67 Remote Cybersecurity companies

Discover the best remote Cybersecurity companies in the world. View a company's profile to learn about its mission, culture and values, tech stack, employee benefits, and open remote roles.

Search
Cybersecurity
View items

67 companies

    1Password logo
    9 jobs available
    Number of employees

    51-200

    Tech stack

    39 tech stacks

    1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know Embrace the unconventional. We all work best in different ways. At 1Password, you can choose the location, environment, schedule, and approach that works best for you, and are encouraged to take time to recharge. Hands on.

    Prelude logo
    0 jobs available
    Number of employees

    11-50

    Tech stack

    13 tech stacks

    Prelude is a technology company that hardens cybersecurity defenses. Our mission is to increase the reach, frequency and usage of advanced security for all organizations.

    Aptible logo
    3 jobs available
    Number of employees

    11-50

    Tech stack

    76 tech stacks

    Aptible was founded to build trust on the internet. We do this by making it easier for companies to go from having an idea to releasing it to the world safely and securely. Protecting data online can no longer be an afterthought. Saying “we take data security seriously” isn’t good enough. Customers, partners, investors, shareholders, and vendors are all demanding proof that you’re authentically investing in data security.

    Sonatype logo
    4 jobs available
    Number of employees

    201-500

    Tech stack

    33 tech stacks

    The Sonatype journey started 10 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven to supporting the world’s largest repository of open source components (Central) to distributing the world's most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation.

    Socure logo
    8 jobs available
    Number of employees

    201-500

    Tech stack

    78 tech stacks

    Socure provides a real-time predictive analytics platform that combines the newest forms of machine learning and artificial intelligence with digital, offline and social identity data to deliver the most accurate and robust KYC, identity verification and fraud risk prediction solution in the market. Socure deploys its advanced identity verification robot across email, phone, online/social, address, IP, physical documents and traditional offline proprietary predictors to help clients better assess identity risk and substantially increase acceptance, reduce fraud losses, and optimize manual review/step up authentication for transactions and applications in the digital world.

    Level logo
    5 jobs available
    Number of employees

    1-10

    Tech stack

    26 tech stacks

    Level is a creative software company using the latest technologies to create products that solve problems for IT organizations. We are problem solvers, translating our research and knowledge into creative action. We saw a problem. We created a solution. Level was designed by a team of developers, engineers, and IT professionals who recognized the common issues plaguing remote platforms and grew frustrated with their lack of resolution.

    Elastic logo
    3 jobs available
    Number of employees

    1,001-5,000

    Tech stack

    35 tech stacks

    Elastic (NYSE: ESTC) is a search company. As the creators of the Elastic Stack (Elasticsearch, Kibana, Beats, and Logstash), Elastic builds self-managed and SaaS offerings that make data usable in real-time and at scale for use cases like application search, site search, enterprise search, logging, APM, metrics, security, business analytics, and many more. Thousands of organizations worldwide, including Cisco, eBay, Goldman Sachs, Microsoft, The Mayo Clinic, NASA, The New York Times, Wikipedia, and Verizon, use Elastic to power mission-critical systems.

    Venafi logo
    1 job available
    Number of employees

    201-500

    Tech stack

    73 tech stacks

    Venafi is the cybersecurity market leader and inventor of machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, code signing, mobile and SSH. Venafi provides global visibility of machine identities and their associated risks for the extended enterprise—on-premises, mobile, virtual, cloud and IoT—at machine speed and scale.

    Corellium logo
    1 job available
    Number of employees

    11-50

    Tech stack

    40 tech stacks

    At Corellium, we're building software for virtual devices with real-world accuracy, designed to eliminate barriers to mobile application testing, streaming, etc. Our goal is to ensure developers and engineers are well-equipped to research, work and test on Arm-based technologies in an array of fields, such as Security Research, Mobile App Security Testing, App Testing and IoT Device Security.

    CodeNotary logo
    0 jobs available
    Number of employees

    11-50

    Tech stack

    54 tech stacks

    Codenotary is the leading company for secure software supply chain. We bring trust and integrity into the software life cycle by providing end-to-end cryptographically verifiable tracking and provenance for all artifacts, actions, and dependencies. We provide the only immutable and client-verifiable solutions capable of processing millions of transactions a second, based on our immudb, the open source standard for immutable databases.

    Thycotic logo
    1 job available
    Number of employees

    501-1,000

    Tech stack

    71 tech stacks

    IT Security That Works. Thycotic Software, Ltd. is committed to providing secure password management solutions. From managing privileged accounts to Active Directory self‐service resets, our software securely manages all credentials critical to your company's operations. SECRET SERVER, our password management software, allows teams to control access to all critical passwords in a one central, web‐based repository.

    Sucuri logo
    0 jobs available
    Number of employees

    51-200

    Tech stack

    37 tech stacks

    We've offered holistic website security solutions since 2008 including malware removal, malware monitoring, and website protection services. Our SiteCheck website security monitor is used by thousands of website owners every month to monitor their websites for malware, blacklist status, and other security issues, and our CloudProxy Firewall safeguards sites and those who visit them from attacks of all kinds.

    FuzzBuzz logo
    0 jobs available
    Number of employees

    1-10

    Tech stack

    10 tech stacks

    We're Fuzzbuzz and we're building a fuzzing as a service platform that integrates into CI systems and the modern software testing workflow. Fuzzing is a type of automated testing that generates and runs thousands of inputs per second on your code to try and find bugs and vulnerabilities. It uses code coverage and other signals from your code to guide the tests it generates and runs. You can read more here.

    episki logo
    0 jobs available
    Number of employees

    1-10

    Tech stack

    22 tech stacks

    A new way to enable your organization to provide security assurance. episki focuses on combining growing companies' security programs, regulatory and compliance needs, and assessment activity all under one source, so they have a central place of truth. People know what needs to be done, they know where the artifacts are, and it's clear where things stand, and everyone's accountable.

    Tenable logo
    0 jobs available
    Number of employees

    1,001-5,000

    Tech stack

    25 tech stacks

    Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000, and large government agencies.

    Surevine logo
    0 jobs available
    Number of employees

    11-50

    Tech stack

    45 tech stacks

    Surevine builds secure, scalable collaboration solutions for the most security-conscious organizations; joining people up and enabling collaboration on their most sensitive information. Our systems are accredited to handle the most sensitive information, whilst still delivering an intuitive and engaging user experience that actively promotes participation; building smart, secure networks of connected people.

    Doyensec logo
    0 jobs available
    Number of employees

    11-50

    Tech stack

    12 tech stacks

    Doyensec is an independent security research and development company focused on vulnerability discovery and remediation. We work at the intersection of software development and offensive engineering to help companies craft secure code. We discover vulnerabilities others cannot and help mitigate risk by providing actionable solutions. In other words, we're an offensive security firm working with the frame of reference of a blue team.

    Cohesive Networks logo
    0 jobs available
    Number of employees

    11-50

    Tech stack

    24 tech stacks

    Cohesive Networks provides cloud-class security and networking software for enterprises. VNS3 has recently been named a finalist in the Data Cloud Awards for Best Use of Cloud in Major Enterprise. With over 3,000 connected customers in more than 22 countries, Cohesive Networks has provided more than 500 million hours of application network security. VNS3 offers more dynamic network controls on top of cloud offerings, including multiple VLAN peering, end-to-end data encryption, application-layer firewall rules, multicast, and multi-region peering.

    NuCypher logo
    0 jobs available
    Number of employees

    11-50

    Tech stack

    29 tech stacks

    NuCypher is a security and encryption platform for distributed systems, including blockchain, big data, cloud, and internet of things. Our core technology, proxy re-encryption is a type of public-key encryption that allows a proxy entity to transform ciphertexts from one public key to another, without learning anything about the underlying message. It is a means of securely delegating access to encrypted information, via the construction of cryptographically-enforced access controls.

    Guardtime logo
    0 jobs available
    Number of employees

    51-200

    Tech stack

    20 tech stacks

    We were founded with the mission of creating a world free from the burden of trust. The cost to the global economy of managing human trust can be measured in the trillions of dollars per year. A whole range of industries (audit, compliance, cybersecurity, inspection, certification) exist that try to narrow the uncertainty associated with trusting others. However, they fail, with rising costs.

The latest jobs in your inbox

We'll keep you updated with the best new remote jobs.

Read about our privacy policy

Hiring remotely?
Start posting jobs today.

Start posting jobs for only $50.

Post remote jobs on Himalayas