Detection & Response Analyst

Rapid7


Date: 2 days ago
City: Arlington, VA
Contract type: Full time

About the Team

Rapid7’s Managed Detection and Response (MDR) team is built from the ground up to bring motivated and passionate security talent face to face with emerging threats, practical challenges, and evil at scale. Our MDR service uses an impact-driven mindset to focus efforts on effective solutions, encouraging personal and technical innovation within the SOC. MDR provides 24/7/365 monitoring, threat hunting, incident response, and more with a focus on endpoint detection and behavioral intelligence.

About the Role

Rapid7 MDR’s Tactical Operations team (TACOPS) is responsible for handling the most time-critical tasks for all customers, such as the investigation and triage of high priority security alerts using our cloud hosted SIEM, InsightIDR. While many SOC analysts forward alerts that require additional analysis to other teams, at Rapid7 MDR, you will typically conduct an investigation beginning from alert triage through to Incident Report delivery.

You will be enabled to complete investigations that can scale in complexity from simple account compromises and commodity malware infections to complex web server compromises and zero-day vulnerability exploitation. Your primary trigger for such investigations will be from reviewing alert data, though you’ll investigate inbound customer requests, as well. However, your Customer Advisor colleagues will be largely responsible for direct communication with the customers, enabling you to dedicate your efforts to investigation and analysis.

While you will own your investigations, you aren’t expected to know everything! You’ll even likely come across a lot of data you’re not familiar with throughout your time in this role, and taking on these investigations is one of the best ways to learn. If you need help, your team lead will ensure you’re able to get the information you need, and your analyst colleagues are available to answer questions, too. Additionally, your team lead will assist you with learning how to prioritize and balance your time between alert triage and in-flight investigations to ensure the best customer outcomes possible.

In the event of a security incident that escalates to Rapid7 MDR’s in-house Incident Responders, you may be tasked with performing investigative tasks related to the Incident Response engagement. The Incident Manager will lead the engagement and give you tasks within the scope of your normal job duties to analyze real-time log data or forensic artifacts.

Your team lead will guide your development in this role and assist you with moving down your career path. As you grow in your role, the Rapid7 MDR SOC provides career paths to grow as a SOC analyst, Incident Responder, Threat Hunter, and more.

In this role, you will work on one of the following shift schedules:

Shift B: Wednesday-Saturday from 10am-8pm ET

Rapid7 requires its TACOPS analysts to work two of their four days on shift in office, with one of those days being Wednesday for shift changeover.

In this role, you will:

  • Utilize Rapid7’s world-class software and threat intelligence to identify potential compromises in customer environments
  • Conduct investigations into a variety of malicious activity on workstations, servers, and in the cloud
    • These investigations include conducting analysis of log data collected by our world-class SIEM and forensic artifacts acquired from affected endpoints
  • Provide timely communication of investigation findings to Customer Advisors in order to provide Rapid7’s customers with the information they need to remediate the current incident and prevent future ones from occurring
  • Prepare Incident Reports for each investigation you complete, which follows MITRE’s ATT&CK Framework and includes your own forensic, malware, and root-cause analysis
  • Communicate with other analysts to share new intelligence regarding tactics, techniques, and trends utilized by threat actors
  • Interface with our global SOCs to facilitate investigation and shift handoffs
  • Provide continuous input to Rapid7’s Threat Intelligence and Detection Engineering team regarding new detection opportunities

The skills you’ll bring include:

  • 1-2 years of experience in a cybersecurity related position (SOC and/or SIEM analysis experience preferred)
  • Understanding of core operating system concepts in Windows, MacOS/Darwin, and Linux.
    • This includes at least a basic understanding of common internal system tools and directory structures
  • An understanding of investigative methodology and the incident response lifecycle, cyber killchain, etc:
    • Knowing what questions to ask to begin an investigation and, regardless of tech stack, have an idea of where to look to answer them.
    • A fundamental understanding of how threat actors utilize tactics such as lateral movement, privilege escalation, defense evasion, persistence, command and control, and exfiltration
  • Willingness to work on a shift schedule, including evenings and a Saturday or Sunday
    • The Rapid7 MDR SOC has a shift rotation which requires analysts to work a 4:3 10 hour shift schedule after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.
  • Practical experience gained through CTF and HTB challenges, as well as personal or professional usage of common penetration testing tools such as Mimikatz, Metasploit modules, BloodHound, etc.
  • Experience with hands-on analysis of forensic artifacts and/or malware samples
  • Passion for cybersecurity and for continuous learning and growth
  • Problem solving, critical thinking, ingenuity
  • A keen curiosity and excitement to learn
  • Effective communication skills to allow for cross-functional collaboration within the SOC and between departments
  • Dedication to putting each customer’s needs and concerns at the forefront of all decision making.

How to apply

To apply for this job you need to authorize on our website. If you don't have an account yet, please register.

Post a resume

Similar jobs

Janitorial Supervisor

AIS, Arlington, VA
$50,000 - $70,000 per year
5 days ago
SummaryThe Janitor Supervisor is responsible for the overall supervision and implementation of base janitorial service and general supervision of the assigned team. Supervisory responsibilities are carried out in accordance with AFSI’s policies and applicable laws. Responsibilities include training employees; planning, assigning, and directing work; appraising performance; addressing complaints and resolving problems.The salary range for this position is $50,000-$70,000/year.Essential Duties and...

Program Management Analyst

BTAS, Arlington, VA
2 weeks ago
Security Clearance Required: Secret, up to SAP/SARWork Location: Arlington, VAPosition Type / Standard Work Hours: Full-time/40 hours per week Summary / Objective: BTAS is looking for a Program Management Analyst to perform critical program management, technical, or business analysis of major DoD acquisition systems and provides recommendations to ensure program success. Primary Responsibilities: Assists in the coordination efforts regarding programmatic,...

Part Time Daytime Grocery Stock Clerk

Harris Teeter, Arlington, VA
2 weeks ago
Primary responsibility is to Take Excellent Care Of Our Customers by satisfying each customer's needs and exceeding their expectations. This requires a defined level of product knowledge, food preparation skills, sales ability, customer relations skills, and cooperation with fellow associates to create An Incredible Place To Work and Shop. Responsible for processing/packaging/stocking products according to Grocery Standards, cleaning work areas,...