The US remains the highest-paying market for tech globally. Major hubs include the San Francisco Bay Area, New York, Seattle, Austin, and Boston, plus fully remote-first companies headquartered across the country.
Who We’re Looking For (Position Overview): We’re looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and…
Read full description
Who We’re Looking For (Position Overview): We’re looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and attribution-relevant indicators. What Your Day-To-Day Looks Like (Position Responsibilities): Malware Analysis & Reverse Engineering Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed) Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required.
You'll provide data governance and engineer solutions that adhere to governance business rules. You Have: 3+ years of experience utilizing Splunk Enterprise Experience with deploying, configuring, and performing…
Read full description
You'll provide data governance and engineer solutions that adhere to governance business rules. You Have: 3+ years of experience utilizing Splunk Enterprise Experience with deploying, configuring, and performing functional testing and data validation in a Splunk environment Experience with Splunk performing systems administration, including performing installation, configuration, monitoring system performance and availability, upgrades, and troubleshooting in Windows and Linux Server environments Experience creating custom dashboards, writing queries and generating reports, and setting up alerts and notifications Active TS/SCI clearance; willingness to take a polygraph exam Associate's degree and 5+ years of experience supporting IT projects and activities, Bachelor's degree and 3+ years of experience supporting IT projects and activities, or Master's degree and 1+ years of experience supporting IT projects and activities Active DoD 8570.01-M Information Assurance Technician (IAT) Level II Certification, including Security+ CE, CCNA-Security, GSEC, SSCP, CySA+, GICSP, or CND Advanced Splunk Certification, such as Splunk Certified Power User or Splunk Enterprise Certified Architect Ability to obtain a DoD 8570.01-M Cybersecurity Service Provider - Infrastructure Support Certification, including CEH, CySA+, GICSP, SSCP, CHFI, CFR, Cloud+, or CND Certification prior to start date Nice If You Have: Experience with fields abstraction Experience with data modeling using Splunk Experience with workflows and drilldown query ...
We are looking for a Smart Contract Security Engineer. What You Will Bring Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities Experience with developer tools for smart contract development…
Read full description
We are looking for a Smart Contract Security Engineer. What You Will Bring Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities Experience with developer tools for smart contract development (e.g., Hardhat, Foundry) Passion for collaborating with developers, security auditors, and stakeholders Strong testing skills and experience with testing frameworks for smart contracts Experience with production deployments of non-trivial protocols and associated security audits Ability to collaborate with cross-functional and geographically remote teams For more information, please contact Joseph@techchaintalent.xyz Show less
This hands-on role is for an experienced cybersecurity professional who can blend technical knowledge, compliance expertise, and practical execution to help a small defense contractor achieve and maintain CMMC Level 2…
Read full description
This hands-on role is for an experienced cybersecurity professional who can blend technical knowledge, compliance expertise, and practical execution to help a small defense contractor achieve and maintain CMMC Level 2 compliance. Essential Functions: Lead CMMC readiness assessments, map controls to NIST SP 800-171 and DFARS requirements, and maintain compliance documentation (SSP, POA&M) Oversee enterprise security policies, standards, and procedures, ensuring alignment with federal and industry regulations Collaborate with IT and DevOps teams to implement secure configurations across workstations, servers, CI/CD pipelines, and cloud environments Conduct risk assessments, vulnerability scans, and threat mitigation; lead incident response and remediation efforts Serve as SME during audits and assessments, coordinating evidence collection and responses Integrate security into projects and operations while delivering training and awareness programs across the organization Stay current on CMMC updates, DoD guidance, and best practices for compliance This position may require occasional travel when needed Must be able to obtain and maintain a US DOD Security Clearance Requirements Basic Qualifications: Bachelor's Degree in Cybersecurity, Information Systems, or related field (or equivalent experience) 7+ years of hands-on cybersecurity experience, including implementation of security controls in small to mid-size environments Prior experience with CMMC 2.0, NIST SP 800-171, and DFARS compliance Extensive experience working with IT systems used in software engineering environments, including Windows and Linux workstations, Active Directory, Azure, and M365 Experience writing and maintaining clear, audit-ready documentation (SSP, POA&M, policies, procedures) Preferred Qualifications: Experience supporting DoD contracts or working within the Defense Industrial Base (DIB) Familiarity with Microsoft Purview, Defender for Cloud, and other M365 compliance tools Experience with vulnerability ma...
Responsibilities Kforce is seeking a Mid or Senior Level Cyber Security Analyst to work on the CISO Security Operations Center team - supporting the rapid threat detection and response mission. About the Team: The…
Read full description
Responsibilities Kforce is seeking a Mid or Senior Level Cyber Security Analyst to work on the CISO Security Operations Center team - supporting the rapid threat detection and response mission. About the Team: The Security Operations Center has a global footprint and is responsible for monitoring 24x7 monitoring and incident response.
KPMG is currently seeking a Senior Associate, Cyber Operations to join our Enterprise Security Services organization. This is a remote work opportunity.
SDR East Coast Data Security Data Detection and Response Our client: A high-growth cybersecurity company in the data security and DSPM category, backed by leading industry investors, focused on shifting…
Read full description
SDR East Coast Data Security Data Detection and Response Our client: A high-growth cybersecurity company in the data security and DSPM category, backed by leading industry investors, focused on shifting enterprises from reactive defense to predictive data protection. Conduct deep-dive research into target enterprise accounts to identify key stakeholders, organizational hierarchies, and specific data security vulnerabilities.
