Jobs
Interviews

35 Rapid7 Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

0 Lacs

bhopal, madhya pradesh

On-site

You will be joining the Vulnerability Management Services team at Atos Group, a global leader in data-driven, trusted, and sustainable digital transformation. With an annual revenue of approximately 5 billion, Atos operates as a next-generation digital business with leading positions in digital, cloud, data, advanced computing, and security across more than 47 countries. By leveraging high-end technologies and a team of 47,000 world-class talents, Atos expands the possibilities of data and technology for current and future generations. Your role will be based in Mumbai (Onsite) with a required experience of 5 to 8 years and the highest qualification of any full-time graduate. As a part of the team, you will be responsible for executing vulnerability scanning and managing VM programs for clients. It is crucial to complete projects within budgeted efforts and agreed timelines while ensuring high-quality deliverables. Key Responsibilities: - Perform vulnerability scanning using tools like SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain a deep understanding of client network architecture and infrastructure - Identify threats, vulnerabilities, and perform control analysis - Develop customized reports and dashboards as per client expectations - Proactively plan and execute projects - Determine likelihood, analyze impacts, and assess risks - Prioritize risks, recommend solutions, and document findings - Identify business risks associated with weaknesses identified during assessments - Collaborate with both business and technical teams for project scope definition, execution, and closure Skills Required: - 5+ years of experience in Vulnerability Scanning with expertise in tools like Qualys, Tenable, Rapid7, etc. - Ability to understand and explain vulnerabilities to stakeholders - Knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Familiarity with standards like PCIDSS, CIS Benchmarks, etc. - Flexibility in handling challenging activities and creativity in problem-solving - Strong communication and writing skills with fluency in verbal communication If you are looking to grow and thrive in a dynamic and innovative environment, we invite you to join us on this exciting journey at Atos Group.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

chennai, tamil nadu

On-site

As an experienced Cloud Monitoring & SOC Specialist, you will be leading the optimization and integration of the monitoring ecosystem. Your passion for transforming data into actionable insights and reducing alert fatigue will be instrumental in this role. Your responsibilities will include consolidating and integrating various tools such as SolarWinds, Instana, Google Cloud Operations, VMware Log Insight, and Rapid7 into a unified monitoring ecosystem. You will architect clear and efficient monitoring and incident-response workflows, implementing centralized AI-driven alerting to minimize noise and accelerate detection. In addition, you will be responsible for developing methods for proactive monitoring and continuous improvement by learning from incidents and iterating on processes. Configuring and maintaining essential NOC/SOC dashboards and monthly capacity reports for leadership visibility will also be part of your role. To qualify for this position, you should have deep technical expertise with 8-10 years of experience in monitoring architecture, tool integration, and SOC operations. Hands-on experience with infrastructure monitoring, APM, cloud (GCP), centralized logging, and SIEM solutions is required. Familiarity with tools such as SolarWinds, Instana, Google Cloud Operations, VMware Log Insight, and Rapid7 is considered a strong advantage. A proven track record of designing effective alert rules, incident-response playbooks, and automated workflows is essential. Experience in writing and refining monitoring procedures, SLAs, runbooks, and regular capacity/performance reports is also required. Strong communication skills and the ability to collaborate with DevOps, SecOps, and IT teams to drive continuous improvement are key attributes for success in this role.,

Posted 2 months ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As an Information Security Engineer III at NCR's Global Information Security team, your role will involve developing and implementing NCR's corporate information security program. This program aims to safeguard the confidentiality, integrity, and availability of information resources. Your responsibilities will include architecture and design for information security controls, policy enforcement, security awareness training, risk management, assessment, monitoring, incident management, and threat and vulnerability management. You will be tasked with identifying, analyzing, and mitigating vulnerabilities within the systems by conducting regular vulnerability assessments using tools like Rapid7. It is crucial to collaborate with cross-functional teams to ensure the security of the infrastructure. You will generate detailed reports for stakeholders, prioritize and remediate security vulnerabilities, and work closely with the Incident Response team during security incidents. Additionally, you will be responsible for patch management, developing security best practices, providing training sessions, maintaining documentation, and staying updated with the latest security trends. To qualify for this role, you should have a Bachelor's degree in Computer Science, Information Security, or a related field, along with a minimum of 5 years of experience in vulnerability management. Proficiency in using vulnerability management tools, a strong understanding of network protocols, operating systems, and security architectures, as well as experience with incident response and patch management processes are required. Excellent analytical and problem-solving skills, effective communication skills, knowledge of relevant security frameworks, and the ability to prioritize work are essential for success in this position. Additionally, you should be willing to learn new tools and processes to continuously improve the vulnerability management program.,

