Mindlance
Vulnerability Assessments Analyst
Mindlance, Fort Lauderdale, Florida, us, 33336
Title:
Vulnerability Assessments AnalystDuration:
6 Months - Long TermLocation : Ft Lauderdale, FL 33394
Hybrid Onsite: 3 Days onsite per week from Day1
The Role:Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be
performing internal network and application reconnaissance
Looking for
violations and observations and reporting those up for remediation . These contractors are required to assist with a Tiger Team effort in response to
a regulatory observation around sensitive data being stored by employees. The contractors will assist with discovery and remediation efforts.
Additional Responsibilities:
Support Red Team in
Penetration testing reconnaissance of internal data repositories .Conduct searches of electronically stored data to extract relevant data efficiently.Prepare data for internal review and reporting.Reporting on identified findings.Work closely with data and control owners on remediation.Demonstratable knowledge of reconnaissance tools and regular expression to identify data.Conduct root cause analysis on issues and provide guidance on corrective actions leveraging risk and impact action.Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions.Assist in assessing risk when making business decisions.
Qualifications:1-2 years' experience or equivalent knowledge and exposure are required with most of the following:
Regular ExpressionsScanning ToolsData Mining ToolsData Repositories (Confluence, Bit Bucket, Github, etc)Offensive security testing tools: Cobalt Strike, Red Team Toolkit, etc.An understanding of OSI modelSecurity devices: Firewalls, VPN, systemsOS Security: Unix/Linux, Windows, OSXUnderstanding of common protocols: HTTP, LDAP, SMTP, DNSReporting information security vulnerabilities to the business
Education:
Bachelor's degree/University degree or equivalent experience.
Certifications:
Industry-accredited security certifications preferred but not required (e.g. PNPT, OSCP, GXPN, GPEN, GCIH, GWAPT, GCFA)
Vulnerability Assessments AnalystDuration:
6 Months - Long TermLocation : Ft Lauderdale, FL 33394
Hybrid Onsite: 3 Days onsite per week from Day1
The Role:Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be
performing internal network and application reconnaissance
Looking for
violations and observations and reporting those up for remediation . These contractors are required to assist with a Tiger Team effort in response to
a regulatory observation around sensitive data being stored by employees. The contractors will assist with discovery and remediation efforts.
Additional Responsibilities:
Support Red Team in
Penetration testing reconnaissance of internal data repositories .Conduct searches of electronically stored data to extract relevant data efficiently.Prepare data for internal review and reporting.Reporting on identified findings.Work closely with data and control owners on remediation.Demonstratable knowledge of reconnaissance tools and regular expression to identify data.Conduct root cause analysis on issues and provide guidance on corrective actions leveraging risk and impact action.Reduce risk by analyzing the root cause of issues, their impact, and required corrective actions.Assist in assessing risk when making business decisions.
Qualifications:1-2 years' experience or equivalent knowledge and exposure are required with most of the following:
Regular ExpressionsScanning ToolsData Mining ToolsData Repositories (Confluence, Bit Bucket, Github, etc)Offensive security testing tools: Cobalt Strike, Red Team Toolkit, etc.An understanding of OSI modelSecurity devices: Firewalls, VPN, systemsOS Security: Unix/Linux, Windows, OSXUnderstanding of common protocols: HTTP, LDAP, SMTP, DNSReporting information security vulnerabilities to the business
Education:
Bachelor's degree/University degree or equivalent experience.
Certifications:
Industry-accredited security certifications preferred but not required (e.g. PNPT, OSCP, GXPN, GPEN, GCIH, GWAPT, GCFA)