This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are looking for SOC Analysts with a passion for cybersecurity to join us. As a Detection and Response Analyst you will work with Rapid7’s advanced tools to investigate and triage high priority security events. Rapid7’s Managed Detection and Response (MDR) team is built from the ground up to bring motivated and passionate security talent face to face with emerging threats, practical challenges, and evil at scale. Our MDR service uses an impact-driven mindset to focus efforts on effective solutions, encouraging personal and technical innovation within the SOC. MDR provides 24/7/365 monitoring, threat hunting, incident response, and more with a focus on endpoint detection and behavioral intelligence.
Job Responsibility:
Utilise Rapid7’s world-class software and threat intelligence to identify potential compromises in customer environments
Conduct investigations into a variety of malicious activities on workstations, servers, and in the cloud
Write an Incident Report for each investigation you complete, which follows MITRE’s ATT&CK Framework and includes your own forensic, malware, and root-cause analysis
Communicate with Customer Advisors regarding investigation findings, Requests For Information from clients, and remediation and mitigation recommendations
Communicate with other analysts to share new intelligence regarding tactics, techniques, and trends utilized by threat actors
Provide continuous input to Rapid7’s Threat Intelligence and Detection Engineering team regarding new detection opportunities
Requirements:
5+ years of experience as a SOC or DFIR or Incident Response Analyst is required
Understanding of core operating system concepts in Windows, MacOS/Darwin, and Linux
A fundamental understanding of how threat actors utilize tactics such as lateral movement, privilege escalation, defense evasion, persistence, command and control, and exfiltration
Practical experience gained through CTF and HTB challenges, as well as personal or professional usage of common penetration testing tools such as Mimikatz, Metasploit modules, BloodHound, etc.
Experience with hands-on analysis of forensic artifacts and/or malware samples
Passion for continuous learning and growth in the cybersecurity world
Effective collaboration within the SOC and between departments
Dedication to putting each customer’s needs and concerns at the forefront of all decision making