Associate Detection & Response Analyst

VA Arlington 22203


Accelerate cloud transformation with practitioner-first cybersecurity solutions. Level up SecOps capabilities with MDR, XDR, SIEM, threat intel, and VM.

View company page

Associate Managed Detection & Response (MDR) Analyst

Rapid7’s Tactical Operations team (TACOPS) is responsible for handling the most time-critical tasks for all customers, such as the investigation and triage of high priority security alerts using our cloud hosted SIEM, InsightIDR. This team is composed of Associate Analysts who work on the following shift schedules (there is no night shift for U.S. analysts at Rapid7!). Rapid7 offers a flexible work environment; Associate Analysts  are required to work in our SOC on Wednesdays, but remote work is optional for the rest of the analyst’s shift.

Shift A: Sunday-Wednesday from 10am-8pm ET

Shift B: Wednesday-Saturday from 10am-8pm ET

A Day in the Life:

Most days for Associate Analysts will consist of reviewing alert data to identify evil activity in customer environments. In these roles you will be empowered to steer investigations. Investigations include everything from evidence acquisition and analysis to figure out how the intrusion began to identify any malicious or unexpected activity related to the event.  Based on this investigation you will be responsible for writing an incident report which includes your technical analysts, documented findings and remediation recommendations for customers.  Your colleague, a Customer Advisor, will be responsible for direct communication with the customer. You will have fellow analysts who will be ready to help you if you encounter a problem or have a question, including Mid, Senior and Lead Analysts. In addition to live response,  


In the event of a security incident that rises to the level of a Remote Incident Response engagement, Associate Analysts may be tasked with performing investigation tasks related to the investigation. In this circumstance you will focus on helping a team track threat actor actions across an environment by examining forensic artifacts.

Additional information about our team and culture can be found here: 

To watch an Associate Analyst in action, check out this webinar: 

Our Associate Analysts have also contributed to the identification of Zero-Day vulnerabilities: 

Job Requirements:


  • A passion for cybersecurity 

  • Problem solving, critical thinking, and ingenuity.

  • A keen curiosity and excitement to learn 

  • Willingness to work on a shift schedule, including evenings and a Saturday or Sunday

  • The Rapid7 MDR SOC has a shift rotation which requires associate analysts to work a 4:3 schedule from 10 AM - 8 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday.

  • Knowledge of Windows, Linux operating systems

  • Fundamental knowledge of security concepts (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.)


  • Security Certifications (GFACT, GSEC, GCIA, GCIH, CySA+, CASP+, Security+, etc.)

  • Scripting/coding ability

  • Participation in CTF events

  • Participation in red team/blue team training tools such as HackTheBox, TryHackMe, and LetsDefend

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or any other status protected by applicable national, federal, state or local law.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Blue team CASP+ Cloud CTF GCIA GCIH GSEC Incident response Linux Red team Scripting SIEM SOC Vulnerabilities Windows

Perks/benefits: Flex hours Team events

Region: North America
Country: United States
Job stats:  15  4  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.