Associate Detection & Response Analyst
at Rapid7
Belfast BT1, Northern Ireland, United Kingdom -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 03 Dec, 2024 | Not Specified | 06 Sep, 2024 | N/A | Security+,Gcih,Gcia,Windows,Operating Systems,Participation | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
We are seeking someone with a passion for cyber security to join our team. As a SOC Analyst with Rapid7 you will work with Rapid7’s advanced tools to investigate and triage high priority security events. Working with Rapid7’s Tactical Operations team (TACOPS) is an ideal opportunity to gain a deep understanding of threat detection and response. As part of this team you will be in the best position to develop the skills needed to build a career in cyber security. This is a hybrid role based in our Arlington, VA Security Operation Center.
The skills you’ll bring include:
- A passion for cybersecurity
- Problem solving, critical thinking, and ingenuity.
- A keen curiosity and excitement to learn
- Willingness to work on a shift schedule, including evenings and a Saturday or Sunday
- The Rapid7 MDR SOC has a shift rotation which requires associate analysts to work a 4:3 schedule from 10 AM - 8 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.
- Knowledge of Windows, Linux operating systems
- Fundamental knowledge of security concepts (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.)
- Security Certifications (GFACT, GSEC, GCIA, GCIH, CySA+, CASP+, Security+, etc.)
- Scripting/coding ability
- Participation in CTF events
- Participation in red team/blue team training tools such as HackTheBox, TryHackMe, and LetsDefen
Responsibilities:
Most days for Associate Analysts will consist of reviewing alert data to identify evil activity in customer environments. In these roles you will be empowered to steer investigations. Investigations include everything from evidence acquisition and analysis to figure out how the intrusion began to identify any malicious or unexpected activity related to the event. Based on this investigation you will be responsible for writing an incident report which includes your technical analysts, documented findings and remediation recommendations for customers. Your colleague, a Customer Advisor, will be responsible for direct communication with the customer. You will have fellow analysts who will be ready to help you if you encounter a problem or have a question, including Mid, Senior and Lead Analysts. In addition to live response, in the event of a security incident that rises to the level of a Remote Incident Response engagement, Associate Analysts may be tasked with performing investigation tasks related to the investigation. In this circumstance you will focus on helping a team track threat actor actions across an environment by examining forensic artifacts.
Additional information about our team and culture can be found here: https://www.rapid7.com/resources/soc-analysts/
To watch an Associate Analyst in action, check out this webinar: https://www.ultimatewindowssecurity.com/webinars/register.aspx?id=3710
Our Associate Analysts have also contributed to the identification of Zero-Day vulnerabilities: https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/
In this role, you will:
- Deliver world-class threat detection services using traditional threat intelligence-based detection and user behavior analytics
- Conduct or assist with Rapid7 incident response investigations.
- Assist in capturing and deploying knowledge of attack methodologies
- Provide continuous input to Rapid7 product development teams
The skills you’ll bring include:
- A passion for cybersecurity
- Problem solving, critical thinking, and ingenuity.
- A keen curiosity and excitement to learn
- Willingness to work on a shift schedule, including evenings and a Saturday or Sunday
- The Rapid7 MDR SOC has a shift rotation which requires associate analysts to work a 4:3 schedule from 10 AM - 8 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.
- Knowledge of Windows, Linux operating systems
- Fundamental knowledge of security concepts (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.)
- Security Certifications (GFACT, GSEC, GCIA, GCIH, CySA+, CASP+, Security+, etc.)
- Scripting/coding ability
- Participation in CTF events
- Participation in red team/blue team training tools such as HackTheBox, TryHackMe, and LetsDefend
We know that the best ideas and solutions come from multi-dimensional teams. That’s because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today.
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
Proficient
1
Belfast BT1, United Kingdom