MDRP Analyst

ISR Tel Aviv

Applications have closed

Rapid7

Level up SecOps with the only endpoint to cloud, unified cybersecurity platform. Confidently act to prevent breaches with a leading MDR partner. Request demo!

View all jobs at Rapid7

Rapid7 is looking for a MDRP Threat Intelligence Analyst to join our “Threat Command” team and take our threat intelligence analysis capabilities to the next levels.

About the Team

As a MDRP Threat Intelligence Analyst at Rapid7, you will be responsible for reviewing alert data to identify threat activity in customer environments. You will be empowered to steer investigations, including everything from evidence acquisition and analysis to figuring out how the intrusion began to identify any malicious or unexpected activity related to the event. Your colleague, a Customer Advisor, will be responsible for direct communication with the customer, and you will have fellow analysts who will be ready to help you if you encounter a problem or have a question.

About the Role

In this role, you will:
 

  • Perform monitoring of alerts on areas including phishing and credential harvesting sites, and data leakage, dark web monitoring.

  • Write findings for each investigation, which includes your intelligence analyst findings and remediation recommendations for customers.

  • Research and implement new tools and data sources to expand analysis on emerging cyber threats.

  • Assist the internal analyst team with use case development, query development, and alert tuning.

  • Create new standard operating procedures to assist analysts with repeatable daily work.

  • Produce intelligence outputs to provide an accurate description of the current threat landscape.

  • Communicate with Customer Advisors on client requests for Information and investigation findings.


The skills you’ll bring include:

  • 1+ Year experience in cyber intelligence or equivalent role with advanced familiarity with cybercrime communities and OSINT sources and tools.

  • Experience in investigating threats, utilizing OSINT, HUMINT and other research techniques to uncover threat actors and their TTPs while providing context to threats and reaching conclusions from incomplete or missing data.

  • Technical know-how on extracting threat data (IP’s, domains, ports, malware, and malicious communications) from multiple sources.

  • Business understanding and familiarity with corporate security solutions.

  • Excellent interpersonal and teamwork skills.
     

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  7  2  0
Category: Analyst Jobs

Tags: Cyber crime HUMINT Malware Monitoring OSINT Threat intelligence TTPs

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.