Cyber Vulnerability & Pen Tester Analyst III

United States - Remote

Applications have closed

Rackspace

As a cloud computing services pioneer, we deliver proven multicloud solutions across your apps, data, and security. Maximize the benefits of modern cloud.

View company page

Overview: The Cyber Vulnerability & Pen Tester Analyst III will focus on providing fanatical experience to internal and external customers through honing security skillsets to specialize in vulnerability assessments, remediation guidance, and automation Receives general guidance for routine tasks, and detailed instruction on new assignments. Completes high volume, low to moderate complexity tasks Acquires job skills performing routine tasks and learns to complete complex tasks. Typical tasks are complex, but still routine in nature Follows and adapts existing processes and troubleshoots technical issues Follows, adapts, improves, and documents existing processes General office environment May require long periods sitting and viewing a computer monitor Moderate levels of stress may occur at times 

You Have:

  • 5-8 years of Security Analyst experience
  • 5+ years of experience performing vulnerability assessments and penetration testing. Experience applying ethical hacker techniques, phishing schemes, emerging logical security threats, and compromised server techniques
  • Strong knowledge of many security concepts, and how they apply to various technologies
  • Strong foundational, or expert-level knowledge, in 1 of the following: System administration, networking, programming, incident response/threat analysis
  • Exceptional attention to detail, verbal and written communication skills, and analytical and problem-solving skills
  • Team player that builds stable internal working relationships
  • Comfortable communicating across the business to solve problems
  • Focused on flawless execution and guiding remediation teams
  • Regularly impacts tactical project execution
  • Shares new and existing knowledge with the team
  • Keeps up-to-date on the dynamic nature of new technologies and security vulnerabilities by monitoring news sources and attending public conferences and organizations

Nice to Haves:

  • Performs routine vulnerability exposure system and process health checks, helps system owners and engineers with issues related to vulnerabilities and configures new systems for automated assessments
  • Interprets and prioritizes vulnerability scan results into remediation actions.
  • Performs vulnerability assessments on servers, workstations, and other components.
  • Familiar with vulnerabilities, remediation, and industry-standard classification schemes (CVE and CVSS)
  • Experience with assessments and exploits of web applications (OWASP Top 10)
  • Understanding of penetration testing methodologies, tactics, techniques, and procedures
  • Performs vulnerability assessments of individual systems, devices, or interfaces with some guidance
  • Contributes to red team missions by completing technical checkpoints
  • Experience with common programming or scripting languages such as Python, Bash, PowerShell, or JavaScript to build and troubleshoot scripts
  • Familiar with vulnerabilities, remediation, and industry-standard prioritization and classification schemes (CVE, CVSS, vendor criticality and risk scores)
  • A foundational understanding of the major compliance regulations, such as PCI, HIPAA, HITRUST, or FedRAMP

Education:

  • Bachelor's degree in Computer Science, Cybersecurity, or other related major

Certifications:

  • At least one related security certification:
  • CEH, CompTIA Security+, GIAC Certification (GCIH, GWAPT, or GPEN), or (ISC)2 certification (CISSP, SSCP, CCSP)

Road Warrior:

  • POST COVD-Optional and occasional domestic travel

About Rackspace TechnologyWe are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.  More on Rackspace TechnologyThough we’re all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know.  Position is available for remote work in the following states unless otherwise specified. Alabama, Arizona, Arkansas, California, Connecticut, Delaware, District of Columbia, Florida, Georgia, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming.

Tags: Automation Bash CCSP CEH CISSP Compliance CompTIA Computer Science CVSS Exploits FedRAMP GCIH GIAC GPEN GWAPT HIPAA HITRUST Incident response JavaScript Monitoring OWASP Pentesting PowerShell Python Red team Scripting SSCP Vulnerabilities

Perks/benefits: Conferences

Regions: Remote/Anywhere North America
Country: United States
Job stats:  36  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.