Cyber Security Analyst II (RapidScale) at Information Technology Senior Management Forum
Raleigh, North Carolina, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Dec, 25

Salary

0.0

Posted On

05 Sep, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Aws, Internal Controls, Information Technology, Documentation, Cisa, Endpoint Protection, Microsoft, Iso, Cissp, Risk Frameworks, Continuous Improvement, Platforms, Hipaa, Security+, Readiness, Confidentiality, Teams

Industry

Information Technology/IT

Description

Posted Date
9/03/2025
Description
At RapidScale, exceptional technology is powered by exceptional people. As a growing leader in secure, reliable managed cloud solutions, we help mid-market through enterprise organizations simplify IT and unleash innovation. With a broad portfolio spanning AWS, Azure, and Google, as well as a full suite of Private Cloud and Cybersecurity solutions, RapidScale enables companies to turn technology into their greatest competitive advantage. Backed by the strength of the Cox family of companies, we offer best-in-class benefits, a commitment to work-life balance, and an award-winning workplace experience.
We are committed to protecting our systems, data, and customers with vigilance and integrity. We are looking for a Cybersecurity Analyst II to support and enhance our security operations across cloud and IT environments. This role is responsible for performing technical assessments, supporting secure system deployments, analyzing vulnerabilities, and contributing to the development and implementation of cybersecurity policies and procedures.

REQUIRED SKILLS & COMPETENCIES

  • Accuracy & Attention to Detail: Ensures precision in documentation and analysis.
  • Confidentiality: Applies data protection policies consistently and appropriately.
  • Customer Focus: Understands and responds to customer needs effectively.
  • Internal Controls: Supports compliance and audit readiness.
  • Technology Savvy: Leverages technology to solve problems and improve outcomes.
  • Acts with Integrity: Upholds ethical standards and transparency.
  • Collaborates with Intent: Works effectively across teams and shares knowledge.
  • Engages Others: Values diverse perspectives and empathetic communication.
  • Focuses on Execution: Drives toward results and continuous improvement.
  • Pursues & Applies Learning: Eager to grow and apply new knowledge.

QUALIFICATIONS

  • Bachelor’s degree in Cybersecurity, Information Technology, or related field preferred.
  • Relevant certifications (e.g., CompTIA Security+, CISSP, CEH) are a plus.
  • 3–5+ years of experience in cybersecurity, risk management, or a related technical security role.
  • Strong understanding of cybersecurity principles, risk frameworks, and technical controls (e.g., encryption, IAM, logging/monitoring, endpoint protection).
  • Familiarity with regulatory and security standards such as NIST CSF, ISO 27001, SOC 2, HIPAA, or PCI-DSS.
  • Hands-on experience or advisory exposure to cloud platforms (Azure, AWS, Microsoft 365).
  • Proficiency in documenting security findings, creating risk reports, and supporting audits.

PREFERRED QUALIFICATIONS:

  • Security certification(s) such as Security+, CISSP, CISA, CCSK, or equivalent.
  • Experience supporting third-party risk management or vendor security assessments.
    Familiarity with vulnerability management tools, GRC platforms, or SIEM technologies.
Responsibilities
  • Perform a range of cybersecurity tasks within assigned functional areas.
  • Provide technical and procedural support for secure deployment of systems and devices (network, application, server, client, database).
  • Evaluate bug reports, exploit notices, and other alerts; recommend mitigation strategies.
  • Conduct and support tests of cybersecurity measures.
  • Assist in interpreting and implementing cybersecurity policies, standards, and requirements.
  • Analyze system vulnerabilities and develop mitigation plans.
  • Maintain tools and documentation for investigations, forensics, incident response, and security analysis.
Loading...