find a remote job
work from anywhere

๐Ÿ‘ฉโ€๐Ÿ’ป Join Remote OK ๐Ÿ‘‹  Log in
General
Remote OK Frontpage ๐Ÿ Remote jobs ๐ŸŒ—  Dark mode ๐Ÿ‘ฉโ€๐Ÿ’ป Hire remote workers ๐Ÿšจ Post a remote job ๐Ÿฑ Compact mode โœ๏ธ Remote work blog new
Top jobs
๐Ÿฆพ  AI Jobs
โฐ Async jobs ๐ŸŒŽ Distributed team ๐Ÿค“ Engineer jobs ๐Ÿ’ผ Executive jobs ๐Ÿ‘ต Senior jobs ๐Ÿค“ Developer jobs ๐Ÿ’ฐ Finance jobs โ™พ๏ธ Sys Admin jobs โ˜•๏ธ JavaScript jobs ๐Ÿ‘ Backend jobs
Companies
๐Ÿšจ Post a remote job ๐Ÿ“ฆ Buy a job bundle ๐Ÿท Ask for a discount Safetywing Health insurance for teams Safetywing Health insurance for nomads
Feeds
๐Ÿ›  Remote Jobs API ๐Ÿชš  RSS feed ๐Ÿช“  JSON feed

Hacker News mode  Hacker News mode

Safe for work mode  Safe for work mode

Other
๐ŸŸข  Uptime (99.99%) ๐Ÿ“ˆ  Pageviews (2.44M/mo) ๐Ÿ“Š Remote work stats new ๐Ÿ‘ท Top remote companies ๐Ÿ’ฐ Highest paying remote jobs ๐Ÿงช State of remote work new
๐ŸŒ  Become a digital nomad
โœจ  Applicant AI
๐Ÿ”ฎ  Web3 Jobs
๐Ÿ“ธ  Photo AI
๐Ÿก  Interior AI
๐Ÿ‡ต๐Ÿ‡น  Get Portuguese residency new
Post a remote job Log in

๐Ÿ‘‰ Hiring for a Remote position?

