המקום בו המומחים והחברות הטובות ביותר נפגשים
About the Role
Most days for an MDR Analyst will consist of reviewing alert data to identify evil activity in customer environments. In this role you will be empowered to steer investigations. Investigations include everything from evidence acquisition and analysis to figuring out how the intrusion began to identify any malicious or unexpected activity related to the event. Based on this investigation you will be responsible for writing a Findings Report which includes your technical analysis, documented findings, and remediation recommendations for customers.
Your colleague, a Customer Advisor, will be responsible for direct communication with the customer. You will have fellow analysts who will be ready to help you if you encounter a problem or have a question, including Senior and Lead Analysts.
In addition to live response, the MDR SOC also performs threat hunting on a monthly basis. Threat hunting is performed in an effort to identify unknown threats in a customer environment.In the event of a security incident that rises to the level of a Remote Incident Response engagement, you may be tasked with performing investigation tasks related to the investigation. In this circumstance you will focus on helping a team track threat actor actions across an environment by examining forensic artefacts.
In this role, you will:
Deliver world-class threat detection services using traditional threat intelligence-based detection and user behaviour analytics
Work on shift as part of a threat detection team in the Rapid7 SOC
Conduct or assist with Rapid7 incident response investigations.
Assist in capturing and deploying knowledge of attack methodologies
Drive research initiatives to further threat detection capabilities and brand reputation through media interaction, public speaking, and blogs
Provide continuous input to Rapid7 product development teams
The skills you’ll bring include:
Problem solving, critical thinking, and ingenuity
A passion for cybersecurity and a keen curiosity and excitement to learn
Knowledge of Windows and/or Linux operating systems
Experience with forensic network investigations, endpoint investigations, malware analysis, incident response, threat hunting, or any other job functions normally found within a SOC
The ability to identify processes in need of improvement and implement solutions.
Endpoint detection experience
משרות נוספות שיכולות לעניין אותך