This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Detection and Response Analyst you will work with Rapid7’s advanced tools to investigate and triage high priority security events. You will be responsible for identifying and analyzing malicious activity in a multitude of customer environments. You will be enabled to complete investigation scaling in complexity from simple account compromises and commodity malware infections, to complex web server compromises and zero-day vulnerability exploitation.
Job Responsibility:
Utilise Rapid7’s world-class software and threat intelligence to identify potential compromises in customer environments
Conduct investigations into a variety of malicious activities on workstations, servers, and in the cloud
Write an Incident Report for each investigation you complete, which follows MITRE’s ATT&CK Framework and includes your own forensic, malware, and root-cause analysis
Communicate with Customer Advisors regarding investigation findings, Requests For Information from clients, and remediation and mitigation recommendations
Communicate with other analysts to share new intelligence regarding tactics, techniques, and trends utilized by threat actors
Provide continuous input to Rapid7’s Threat Intelligence and Detection Engineering team regarding new detection opportunities
Requirements:
5+ years of experience as a SOC or DFIR or Incident Response Analyst is required
Understanding of core operating system concepts in Windows, MacOS/Darwin, and Linux
A fundamental understanding of how threat actors utilize tactics such as lateral movement, privilege escalation, defense evasion, persistence, command and control, and exfiltration
Practical experience gained through CTF and HTB challenges, as well as personal or professional usage of common penetration testing tools such as Mimikatz, Metasploit modules, BloodHound, etc.
Experience with hands-on analysis of forensic artifacts and/or malware samples
Passion for continuous learning and growth in the cybersecurity world
Effective collaboration within the SOC and between departments
Dedication to putting each customer’s needs and concerns at the forefront of all decision making