Security Operations Analyst II - InfoSec

NIS Belfast

Applications have closed

Rapid7

Level up SecOps with the only endpoint to cloud, unified cybersecurity platform. Confidently act to prevent breaches with a leading MDR partner. Request demo!

View company page

About the Team
Our Information security team is tasked with enhancing our security posture and elevating customer confidence in Rapid7 products. Together, we lead the effective delivery of business outcomes, and program maturation through standardisation and iterative improvement.

As part of our team, you'll work with highly engaged and capable colleagues to build and implement complex, cross-functional initiatives that secure our business, our employees, and our customers.

About the Role

The Security Operations Analyst will be responsible for reviewing alert data to identify evil activity in the Rapid7 environment.  In this role you will be empowered to steer investigations such as evidence acquisition and analysis, figuring out how the intrusion began, identifying any malicious or unexpected activity related to the event, etc..Based on this investigation you will be responsible for writing an Incident Report which includes your technical analysis, documented findings, and remediation recommendations.

You will have fellow analysts who will be ready to help you if you encounter a problem or have a question, including Senior and Lead Analysts.

In this role, you will:

  • Deliver world-class threat detection services using traditional threat intelligence-based detection and user behavior analytics.

  • Work on the threat detection team in the Rapid7 SOC.

  • Conduct or assist with Rapid7 incident response investigations. 

  • Assist in capturing and deploying knowledge of attack methodologies.

  • Drive research initiatives to further threat detection capabilities and brand reputation through media interaction, public speaking, and blogs.

  • Provide continuous input to the Rapid7 product development team.

The skills you’ll bring include:

  • 2-4 years of experience in an active hands on technical role

  • Problem solving, critical thinking, and ingenuity

  • A passion for cybersecurity with a keen curiosity and excitement to learn

  • Knowledge of Windows, Mac, and/or Linux operating systems

  • The ability to identify processes in need of improvement and implement solutions

  • Certifications such as Sec+ or GCIH, or actively pursuing

Nice to have:

  • Experience with forensic network investigations, endpoint investigations, malware analysis, incident response, threat hunting, or any other job functions normally found within a SOC

  • Endpoint detection experience

We know that the best ideas and solutions come from multi-dimensional teams. That’s because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today.

About Rapid7

At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities. We do this by embracing tenacity, passion, and collaboration to challenge what’s possible and drive extraordinary impact.

Here, we’re building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 10,000 global customers ahead of whatever’s next.

Join us and bring your unique experiences and perspectives to tackle some of the world’s biggest security challenges.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Analytics GCIH Incident response Linux Malware SOC Threat detection Threat intelligence Windows

Perks/benefits: Career development

Region: Europe
Country: United Kingdom
Job stats:  19  5  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.