Security Analyst

This position is open as of 12/21/2015.

Security Analyst – Pentesting

If you are a Security Analyst – Pentesting with experience, please read on!

Top Reasons to Work with Us

1. Largest home furnishing store in North America
2. The office in KS is located near the Kansas Speedway and Sporting Park
3. Room for Growth with a company that has been around for over 70 years!

What You Will Be Doing

Pentesting Requirement Skills:

2 years’ experience minimum working with Kali Linux, Metasploit, Nessus.
Phishing assessment
Vulnerability scanning
Penetration of systems
Incident response development
Windows assessment

What You Need for this Position

At Least 1 Year of experience and knowledge of:

– Understand scripting in Python and/or Bash
– NESSUS
– Metasploit
– kali linux
– CISSP

What’s In It for You

Great Compensation Annual Salary with Benefits!
Located in the great city of Kansas City, KS!

So, if you are a Security Analyst – Pentesting with experience, please apply today!


Required Skills


Understand scripting in Python and/or Bash, NESSUS, Metasploit, kali linux, CISSP

If you are a good fit for the Security Analyst – Pentesting position, and have a background that includes:

Understand scripting in Python and/or Bash, NESSUS, Metasploit, kali linux, CISSP and you are interested in working the following job types:

Information Technology, Engineering, Professional Services

Within the following industries:

Securities, Banking – Financial Services, Biotechnology

Our privacy policy: Your resume and information will be kept completely confidential.

Looking forward to receiving your resume through our website and going over the job in more detail with you!


CyberCoders, Inc is proud to be an Equal Opportunity Employer

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.

Your Right to Work – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.

Penetration Testing

Penetration testing, also called pentesting, is an attack method which scans for broad vulnerabilities in networked computers. It is primarily used in professional settings in order to ascertain the status of security in a machine.

In 1965, one of the first computer conferences was held. Participants shared information about their systems and it was revealed that basic security measures had been somewhat easily undermined on System Development Corporation’s AN/FSQ-32. SDC was a government contractor developing computer infrastructure alongside other vendors of the day, including IBM and Bell. Thus was born the first request for security auditing and penetration testing or, as they put it, “studies to be conducted in such areas as breaking security protection in the time-shared system,” as described in US Government Computer Penetration Programs and the Implications for Cyberwar by Edward Hunt.

At the time, the risk of people at home or around the world simply breaking into systems was low, and computers were not relied on for the same level of data as they are now. Even thirty years later, in 1995, computer reliance was minimal. It’s only in the two decades since that the inverse has become true, and computers are relied on for more important data whereas analog methods of data storage and retrieval are used less frequently.

Nevertheless, only two years later, in 1967, government officials began to better understand the need for tight network security. In the 70s, organized teams of penetration testers called “Tiger Teams.” The teams were overwhelmingly successful, but their ultimate purpose was to find better ways to lock time sharing computer systems down.

An early leader in computer security was James P. Anderson, who had worked for the NSA as well as various IT firms. In 1971, his company was hired to probe the defenses of the computer system at the Pentagon. He later outlined what is perhaps the first known penetration testing routine:

  1. Find an exploitable vulnerability.
  2. Design an attack around it.
  3. Test the attack.
  4. Seize a line in use.
  5. Enter the attack.
  6. Exploit the entry for information recovery.

Modern security consultants can go out for the Information Assurance Certification Review Board’s Certified Penetration Tester (CPT) certificate. The exam involves both a multiple choice questionnaire and a practical implementation test in which the candidate must pentest a virtual server.

For an individual to take the test at one of IACRB’s facilities costs $499 as of December, 2015, although it is less expensive for vouchers provided by employers.

See our List of Security Auditing Firms.

See our List of Pentest Tools.

French Runoff Elections Test Power of Marine Le Pen’s National Front

The party achieved a breakthrough last week by taking the lead in the first round of the vote.

You’ve hit your limit of 5 free articles this month.
Try our subscription options:

Print & Digital 3 Months
Weekly home delivery with free shipping, access to Newsweek’s web site, and the complete online archive
Digital 3 Months
Access to Newsweek’s web site, and the complete online archive