Incident Response Consultant

IES-Dublin

Rapid7

Level up SecOps with the only endpoint to cloud, unified cybersecurity platform. Confidently act to prevent breaches with a leading MDR partner. Request demo!

View company page

About the Team

The Rapid7 Incident Response team is considered the tip of the spear within Rapid7's Detection & Response practice. This team is primarily responsible for ensuring 24/7 breach response coverage for Rapid7's MDR and retainer customers, guaranteeing to be there for our customers in their greatest times of need. All services are delivered using Rapid7's existing portfolio of detection and response solutions, such as Rapid7 InsightIDR and Velociraptor. The experiences gained by the members of this Managed Services team directly feed into Rapid7's Product organization, improving Rapid7 products for all standalone customers as well. Our approach is hybrid first, with most of our team members spending three days a week in the office. Rapid7 is built on a culture of collaboration and teamwork designed to foster meaningful connections and trusting relationships.

About the Role

Rapid7 Incident Responders split their time between reactive breach response cases - supporting Rapid7 customers in their greatest time of need, and proactive customer engagements - delivering threat hunting and detection & response exercises with our customers’ dedicated internal security teams. Rapid7 aims to provide unparalleled work/life balance that allows talented Detection & Response experts to thrive in a reactive Incident Response setting. Incident Responders help to impact the direction of Rapid7’s Products and Services.

In this role, you will:

  • Lead and support incident response engagements, from detection and containment through forensic analysis and remediation, while partnering with Incident Responders, MDR Analysts, and Customer Advisors

  • Support proactive incident response service engagements, including compromise assessments and incident simulations

  • Utilize Rapid7 technologies like InsightIDR and Velociraptor to deliver positive customer outcomes

  • Deliver verbal and written updates and forensic reports to customers

  • Assist in capturing and deploying knowledge of latest attacker methodologies with members of our Managed Threat Operations team and as part of Rapid7’s Emergent Threat Response program

  • Ensures all security incidents are tracked and documented appropriately.

  • Collaborate with peers and cross-team partners on process enhancements and documentation 

  • Participate in pre-sales conversations with prospective customers, Sales enablement sessions, webinars, and other business development opportunities

  • Advise and mentor members of our MDR SOC and Managed Threat Operations teams

The skills you’ll bring include:

  • 1-2 years of hands-on incident response experience

  • 2-3 years of security analyst experience, preferably in a SOC or MSSP setting

  • Strong technical experience in three of the five areas below

    • Host forensics (Windows / Mac / Linux)

    • Network traffic analysis

    • Log Review

    • Malware triage

    • Cloud technologies, including AWS, Azure, and GCP

  • Strong verbal and written communication skills, in particular the ability to effectively communicate investigation findings and associated mitigation and remediation actions to technical and non-technical audiences

  • Strong time management and prioritization skills in fast-paced situations

  • Desire to continuously learn and grow from your peers and on the job experiences, with a willingness to share your knowledge

  • Relevant industry certifications, such as, but not limited to: GCIA, GCIH, GDAT, GCFE, and GFCA

We know that the best ideas and solutions come from multi-dimensional teams. That’s because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today.
 

About Rapid7

At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities. We do this by embracing tenacity, passion, and collaboration to challenge what’s possible and drive extraordinary impact.

Here, we’re building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 11,000+ global customers ahead of whatever’s next.

Join us and bring your unique experiences and perspectives to tackle some of the world’s biggest security challenges.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  8  2  0

Tags: AWS Azure Cloud Forensics GCFE GCIA GCIH GCP Incident response Linux Malware SOC Windows

Perks/benefits: Career development

Region: Europe
Country: Ireland

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.