Vulnerability Assessments Analyst - Red Team
Salary undisclosed
Apply on
Original
Simplified
Vulnerability Assessments Analyst - Red Team
Location: Ft Lauderdale, FL (3 days Onsite - Hybrid)
Duration: Through 10-APR-2025
Intake call notes:
Must Haves:
1-2 years' experience or equivalent knowledge and exposure are required with most of the following:
Regular Expressions
Scanning Tools
Data Mining Tools
Data Repositories (Confluence, Bit Bucket, GitHub, etc.)
Offensive security testing tools: Cobalt Strike, Red Team Toolkit, etc.
An understanding of OSI model
Security devices: Firewalls, VPN, AAA systems
OS Security: Unix/Linux, Windows, OSX
Understanding of common protocols: HTTP, LDAP, SMTP, DNS
Reporting information security vulnerabilities to the business
The Role:
The Vulnerability Assessments Analyst - Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and application reconnaissance looking for violations and observations and reporting those up for remediation.
These contractors are required to assist with a Tiger Team effort in response to a regulatory observation around sensitive data being stored by employees. The contractors will assist with discovery and remediation efforts. Additional Responsibilities Support Citis Red Team in Penetration testing reconnaissance of internal data repositories. Conduct searches of electronically stored data to extract relevant data efficiently. Prepare data for internal review and reporting. Reporting on identified findings. Work closely with data and control owners on remediation. Demonstratable knowledge of reconnaissance tools and regular expression to identify data. Conduct root cause analysis on issues and provide guidance on corrective actions leveraging risk and impact action. Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions. Assist in assessing risk when making business decisions.
Responsibilities
Support Citis Red Team in Penetration testing reconnaissance of internal data repositories.
Conduct searches of electronically stored data to extract relevant data efficiently.
Prepare data for internal review and reporting.
Reporting on identified findings.
Work closely with data and control owners on remediation.
Demonstratable knowledge of reconnaissance tools and regular expression to identify data.
Conduct root cause analysis on issues and provide guidance on corrective actions leveraging risk and impact action.
Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions.
Assist in assessing risk when making business decisions.
Qualifications
1-2 years experience or equivalent knowledge and exposure are required with most of the following:
Regular Expressions
Scanning Tools
Data Mining Tools
Data Repositories (Confluence, Bit Bucket, Github, etc)
Offensive security testing tools: Cobalt Strike, Red Team Toolkit, etc.
An understanding of OSI model
Security devices: Firewalls, VPN, AAA systems
OS Security: Unix/Linux, Windows, OSX
Understanding of common protocols: HTTP, LDAP, SMTP, DNS
Reporting information security vulnerabilities to the business
Education:
Bachelors degree/University degree or equivalent experience
Industry-accredited security certifications preferred but not required (e.g. PNPT, OSCP, GXPN, GPEN, GCIH, GWAPT, GCFA)
This job description provides a high-level review of the types of work performed. Other job-related duties may be assigned as required.
Pay Range: $70 - $75/hour on W2
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
Location: Ft Lauderdale, FL (3 days Onsite - Hybrid)
Duration: Through 10-APR-2025
Intake call notes:
Must Haves:
1-2 years' experience or equivalent knowledge and exposure are required with most of the following:
Regular Expressions
Scanning Tools
Data Mining Tools
Data Repositories (Confluence, Bit Bucket, GitHub, etc.)
Offensive security testing tools: Cobalt Strike, Red Team Toolkit, etc.
An understanding of OSI model
Security devices: Firewalls, VPN, AAA systems
OS Security: Unix/Linux, Windows, OSX
Understanding of common protocols: HTTP, LDAP, SMTP, DNS
Reporting information security vulnerabilities to the business
The Role:
The Vulnerability Assessments Analyst - Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and application reconnaissance looking for violations and observations and reporting those up for remediation.
These contractors are required to assist with a Tiger Team effort in response to a regulatory observation around sensitive data being stored by employees. The contractors will assist with discovery and remediation efforts. Additional Responsibilities Support Citis Red Team in Penetration testing reconnaissance of internal data repositories. Conduct searches of electronically stored data to extract relevant data efficiently. Prepare data for internal review and reporting. Reporting on identified findings. Work closely with data and control owners on remediation. Demonstratable knowledge of reconnaissance tools and regular expression to identify data. Conduct root cause analysis on issues and provide guidance on corrective actions leveraging risk and impact action. Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions. Assist in assessing risk when making business decisions.
Responsibilities
Support Citis Red Team in Penetration testing reconnaissance of internal data repositories.
Conduct searches of electronically stored data to extract relevant data efficiently.
Prepare data for internal review and reporting.
Reporting on identified findings.
Work closely with data and control owners on remediation.
Demonstratable knowledge of reconnaissance tools and regular expression to identify data.
Conduct root cause analysis on issues and provide guidance on corrective actions leveraging risk and impact action.
Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions.
Assist in assessing risk when making business decisions.
Qualifications
1-2 years experience or equivalent knowledge and exposure are required with most of the following:
Regular Expressions
Scanning Tools
Data Mining Tools
Data Repositories (Confluence, Bit Bucket, Github, etc)
Offensive security testing tools: Cobalt Strike, Red Team Toolkit, etc.
An understanding of OSI model
Security devices: Firewalls, VPN, AAA systems
OS Security: Unix/Linux, Windows, OSX
Understanding of common protocols: HTTP, LDAP, SMTP, DNS
Reporting information security vulnerabilities to the business
Education:
Bachelors degree/University degree or equivalent experience
Industry-accredited security certifications preferred but not required (e.g. PNPT, OSCP, GXPN, GPEN, GCIH, GWAPT, GCFA)
This job description provides a high-level review of the types of work performed. Other job-related duties may be assigned as required.
Pay Range: $70 - $75/hour on W2
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job Similar Jobs