Information Security Analyst - Penetration Testing (Brno Office, Czech Republic)

Brno - Tech Park Brno - B

Red Hat

Red Hat is the world’s leading provider of enterprise open source solutions, including high-performing Linux, cloud, container, and Kubernetes technologies.

View all jobs at Red Hat

Apply now Apply later

The Red Hat Information Technology team is seeking an Offensive Security Analyst to join us in Brno. In this role, you will serve as part of Red Hat's Information Risk and Security team, which is responsible for ensuring confidentiality, integrity, and availability of Red Hat's systems, data, and networks. You'll need to maintain a current knowledge of security vulnerabilities to help you evaluate, recommend, and implement security controls to prevent unauthorized access to company information. Excellent communication skills are a must because you will consult with management and other areas of the business, advising them on their projects and on the impact that theft, destruction, alteration, or denial of access has on Red Hat's overall success.

What you will do

  • Maintain a working knowledge of the latest threats, vulnerabilities and exploits.
  • Stay informed on information security best practices and evaluate their applicability in Red Hat’s environment.
  • Perform Security audits, penetration testing of internal applications and internal Red/Purple Teaming.
  • Performing vulnerability scans and assessments, to consult findings and mitigations.
  • Effectively and qualitatively communicate risks and potential impacts.
  • Work with system owners to take preventive or corrective actions based on risk analysis.

What you will bring

  • Intensive experience in a technical information security role.
  • Industry certifications, including CISSP, OSCP would be highly regarded.
  • Excellent communication skills, both written and verbal, to convey information effectively and professionally to a wide variety of technical and non-technical audiences.
  • Experience with penetration testing and auditing tools tools like Metasploit, Burp/ZAP, Qualys highly regarded.
  • Experience with Threat Led penetration testing is highly regarded.
  • Familiar with web penetration testing methodologies, OWASP top 10, Web application security highly regarded.

About Red Hat

Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies. Spread across 40+ countries, our associates work flexibly across work environments, from in-office, to office-flex, to fully remote, depending on the requirements of their role. Red Hatters are encouraged to bring their best ideas, no matter their title or tenure. We're a leader in open source because of our open and inclusive environment. We hire creative, passionate people ready to contribute their ideas, help solve complex problems, and make an impact.

Diversity, Equity & Inclusion at Red Hat
Red Hat’s culture is built on the open source principles of transparency, collaboration, and inclusion, where the best ideas can come from anywhere and anyone. When this is realized, it empowers people from diverse backgrounds, perspectives, and experiences to come together to share ideas, challenge the status quo, and drive innovation. Our aspiration is that everyone experiences this culture with equal opportunity and access, and that all voices are not only heard but also celebrated. We hope you will join our celebration, and we welcome and encourage applicants from all the beautiful dimensions of diversity that compose our global village.

Equal Opportunity Policy (EEO)
Red Hat is proud to be an equal opportunity workplace and an affirmative action employer. We review applications for employment without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, age, veteran status, genetic information, physical or mental disability, medical condition, marital status, or any other basis prohibited by law.


Red Hat does not seek or accept unsolicited resumes or CVs from recruitment agencies. We are not responsible for, and will not pay, any fees, commissions, or any other payment related to unsolicited resumes or CVs except as required in a written contract between Red Hat and the recruitment agency or party requesting payment of a fee.


Red Hat supports individuals with disabilities and provides reasonable accommodations to job applicants. If you need assistance completing our online job application, email application-assistance@redhat.com. General inquiries, such as those regarding the status of a job application, will not receive a reply.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0

Tags: Application security Audits CISSP Cloud Exploits Kubernetes Linux Metasploit Offensive security Open Source OSCP OWASP Pentesting Qualys Red Hat Risk analysis Vulnerabilities Vulnerability scans

Perks/benefits: Transparency

Regions: Remote/Anywhere Europe
Country: Czechia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.