Post a job
on the ๐Ÿ† #1 Remote Jobs board.
Minimum
$0k/year
๐Ÿ’ฐ 401(k)
๐ŸŒŽ Distributed team
โฐ Async
๐Ÿค“ Vision insurance
๐Ÿฆท Dental insurance
๐Ÿš‘ Medical insurance
๐Ÿ– Unlimited vacation
๐Ÿ– Paid time off
๐Ÿ“† 4 day workweek
๐Ÿ’ฐ 401k matching
๐Ÿ” Company retreats
๐Ÿฌ Coworking budget
๐Ÿ“š Learning budget
๐Ÿ’ช Free gym membership
๐Ÿง˜ Mental wellness budget
๐Ÿ–ฅ Home office budget
๐Ÿฅง Pay in crypto
๐Ÿฅธ Pseudonymous
๐Ÿ’ฐ Profit sharing
๐Ÿ’ฐ Equity compensation
โฌœ๏ธ No whiteboard interview
๐Ÿ‘€ No monitoring system
๐Ÿšซ No politics at work
๐ŸŽ… We hire old (and young)
Regions
๐ŸŒ Worldwide
โ›ฐ๏ธ North America
๐Ÿ’ƒ Latin America
๐Ÿ‡ช๐Ÿ‡บ Europe
๐Ÿฆ Africa
๐Ÿ•Œ Middle East
โ›ฉ Asia
๐ŸŒŠ Oceania
Countries
๐Ÿ‡บ๐Ÿ‡ธ United States
๐Ÿ‡จ๐Ÿ‡ฆ Canada
๐Ÿ‡ฌ๐Ÿ‡ง United Kingdom
๐Ÿ‡ฆ๐Ÿ‡บ Australia
๐Ÿ‡ณ๐Ÿ‡ฟ New Zealand
๐Ÿ‡ฎ๐Ÿ‡ณ India
๐Ÿ‡ต๐Ÿ‡น Portugal
๐Ÿ‡ฉ๐Ÿ‡ช Germany
๐Ÿ‡ณ๐Ÿ‡ฑ Netherlands
๐Ÿ‡ธ๐Ÿ‡ฌ Singapore
๐Ÿ‡ซ๐Ÿ‡ท France
๐Ÿ‡ญ๐Ÿ‡ฐ Hong Kong
๐Ÿ‡ง๐Ÿ‡ท Brazil
๐Ÿ‡ฌ๐Ÿ‡ท Greece
๐Ÿ‡ฆ๐Ÿ‡ช United Arab Emirates
๐Ÿ‡ธ๐Ÿ‡ช Sweden
๐Ÿ‡ต๐Ÿ‡ฑ Poland
๐Ÿ‡ช๐Ÿ‡ธ Spain
๐Ÿ‡ฒ๐Ÿ‡ฝ Mexico
๐Ÿ‡บ๐Ÿ‡ฆ Ukraine
๐Ÿ‡ฏ๐Ÿ‡ต Japan
๐Ÿ‡น๐Ÿ‡ญ Thailand
๐Ÿ‡จ๐Ÿ‡ฟ Czechia
๐Ÿ‡ท๐Ÿ‡บ Russia
๐Ÿ‡ฎ๐Ÿ‡ฑ Israel
