Cyber Vulnerability & Pen Tester Analyst III
United States - Remote
Applications have closed
Rackspace
As a cloud computing services pioneer, we deliver proven multicloud solutions across your apps, data, and security. Maximize the benefits of modern cloud.You Have:
- 5-8 years of Security Analyst experience
- 5+ years of experience performing vulnerability assessments and penetration testing. Experience applying ethical hacker techniques, phishing schemes, emerging logical security threats, and compromised server techniques
- Strong knowledge of many security concepts, and how they apply to various technologies
- Strong foundational, or expert-level knowledge, in 1 of the following: System administration, networking, programming, incident response/threat analysis
- Exceptional attention to detail, verbal and written communication skills, and analytical and problem-solving skills
- Team player that builds stable internal working relationships
- Comfortable communicating across the business to solve problems
- Focused on flawless execution and guiding remediation teams
- Regularly impacts tactical project execution
- Shares new and existing knowledge with the team
- Keeps up-to-date on the dynamic nature of new technologies and security vulnerabilities by monitoring news sources and attending public conferences and organizations
Nice to Haves:
- Performs routine vulnerability exposure system and process health checks, helps system owners and engineers with issues related to vulnerabilities and configures new systems for automated assessments
- Interprets and prioritizes vulnerability scan results into remediation actions.
- Performs vulnerability assessments on servers, workstations, and other components.
- Familiar with vulnerabilities, remediation, and industry-standard classification schemes (CVE and CVSS)
- Experience with assessments and exploits of web applications (OWASP Top 10)
- Understanding of penetration testing methodologies, tactics, techniques, and procedures
- Performs vulnerability assessments of individual systems, devices, or interfaces with some guidance
- Contributes to red team missions by completing technical checkpoints
- Experience with common programming or scripting languages such as Python, Bash, PowerShell, or JavaScript to build and troubleshoot scripts
- Familiar with vulnerabilities, remediation, and industry-standard prioritization and classification schemes (CVE, CVSS, vendor criticality and risk scores)
- A foundational understanding of the major compliance regulations, such as PCI, HIPAA, HITRUST, or FedRAMP
Education:
- Bachelor's degree in Computer Science, Cybersecurity, or other related major
Certifications:
- At least one related security certification:
- CEH, CompTIA Security+, GIAC Certification (GCIH, GWAPT, or GPEN), or (ISC)2 certification (CISSP, SSCP, CCSP)
Road Warrior:
- POST COVD-Optional and occasional domestic travel
About Rackspace TechnologyWe are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future. More on Rackspace TechnologyThough we’re all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. Position is available for remote work in the following states unless otherwise specified. Alabama, Arizona, Arkansas, California, Connecticut, Delaware, District of Columbia, Florida, Georgia, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming.
Tags: Automation Bash CCSP CEH CISSP Compliance CompTIA Computer Science CVSS Exploits FedRAMP GCIH GIAC GPEN GWAPT HIPAA HITRUST Incident response JavaScript Monitoring OWASP Pentesting PowerShell Python Red team Scripting SSCP Vulnerabilities
Perks/benefits: Conferences
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs
- Open Forensics-related jobs