This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are looking for people with a passion for investigation and forensic analysis to join our MDR SOC team at Rapid7. As an Associate Detection & Response Analyst, you will utilise Rapid7's advanced tools to investigate and triage security events and work side-by-side with Rapid7's Incident Response team to investigate incidents ranging from commodity malware to sophisticated threat actors. As a SOC analyst you will have the opportunity to impact this team while building your career and expertise with a globally recognised cyber security company.
Job Responsibility:
Review alert data to identify malicious activity in customer environments
Steer investigations, which includes everything from evidence acquisition and analysis to figuring out how the intrusion began to identify any malicious or unexpected activity related to the event
Write a Findings Report which includes your technical analysis, documented findings, and remediation recommendations for customers
Deliver world-class threat detection services using traditional threat intelligence-based detection and user behavior analytics
Conduct or assist with Rapid7 incident response investigations
Assist in capturing and deploying knowledge of attack methodologies
Provide continuous input to Rapid7 product development teams
On a monthly basis you will perform threat hunting to identify unknown threats in a customer environment
In the event of a security incident that rises to the level of a Remote Incident Response engagement, you may be tasked with performing investigation tasks related to the investigation
Partner cross functionally with a Customer Advisor who will be responsible for direct communication with our customers
Requirements:
Knowledge of Windows, Linux operating systems
2-5 years of experience as a SOC or DFIR or Incident Response Analyst
Knowledge of security concepts (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.)
Willingness to work on a shift schedule - The Rapid7 MDR SOC has a shift rotation which requires analysts to work a 4:3 schedule from 8 AM - 6 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.
Excited by technology with a passion for cybersecurity, curious and eager to learn and develop in a security role
Demonstrates a strong sense of responsibility for protecting customer trust, making decisions that prioritize security and impact
A collaborative team player who has the ability to partner successfully with others to drive impact
Demonstrates a strong sense of ownership, holding themself and others accountable to achieving outcomes that deliver value to our customers and internal teams
The attitude and ability to thrive in a high-growth, evolving environment
Ability to make transparent, well-communicated, and efficient decisions under pressure, with careful consideration of risk and impact
Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success.
Nice to have:
Participation in CTF events
Participation in red team/blue team training tools such as HackTheBox, TryHackMe, and LetsDefend