๐Ÿ‡ซ๐Ÿ‡ฎ Finland
๐Ÿ‡จ๐Ÿ‡ณ China
๐Ÿ‡ฎ๐Ÿ‡ฉ Indonesia
๐Ÿ‡ฆ๐Ÿ‡ซ Afghanistan
๐Ÿ‡ฆ๐Ÿ‡ฑ Albania
๐Ÿ‡ฉ๐Ÿ‡ฟ Algeria
๐Ÿ‡ฆ๐Ÿ‡ธ American Samoa
๐Ÿ‡ฆ๐Ÿ‡ฉ Andorra
๐Ÿ‡ฆ๐Ÿ‡ด Angola
๐Ÿ‡ฆ๐Ÿ‡ฎ Anguilla
๐Ÿ‡ฆ๐Ÿ‡ถ Antarctica
๐Ÿ‡ฆ๐Ÿ‡ฌ Antigua and Barbuda
๐Ÿ‡ฆ๐Ÿ‡ท Argentina
๐Ÿ‡ฆ๐Ÿ‡ฒ Armenia
๐Ÿ‡ฆ๐Ÿ‡ผ Aruba
๐Ÿ‡ฆ๐Ÿ‡น Austria
๐Ÿ‡ฆ๐Ÿ‡ฟ Azerbaijan
๐Ÿ‡ง๐Ÿ‡ธ The Bahamas
๐Ÿ‡ง๐Ÿ‡ญ Bahrain
๐Ÿ‡ง๐Ÿ‡ฉ Bangladesh
๐Ÿ‡ง๐Ÿ‡ง Barbados
๐Ÿ‡ง๐Ÿ‡พ Belarus
๐Ÿ‡ง๐Ÿ‡ช Belgium
๐Ÿ‡ง๐Ÿ‡ฟ Belize
๐Ÿ‡ง๐Ÿ‡ฏ Benin
๐Ÿ‡ง๐Ÿ‡ฒ Bermuda
๐Ÿ‡ง๐Ÿ‡น Bhutan
๐Ÿ‡ง๐Ÿ‡ด Bolivia
๐Ÿ‡ง๐Ÿ‡ฆ Bosnia
๐Ÿ‡ง๐Ÿ‡ผ Botswana
๐Ÿ‡ง๐Ÿ‡ป Bouvet Island
๐Ÿ‡ฎ๐Ÿ‡ด British Indian Ocean Territory
๐Ÿ‡ง๐Ÿ‡ณ Brunei
๐Ÿ‡ง๐Ÿ‡ฌ Bulgaria
๐Ÿ‡ง๐Ÿ‡ซ Burkina Faso
๐Ÿ‡ง๐Ÿ‡ฎ Burundi
๐Ÿ‡ฐ๐Ÿ‡ญ Cambodia
๐Ÿ‡จ๐Ÿ‡ฒ Cameroon
๐Ÿ‡จ๐Ÿ‡ป Cape Verde
๐Ÿ‡ฐ๐Ÿ‡พ Cayman Islands
๐Ÿ‡จ๐Ÿ‡ซ Central African Republic
๐Ÿ‡น๐Ÿ‡ฉ Chad
๐Ÿ‡จ๐Ÿ‡ฑ Chile
๐Ÿ‡จ๐Ÿ‡ฝ Christmas Island
๐Ÿ‡จ๐Ÿ‡จ Cocos Islands
๐Ÿ‡จ๐Ÿ‡ด Colombia
๐Ÿ‡ฐ๐Ÿ‡ฒ Comoros
๐Ÿ‡จ๐Ÿ‡ฌ Congo
๐Ÿ‡จ๐Ÿ‡ฉ DR Congo
๐Ÿ‡จ๐Ÿ‡ฐ Cook Islands
๐Ÿ‡จ๐Ÿ‡ท Costa Rica
๐Ÿ‡ญ๐Ÿ‡ท Croatia
๐Ÿ‡จ๐Ÿ‡บ Cuba
๐Ÿ‡จ๐Ÿ‡ผ Curaรงao
๐Ÿ‡จ๐Ÿ‡พ Cyprus
๐Ÿ‡ฉ๐Ÿ‡ฐ Denmark
๐Ÿ‡ฉ๐Ÿ‡ฏ Djibouti
๐Ÿ‡ฉ๐Ÿ‡ฒ Dominica
๐Ÿ‡ฉ๐Ÿ‡ด Dominican Republic
๐Ÿ‡ช๐Ÿ‡จ Ecuador
๐Ÿ‡ช๐Ÿ‡ฌ Egypt
๐Ÿ‡ธ๐Ÿ‡ป El Salvador
