This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Rapid7 is looking for a Cyber Intelligence Analyst to join our Cyber Threat Intelligence team and help strengthen our global threat intelligence capabilities. In this role, you will investigate emerging cyber threats, analyze adversary activity, and produce actionable intelligence that enables organizations to better understand and defend against real-world risks. This is an exciting opportunity for someone with a passion for cyber threat analysis and intelligence to work alongside experienced security professionals, contribute to meaningful customer outcomes, and further develop their expertise within a globally recognized cybersecurity company.
Job Responsibility:
Respond to customer RFIs within defined scope and SLAs, using approved intelligence tools and research techniques
Investigate cyber threats such as phishing, data leakage, ransomware, DDoS, and impersonation activities
Collect, analyze, and document intelligence from OSINT, platform data, and dark web sources
Identify threat indicators, attacker behavior, and relevant context to assess potential customer impact
Produce clear, concise, and customer-ready intelligence outputs, including reports and investigation summaries
Escalate complex or out-of-scope findings in accordance with established workflows
Collaborate with internal teams including MDR, SOC, Remediation, and Customer Success as needed
Requirements:
1–2 years of experience in cyber intelligence, or a related technical role
Analytical Skills: Ability to analyze threat data, identify patterns, and draw evidence-based conclusions
Research Capability: Ability to carry out structured online research using open-source intelligence methods
Foundational understanding of cyber threats, attack vectors, and common cybercrime techniques
Experience investigating phishing, data leaks, malware, or other external threats
Familiarity with extracting and analyzing threat data such as IPs, domains, URLs, and malware artifacts
Comfortable working within investigation workflows and ticketing systems, taking ownership of assigned cases from intake through resolution to ensure timely, accurate, and high-quality outputs
Works closely with cross-functional stakeholders to gather context and communicate findings
Strong written English with the ability to communicate clearly and concisely, able to summarize complex findings clearly for customer-facing and internal audiences
Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success.
Nice to have:
Prior exposure to dark web forums, marketplaces, or cybercrime ecosystems
Experience working in customer-facing or service-oriented environments
Experience using ticketing systems such as Salesforce or Zendesk