You are expected to manage client engagements related to IAM, utilize IAM products, and build meaningful client relationships. Responsibilities Manage client engagements related to IAM Utilize...
You are expected to manage client engagements related to IAM, utilize IAM products, and build meaningful client relationships. Responsibilities Manage client engagements related to IAM Utilize...
Lensa partners with DirectEmployers to promote this job for Medtronic. You Will Be a Key Member On The Cloud Security Team Assisting With Decision Making To Ensure a Proper Email Security Program At Medtronic.
Contribute to the development and organization of Cyber Security and Data Protection program management, threat intelligence, defense monitoring and vulnerability management. Collaborate and contributeto the development…
Read full description
Contribute to the development and organization of Cyber Security and Data Protection program management, threat intelligence, defense monitoring and vulnerability management. Collaborate and contributeto the development and organization of Cyber Security and Data Protection program management, threat intelligence, defense monitorin...
You will play a key role in defining technical solutions that secure a customer’s key business imperatives. Lead and support customer demonstrations that showcase our unique value proposition Scope and lead Proof of…
Read full description
You will play a key role in defining technical solutions that secure a customer’s key business imperatives. Lead and support customer demonstrations that showcase our unique value proposition Scope and lead Proof of Value (PoV) projects for prospective customers and partners based on best practices to ensure technical win in your assigned opportunities Drive high technical validation and PoV win rates within your assigned specialization area Responsible for discussing and highlighting product ...
Salary tags blend employer provided ranges with Catalitium estimates. We mark ranges with Est. labels, note any missing data, and never inflate compensation to boost clicks.
Currency harmonized to USD/EUR/GBP/CHF to avoid surprises.
Outliers are reviewed manually before they appear on a card.
Sponsored employers follow the same disclosure and pay rules.
Yes. Remote-friendly AI and ML roles in the EU have grown over 30% year-on-year. Germany, France, the Netherlands, and Spain lead in volume. Use the AI and EU filters together to surface them quickly, and check the salary estimate badge to ensure the range meets your expectations.
How fresh are the job postings?
Listings are refreshed continuously from employer feeds and normalised daily. Each card shows a posted date pill so you can see exactly how old a listing is. Jobs posted within the last 7 days receive a green New badge. Listings older than 30 days receive a May be filled warning.
Do roles include salary estimates?
Yes. Most listings show an Est. salary pill derived from Catalitium's location-based salary database, blended with any employer-disclosed range. Senior and lead roles receive an automatic seniority uplift. If a salary range is genuinely unknown we leave the field blank rather than show a misleading estimate.
What is a ghost job and how do I spot one?
A ghost job is a listing that has been live for 30+ days and is likely already filled, on hold, or was never a real opening. Research suggests up to 40% of active listings at any time are ghost jobs. Catalitium flags every listing older than 30 days with a triangle May be filled badge so you can prioritise your energy on fresh openings.
What are the highest-paying tech roles right now?
AI and ML engineer roles currently command the highest median salaries on Catalitium, around $150k–$200k USD in the US and EUR 100k–EUR 160k in Europe. Principal and Staff Engineer roles come close, followed by senior full-stack and cloud infrastructure engineers. Use the >100k filter to see only high-compensation listings.
How do I negotiate a higher salary offer?
Reference Catalitium's salary data when negotiating: show the employer the market range for your role and region. Studies show engineers who negotiate receive 10–20% more than the initial offer on average. If base salary is fixed, push on equity, signing bonus, remote allowance, and learning budget. See our Salary Negotiation Guide in the Resources section.
Which European cities pay the most for tech?
Zurich and Geneva (Switzerland) consistently top European tech salaries, followed by London, Amsterdam, Berlin, Paris, and Stockholm. Swiss salaries are typically quoted in CHF and translate to EUR 100k–160k for mid-senior roles. London follows at GBP 70k–110k. Berlin and Amsterdam are competitive at EUR 70k–100k for comparable experience levels.
Can I track my job applications on Catalitium?
Yes. Our free Application Tracker lets you move roles through a Kanban pipeline: Applied, Phone Screen, Interview, Offer, and Closed. It requires no account and stores everything privately in your browser. Hit the Track button on any job card to add it. You can also export your full pipeline as a CSV.
How does Catalitium differ from LinkedIn Jobs?
LinkedIn optimises for engagement and premium upgrades. Catalitium is built exclusively for tech candidates who want signal over noise: every listing shows salary estimates, ghost jobs are flagged, AI-powered summaries save you time reading descriptions, and the application tracker replaces the black-hole Easy Apply experience. No premium paywall, no recruiter spam.
Can I filter to remote-only jobs?
Yes. Choose Remote in the location/country field or tap a Remote shortcut chip. Results are limited to roles that advertise remote or hybrid where the listing text supports it, and remote-friendly rows show a Remote badge.
Which tech stacks are most in demand?
Across Catalitium tech listings, Python, TypeScript/JavaScript, Go, Java, and cloud platforms (AWS, GCP, Azure, Kubernetes) recur most often; AI and data roles add PyTorch, TensorFlow, and LLM tooling. Title and AI summary chips reflect the employer's stated stack.
Which Swiss cities pay the most for software roles?
Zurich and Geneva typically lead Switzerland for software, data, and platform engineering compensation; smaller hubs follow at a discount. Swiss ranges often sit above neighbouring EU markets for comparable seniority—check Est. salary on each card when you filter by Switzerland.
Save this search and get a weekly digest of top matches.
Includes salary signal. No spam.