Incident Responder at Rapid7
Dublin, County Dublin, Ireland -
Full Time


Start Date

Immediate

Expiry Date

13 Sep, 25

Salary

0.0

Posted On

15 Jun, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Forensic Analysis, Time Management, Enterprise Security, Communication Skills, Gcia, Siem, Azure, Edr, Aws, Network Traffic Analysis, Gcih, Incident Response

Industry

Information Technology/IT

Description

The Rapid7 Incident Responder is a hands-on, technical role focused on digital forensics and incident response that offers various customer-facing and consulting opportunities.
Rapid7 Incident Responders split their time between reactive breach response cases - supporting Rapid7 customers in their greatest time of need, and proactive customer engagements - delivering threat hunting and detection & response exercises with our customers’ dedicated internal security teams. Rapid7 aims to provide unparalleled work/life balance that allows talented Detection & Response experts to thrive in a reactive Incident Response setting.

The skills you’ll bring include:

  • 2-3 years of hands-on incident response experience, including conducting technical incident response investigations, forensic analysis, and using Windows/Mac/Linux forensic artifacts to identify and assess threat actor activities
  • Knowledge of enterprise security, with experience integrating technologies like EDR, SIEM, Velociraptor, OSQuery, and others to enhance threat detection and streamline incident response.
  • Strong technical expertise in at least two of the following areas:
  • Host forensics (Windows / Mac / Linux)
  • Network traffic analysis
  • Log review
  • Malware triage
  • Cloud technologies, including AWS, Azure, and GCP
  • Excellent verbal and written communication skills, with the ability to clearly convey investigation findings and remediation steps to both technical and non-technical audiences, including executives and legal teams.
  • Strong relationship-building skills, with the ability to understand customer needs and deliver measurable value.
  • Exceptional time management and prioritization skills.
  • Willingness to participate in an on-call rotation, including evening and weekend shifts as needed.
  • Relevant industry certifications such as GCIA, GCIH, GDAT, GCFE, and GFCA (or equivalent)
Responsibilities

Embedded within the Rapid7 MDR SOC pods, an Incident Responder’s primary responsibilities include incident management, forensic analysis, threat hunting, and delivering both verbal and written communications to customers. Incident Responders will manage major incident response engagements, with oversight from Senior Incident Responders.
Additionally, a portion of their time will be dedicated to ongoing research in incident response and enhancing service enablement by improving internal processes, procedures, and methodologies used to deliver incident response services.

In this role, you will:

  • Deliver world-class incident response services, managing customer engagements from initial incident scoping to final reporting, and driving investigations through the entire IR lifecycle.
  • Coordinate and guide SOC Analysts during major investigations.
  • Conduct forensic investigations using real-time telemetry from the InsightIDR platform and endpoint artifacts from Velociraptor.
  • Support proactive threat hunting through Rapid7’s Compromise Assessment offering, utilizing tools like Velociraptor and other EDR technologies.
  • Conduct threat emulation activities as part of Rapid7’s Detection & Response Workshop, helping clients assess their ability to respond to major threats using their existing tools.
  • Advise clients on security best practices and strategies for mitigating attacks through enterprise security controls.
  • Capture and apply knowledge of the latest attacker methodologies to improve response efforts.
  • Contribute to public blogs and webinars by sharing insights on the latest attacker techniques discovered during major investigations.
  • Provide guidance to MDR analysts on minor incident investigations.

The skills you’ll bring include:

  • 2-3 years of hands-on incident response experience, including conducting technical incident response investigations, forensic analysis, and using Windows/Mac/Linux forensic artifacts to identify and assess threat actor activities
  • Knowledge of enterprise security, with experience integrating technologies like EDR, SIEM, Velociraptor, OSQuery, and others to enhance threat detection and streamline incident response.
  • Strong technical expertise in at least two of the following areas:
  • Host forensics (Windows / Mac / Linux)
  • Network traffic analysis
  • Log review
  • Malware triage
  • Cloud technologies, including AWS, Azure, and GCP
  • Excellent verbal and written communication skills, with the ability to clearly convey investigation findings and remediation steps to both technical and non-technical audiences, including executives and legal teams.
  • Strong relationship-building skills, with the ability to understand customer needs and deliver measurable value.
  • Exceptional time management and prioritization skills.
  • Willingness to participate in an on-call rotation, including evening and weekend shifts as needed.
  • Relevant industry certifications such as GCIA, GCIH, GDAT, GCFE, and GFCA (or equivalent).

We know that the best ideas and solutions come from multi-dimensional teams. Teams reflecting a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today.

Loading...