๐Ÿ‡ฌ๐Ÿ‡ถ Equatorial Guinea
๐Ÿ‡ช๐Ÿ‡ท Eritrea
๐Ÿ‡ช๐Ÿ‡ช Estonia
๐Ÿ‡ช๐Ÿ‡น Ethiopia
๐Ÿ‡ซ๐Ÿ‡ฐ Falkland Islands
๐Ÿ‡ซ๐Ÿ‡ด Faroe Islands
๐Ÿ‡ซ๐Ÿ‡ฏ Fiji
๐Ÿ‡ฌ๐Ÿ‡ซ French Guiana
๐Ÿ‡น๐Ÿ‡ฑ East Timor
๐Ÿ‡น๐Ÿ‡ซ French Southern Territories
๐Ÿ‡ฌ๐Ÿ‡ฆ Gabon
๐Ÿ‡ฌ๐Ÿ‡ฒ Gambia
๐Ÿ‡ฌ๐Ÿ‡ช Georgia
๐Ÿ‡ฌ๐Ÿ‡ญ Ghana
๐Ÿ‡ฌ๐Ÿ‡ฎ Gibraltar
๐Ÿ‡ฌ๐Ÿ‡ฑ Greenland
๐Ÿ‡ฌ๐Ÿ‡ฉ Grenada
๐Ÿ‡ฌ๐Ÿ‡ต Guadeloupe
๐Ÿ‡ฌ๐Ÿ‡บ Guam
๐Ÿ‡ฌ๐Ÿ‡น Guatemala
๐Ÿ‡ฌ๐Ÿ‡ฌ Guernsey
๐Ÿ‡ฌ๐Ÿ‡ณ Guinea
๐Ÿ‡ฌ๐Ÿ‡ผ Guinea Bissau
๐Ÿ‡ฌ๐Ÿ‡พ Guyana
๐Ÿ‡ญ๐Ÿ‡น Haiti
๐Ÿ‡ญ๐Ÿ‡ฒ Heard Island and McDonald Islands
๐Ÿ‡ญ๐Ÿ‡ณ Honduras
๐Ÿ‡ญ๐Ÿ‡บ Hungary
๐Ÿ‡ฎ๐Ÿ‡ธ Iceland
๐Ÿ‡ฎ๐Ÿ‡ท Iran
๐Ÿ‡ฎ๐Ÿ‡ถ Iraq
๐Ÿ‡ฎ๐Ÿ‡ช Ireland
๐Ÿ‡ฎ๐Ÿ‡ฒ Isle of Man
๐Ÿ‡ฎ๐Ÿ‡น Italy
๐Ÿ‡จ๐Ÿ‡ฎ Cote d'Ivoire
๐Ÿ‡ฏ๐Ÿ‡ฒ Jamaica
๐Ÿ‡ฏ๐Ÿ‡ช Jersey
๐Ÿ‡ฏ๐Ÿ‡ด Jordan
๐Ÿ‡ฝ๐Ÿ‡ฐ Kosovo
๐Ÿ‡ฝ๐Ÿ‡ฐ Kosovo
๐Ÿ‡ฐ๐Ÿ‡ฟ Kazakhstan
๐Ÿ‡ฐ๐Ÿ‡ช Kenya
๐Ÿ‡ฐ๐Ÿ‡ฎ Kiribati
๐Ÿ‡ฐ๐Ÿ‡ต North Korea
๐Ÿ‡ฐ๐Ÿ‡ท South Korea
๐Ÿด Kurdistan
๐Ÿ‡ฐ๐Ÿ‡ผ Kuwait
๐Ÿ‡ฐ๐Ÿ‡ฌ Kyrgyzstan
๐Ÿ‡ฑ๐Ÿ‡ฆ Laos
๐Ÿ‡ฑ๐Ÿ‡ป Latvia
๐Ÿ‡ฑ๐Ÿ‡ง Lebanon
๐Ÿ‡ฑ๐Ÿ‡ธ Lesotho
๐Ÿ‡ฑ๐Ÿ‡ท Liberia
๐Ÿ‡ฑ๐Ÿ‡พ Libya
๐Ÿ‡ฑ๐Ÿ‡ฎ Liechtenstein
๐Ÿ‡ฑ๐Ÿ‡น Lithuania
๐Ÿ‡ฑ๐Ÿ‡บ Luxembourg
๐Ÿ‡ฒ๐Ÿ‡ด Macau
๐Ÿ‡ฒ๐Ÿ‡ฐ North Macedonia
๐Ÿ‡ฒ๐Ÿ‡ฌ Madagascar
๐Ÿ‡ฒ๐Ÿ‡ผ Malawi
๐Ÿ‡ฒ๐Ÿ‡พ Malaysia
๐Ÿ‡ฒ๐Ÿ‡ป Maldives
