This job post is closed and the position is probably filled. Please do not apply. Work for Rackspace and want to re-open this job? Use the edit link in the email when you posted the job!
๐ค Closed by robot after apply link errored w/ code 404 1 year ago
Summary:\n\nPerform real-time monitoring and analysis of security events from multiple sources. Identify source or cause and provide recommendations for secure infrastructure through policy, practices, risk management, engineering, and improved operations. Responsible for adhering to company security policies and procedures and any other relevant policies and standards as directed.\nย \nCareer Level Summary:ย \nยทย ย ย ย ย ย Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines\nยทย ย ย ย ย ย Solves complex problems\nยทย ย ย ย ย ย Works independently, receives minimal guidance\nยทย ย ย ย ย ย May lead projects or project steps within a broader project or may have accountability for on-going activities or objectives\nยทย ย ย ย ย ย Acts as a resource for colleagues with less experience\nยทย ย ย ย ย ย Level at which career may stabilize for many years or until retirement\nย \nCritical Competencies:\nยทย ย ย ย ย ย Systems Thinking: Takes a whole systems approach to analyze issues and implements holistic solutions by ensuring that linkages between structure, people, process, and technology are made\nยทย ย ย ย ย ย Idea Creation: Identifies new technologies, applications, and process changes to continually improve efficiency or technology performance\nย \nKey Responsibilities:\nยทย ย ย ย ย ย Other Incidental tasks related to the job, as necessary.\nยทย ย ย ย ย ย Monitor and analyze log files from a variety of sources, including but not limited to NIDS, HIDS, firewall logs, and system logs (Windows and Unix) to identify possible threats to network security\nยทย ย ย ย ย ย Triage security events: assess the priority and determine risk\nยทย ย ย ย ย ย Receive escalations of events from lower-level analysts\nยทย ย ย ย ย ย Use the Cyber Kill Chain, current intelligence information, and investigative techniques to proactively review customers environments searching for anomalous behavior\nยทย ย ย ย ย ย Identify, modify, and manipulate applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)\nยทย ย ย ย ย ย Reconstruct cyber events, assess cyber threat and scope of impact, identify, and track any internal lateral or external movement, and develop response solutions\nยทย ย ย ย ย ย Interact with security community to obtain technical cyber threat intelligence; track cyber threat actors/campaigns based on technical analysis and open source/third party intelligence\nยทย ย ย ย ย ย Research and track new exploits and cyber threats; conduct cursory and/or in-depth computer forensic investigations (i.e., packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations\nยทย ย ย ย ย ย Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering.\nยทย ย ย ย ย ย Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs\nยทย ย ย ย ย ย Work as a part of an Incident Response Team to investigate and remediate active threats while accurately documenting results using standard incident response techniques and the incident response process\nย \nKnowledge:\nยทย ย ย ย ย ย Proficient knowledge of Cybersecurity principles, threats, and vulnerabilities\nยทย ย ย ย ย ย Proficient knowledge of incident response methodologies\nยทย ย ย ย ย ย Proficient knowledge of cyber investigative techniques\nยทย ย ย ย ย ย Deep understanding and continued learning of current cyber threat trends\nยทย ย ย ย ย ย Proficient knowledge of computer networking concepts and protocols, and network security methodologies\nยทย ย ย ย ย ย Proficient knowledge of Proficient physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, Data storage)\nยทย ย ย ย ย ย Proficient knowledge of defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).