Incident Handler

Posted 6 Days Ago
Be an Early Applicant
Arlington, VA
Hybrid
1-3 Years Experience
Artificial Intelligence • Cloud • Information Technology • Sales • Security • Software • Cybersecurity
At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities.
The Role
As an Incident Handler at Rapid7, you will conduct investigations into malicious activities across various environments, prepare incident reports, and communicate findings with customer advisors. You will also collaborate with other analysts and contribute to Rapid7's Threat Intelligence efforts.
Summary Generated by Built In

We are looking for people with a passion for investigation and forensic analysis to join our MDR SOC team at Rapid7. As an Incident Handler, you will work side by side MDR SOC Analysts and MDR Incident Responders to investigate incidents ranging from commodity malware to sophisticated threat actors.
About the Team
Rapid7's Managed Detection and Response (MDR) team is built from the ground up to bring motivated and passionate security talent face to face with emerging threats, practical challenges, and evil at scale. Our MDR service uses an impact-driven mindset to focus efforts on effective solutions, encouraging personal and technical innovation within the SOC. MDR provides 24/7/365 monitoring, threat hunting, incident response, and more with a focus on endpoint detection and behavioral intelligence.
About the Role
As an Incident Handler in Rapid7's SOC, you will be responsible for investigating and analyzing malicious activity in a multitude of customer environments. You will be enabled to complete investigations scaling in complexity from account compromises and commodity malware infections, to complex web server compromises and zero-day vulnerability exploitation. Your Customer Advisor colleagues will be responsible for direct communication with the customers, enabling you to dedicate your efforts to analysis. Your team will be available to answer questions, provide guidance, and assist you in investigations, if needed.
In this role, you will:

  • As a core duty, you will conduct investigations into a variety of malicious activity on workstations, servers, and in the cloud. You will investigate all levels of incidents, including Incident Response engagements in which you will provide analysis assistance to Rapid7's Incident Responders.
  • Prepare Incident Reports for each minor incident investigation you complete, which follow MITRE's ATT&CK Framework and include your own forensic, malware, and root-cause analysis.
  • Communicate with Customer Advisors regarding investigation findings, Requests For Information from clients, and remediation and mitigation recommendations.
  • Communicate with other analysts to share new intelligence regarding tactics, techniques, and trends utilized by threat actors.
  • Provide continuous input to Rapid7's Threat Intelligence and Detection Engineering team regarding new detection opportunities.
  • Assist in customer engagement opportunities pertaining to the function of your role in the MDR service as necessary.
  • Participate in projects that directly relate to your role in an effort to increase positive customer outcomes.
  • Utilize Rapid7's world-class software and threat intelligence to identify potential compromises in customer environments as necessary.


The skills you'll bring include:

  • 1-2 years of experience in a cybersecurity related position (SOC and/or SIEM analysis experience preferred)
  • Understanding of core operating system concepts in Windows, MacOS/Darwin, and Linux. This includes at least an understanding of common internal system tools and directory structures.
  • A fundamental understanding of how threat actors utilize tactics such as lateral movement, privilege escalation, defense evasion, persistence, command and control, and exfiltration.
  • Practical experience gained through CTF and HTB challenges, as well as personal or professional usage of common penetration testing tools such as Mimikatz, Metasploit modules, BloodHound, etc.
  • Experience with hands-on analysis of forensic artifacts and/or malware samples.
  • Passion for continuous learning and growth in the cybersecurity world.
  • Effective collaboration within the SOC and between departments.
  • Dedication to putting each customer's needs and concerns at the forefront of all decision making.


We know that the best ideas and solutions come from multi-dimensional teams. That's because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don't be shy - apply today.
About Rapid7
At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities. We do this by embracing tenacity, passion, and collaboration to challenge what's possible and drive extraordinary impact.
Here, we're building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 11,000+ global customers ahead of whatever's next.
Join us and bring your unique experiences and perspectives to tackle some of the world's biggest security challenges.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or any other status protected by applicable national, federal, state or local law.

Top Skills

Linux
macOS
Windows

What the Team is Saying

Priya
Sammi
Tara
John
Grace
The Company
HQ: Boston, MA
2,400 Employees
Hybrid Workplace
Year Founded: 2000

What We Do

We do this by embracing tenacity, passion, and collaboration to challenge what’s possible and drive extraordinary impact.

Here, we’re building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 11,000+ global customers ahead of whatever’s next.

Why Work With Us

What makes us unique is how we embrace, model, and celebrate our core values. By challenging convention, being an advocate, creating impact together, always bringing our full selves, and recognizing that our work is never done, we are able to make an extraordinary impact on our business, our industry, and our own career growth.

Gallery

Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery

Rapid7 Offices

Hybrid Workspace

Employees engage in a combination of remote and on-site work.

Our default working model is hybrid, with employees working three days per week in the office. This approach underpins our commitment to flexibility and adaptability while supporting our dedication to development, teamwork and customer purpose.

Typical time on-site: 3 days a week
Company Office Image
HQBoston
Company Office Image
Arlington
Company Office Image
Austin, TX
Company Office Image
Belfast, GB
Company Office Image
Prague
Company Office Image
Reding, UK
Company Office Image
Town 'n' Country, FL
Learn more

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account