๐Ÿ‡ฒ๐Ÿ‡ฑ Mali
๐Ÿ‡ฒ๐Ÿ‡น Malta
๐Ÿ‡ฒ๐Ÿ‡ญ Marshall Islands
๐Ÿ‡ฒ๐Ÿ‡ถ Martinique
๐Ÿ‡ฒ๐Ÿ‡ท Mauritania
๐Ÿ‡ฒ๐Ÿ‡บ Mauritius
๐Ÿ‡พ๐Ÿ‡น Mayotte
๐Ÿ‡ซ๐Ÿ‡ฒ Micronesia
๐Ÿ‡ฒ๐Ÿ‡ฉ Moldova
๐Ÿ‡ฒ๐Ÿ‡จ Monaco
๐Ÿ‡ฒ๐Ÿ‡ณ Mongolia
๐Ÿ‡ฒ๐Ÿ‡ช Montenegro
๐Ÿ‡ฒ๐Ÿ‡ธ Montserrat
๐Ÿ‡ฒ๐Ÿ‡ฆ Morocco
๐Ÿ‡ฒ๐Ÿ‡ฟ Mozambique
๐Ÿ‡ฒ๐Ÿ‡ฒ Myanmar
๐Ÿ‡ณ๐Ÿ‡ฆ Namibia
๐Ÿ‡ณ๐Ÿ‡ท Nauru
๐Ÿ‡ณ๐Ÿ‡ต Nepal
๐Ÿ‡ง๐Ÿ‡ถ Caribbean Netherlands
๐Ÿ‡ณ๐Ÿ‡จ New Caledonia
๐Ÿ‡ณ๐Ÿ‡ฎ Nicaragua
๐Ÿ‡ณ๐Ÿ‡ช Niger
๐Ÿ‡ณ๐Ÿ‡ฌ Nigeria
๐Ÿ‡ณ๐Ÿ‡บ Niue
๐Ÿ‡ณ๐Ÿ‡ซ Norfolk Island
๐Ÿ‡ฒ๐Ÿ‡ต Northern Mariana Islands
๐Ÿ‡ณ๐Ÿ‡ด Norway
๐Ÿ‡ด๐Ÿ‡ฒ Oman
๐Ÿ‡ต๐Ÿ‡ธ Palestine
๐Ÿ‡ต๐Ÿ‡ฐ Pakistan
๐Ÿ‡ต๐Ÿ‡ผ Palau
๐Ÿ‡ต๐Ÿ‡ฆ Panama
๐Ÿ‡ต๐Ÿ‡ฌ Papua New Guinea
๐Ÿ‡ต๐Ÿ‡พ Paraguay
๐Ÿ‡ต๐Ÿ‡ช Peru
๐Ÿ‡ต๐Ÿ‡ญ Philippines
๐Ÿ‡ต๐Ÿ‡ณ Pitcairn Island
๐Ÿ‡ต๐Ÿ‡ซ Polynesia
๐Ÿ‡ต๐Ÿ‡ท Puerto Rico
๐Ÿ‡ถ๐Ÿ‡ฆ Qatar
๐Ÿ‡ท๐Ÿ‡ช Reunion
๐Ÿ‡ท๐Ÿ‡ด Romania
๐Ÿ‡ท๐Ÿ‡ผ Rwanda
๐Ÿ‡ธ๐Ÿ‡ญ Saint Helena
๐Ÿ‡ฐ๐Ÿ‡ณ Saint Kitts and Nevis
๐Ÿ‡ฑ๐Ÿ‡จ Saint Lucia
๐Ÿ‡ต๐Ÿ‡ฒ Saint Pierre and Miquelon
๐Ÿ‡ป๐Ÿ‡จ Saint Vincent and the Grenadines
๐Ÿ‡ผ๐Ÿ‡ธ Samoa
๐Ÿ‡ธ๐Ÿ‡ฒ San Marino
๐Ÿ‡ธ๐Ÿ‡น Sao Tome and Principe
๐Ÿ‡ธ๐Ÿ‡ฆ Saudi Arabia
๐Ÿ‡ธ๐Ÿ‡ณ Senegal
๐Ÿ‡ท๐Ÿ‡ธ Serbia
๐Ÿ‡ธ๐Ÿ‡จ Seychelles
๐Ÿ‡ธ๐Ÿ‡ฑ Sierra Leone
๐Ÿ‡ฒ๐Ÿ‡ซ Saint-Martin
๐Ÿ‡ธ๐Ÿ‡ฝ Sint Maarten
