Match score not available

Senior Detection Engineer

extra holidays - extra parental leave
Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

5+ years of experience as a SOC Analyst, Incident Responder, or in Offensive Security practices, or 4+ years in cyber threat intelligence or detection engineering., Proficiency in using Threat Intelligence Platforms and writing detections using Yara, Suricata, Sigma, or similar tools., Strong understanding of threat actor tactics including lateral movement, privilege escalation, and command and control., Excellent research, collaboration, and communication skills..

Key responsabilities:

  • Serve as the primary technical escalation point for the Detection Operations Team.
  • Evaluate and improve the InsightIDR detection library and coordinate third-party integration projects.
  • Conduct research on attacker behaviors and techniques, and perform detection testing in controlled environments.
  • Collaborate with various teams to ensure detection coverage during large-scale exploitation of vulnerabilities.

Rapid7 logo
Rapid7 Large https://r-7.co/3i5nlhP
1001 - 5000 Employees
See all jobs

Job description

Do you enjoy information security research and threat intelligence? Do you have experience tracking nation state and cyber criminal threat actors? Would you like the opportunity to research and report on the latest threats and techniques used by attackers?

Rapid7 Managed Detection and Response operate around-the-clock to identify vulnerabilities, detect breaches, respond and investigate attacker activity, and help our customers improve their ability to deal with threats. 

About the Team 

Rapid7’s Threat Intelligence & Detection Engineering (TIDE) team is built from the ground up to provide our customers with high-fidelity threat detections and alerting that limit threat actor dwell time and impact across our customers' ecosystems. Our TIDE team uses purposeful research, threat intelligence curation, observed malicious behavior, and informed collaboration to ensure that our detections evolve along with the ever-changing threat and technological landscape.

About the Role

As a Senior Detection Engineer, you will serve as the primary technical escalation point for the Detection Operations Team. The Detection Operations team is responsible for the upkeep and evaluation of the detection library for the MDR service. Our team’s mission is to empower excellence in our customer’s security posture by  continuously refining Rapid7’s detection library, enhancing their effectiveness to swiftly identify incidents while reducing analyst strain. Our vision is to lead with an unparalleled, state-of-the-art, and globally recognized detection library to set new standards in cybersecurity. You will collaborate closely with the SOC and Data Science teams to identify patterns of activity to improve detections, assist with the creation of new data models, and constantly update the collective understanding of threats.In addition, you will learn from IR engagements, SOC incidents, and a variety of other sources and apply that knowledge to inform new detections for use across our customer base, while assisting more junior teammates.

In this role, you will:

  • Utilize Rapid7’s world-class software and threat intelligence to evaluate and improve the current InsightIDR detection library, including coordinating third-party integration projects.

  • Collaborate closely with SOC Analysts, the Data Science team, Incident Response (IR) Consultants, Customer Advisors, and security researchers.

  • Conduct research on attacker behaviors and techniques using information gathered from IR engagements, other incidents and malicious activity discovered through various telemetry sources.

  • Conduct detection testing in a controlled environment.

  • Collaborate with Rapid7’s Emergent Threat Response (ETR) team to ensure Rapid7 has detection coverage during large scale exploitation of vulnerabilities from recently disclosed zero days or CVEs.

  • Utilize expert level skills in multiple security domains to build rules that detect or prevent evil across network, endpoint and cloud services.

The skills you’ll bring include:

  • 5+ years as a SOC Analyst/Incident Responder/Offensive security practice experience OR 4+ years of cyber threat intelligence/research/detection engineering experience.

  • Experience using industry Threat Intelligence Platforms.

  • Experience writing detections using Yara/Suricata/Sigma or similar.

  • Experience with hands-on analysis of forensic artifacts and/or malware samples.

  • Conduct research using various OSINT methods.

  • A solid understanding of how threat actors utilize tactics such as lateral movement, privilege escalation, defense evasion, persistence, command and control, and exfiltration.

  • Effective collaboration between different teams.

  • Innovative problem solving mindset.

  • Strong ability to perform research (search for, organize, and evaluate information).

  • Strong written and verbal skills.

We know that the best ideas and solutions come from multi-dimensional teams. That’s because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today.
 

About Rapid7

At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities. We do this by embracing tenacity, passion, and collaboration to challenge what’s possible and drive extraordinary impact.

Here, we’re building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 11,000+ global customers ahead of whatever’s next.

Join us and bring your unique experiences and perspectives to tackle some of the world’s biggest security challenges.

#LI-BD1 #LI-Remote

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or any other status protected by applicable national, federal, state or local law.

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Non-Verbal Communication
  • Collaboration
  • Research
  • Problem Solving

Related jobs