Home
Jobs

5 Rapid7 Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Foundit logo

Company Profile Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member's contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware. Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution. Flexible to Provide support to 24/7 L1 Monitoring shift members Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM

Posted 1 week ago

Apply

0.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Foundit logo

Company Profile Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member's contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. Shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution.Flexible to Provide support to 24/7 L1 Monitoring shift members. Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM.

Posted 2 weeks ago

Apply

4.0 - 7.0 years

5 - 12 Lacs

Hyderabad, Chennai

Hybrid

Naukri logo

Hi, Greetings from CES LTD: Website Link : https://www.cesltd.com SMART IT Solutions | Scalable, Secure, and Future-Ready | CES Ltd CES delivers SMART-driven solutions. Support enterprise growth, modernize IT infrastructure, automate workflows, reinforce cybersecurity, and transform business efficiency www.cesltd.com Headquarted AT : Chicago ( Illinois ) Certified AS : CMMI Level 5 Organisation Job Summary: We are looking for a skilled and proactive Cybersecurity Analyst with 4 to 6 years of experience to join our clients cybersecurity team. The ideal candidate will be responsible for identifying, analyzing, and remediating vulnerabilities across the environment using Rapid7 and related tools. A strong understanding of security principles, patch management, and vulnerability remediation is essential. Key Responsibilities: • Monitor and assess vulnerabilities across systems, networks, and applications using Rapid7 InsightVM and InsightIDR. • Analyse vulnerability scan results, prioritize risks based on criticality and asset value, and drive remediation activities. • Work closely with system and network teams to track and validate vulnerability fixes. • Develop and maintain vulnerability management reports and dashboards. • Ensure timely remediation of critical and high-severity vulnerabilities. • Assist in patch management planning and execution in coordination with IT support teams. • Document and escalate security incidents and vulnerabilities in line with incident response procedures. • Stay up-to-date with the latest cybersecurity threats, trends, and best practices. • Participate in security audits and compliance checks as required. Required Skills & Qualifications: • Bachelors degree or B.Tech in Computer Science, Information Security, or a related field. • 3 to 5 years of hands-on experience in cybersecurity or information security roles. • Proven experience with Rapid7 tools (InsightVM, InsightIDR, Nexpose). • Strong understanding of vulnerability management lifecycle and CVSS scoring. • Knowledge of patch management tools and procedures. • Familiarity with common operating systems (Windows/Linux), networks, and cloud platforms. • Experience in coordinating with cross-functional IT teams. • Strong analytical and problem-solving skills. • Excellent communication and documentation abilities. Preferred Qualifications (Nice to Have): • Relevant certifications such as CompTIA Security+, CEH, CISSP, or Rapid7 certifications. • Experience with ticketing systems (e.g., ServiceNow, Jira). • Exposure to compliance standards (e.g., ISO 27001, NIST, PCI-DSS). Regards, Kanchana CES LTD!