๐Ÿ‡ธ๐Ÿ‡ฐ Slovakia
๐Ÿ‡ธ๐Ÿ‡ฎ Slovenia
๐Ÿ‡ธ๐Ÿ‡ง Solomon Islands
๐Ÿ‡ธ๐Ÿ‡ด Somalia
๐Ÿ‡ฟ๐Ÿ‡ฆ South Africa
๐Ÿ‡ฌ๐Ÿ‡ธ South Georgia and the South Sandwich Islands
๐Ÿ‡ธ๐Ÿ‡ธ South Sudan
๐Ÿ‡ฑ๐Ÿ‡ฐ Sri Lanka
๐Ÿ‡ธ๐Ÿ‡ฉ Sudan
๐Ÿ‡ธ๐Ÿ‡ท Suriname
๐Ÿ‡ธ๐Ÿ‡ฏ Svalbard and Jan Mayen Islands
๐Ÿ‡ธ๐Ÿ‡ฟ Swaziland
๐Ÿ‡จ๐Ÿ‡ญ Switzerland
๐Ÿ‡ธ๐Ÿ‡พ Syria
๐Ÿ‡น๐Ÿ‡ผ Taiwan
๐Ÿ‡น๐Ÿ‡ฏ Tajikistan
๐Ÿ‡น๐Ÿ‡ฟ Tanzania
๐Ÿ‡น๐Ÿ‡ฌ Togo
๐Ÿ‡น๐Ÿ‡ฐ Tokelau
๐Ÿ‡น๐Ÿ‡ด Tonga
๐Ÿ‡น๐Ÿ‡น Trinidad and Tobago
๐Ÿ‡น๐Ÿ‡ณ Tunisia
๐Ÿ‡น๐Ÿ‡ท Turkey
๐Ÿ‡น๐Ÿ‡ฒ Turkmenistan
๐Ÿ‡น๐Ÿ‡จ Turks and Caicos Islands
๐Ÿ‡น๐Ÿ‡ป Tuvalu
๐Ÿ‡บ๐Ÿ‡ฌ Uganda
๐Ÿ‡บ๐Ÿ‡พ Uruguay
๐Ÿ Hawaii
๐Ÿ‡บ๐Ÿ‡ฒ USA Minor Outlying Islands
๐Ÿ‡บ๐Ÿ‡ฟ Uzbekistan
๐Ÿ‡ป๐Ÿ‡บ Vanuatu
๐Ÿ‡ป๐Ÿ‡ฆ Vatican City
๐Ÿ‡ป๐Ÿ‡ช Venezuela
๐Ÿ‡ป๐Ÿ‡ณ Vietnam
๐Ÿ‡ป๐Ÿ‡ฌ British Virgin Islands
๐Ÿ‡ป๐Ÿ‡ฎ United States Virgin Islands
๐Ÿ‡ผ๐Ÿ‡ซ Wallis and Futuna Islands
๐Ÿ‡ช๐Ÿ‡ญ Western Sahara
๐Ÿ‡พ๐Ÿ‡ช Yemen
๐Ÿ‡ฟ๐Ÿ‡ฒ Zambia
๐Ÿ‡ฟ๐Ÿ‡ผ Zimbabwe
Apply for this job
๐Ÿ’ต Salary
๐ŸŽช Benefits
๐Ÿ‘ˆ Go back
๐Ÿค“ Engineer Remove this filter
๐Ÿ’ผ Executive Remove this filter
๐Ÿ‘ต Senior Remove this filter
๐Ÿค“ Developer Remove this filter
๐Ÿ’ฐ Finance Remove this filter
โ™พ๏ธ Sys Admin Remove this filter
closed

Rackspace

 This job is getting a high amount of applications right now (10% of viewers clicked Apply)

๐Ÿ‡บ๐Ÿ‡ธ United States
๐Ÿ’ฐ $70k - $120k*

Security

 

Analyst

 

System

Code

Travel

Mobile

Management

Lead

Operations

Linux

Rackspace

๐Ÿ‘€ 1,033 views

โœ… 104 applied (10%)

Share this job:
Get a rok.co short link

This job post is closed and the position is probably filled. Please do not apply. Work for Rackspace and want to re-open this job? Use the edit link in the email when you posted the job! ๐Ÿค– Closed by robot after apply link errored w/ code 404 1 year ago


Summary:\n\nPerform real-time monitoring and analysis of security events from multiple sources. Identify source or cause and provide recommendations for secure infrastructure through policy, practices, risk management, engineering, and improved operations. Responsible for adhering to company security policies and procedures and any other relevant policies and standards as directed.\nย \nCareer Level Summary:ย  \nยทย ย ย ย ย ย  Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines\nยทย ย ย ย ย ย  Solves complex problems\nยทย ย ย ย ย ย  Works independently, receives minimal guidance\nยทย ย ย ย ย ย  May lead projects or project steps within a broader project or may have accountability for on-going activities or objectives\nยทย ย ย ย ย ย  Acts as a resource for colleagues with less experience\nยทย ย ย ย ย ย  Level at which career may stabilize for many years or until retirement\nย \nCritical Competencies:\nยทย ย ย ย ย ย  Systems Thinking: Takes a whole systems approach to analyze issues and implements holistic solutions by ensuring that linkages between structure, people, process, and technology are made\nยทย ย ย ย ย ย  Idea Creation: Identifies new technologies, applications, and process changes to continually improve efficiency or technology performance\nย \nKey Responsibilities:\nยทย ย ย ย ย ย  Other Incidental tasks related to the job, as necessary.\nยทย ย ย ย ย ย  Monitor and analyze log files from a variety of sources, including but not limited to NIDS, HIDS, firewall logs, and system logs (Windows and Unix) to identify possible threats to network security\nยทย ย ย ย ย ย  Triage security events: assess the priority and determine risk\nยทย ย ย ย ย ย  Receive escalations of events from lower-level analysts\nยทย ย ย ย ย ย  Use the Cyber Kill Chain, current intelligence information, and investigative techniques to proactively review customers environments searching for anomalous behavior\nยทย ย ย ย ย ย  Identify, modify, and manipulate applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)\nยทย ย ย ย ย ย  Reconstruct cyber events, assess cyber threat and scope of impact, identify, and track any internal lateral or external movement, and develop response solutions\nยทย ย ย ย ย ย  Interact with security community to obtain technical cyber threat intelligence; track cyber threat actors/campaigns based on technical analysis and open source/third party intelligence\nยทย ย ย ย ย ย  Research and track new exploits and cyber threats; conduct cursory and/or in-depth computer forensic investigations (i.e., packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations\nยทย ย ย ย ย ย  Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering.\nยทย ย ย ย ย ย  Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs\nยทย ย ย ย ย ย  Work as a part of an Incident Response Team to investigate and remediate active threats while accurately documenting results using standard incident response techniques and the incident response process\nย \nKnowledge:\nยทย ย ย ย ย ย  Proficient knowledge of Cybersecurity principles, threats, and vulnerabilities\nยทย ย ย ย ย ย  Proficient knowledge of incident response methodologies\nยทย ย ย ย ย ย  Proficient knowledge of cyber investigative techniques\nยทย ย ย ย ย ย  Deep understanding and continued learning of current cyber threat trends\nยทย ย ย ย ย ย  Proficient knowledge of computer networking concepts and protocols, and network security methodologies\nยทย ย ย ย ย ย  Proficient knowledge of Proficient physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, Data storage)\nยทย ย ย ย ย ย  Proficient knowledge of defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).