Incident Responder

at  Rapid7

Melbourne VIC 3000, Victoria, Australia -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate05 Aug, 2024Not Specified06 May, 20241 year(s) or aboveCommunication Skills,Aws,Time Management,Network Traffic Analysis,AzureNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

Do you enjoy being in the fight, investigating unusual activity, tearing apart malware, and chasing attackers in realtime? Do you pride yourself on developing methods for identifying and analyzing breaches? Do you feel compelled to help organizations improve their abilities to effectively detect threats and drive incident response?

The skills you’ll bring include:

  • 1-2 years of hands-on, technical incident response experience
  • 2-3 years of security analyst experience, preferably in a SOC or MSSP setting
  • Strong technical experience in three of the five areas below
  • Host forensics (Windows / Mac / Linux)
  • Network traffic analysis
  • Log Review
  • Malware triage
  • Cloud technologies, including AWS, Azure, and GCP
  • Strong verbal and written communication skills, in particular the ability to effectively communicate investigation findings and associated mitigation and remediation actions to technical and non-technical audiences
  • Strong time management and prioritization skills in fast-paced situations
  • Desire to continuously learn and grow from your peers and on the job experiences, with a willingness to share your knowledge
  • Relevant industry certifications, such as, but not limited to: GCIA, GCIH, GDAT, GCFE, and GFC

Responsibilities:

Rapid7 Incident Responders split their time between reactive breach response cases - supporting Rapid7 customers, and others, in their greatest time of need, and proactive customer engagements - delivering threat hunting and detection & response exercises with our customers’ dedicated internal security teams. Rapid7 aims to provide unparalleled work/life balance that allows talented experts to thrive in a reactive Incident Response setting. Incident Responders help to impact the direction of Rapid7’s Products and Services.

In this role, you will:

  • Lead and support incident response engagements, from detection and containment through forensic analysis and remediation, while partnering with Incident Responders, MDR Analysts, and Customer Advisors
  • Support proactive incident response service engagements, including compromise assessments and incident simulations
  • Utilize Rapid7 technologies like InsightIDR and Velociraptor to deliver positive customer outcomes
  • Deliver verbal and written updates and forensic reports to customers
  • Assist in capturing and deploying knowledge of latest attacker methodologies with members of our Managed Threat Operations team and as part of Rapid7’s Emergent Threat Response program
  • Collaborate with peers and cross-team partners on process enhancements and documentation
  • Participate in pre-sales conversations with prospective customers, Sales enablement sessions, webinars, and other business development opportunities
  • Advise and mentor members of our MDR SOC and Managed Threat Operations teams
  • Participate in an on-call rotation (after-hours/weekend), as required, to address incidents and maintain continuous coverage.

The skills you’ll bring include:

  • 1-2 years of hands-on, technical incident response experience
  • 2-3 years of security analyst experience, preferably in a SOC or MSSP setting
  • Strong technical experience in three of the five areas below
  • Host forensics (Windows / Mac / Linux)
  • Network traffic analysis
  • Log Review
  • Malware triage
  • Cloud technologies, including AWS, Azure, and GCP
  • Strong verbal and written communication skills, in particular the ability to effectively communicate investigation findings and associated mitigation and remediation actions to technical and non-technical audiences
  • Strong time management and prioritization skills in fast-paced situations
  • Desire to continuously learn and grow from your peers and on the job experiences, with a willingness to share your knowledge
  • Relevant industry certifications, such as, but not limited to: GCIA, GCIH, GDAT, GCFE, and GFCA


REQUIREMENT SUMMARY

Min:1.0Max:3.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Proficient

1

Melbourne VIC 3000, Australia