FIRST - Is this you?
Are you a proactive, analytical problem solver?
Do you communicate in a factual, informative, and direct manner?
Do you do something with 100% commitment or not at all?
Does your managing style help ensure your team is firing on all cylinders?
If so, GREAT! Now check to see that you have the technical aptitude for this job below.
The job, the salary, the benefits.
Garland Heart Info Security is looking for a confident, self-starter who can manage multiple clients and complete detailed audit requirements in a timely fashion. Your main role will be conducting information security audits and technical security reviews. Your experience and willingness to learn will dictate how fast and how far you can go in this position. We need someone that can "talk tech" in layman terms to an audience.
Job requirements include:
Conducting information security audits based on GLBA, FFIEC and COBIT guidelines.
Performing Social Engineering reviews including dumpster diving.
Conducting Internal Vulnerability Assessments and Penetration Testing using industry tools
Traveling up to 80%. Travel is usually Monday through Thursday up to twice a month. Some months require more traveling, some months require less traveling.
Once earned, enjoy very flexible hours in a results-oriented work environment.
Salary range is $35k-$50K, based off fit and experience.
Performance Driven Company
Company Profit Share
Cert Bonuses, up to $4.5K annually
Ability to Work Remotely
New Apple Gear at hire!
Travel Per Diem
Medical, Dental, and Vision Benefits
Life Insurance Options
401K + Company Match
Smart and effective communication
The following skills are preferred but not required:
Experience with technology and cybersecurity in a variety of environments
Experience with OSINT
Experience with penetration testing tools
Make the complicated subject easy to understand to the novice
Experience in the FFIEC, GLBA, SOC, ISO or COBIT guidance a plus
Linux and vmWare or virtualization usage
Certifications that could help ease your transition include but are not limited too:
CISSP/GSEC (or equivalent)
CEH/GPEN (or equivalent)