This job post is closed and the position is probably filled. Please do not apply. Work for Rackspace and want to re-open this job? Use the edit link in the email when you posted the job!
๐ค Closed by robot after apply link errored w/ code 404 1 year ago
Rackers:ย Valued members of a winning team Our employees, affectionately called โRackers,โ are our true strength and differentiator. As valued members of a winning team on an inspiring mission, Rackers make a real difference for our customers. Itโs why weโre frequently recognized as an employer of choice by global industry-leading programs, including Great Place to Work, Forbes and Fortune.ย They embody our Core Values, demonstrating that Fanatical Experience is:\nย \nยทย ย ย ย ย ย ย ย ย Excellence. We are an accountable, disciplined, high-performing company with proven results.\nยทย ย ย ย ย ย ย ย ย Customer-driven. We are proactive, collaborative and committed to success for our customers.\nยทย ย ย ย ย ย ย ย ย Expertise. Rackers are passionate learners who are embedded in our customersโ businesses to provide unbiased solutions.\nยทย ย ย ย ย ย ย ย ย Agility. We adopt new technologies and evolve services to meet customers where they are in their journey.\nยทย ย ย ย ย ย ย ย ย Compassion. Weโre one team doing the right thing for our customers, communities, and each other.\nย \nPosition Overview: As our Cyber Vulnerability Analyst & Penetration Tester II you will be part of a fanatical cyber security team where youโll contribute to building and delivering services, solutions and processes that enable security defects to found, fixed or avoided before applications are released to production.ย \nย \nWork Location:ย Work may be performed remotely from any of the 48 continental United States.\nย \nKey Duties and Responsibilities:\nยทย ย ย ย ย ย Tracks public and privately released vulnerabilities and assists in the corporate triage process including identification, criticality evaluation, remediation planning, communications, and resolution. \nยทย ย ย ย ย ย Conducts vulnerability assessment scans, assisting with penetration testing, exposing security vulnerabilities and risks, and recommending solutions to mitigate such vulnerabilities.\nยทย ย ย ย ย ย Provides significant contributions to black box testing, source code analysis, manual pen testing, and training. \nยทย ย ย ย ย ย Schedules and executes vulnerability/ penetration testing. \nยทย ย ย ย ย ย Leads limited (in scope or complexity) engagements and provides end-to-end planning and execution for those engagements. \nยทย ย ย ย ย ย Reports out on vulnerability and penetration testing and works with business units to develop remediation plans. \nยทย ย ย ย ย ย Works closely with the Risk Management, ISOC and Intel teams. \nยทย ย ย ย ย ย Keeps up with the changing nature of security threats. \nยทย ย ย ย ย ย Assesses the risk from not only a tactical perspective but also a strategic/global scale and apply these findings to aid in prioritizing remediation efforts. \nยทย ย ย ย ย ย Interacts with business units to discover, triage and resolve security vulnerabilities with manual and automated tools to enforce security criteria as part of a Secure Development Life Cycle on a continuous basis. \nยทย ย ย ย ย ย Researches and investigates new and emerging vulnerabilities and participate in external security communities.\nย \nRequired Knowledge, Skills, and Abilities:ย ย \nยทย ย ย ย ย ย Experience executing, ethical hacking and penetration testing. \nยทย ย ย ย ย ย Significant knowledge regarding security vulnerabilities, application analysis, and protocol analysis. \nยทย ย ย ย ย ย Knowledge of and practiced experience with penetration testing and ethical hacking products. \nยทย ย ย ย ย ย Knowledge of and ability to manage vulnerability scans against a range of assets.\nยทย ย ย ย ย ย Experience devising methods to automate testing activities and streamline testing processes.\nยทย ย ย ย ย ย Practical experience with Linux and Windows operating systems. \nยทย ย ย ย ย ย Familiarity with common programming or scripting languages. \nยทย ย ย ย ย ย Ability to interpret and prioritize vulnerability scan results into remediation actions and tracking those actions through to completion. \nยทย ย ย ย ย ย Practiced knowledge performing vulnerability assessments against servers, workstations, web applications and other components. \nยทย ย ย ย ย ย Knowledge regarding security vulnerabilities, application analysis and protocol analysis.\nยทย ย ย ย ย ย Knowledge of methods for on-going evaluation of the effectiveness and applicability of information security controls (e.g., vulnerability testing, and assessment tools). \nยทย ย ย ย ย ย Ability to understand information security risks associated with vulnerability and penetration testing. \nยทย ย ย ย ย ย Knowledge of patching programs of major hardware/software manufacturers. \nยทย ย ย ย ย ย Knowledge of secure configuration and hardening of systems. \nยทย ย ย ย ย ย Ability to analyze vulnerabilities to appropriately characterize threats and provide remediation advice. \nยทย ย ย ย ย ย Familiarity with classes of vulnerabilities, appropriate remediation, and industry-standard classification schemes (CVE, CVSS, CPE).\nยทย ย ย ย ย ย Experience applying ethical hacker techniques, phishing schemes, emerging logical security threats, and compromised server techniques\nย \nExperience/Education/Certifications:\nยทย ย ย ย ย ย Requires 4 years of similar job related experience ย \nยทย ย ย ย ย ย Bachelorโs degree in Computer Science or related field required. At the managerโs discretion, additional relevant experience may substitute for the degree requirement. High school diploma or equivalent required\nยทย ย ย ย ย ย Current CEH, GPEN, CISSP, and GCIA certifications preferred\nย \n\n\nPay and Benefits: The following information isย requiredย by theโฏColorado Equal Pay Transparency Actย and appliesย onlyย toย individuals working inย the state of Colorado.ย The anticipated starting payย rangeย ofย Colorado applicantsย forย this role is $88,600- $114,800.ย ย Actual compensation is influenced by a wide array of factors including but not limited to skill set, level of experience,ย licenses and certifications,ย and specific work location.ย Informationย on benefits offered isย here.\n\n#LI-MF1 #LI-Remote\n\n\nAbout Rackspace Technology\nWe are the multicloud solutions experts. We combine our expertise with the worldโs leading technologies โ across applications, data and security โ to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.\nย \nย \nMore on Rackspace Technology\nThough weโre all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. \n\n#Salary and compensation\n
No salary data published by company so we estimated salary based on similar jobs related to Consulting, Analyst, Engineer, Embedded, Testing and Linux jobs that are similar:\n\n
$67,500 — $117,500/year\n
\n\n#Benefits\n
๐ฐ 401(k)\n\n๐ Distributed team\n\nโฐ Async\n\n๐ค Vision insurance\n\n๐ฆท Dental insurance\n\n๐ Medical insurance\n\n๐ Unlimited vacation\n\n๐ Paid time off\n\n๐ 4 day workweek\n\n๐ฐ 401k matching\n\n๐ Company retreats\n\n๐ฌ Coworking budget\n\n๐ Learning budget\n\n๐ช Free gym membership\n\n๐ง Mental wellness budget\n\n๐ฅ Home office budget\n\n๐ฅง Pay in crypto\n\n๐ฅธ Pseudonymous\n\n๐ฐ Profit sharing\n\n๐ฐ Equity compensation\n\nโฌ๏ธ No whiteboard interview\n\n๐ No monitoring system\n\n๐ซ No politics at work\n\n๐ We hire old (and young)\n\n
\n\n#Location\nUnited States - Remote
# How do you apply?\n\nThis job post has been closed by the poster, which means they probably have enough applicants now. Please do not apply.