\nยทย ย ย ย ย ย Proficient knowledge of virtualization and cloud-based Infrastructure (AWS, Azure, GCP)\nยทย ย ย ย ย ย Proficient knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files\nยทย ย ย ย ย ย Proficient knowledge of networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications\nยทย ย ย ย ย ย Proficient knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA])\nยทย ย ย ย ย ย Proficient knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)\nยทย ย ย ย ย ย Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines\nยทย ย ย ย ย ย Has knowledge of best practices and how own area integrates with others; is aware of the competition and the factors that differentiate them in the market\nย \nSkills\nยทย ย ย ย ย ย Intermediate system administration, network, and operating system hardening techniques\nยทย ย ย ย ย ย Proficient skills in hacking methodologies in Windows or Unix/Linux environment\nยทย ย ย ย ย ย Proficient skills in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)\nยทย ย ย ย ย ย Proficient skills in Security Information and Event Management tools - Searching, aggregating, and correlating data\nยทย ย ย ย ย ย Demonstrated effective oral and written communication skills\nยทย ย ย ย ย ย Demonstrated effective problem solving & analytical skills\nยทย ย ย ย ย ย Team player, willing to work with others in sharing information to help increase overall team knowledge\nย \nEducation:\nRequired\nยทย ย ย ย ย ย Bachelor's Degree in Computer Science, Management Information Systems, or a related technical field\nยทย ย ย ย ย ย At the Manager's discretion, 4 years of additional related experience may substitute for the degree requirement; if substitution allowed, regional equivalent to High School Diploma is required.\nPreferred\nยทย ย ย ย ย ย Degree focus on Cyber Security\nCertifications\nยทย ย ย ย ย ย Sec+, GSEC, and Net+ certifications required\nยทย ย ย ย ย ย Prefer completion of, or work toward, SANS GIAC/GCIA/GCIH/GCFA, etc. or other network/system security certifications\nย \nExperience\nยทย ย ย ย ย ย 5 - 7 years of experience in cyber security\nยทย ย ย ย ย ย Experience analyzing host and network-based logged events (i.e. firewall, IPS/IDS, Windows, Web, proxy, and mail filtering)\nยทย ย ย ย ย ย Experience in a Security Operations Center\nย \nPhysical Demands\nGeneral office environment: no special physical demands required. May require long periods of sitting and viewing a computer monitor. Schedule flexibility to include working weekends and/or evenings and holidays as required by the business for 24/7 operations. Must be able to lift 50 lbs over-head.ย ย ย ย ย ย ย ย \nย \nTravel\nNo travel required\nย \nDisclaimer\nThe above information has been designed to indicate the general nature and level of work performed by employees in this classification. It is not designed to contain or to be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the employee assigned to this job.\n\nThe following information isย requiredย by the Colorado Equal Pay Transparency Actย and appliesย onlyย toย individuals working inย the state of Colorado.ย The anticipated starting payย rangeย ofย Colorado applicantsย forย this role isย $81,600 โ 105,800. Actual compensation is influenced by a wide array of factors including but not limited to skill set, level of experience,ย licenses and certifications,ย and specific work location.ย Informationย on benefits offered isย here.\nย \n#LI-RD1, #LI-Remote\n\n\nAbout Rackspace Technology\nWe are the multicloud solutions experts. We combine our expertise with the worldโs leading technologies โ across applications, data and security โ to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.\nย \nย \nMore on Rackspace Technology\nThough weโre all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. \n\n#Salary and compensation\n
No salary data published by company so we estimated salary based on similar jobs related to Cloud, Backend, Amazon, SaaS, Engineer, Software, Marketing, Sales, Education, Developer, Senior, Digital Nomad, Architect, Drupal, iOS, Mobile, Junior, Excel, Legal, Developer, Travel, Analyst, Accounting, Salesforce, API and Linux jobs that are similar:\n\n
$70,000 — $120,000/year\n
\n\n#Benefits\n
๐ฐ 401(k)\n\n๐ Distributed team\n\nโฐ Async\n\n๐ค Vision insurance\n\n๐ฆท Dental insurance\n\n๐ Medical insurance\n\n๐ Unlimited vacation\n\n๐ Paid time off\n\n๐ 4 day workweek\n\n๐ฐ 401k matching\n\n๐ Company retreats\n\n๐ฌ Coworking budget\n\n๐ Learning budget\n\n๐ช Free gym membership\n\n๐ง Mental wellness budget\n\n๐ฅ Home office budget\n\n๐ฅง Pay in crypto\n\n๐ฅธ Pseudonymous\n\n๐ฐ Profit sharing\n\n๐ฐ Equity compensation\n\nโฌ๏ธ No whiteboard interview\n\n๐ No monitoring system\n\n๐ซ No politics at work\n\n๐ We hire old (and young)\n\n
\n\n#Location\nUnited States - Remote
# How do you apply?\n\nThis job post has been closed by the poster, which means they probably have enough applicants now. Please do not apply.