Posted 2 weeks ago

Apply

0.0 - 3.0 years

2 - 5 Lacs

Hyderabad

Work from Office

Naukri logo

What you will do In this vital role supports the identification, assessment, and tracking of vulnerabilities across the organizations IT landscape. The Junior Vulnerability Management Analyst assists senior team members in analyzing vulnerability data, correlating risk indicators (e.g., KEV, EPSS), and supporting remediation efforts. This position offers an opportunity to grow technical expertise while contributing to the organizations security posture through structured vulnerability management processes. Roles & Responsibilities: Assist with analyzing vulnerability scan results from tools such as Tenable, Qualys, or Rapid7. Support prioritization efforts using CVSS scores, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), and asset criticality. Collaborate with IT and security teams to track remediation status and escalate high-risk findings. Monitor public threat intelligence sources to understand the context of vulnerabilities. Contribute to the development of dashboards and reports for tracking vulnerabilities and trends. Assist in documenting vulnerability management processes and remediation workflows. Support compliance and audit requests by providing vulnerability data as needed. Learn and follow policies related to patch management and secure configurations. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelors degree and 0 to 3 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools OR Diploma and 4 to 7 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools Must-Have Skills: Basic familiarity with vulnerability management platforms (e.g., Tenable, Qualys, or Rapid7) Understanding of basic CVSS scoring and vulnerability classification Awareness of cybersecurity concepts such as threat intelligence, patching, and risk assessment Foundational knowledge of networking and common IT systems Willingness to learn and grow in the field of vulnerability management Preferred Qualifications: Good-to-Have Skills: Exposure to KEV, EPSS, or similar threat-based scoring frameworks Basic experience with scripting languages (e.g., Python, PowerShell) Awareness of cloud security tools (e.g., AWS Inspector, Azure Defender) Familiarity with compliance standards such as NIST, ISO, or PCI-DSS CompTIA Security+ (preferred) Tenable Certified Nessus Auditor (Preferred) Qualys Vulnerability Management Specialist (Preferred) Soft Skills: Analytical Thinking Comfortable working with data and identifying patterns Attention to Detail Careful review and tracking of vulnerabilities Communication Skills Able to clearly document and explain findings Collaboration & Teamwork Works well with cross-functional teams Curiosity & Continuous Learning Strong interest in cybersecurity and professional growth Problem-Solving Mindset Seeks practical solutions to real-world security issues

Posted 3 weeks ago

Apply

5.0 - 9.0 years

5 - 9 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

The Vulnerability Manager position is responsible for managing the identification of vulnerabilities in EagleView's on-premise and cloud environment and working with systems owners to remediate findings. The Vulnerability Manager will convert raw vulnerability reports to actionable and prioritized information to enable engineers to focus on mitigating the highest levels of risk. As an additional duty, this role will also perform asset management for enterprise assets, combining asset discovery with vulnerability scanning to ensure comprehensive coverage of all assets. This position will serve as a critical member of the Cyber Security Team and will enable EagleView to achieve compliance with on-going assessment programs and reduce risk to company systems and services. Primary Responsibilities: Define and operate a formal Vulnerability Management Program and framework that defines the vulnerability priorities aligned with business criticality Establish an agile approach for vulnerability management capability improvements Provide risk-based mitigation and remediation recommendations and guidance Responsible for researching and analyzing vulnerabilities, identifying relevant threats, and providing risk-based mitigation and remediation recommendations Develop and optimize tools and services to provide comprehensive visibility, situational awareness, and response readiness Support the implementation of vulnerability management projects Refine scan results to identify and resolve any false positive findings, and produce vulnerability reports with actionable and prioritized information for system owners Track and report status of vulnerability remediation Assist in the development of baseline security configurations for operating systems, applications, and networking equipment Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology partners and support teams Develop baseline asset inventories using endpoint management applications (on-premise assets) and custom databases (cloud assets) Identify and maintain owners for systems in the asset inventory Skills/Requirements Required Knowledge, Skills and Experience: Bachelor's degree in a technology or business-related field (BSc or BBA preferred) 5 years of experience in Vulnerability Management Advanced understanding of operating system and application security, administration, and debugging Advanced understanding of technical information security concepts related to threat landscapes Experience with vulnerability scanners, vulnerability management systems, patch management, and host-based security systems (Rapid7 preferred) Experience working with asset management systems and databases Demonstrable conceptual, analytical and innovative problem-solving and evaluative skills Ability to conduct independent research and analysis, identifying issues, formulating options, and making conclusions and recommendations Demonstrated ability to recognize, interpret, and communicate vulnerability management information Working knowledge of business and risk assessment methodologies/ mitigation strategies using industry standards (e.g., COBIT, ITIL, ISO 27001:2013, NIST, OWASP, etc.) Very high attention to detail, with strong skills in managing/presenting data and information Strong skills in documentation, including policies, standards, processes and procedures Preferred Knowledge, Skills and Experience: Certification such as SANS GIAC, CISA, or CISSP preferred SQL database query language, and scripting experience in Python or other commonly used languages

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies