, address customer needs, and assist with incident response handling and communication.

​Required Skills and Expertise

​The role demands a strong foundation in offensive security tools, network protocols, and multiple programming languages.

  • Penetration Testing Knowledge: Strong knowledge of modern penetration testing tools and methods.
  • Security Concepts: Strong knowledge of network, web-based application, and IEEE 802.11 security concepts.
  • Operating Systems: Knowledge of Windows/Linux/UNIX internals and the Internet protocol suite.
  • Programming Languages: Experience using interpreted languages (Ruby, Python, PHP, etc.) and knowledge of compiled languages (Java, C, C++, Assembly, etc.).
  • Consulting: Previous technical security consulting experience.

Job Features

Job CategoryIT & Cybersecurity, Security

​This is a remote Penetration Testing Analyst role on the Global Services team, focused on helping clients improve their security posture by performing comprehensive technical testing and delivering...View more

​This is a senior-level, remote Senior Cybersecurity Engineer role at Healthfirst, specifically focusing on Security Awareness. This engineer will be responsible for developing and running the enterprise-wide security awareness program, ensuring it meets healthcare regulations and standards, and actively works to mitigate the top human risks by changing employee behavior.

  • Location: Remote, New York.
  • Hiring Range (GNY Area): $134,600 - $194,480.
  • Hiring Range (Other Approved Locations): $119,600 - $177,905.
  • Focus: Developing comprehensive security awareness campaigns, identifying top human risks, changing user behavior, ensuring regulatory compliance, and applying IT/Security Engineering expertise to the awareness discipline.
  • Experience: Management/leadership experience in instructional design and having substantially expanded an enterprise security program for a large organization ($5B+ annual revenue).

​Responsibilities: Program Development and Risk Mitigation

​The role requires a blend of technical security knowledge, instructional design, and strategic leadership to influence behavior across the enterprise.

  • Program Development: Develop learning and awareness programs to cultivate a culture of security awareness.
  • Behavior Change: Identify the top human risks to Healthfirst and the specific behaviors that need to be changed to mitigate that risk. Develop and maintain a program that supports changing these risky behaviors.
  • Compliance: Ensure the security awareness program meets industry regulations, standards, and compliance requirements (e.g., HIPAA in healthcare), and clearly communicates security policies.
  • Liaison: Work closely with leadership across the organization to understand security challenges and tailor training to meet business and compliance requirements.
  • Technical Integration: Continuously monitor the vulnerability of the enterprise and develop engineering solutions to improve security, applying expertise in IT Infrastructure and Application Development.

​Required and Preferred Qualifications

​The position mandates both technical security understanding and direct experience leading large-scale organizational programs.

  • Education: BS Degree in Computer Science, Information Technology, or Cyber Security (or related field).
  • Leadership Experience (Mandatory): Management and leadership responsibility, experience in instructional design, and having built or substantially expanded an enterprise security program for an organization larger than $5B annual revenue.
  • Core Security Understanding: In-depth understanding of cybersecurity concepts and principles, and the ability to mitigate identified human risks.
  • Program Development: Ability to develop comprehensive security awareness campaigns and form complex security messages in a simple, clear, and concise manner.
  • Preferred Tools: Knowledge of KnowBe4 and Living Security (security awareness platforms).
  • Preferred Experience: Project management experience, IT engineering or Security Engineering experience, and basic experience giving security training to non-security personnel.

Job Features

Job CategoryHealthcare, IT & Cybersecurity, Security

​This is a senior-level, remote Senior Cybersecurity Engineer role at Healthfirst, specifically focusing on Security Awareness. This engineer will be responsible for developing and running the enter...View more

​This is an advanced level, remote, contract-to-hire Cybersecurity Engineer role focused on system and network security. The engineer will be a top-level contributor and expert in security operations, incident response, and forensic analysis. This position requires deep technical knowledge in networking, Linux/Windows administration, advanced scripting, and malware analysis, preferably within banking, government, or healthcare sectors.

  • Location: York, Pennsylvania (Remote Friendly).
  • Work Type: Contract To Hire (3 months duration to start).
  • Experience: 5+ years of IT experience with 3+ years of enterprise information system security experience is required.
  • Education: Associate's Degree Required; Bachelor's Degree preferred.
  • Certification: CISSP, ISSA, CCSP or related security certification(s) Upon Hire Required.
  • Focus: Continuous monitoring program, incident response management (forensics, containment), security system deployment (Check Point, Anti-virus, DLP, etc.), and developing architectural/functional specifications.

​Duties & Responsibilities: Incident, Monitoring, and Design

​The engineer is responsible for high-level operations, security architecture, and complex threat analysis.

  • Security Operations & Monitoring: Make enhancements to existing monitoring and security operations, and contribute to a continuous monitoring program framework. Monitor information systems and maintain security controls to ensure regulatory compliance.
  • Deployment & Integration: Participate in the deployment and operation of information security systems, including integration, testing, troubleshooting, and updating/upgrading of various security tools (Anti-virus, IPS, malware detection, DLP, Identity and access management, encryption tools).
  • Incident Response: Key participant/operator in incident response activities, including reporting, enterprise coordination, isolation, containment, eradication, and recovery. Provides forensic analysis for incidents. Participates in tactical efforts to stem attacks.
  • Threat Analysis: Provides advanced expertise around the analysis of malware, suspicious emails, and writes protection signatures.
  • Documentation & Reporting: Develops and maintains various daily reports for audit review (security and change management). Responsible for writing the architectural and functional specifications related to security and data flows.
  • Support: Provides advanced technical support and consultation on complex projects. Provides after hours, on-call support as needed.

​Required Knowledge and Skills

​The role mandates advanced knowledge in core infrastructure and offensive/defensive security.

  • Core Security Expertise:
    • ​Advanced awareness and understanding of cybersecurity trends and hacking techniques.
    • ​Advanced knowledge of malware analysis and writing protection signatures.
  • Networking & OS:
    • ​Advanced knowledge of common application-level protocols (SMTP, SSH, HTTPS, FTP) and network fundamentals (routing, switching).
    • ​Advanced understanding of Linux and/or Windows administration.
    • ​Advanced scripting knowledge (Bash, VBScript, Perl, PHP, etc.).
  • Domain (Preferred): Prior experience in banking, government, or healthcare security procedures, specifically with a network and/or security engineering focus.

Job Features

Job CategoryIT & Cybersecurity

​This is an advanced level, remote, contract-to-hire Cybersecurity Engineer role focused on system and network security. The engineer will be a top-level contributor and expert in security operation...View more

​This is a full-time, remote Cybersecurity Engineer role at BECU, a large financial institution, focused on protecting their digital ecosystem by developing security requirements and architecting secure solutions across cloud, mobile, and on-premises environments. The engineer will implement and manage cutting-edge security tools, drive policy evolution, and ensure robust security controls are deployed across all platforms.

  • Location: Remote (Must reside in one of the approved states: WA, OR, ID, AZ, TX, GA, SC, NC, CA, or VA). Hybrid requirement for Washington State residents near Tukwila HQ (Tuesdays & Wednesdays).
  • Pay Range (Target): $114,300.00 - $139,700.00 annually.
  • Minimum Experience: Five years of progressively responsible experience in cyber security, security engineering, network engineering, computer incident response, systems architecture, or digital platform security (cloud).
  • Focus: Security tool management, policy and standards development, root cause analysis for security tooling issues, and securing cloud/mobile/on-prem platforms.

​Impact & What You'll Do: Engineering, Policy, and Response

​The engineer is a key defender responsible for the execution and continuous improvement of security services.

  • Tool Management: Implement and manage cutting-edge cybersecurity tools and services, ensuring smooth and effective protection of the environment.
  • Policy & Standards: Help evolve BECU's security policies, standards, and guidelines to stay ahead of emerging threats and technology trends.
  • Secure Implementation: Drive the implementation of security controls and requirements across all compute and storage platforms, utilizing a digital-first approach across cloud, mobile, and on-prem environments.
  • Problem Solving: Perform root cause analysis for security tooling issues and ensure timely resolution to maintain system integrity.
  • Monitoring & Response: Run proactive monitoring, alerting, and escalation for cybersecurity events, acting as a key player in the defensive strategy.
  • Collaboration: Work closely with IT and business teams to integrate cybersecurity solutions and develop clear, actionable documentation.

​Qualifications and Preferred Certifications (Text Rewrite)

Minimum Qualifications Required:

  • ​Bachelor’s degree in Information Security, Computer Science, or equivalent education or work experience.
  • ​Minimum five years of progressively responsible experience in cyber security, security engineering, network engineering, computer incident response, systems architecture, digital platform security (cloud), or related fields.

Desired Qualifications and Preferred Skills:

  • ​Active CISSP, CISM, or equivalent certification is preferred.
  • ​Additional cloud certifications such as CCSK or CCSP are preferred.
  • ​Proven experience in assessing and articulating risk using data-driven, fact-based methods to all different audiences and leadership levels.
  • ​Demonstrated proficiency in verbal and written communication for conveying technical concepts clearly and accurately.
  • ​The role requires the willingness to be on camera for all customer and internal meetings.

Job Features

Job CategoryIT & Cybersecurity

​This is a full-time, remote Cybersecurity Engineer role at BECU, a large financial institution, focused on protecting their digital ecosystem by developing security requirements and architecting se...View more

​This is a 100% Remote Cyber Security Engineer role, internally titled "Product Security Leader PSR," at GE Healthcare's Caption Health SBU, which focuses on AI-assisted ultrasound clinical applications. This role is a senior-level position dedicated to integrating security into every phase of the product lifecycle (Security by Design) in a highly regulated healthcare environment, ensuring compliance with standards like HIPAA and HITRUST.

  • Location: Remote, United States.
  • Experience: 5–8 years of experience in application/product security.
  • Focus: Threat Modeling, Vulnerability Management, Security by Design, Incident Response, and maintaining strict compliance documentation for healthcare technology products.
  • Compliance Standards: HIPAA, HITRUST, SOC 2, ISO 27001.

​Essential Responsibilities: Security Lifecycle Management

​The leader is responsible for embedding robust security practices from product conception through release and maintenance.

  • Security by Design: Partner with product and engineering teams to integrate security into architecture, design, and development processes.
  • Risk Assessment: Conduct threat modeling, security reviews, and risk assessments for new and existing products.
  • Compliance & Documentation: Deliver product release security documents and document cybersecurity status and processes in accordance with regulations. Ensure products meet internal and external compliance requirements (HIPAA, HITRUST, SOC 2, ISO 27001).
  • Vulnerability Management: Identify, triage, and drive remediation of vulnerabilities in applications and infrastructure.
  • Incident Response: Support product-related security incidents and coordinate resolution.
  • Awareness: Educate developers and product managers on secure development practices and emerging threats.

​Required and Preferred Qualifications

​The role requires a strong background in software security engineering, with a preference for healthcare domain experience.

  • Required Experience: 5–8 years in application/product security, with a strong understanding of secure software development.
  • Technical Proficiency: Proficiency in threat modeling and vulnerability management. Experience in security/network/system administration/development.
  • Cloud & Containers: Familiarity with cloud platforms (AWS, Azure, GCP) and container security (Docker, Kubernetes).
  • Preferred Domain Expertise:
    • ​Experience working in or with healthcare technology companies or digital health platforms.
    • ​Deep understanding of HIPAA, HITECH, and 21 CFR Part 11 compliance requirements.
    • ​Knowledge of PHI/PII protection and data residency concerns.
    • ​Exposure to HITRUST CSF or similar frameworks.
  • Certifications (Plus): OSCP, CISSP, CSSLP.

Job Features

Job CategoryIT & Cybersecurity

​This is a 100% Remote Cyber Security Engineer role, internally titled "Product Security Leader PSR," at GE Healthcare's Caption Health SBU, which focuses on AI-assisted ultrasound clinical applicat...View more

​This is a full-time, remote Information Security Compliance Analyst role at Bonterra, a technology company dedicated to the social good industry. The analyst will be the primary resource for executing the company's annual Service Organization Controls (SOC) reporting and will be heavily involved in vendor risk management and enterprise-wide security programs.

  • Location: Remote, United States.
  • US Base Salary Range: $75,000 - $100,000.
  • Experience: 6+ years' experience performing risk and compliance activities (or less experience with a relevant degree).
  • Focus: Leading SOC reporting initiatives, performing technical risk assessments of third-party suppliers, maintaining vendor registers, and assisting with security awareness and training programs.

​Job Responsibilities: Audit, Risk, and Program Management

​The analyst is central to maintaining Bonterra's compliance posture and managing third-party risk.

  • SOC Reporting Lead: Perform as the primary in executing the annual Service Organization Controls (SOC) reporting initiatives across several Bonterra products.
  • Audit Coordination: Work closely with control owners and internal/external auditors to ensure requests are completed efficiently as part of the overall project management process.
  • Vendor Risk Management (VRM): Perform technical risk assessments of third-party suppliers' security and privacy controls. Maintain a register of relevant suppliers, controls, and risks for ongoing VRM activities.
  • Program Support: Assist in maintaining the overall security awareness, role-based security training, and phishing simulation programs across the enterprise.
  • Incident Response: Responsible for creating the playbook for reporting of high-risk events that involve compliance, risk, and information security.
  • Internal Audits: Assist in conducting user activity audits where required.

​Required Qualifications and Certifications

​The role requires strong organizational skills, proven project management capability, and preferred certifications in the risk and compliance domain.

  • Experience: 6+ years' experience performing risk and compliance activities (or relevant degree with less experience).
  • Management Skills: Project management experience, experience managing multiple priorities independently, and excellent organizational, planning, and time management skills.
  • Analytical Skills: Excellent research and analytical skills.
  • Communication: Excellent verbal and written communication skills, with the ability to exercise good judgment when dealing with senior management.
  • Software Proficiency: Proficient with technology and ability to learn software systems, including GRC, ticketing, and project management software and workflows.
  • Preferred Certifications: Information systems security professional certifications preferred (e.g., CRISC, CISA, CISSP, CISM, GSEC, GCFA, GCTI, CCSP, or other relevant certifications).

Job Features

Job CategoryIT & Cybersecurity

​This is a full-time, remote Information Security Compliance Analyst role at Bonterra, a technology company dedicated to the social good industry. The analyst will be the primary resource for execut...View more

​This is a long-term contract opportunity for a Specialty Software Engineer with a focus on Red Team Cyber Security Research at a major Financial Services Company. The role involves consulting, participating in moderately complex software initiatives, and contributing to large-scale planning, requiring deep expertise in creating exploits, reverse engineering, and converged security testing.

  • Location: Hybrid preferred in Charlotte, NC; Dallas, TX; Raleigh, NC; or Minneapolis. Remote candidates will be considered.
  • Contract: 6+ Months (Long-term).
  • Rate: $61.69/hr - $69.51/hr.
  • Focus: AI Cyber Security Research, creating proofs of concept/exploits, reverse engineering, converged testing (Red Team), and technical reporting on attack chains.

​Required Skills & Experience

​The role mandates experience in both software engineering and specialized offensive security techniques.

  • Software Engineering: 4+ years of Specialty Software Engineering experience.
  • Offensive Security/Exploitation (2+ years): Experience in one or a combination of the following:
    • ​Creating proof of concepts.
    • ​Creating exploits.
    • Reverse engineering.
  • Security Research (2+ years): AI Cyber Security Research experience.
  • Red Team/Converged Testing (3+ years): Experience in converged testing (Red Team testing).
  • Communication: 3+ years of experience:
    • ​Presenting complex technical topics to diverse stakeholder groups.
    • ​Writing technical reports explaining attack chains and cyber security vulnerabilities and their impact.

​What You Will Be Doing

​The engineer will contribute to high-level security initiatives and troubleshoot complex challenges within Specialty Software Engineering.

  • ​Consult on or participate in moderately complex initiatives and deliverables within Specialty Software Engineering.
  • ​Review and analyze moderately complex Specialty Software Engineering challenges that require an in-depth evaluation of variable factors.
  • ​Contribute to the resolution of moderately complex issues and consult with others while leveraging an understanding of function, policies, procedures, and compliance requirements.

​Desired Skills

  • ​Artificial Intelligence (AI) and Gen AI.
  • ​Kubernetes & Docker Containerization.
  • ​Attention to Details and Complex Situations.
  • ​Technical Writing.

Job Features

Job CategoryIT & Cybersecurity, Software Engineering

​This is a long-term contract opportunity for a Specialty Software Engineer with a focus on Red Team Cyber Security Research at a major Financial Services Company. The role involves consulting, part...View more

​This is a full-time, remote, 12-week internship role at Ever.Ag, supporting customers who use their agriculture retail and agronomy software solutions. The intern will focus on problem-solving, delivering customer support, and assisting users with both administrative and technical needs. This role is ideal for a student seeking hands-on experience in the AgTech sector.

  • Location: Remote, United States.
  • Duration: 12 weeks, starting May 26, 2026, and concluding August 14, 2026.
  • Hours: Flexible 30–40 hours per week.
  • Eligibility: Must be currently enrolled in an accredited degree program with a graduation date after August 2026.
  • Focus: Tier 2 support, troubleshooting, Salesforce reporting, and knowledge item creation for agriculture retail and agronomy software.

​Key Responsibilities

​The intern will gain hands-on experience in a professional support environment while contributing to core team functions.

  • Customer Support: Help users navigate administrative and technical needs, troubleshoot issues, and provide expert guidance.
  • Reporting and Documentation:
    • ​Perform Salesforce reporting.
    • ​Contribute to the customer support portal.
    • ​Drive Knowledge item creation (improving team efficiency and self-service).
  • Special Projects: Participate in assigned tasks and special projects that impact the team, growers, retailers, and agronomy professionals.

​Competencies to Improve

​The internship offers experience in enterprise software, technical tools, and industry domain knowledge.

  • Software Expertise: Hands-on experience with Ever.Ag’s key software solutions.
  • Support Tools: Hands-on experience with Salesforce.com’s Support Cloud solution.
  • Industry Knowledge: Understanding of key aspects related to the dairy supply chain.

​Required Qualifications and Preferred Skills

​The ideal candidate is currently pursuing a degree in a relevant field and has prior customer-facing experience.

  • Education: Pursuit of Bachelor’s Degree in agricultural or agtech related disciplines.
  • Experience: Previous experience in some type of direct customer-facing job.
  • Technical Skills (Preferred): Some knowledge/experience using remote access, networking, troubleshooting tech (hardware or software), and SQL.
  • Software: Experience with MS-Office.

Job Features

Job CategoryCustomer Success, Support Service

​This is a full-time, remote, 12-week internship role at Ever.Ag, supporting customers who use their agriculture retail and agronomy software solutions. The intern will focus on problem-solving, del...View more

​This is a full-time, remote Senior Technical Support Engineer role at New Relic, focused on supporting their intelligent observability platform. The engineer will specialize in complex, escalated cases requiring deep expertise in cloud, networking, automation, and the full product suite. This role serves as a critical technical liaison between customers and software engineering teams.

  • Location: Remote (CST/EST preferred, major US cities listed as hubs).
  • Estimated Base Pay Range: $90,000 - $121,000 USD.
  • Focus: Advanced troubleshooting of cloud/containerized systems (AWS, Docker, Kubernetes), OpenTelemetry, scripted deployment (Terraform/Ansible), API integration (REST/GraphQL), and acting as a customer advocate for the Product Organization.
  • Visa Sponsorship: Not available for this position.

​What You'll Do: Advanced Escalations and Advocacy

​The Senior Engineer focuses on high-complexity issues, knowledge sharing, and driving product improvements based on customer feedback.

  • Complex Resolution: Collaborate across teams to assist in solving highly complex technical customer problems across the New Relic product suite.
  • Engineering Liaison: Work closely with software engineering teams to resolve advanced customer issues, often acting as a technical liaison.
  • Customer Advocacy: Act as an advocate for customers to the Product Organization, providing feedback on feature requests and bugs that improve the New Relic platform's customer experience.
  • Process Improvement: Use insight and creativity to help identify recurring or systemic problems and suggest ways to address them.
  • Training: Advance technical skills through continuous training and development on product features and capabilities.

​Required Technical Expertise

​The role requires authoritative troubleshooting skills and expertise across the modern DevOps and cloud ecosystem.

  • Cloud & Containerization: Expertise in AWS and containerization technologies such as Docker and Kubernetes. Cloud experience with Azure and GCP is also required.
  • Observability/Monitoring: Experience with observability vendors and the OpenTelemetry standard.
  • DevOps/Automation: Experience with scripted deployment skillsets common in DevOps environments, such as Terraform, Chef, Puppet, or Ansible.
  • Operating Systems: Strong understanding of Linux-based web hosting and Linux environments (services, permissions, and file manipulation).
  • APIs & Scripting: Experience working with APIs (REST/GraphQL/SOAP) for data retrieval/automation, including using tools like Postman and manipulating JSON payloads. Comfortable with troubleshooting authentication (API Keys, OAuth) and integrating API calls into basic scripts (Python/Bash).
  • Bonus Certifications: AWS, GCP, Azure Cloud Certified, or CKA certified.

Job Features

Job CategoryInformation Technology, Support Service, Technical Services

​This is a full-time, remote Senior Technical Support Engineer role at New Relic, focused on supporting their intelligent observability platform. The engineer will specialize in complex, escalated c...View more

​This is a full-time, Fully Remote Regional Support Engineer role at United Imaging, a global medical device developer. The engineer acts as the primary technical liaison and Regional Support Specialist for multiple medical imaging (MI) systems, with a focus on PET/CT. The role is critical for driving technical experience, providing advanced support to the Field Service team, developing training, and managing customer escalations during a period of rapid company growth.

  • Location: Fully Remote (Reports to HQ in Houston, TX).
  • Travel: Ability to travel extensively throughout the US (~75%) and internationally.
  • Experience: Minimum 5 years’ experience servicing MI imaging systems (preferably in a national or regional specialist role).
  • Education: BSEE or equivalent degree.
  • Focus: Advanced technical support for Field Service Engineers (FSEs) and customers (remote/on-site), developing/delivering technical training, triage/closing customer escalations, and improving first-time-fix rates for PET/CT systems.

​💻 Duties & Responsibilities: Support, Training, and Escalation

​The engineer is a high-level technical expert responsible for system reliability and the competence of the field team.

  • Regional Technical Support: Act as the Regional Support Specialist for MI (PET/CT) systems, providing rapid technical support to Customer Service Engineers and Customers, both remote and on-site as needed.
  • Training & Mentorship: Responsible for developing and delivering technical service training courses at the Training Center in Houston. Responsible for technical knowledge transfers to field-based CSOs to drive world-class first-time-fix rates.
  • Escalation Management: Responsible for triaging, coordinating, managing, and closing customer escalations; working closely with the Field Service and Business Unit teams.
  • Liaison & Reporting: Act as a technical interface between the MI Business Unit and the US Field Service organization. Tracking, monitoring, and communicating top reliability and serviceability issues reported by the field.
  • Guidance: Providing guidance on siting, installations, tooling, and test equipment required for high levels of customer service.