\nยทย ย ย ย ย ย  Proficient knowledge of virtualization and cloud-based Infrastructure (AWS, Azure, GCP)\nยทย ย ย ย ย ย  Proficient knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files\nยทย ย ย ย ย ย  Proficient knowledge of networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications\nยทย ย ย ย ย ย  Proficient knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA])\nยทย ย ย ย ย ย  Proficient knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)\nยทย ย ย ย ย ย  Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines\nยทย ย ย ย ย ย  Has knowledge of best practices and how own area integrates with others; is aware of the competition and the factors that differentiate them in the market\nย \nSkills\nยทย ย ย ย ย ย  Intermediate system administration, network, and operating system hardening techniques\nยทย ย ย ย ย ย  Proficient skills in hacking methodologies in Windows or Unix/Linux environment\nยทย ย ย ย ย ย  Proficient skills in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)\nยทย ย ย ย ย ย  Proficient skills in Security Information and Event Management tools - Searching, aggregating, and correlating data\nยทย ย ย ย ย ย  Demonstrated effective oral and written communication skills\nยทย ย ย ย ย ย  Demonstrated effective problem solving & analytical skills\nยทย ย ย ย ย ย  Team player, willing to work with others in sharing information to help increase overall team knowledge\nย \nEducation:\nRequired\nยทย ย ย ย ย ย  Bachelor's Degree in Computer Science, Management Information Systems, or a related technical field\nยทย ย ย ย ย ย  At the Manager's discretion, 4 years of additional related experience may substitute for the degree requirement; if substitution allowed, regional equivalent to High School Diploma is required.\nPreferred\nยทย ย ย ย ย ย  Degree focus on Cyber Security\nCertifications\nยทย ย ย ย ย ย  Sec+, GSEC, and Net+ certifications required\nยทย ย ย ย ย ย  Prefer completion of, or work toward, SANS GIAC/GCIA/GCIH/GCFA, etc. or other network/system security certifications\nย \nExperience\nยทย ย ย ย ย ย  5 - 7 years of experience in cyber security\nยทย ย ย ย ย ย  Experience analyzing host and network-based logged events (i.e. firewall, IPS/IDS, Windows, Web, proxy, and mail filtering)\nยทย ย ย ย ย ย  Experience in a Security Operations Center\nย \nPhysical Demands\nGeneral office environment: no special physical demands required. May require long periods of sitting and viewing a computer monitor. Schedule flexibility to include working weekends and/or evenings and holidays as required by the business for 24/7 operations. Must be able to lift 50 lbs over-head.ย ย ย ย ย ย ย ย  \nย \nTravel\nNo travel required\nย \nDisclaimer\nThe above information has been designed to indicate the general nature and level of work performed by employees in this classification. It is not designed to contain or to be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the employee assigned to this job.\n\nThe following information isย requiredย by the Colorado Equal Pay Transparency Actย and appliesย onlyย toย individuals working inย the state of Colorado.ย The anticipated starting payย rangeย ofย Colorado applicantsย forย this role isย $81,600 โ€“ 105,800. Actual compensation is influenced by a wide array of factors including but not limited to skill set, level of experience,ย licenses and certifications,ย and specific work location.ย Informationย on benefits offered isย here.\nย \n#LI-RD1, #LI-Remote\n\n\nAbout Rackspace Technology\nWe are the multicloud solutions experts. We combine our expertise with the worldโ€™s leading technologies โ€” across applications, data and security โ€” to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.\nย \nย \nMore on Rackspace Technology\nThough weโ€™re all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. \n\n#Salary and compensation\n No salary data published by company so we estimated salary based on similar jobs related to Cloud, Backend, Amazon, SaaS, Engineer, Software, Marketing, Sales, Education, Developer, Senior, Digital Nomad, Architect, Drupal, iOS, Mobile, Junior, Excel, Legal, Developer, Travel, Analyst, Accounting, Salesforce, API and Linux jobs that are similar:\n\n $70,000 — $120,000/year\n
\n\n#Benefits\n ๐Ÿ’ฐ 401(k)\n\n๐ŸŒŽ Distributed team\n\nโฐ Async\n\n๐Ÿค“ Vision insurance\n\n๐Ÿฆท Dental insurance\n\n๐Ÿš‘ Medical insurance\n\n๐Ÿ– Unlimited vacation\n\n๐Ÿ– Paid time off\n\n๐Ÿ“† 4 day workweek\n\n๐Ÿ’ฐ 401k matching\n\n๐Ÿ” Company retreats\n\n๐Ÿฌ Coworking budget\n\n๐Ÿ“š Learning budget\n\n๐Ÿ’ช Free gym membership\n\n๐Ÿง˜ Mental wellness budget\n\n๐Ÿ–ฅ Home office budget\n\n๐Ÿฅง Pay in crypto\n\n๐Ÿฅธ Pseudonymous\n\n๐Ÿ’ฐ Profit sharing\n\n๐Ÿ’ฐ Equity compensation\n\nโฌœ๏ธ No whiteboard interview\n\n๐Ÿ‘€ No monitoring system\n\n๐Ÿšซ No politics at work\n\n๐ŸŽ… We hire old (and young)\n\n
\n\n#Location\nUnited States - Remote
# How do you apply?\n\nThis job post has been closed by the poster, which means they probably have enough applicants now. Please do not apply.
164ms