Incident Responder
at Rapid7
Melbourne VIC 3000, Victoria, Australia -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 05 Aug, 2024 | Not Specified | 06 May, 2024 | 1 year(s) or above | Communication Skills,Aws,Time Management,Network Traffic Analysis,Azure | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
Do you enjoy being in the fight, investigating unusual activity, tearing apart malware, and chasing attackers in realtime? Do you pride yourself on developing methods for identifying and analyzing breaches? Do you feel compelled to help organizations improve their abilities to effectively detect threats and drive incident response?
The skills you’ll bring include:
- 1-2 years of hands-on, technical incident response experience
- 2-3 years of security analyst experience, preferably in a SOC or MSSP setting
- Strong technical experience in three of the five areas below
- Host forensics (Windows / Mac / Linux)
- Network traffic analysis
- Log Review
- Malware triage
- Cloud technologies, including AWS, Azure, and GCP
- Strong verbal and written communication skills, in particular the ability to effectively communicate investigation findings and associated mitigation and remediation actions to technical and non-technical audiences
- Strong time management and prioritization skills in fast-paced situations
- Desire to continuously learn and grow from your peers and on the job experiences, with a willingness to share your knowledge
- Relevant industry certifications, such as, but not limited to: GCIA, GCIH, GDAT, GCFE, and GFC
Responsibilities:
Rapid7 Incident Responders split their time between reactive breach response cases - supporting Rapid7 customers, and others, in their greatest time of need, and proactive customer engagements - delivering threat hunting and detection & response exercises with our customers’ dedicated internal security teams. Rapid7 aims to provide unparalleled work/life balance that allows talented experts to thrive in a reactive Incident Response setting. Incident Responders help to impact the direction of Rapid7’s Products and Services.
In this role, you will:
- Lead and support incident response engagements, from detection and containment through forensic analysis and remediation, while partnering with Incident Responders, MDR Analysts, and Customer Advisors
- Support proactive incident response service engagements, including compromise assessments and incident simulations
- Utilize Rapid7 technologies like InsightIDR and Velociraptor to deliver positive customer outcomes
- Deliver verbal and written updates and forensic reports to customers
- Assist in capturing and deploying knowledge of latest attacker methodologies with members of our Managed Threat Operations team and as part of Rapid7’s Emergent Threat Response program
- Collaborate with peers and cross-team partners on process enhancements and documentation
- Participate in pre-sales conversations with prospective customers, Sales enablement sessions, webinars, and other business development opportunities
- Advise and mentor members of our MDR SOC and Managed Threat Operations teams
- Participate in an on-call rotation (after-hours/weekend), as required, to address incidents and maintain continuous coverage.
The skills you’ll bring include:
- 1-2 years of hands-on, technical incident response experience
- 2-3 years of security analyst experience, preferably in a SOC or MSSP setting
- Strong technical experience in three of the five areas below
- Host forensics (Windows / Mac / Linux)
- Network traffic analysis
- Log Review
- Malware triage
- Cloud technologies, including AWS, Azure, and GCP
- Strong verbal and written communication skills, in particular the ability to effectively communicate investigation findings and associated mitigation and remediation actions to technical and non-technical audiences
- Strong time management and prioritization skills in fast-paced situations
- Desire to continuously learn and grow from your peers and on the job experiences, with a willingness to share your knowledge
- Relevant industry certifications, such as, but not limited to: GCIA, GCIH, GDAT, GCFE, and GFCA
REQUIREMENT SUMMARY
Min:1.0Max:3.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Software Engineering
Graduate
Proficient
1
Melbourne VIC 3000, Australia