​🛠️ Required Experience and Skills

​The role demands deep, practical knowledge of medical imaging diagnostics and a passion for customer service.

  • Domain Experience (5+ years required): Minimum 5 years’ experience servicing MI imaging systems (preferably in a specialist role).
  • Technical Depth: Deep understanding of diagnostic MI in a medical imaging clinical environment.
  • Prior Experience: Field service / technical support experience in high tech medical imaging. CT imaging service experience is a plus.
  • Soft Skills: Totally Customer focused with a passion for solving customer problems, and committed to providing excellent customer satisfaction.

Job Features

Job CategoryHealthcare, Support Service

​This is a full-time, Fully Remote Regional Support Engineer role at United Imaging, a global medical device developer. The engineer acts as the primary technical liaison and Regional Support Specia...View more

Remote
United States
Posted 2 months ago

​This is a full-time, remote Support Engineer role at Rimini Street, a leading third-party enterprise software support provider. The position focuses on the Oracle Technology Archive Product Line within the North American region (NAMER). The engineer acts as the Archiving Expert for new clients, driving the creation of a comprehensive archive scoping roadmap, documenting download instructions for Oracle patches and media, and leading mini archiving projects.

  • Location: Remote, United States.
  • Experience: 5+ years relevant technical experience working with Oracle products (EBS, Middleware, Database), with knowledge of maintenance/patching mechanics for ERP architecture.
  • Focus: Onboarding support, scoping archived software (patches/media) for compliance, documentation, client-facing consultation, and process improvement for Oracle Technology product lines.
  • Work Requirement: Ability to work flexible hours to contribute to the 24x7x365 support service.

​Essential Duties & Responsibilities: Scoping, Consultation, and Process

​The engineer is the technical authority on client archive content and internal archiving processes.

  • Archive Scoping & Consultation: Review new clients’ covered products and use standard processes to help them build an archive scoping roadmap document. Act as the Archiving Expert during scoping sessions, creating and presenting the archive document to client technical and financial teams.
  • Technical Instruction: Provide a detailed instruction guide to download software patches and media by release and platform for Oracle technology key areas (Database, Developer Tools, Middleware).
  • Project Leadership: Ability to run and lead conference calls with customers and lead mini archiving projects from start to finish.
  • Process Management: Responsible for the improvement, growth, and evolution of the archive process, including process documentation, tracking, and scoping.
  • Internal Coordination: Work closely with the Archive QA team, Archiving Services team (who perform downloads), Onboarding, and Account Managers to track client progress and validate archive completeness.

​Required Experience and Technical Skills

​The role mandates deep knowledge of Oracle’s technical and ERP environments, focusing on maintenance and deployment mechanics.

  • Domain Expertise (5+ years required): Technical experience working with Oracle products (Oracle E-Business Suite (EBS), Oracle Middleware, Oracle Database).
  • Technical Knowledge (Mandatory): Knowledge of software patching, maintenance, upgrading, and installation methodologies for ERP architecture (including Database and Middleware/Fusion Middleware/WebLogic).
  • ERP Experience (Strong Skills): Strong skills with Oracle E-Business Suite, Fusion Middleware, JDE, or Siebel.
  • Soft Skills: Strong client facing skills with a leadership background, excellent presentation skills, attention to detail, and extreme focus on Client satisfaction.
  • Desired/Plus: Consulting background, Project management related skills, and knowledge of developer tools (JDeveloper, OBIEE).

Job Features

Job CategoryInformation Technology, Support Service

​This is a full-time, remote Support Engineer role at Rimini Street, a leading third-party enterprise software support provider. The position focuses on the Oracle Technology Archive Product Line wi...View more