We're Hiring! Looking for Security, Office 365, and SharePoint Writers

The Petri IT Knowledgebase is hiring! We’re looking to add two more contract writers to our content team: One focused on IT security, and another focused on Office 365 and SharePoint. Both openings are contract freelance positions and are designed to accommodate someone who works as an IT professional or consultant in those topic areas, but has free time available to write about their respective areas of expertise. Compensation will vary depending upon experience and expertise. Both positions are remote, so applicants can work from home.

Both openings require a certain number of posts on a weekly and monthly basis, and the content we’re looking for consists primarily of how-to and opinion articles. Here are some additional details of the responsibilities of both openings, followed by more specific information on each position.


  • Write two how-to and opinion blog posts per week and two long-form how-to technical articles per month
  • Post content directly into a WordPress-based web content management system (CMS)
  • Promote content and engage with readers using popular social media platforms.

Submission Process

Applicants should follow the links below for more information on each specific position, and should send in the following materials when applying:

  • Cover Letter
  • Resume
  • Two writing samples (or links to them)
  • Links to previously published work, blogs, and social media handles (LinkedIn, Facebook, and Twitter)

IT Security Writer

Are you an IT security professional who has extensive, hands-on experience with implementing an IT security strategy for a medium to large enterprise? Can you recite the differences between authentication, identity, authorization, and encryption in your sleep? And do you know – at a glance – what the acronyms SIEM, AES, SSL, WEP, WPA, WPA2, and CISO stand for? Do you keep tabs on all the latest developments in malware, ransomware, viruses, and other malicious software?

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Do you also like to write – perhaps you have your own blog, or you’ve had technical articles published before – and you’re active on social media platforms like Facebook, Twitter, and LinkedIn? If so, we’d like to talk to you.

The IT Security Blogger will post news analysis, opinion, and both short- and long-form technical how-to content about computer security, specifically on the Microsoft Windows server and client platform. Applicants should also be knowledgeable about using security products in mixed-vendor environments, including Windows Server, Linux, and MacOS environments, as well as on mobile devices running iOS, Android, and Windows Phone operating systems.

Apply for IT Security Blogger Position

Office 365 / SharePoint Writer

Are you an IT professional who has extensive experience with Microsoft Office 365 and Microsoft SharePoint? Do you know the differences between the various editions and versions of Office 365 and Microsoft SharePoint? Do you know what the acronyms BPOS, O365, WSS, and SPS mean at a glance? Do you also like to write and are active on social media platforms like Facebook, Twitter, and Linkedin? If so, we’d like to talk to you.

The Microsoft Office 365 / Microsoft SharePoint Blogger will post how-to content, breaking news and opinionated analysis of Microsoft’s Office 365 and SharePoint product families, as well as provide additional tips and suggestions to help readers get the most out of those platforms.

Apply for Office 365 / SharePoint Blogger Position

So are there other topic areas you think we should be hiring writers for? Drop me an email or touch base with me on Twitter, Google+, or Facebook (see below).

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: