This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Rapid7's Vulnerability Intelligence team does industry-leading attack research that prioritizes and uncovers risk for organizations worldwide. We’re looking for an experienced vulnerability researcher to contribute to overall team goals, helping defenders get ahead of the curve on emergent threats, and keeping Rapid7 top of mind for industry audiences. You’ll work with a skilled group of technical and cross-team leaders who are highly collaborative and deeply embedded in the security community.
Job Responsibility:
Work with the broader Vulnerability Intelligence team to support day-to-day research operations, including coordinated vulnerability disclosures and rapid responses to major security incidents
Perform and publish root cause analyses of high-priority vulnerabilities and potential threats that highlight Rapid7’s attacker-focused approach to vulnerability intelligence
Develop and publish new exploits and attack techniques, working alongside the Metasploit team to incorporate them into Metasploit Framework as needed
Conduct zero-day vulnerability research against popular enterprise technologies (e.g., network appliances, VPN gateways, CI/CD servers, file transfer and backup solutions, etc)
Advise our security and threat detection engineers as they develop vulnerability checks, fingerprints, and detections
contextualize risk and explain attack patterns to cross-team technical stakeholders
Requirements:
10+ years of experience with common vulnerability classes and exploitation techniques (e.g., command injection, deserialization, etc)
Experience producing vulnerability root cause analyses (or other technical writing on vulnerabilities and exploits)
Hands-on experience reverse engineering, patch diffing, and developing exploits
Familiarity with common security research tooling (e.g., IDA, Ghidra, Binary Ninja, Burpsuite, etc)
An instinct for where and how to obtain or emulate vulnerable software
Deep empathy for the challenges that security teams and global organizations face in today's threat climate
willingness to listen, mentor, and collaborate across teams
Nice to have:
Prior experience developing Metasploit modules is a plus
Prior experience reverse engineering at least one common enterprise software development language (e.g. Java, .NET, C/C++) is also a plus