Associate Managed Detection & Response (MDR) Analyst
VA Arlington
Rapid7
Level up SecOps with the only endpoint to cloud, unified cybersecurity platform. Confidently act to prevent breaches with a leading MDR partner. Request demo!Associate Managed Detection & Response (MDR) Analyst
Rapid7’s Tactical Operations team (TACOPS) is responsible for handling the most time-critical tasks for all customers, such as the investigation and triage of high priority security alerts using our cloud hosted SIEM, InsightIDR. This team is composed of Managed Detection & Response Analysts who work on the following shift schedules (there is no night shift for U.S. analysts at Rapid7!). Rapid7 offers a flexible work environment; Associate Analysts are required to work in our SOC two days per week, one of which is typically Wednesday.
Shift A: Sunday-Wednesday from 10am-8pm ET
Shift B: Wednesday-Saturday from 10am-8pm ET
About the Role
Most days for Associate Analysts will consist of reviewing alert data to identify evil activity in customer environments. In these roles you will be empowered to steer investigations. Investigations include everything from evidence acquisition and analysis to figure out how the intrusion began to identify any malicious or unexpected activity related to the event. Based on this investigation you will be responsible for writing an incident report which includes your technical analysts, documented findings and remediation recommendations for customers. Your customer advisor colleagues will be largely responsible for direct communication with the customer. You will have fellow analysts who will be ready to help you if you encounter a problem or have a question, including Mid, Senior and Lead Analysts.
In the event of a security incident that rises to the level of a Remote Incident Response engagement, Associate Analysts may be tasked with performing investigation tasks related to the investigation. In this circumstance you will focus on helping a team track threat actor actions across an environment by examining forensic artifacts.
Additional information about our team and culture can be found here:
https://www.rapid7.com/resources/soc-analysts/
The skills you’ll bring include:
0-2 years of experience
A passion for cybersecurity
Problem solving, critical thinking, and ingenuity.
A keen curiosity and excitement to learn
Willingness to work on a shift schedule, including evenings and a Saturday or Sunday
The Rapid7 MDR SOC has a shift rotation which requires associate analysts to work a 4:3 schedule from 10 AM - 8 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.
Knowledge of Windows, Linux operating systems
Fundamental knowledge of security concepts gained either through education, work as a systems administrator or from any of the preferred requirements below (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.). While Helpdesk IT experience alone may provide working knowledge of hardware, it is not necessarily applicable to this role and cybersecurity.
Preferred
Security Certifications (GFACT, GSEC, GCIA, GCIH, CySA+, CASP+, Security+, etc.)
Scripting/coding ability
Participation in CTF events
Participation in red team/blue team training tools such as HackTheBox, TryHackMe, and LetsDefend
We know that the best ideas and solutions come from multi-dimensional teams. That’s because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today.
About Rapid7
At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities. We do this by embracing tenacity, passion, and collaboration to challenge what’s possible and drive extraordinary impact.
Here, we’re building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 11,000+ global customers ahead of whatever’s next.
Join us and bring your unique experiences and perspectives to tackle some of the world’s biggest security challenges.
#LI-JM2
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or any other status protected by applicable national, federal, state or local law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Blue team CASP+ Cloud CTF GCIA GCIH GSEC Incident response Linux Red team Scripting SIEM SOC Windows
Perks/benefits: Career development Flex hours Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.