You are using the web browser we don't support. Please upgrade or use a different browser to improve your experience.
"icon arrow top"

Info Security Analyst (Penetration Tester) – Mid level New




Universal City, United States

United States

Business Operations and Analytics




Not specified

Permanent | Full Time

Purpose of Job We are currently seeking a talented Info Security Analyst (Penetration Tester) – Mid level for our San Antonio, TX or 100% remote work environment location(s).

Investigates, analyzes, and responds to security anomalies and events (e.g. suspicious behavior, attacks, and security breaches) within USAA’s environments using a variety of cyber defense tools to detect and respond to threats. Conducts vulnerability, security configuration, and/or penetration testing assessments of systems and networks. Identifies cyber threats, analyzes operational impacts and communicates to appropriate stakeholders. Stays current with latest information security threats, exploits, trends, and intelligence.

We are seeking a talented Penetration Tester –Mid level to join our Application and Infrastructure Penetration Testing team. The team is responsible for penetration testing to evaluate the security posture of USAA applications and infrastructure.

As a Penetration Tester, you will: Perform manual network, cloud, infrastructure, web application, and mobile application penetration testing to identify vulnerabilities. Effectively communicate findings and recommendations to technical and business stakeholders. Assist in remediation strategies to mitigate identified vulnerabilities.

Job Requirements
USAA knows what it means to serve. We facilitate the financial security of millions of U.S. military members and their families. This singular mission requires a dedication to innovative thinking at every level.

USAA Information Technology: A Realistic Preview
USAA Careers – World Class Benefits

Researches and analyzes the latest information security vulnerabilities, threats, exploits, trends and intelligence.
Conducts routine vulnerability management, security configuration assessments, and/or penetration testing operations and manages the resulting findings.
Monitors internal and external networks, systems, and applications for security anomalies and events (e.g. suspicious behavior, attacks, and security breaches).
Responds to cyber incidents, performing detailed analysis using complex security tools to determine root cause. Must use a broad range of demonstrated experience (e.g. forensics, networking, servers, coding, etc.) to determine a malicious actor's tactics, techniques and procedures.
Uses the discoveries from the incident response process to make moderately complex improvements to the existing detection capabilities and security controls.
Prepares written briefs with recommendations to leadership on latest threats, alerts, and incidents.
Work is completed independently. Serves as a resource to team members on escalated issues of an unusual nature.
Identifies and manages existing and emerging risks that stem from business activities and ensures risks associated with business activities are effectively identified, measured, monitored, and controlled.
Follows written risk and compliance policies and procedures for business activities.

Bachelor's degree in related field of study, OR 4 additional years of related experience beyond the minimum required.
4 or more years of related experience in Information Security, Cybersecurity and/or Information Technology to include accountability for complex tasks and/or projects.
2 or more years of related experience in Incident Response, Information Assurance, Forensics and/or Cyber Intelligence
Proficient level of business acumen in the areas of business operations, risk management, industry practices and emerging trends.

Experience in executing penetration tests against network infrastructure, web applications, mobile applications, APIs, OR various cloud technologies (AWS, Azure, GCP)
Experience finding OWASP Top 10 Vulnerabilities during Penetration Testing
Familiarity with Cloud security including the review of cloud configurations and exploiting common cloud specific weaknesses.
Experience with BURP Suite and / or Metasploit
Possess one or more of the relevant certifications (OSCP, OSCE, OSWE, GPEN, GWAPT, GMOB, CISSP)
Ability to communicate highly technical aspects to business, technical stakeholders, and developers

The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.

USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market position. The salary range for this position is: $88,200 - $158,900 *(this does not include geographic differential it may be applied based on your work location). Employees may be eligible for pay incentives based on overall corporate and individual performance or at the discretion of the USAA Board of Directors.

  • Geographical Differential: Geographic pay differential is additional pay provided to eligible employees working in locations where market pay levels are above the national average.
Shift Premium will be addressed on an individual-basis for applicable roles that are consistently scheduled for non-core hours.

At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. Please visit USAA Total Rewards for more details.

Relocation assistance is not available for this position.

Loading please wait...