Posted 2 months ago

Apply

8.0 - 15.0 years

8 - 15 Lacs

Gurgaon, Haryana, India

On-site

What are we looking for We are seeking a highly skilled and strategic Security Architect to join our team. This role is crucial in defining and driving our security roadmap, designing robust security solutions across on-premises and cloud environments, and ensuring the continuous enhancement of our security posture to meet evolving threats and business requirements. Key Responsibilities: Collaborate with Information Security and IT Leadership to define the security roadmap and drive strategic initiatives. Design, engineer, and implement security solutions that adhere to a defense-in-depth strategy while meeting business requirements and processes. Periodically review existing security solutions to identify opportunities for improvement, enhancing security capabilities and adding value to the enterprise. Assist in designing security elements for on-premises compute, storage, and network infrastructure services. Contribute to the design of security elements for cloud infrastructure and platform services within Microsoft Azure. Work with the Information Security department to design technical security controls that enforce security policies. Support project managers during project planning and execution phases, creating comprehensive documentation for handover to operations teams. Provide regular updates on project tasks and non-project assignments. Support the Security Operations team in investigating major security incidents. Deliver Level 4 (L4) technical support for escalated major incidents and security incidents to restore production services. Stay current on emerging threats, security trends, and risk mitigation strategies, providing recommendations to the Security Operations team as needed. Create detailed Technical Design Documents and other required documentation. Train Security Operations team members on new security solutions relevant to their roles. Collaborate effectively with multi-cultural teams across different time zones. Required Skills & Qualifications: Bachelor's degree in information systems or equivalent. Proven experience architecting and designing security solutions in on-premises enterprise environments that provide technical controls to meet security policy requirements. Demonstrated experience securing Microsoft Azure cloud infrastructure and platform services. Experience with log analytics solutions such as Splunk or Azure Log Analytics . Expertise in securing enterprise and globally distributed networks, including firewalls, IDS/IPS, DDoS protections, encryption tools/protocols, and privilege access management systems. Familiarity with vulnerability management systems such as Rapid7 or Nessus . Knowledge of data in-transit and data-at-rest encryption solutions and key management solutions. Understanding of advanced endpoint protection solutions for zero-day defense against threats. Strong consultative and problem-solving skills at a cross-functional level. Ability to quickly learn, self-start, and work both independently and as part of a team. Excellent verbal and written communication skills. Current security certifications (e.g., CISSP, CISM, CCSP ) are highly desired.

Posted 2 months ago

Apply

0.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Company Profile Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member's contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware. Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution. Flexible to Provide support to 24/7 L1 Monitoring shift members Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM

Posted 3 months ago

Apply

0.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Company Profile Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member's contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. Shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution.Flexible to Provide support to 24/7 L1 Monitoring shift members. Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM.

Posted 3 months ago

Apply

4.0 - 7.0 years

5 - 12 Lacs

Hyderabad, Chennai

Hybrid

Hi, Greetings from CES LTD: Website Link : https://www.cesltd.com SMART IT Solutions | Scalable, Secure, and Future-Ready | CES Ltd CES delivers SMART-driven solutions. Support enterprise growth, modernize IT infrastructure, automate workflows, reinforce cybersecurity, and transform business efficiency www.cesltd.com Headquarted AT : Chicago ( Illinois ) Certified AS : CMMI Level 5 Organisation Job Summary: We are looking for a skilled and proactive Cybersecurity Analyst with 4 to 6 years of experience to join our clients cybersecurity team. The ideal candidate will be responsible for identifying, analyzing, and remediating vulnerabilities across the environment using Rapid7 and related tools. A strong understanding of security principles, patch management, and vulnerability remediation is essential. Key Responsibilities: • Monitor and assess vulnerabilities across systems, networks, and applications using Rapid7 InsightVM and InsightIDR. • Analyse vulnerability scan results, prioritize risks based on criticality and asset value, and drive remediation activities. • Work closely with system and network teams to track and validate vulnerability fixes. • Develop and maintain vulnerability management reports and dashboards. • Ensure timely remediation of critical and high-severity vulnerabilities. • Assist in patch management planning and execution in coordination with IT support teams. • Document and escalate security incidents and vulnerabilities in line with incident response procedures. • Stay up-to-date with the latest cybersecurity threats, trends, and best practices. • Participate in security audits and compliance checks as required. Required Skills & Qualifications: • Bachelors degree or B.Tech in Computer Science, Information Security, or a related field. • 3 to 5 years of hands-on experience in cybersecurity or information security roles. • Proven experience with Rapid7 tools (InsightVM, InsightIDR, Nexpose). • Strong understanding of vulnerability management lifecycle and CVSS scoring. • Knowledge of patch management tools and procedures. • Familiarity with common operating systems (Windows/Linux), networks, and cloud platforms. • Experience in coordinating with cross-functional IT teams. • Strong analytical and problem-solving skills. • Excellent communication and documentation abilities. Preferred Qualifications (Nice to Have): • Relevant certifications such as CompTIA Security+, CEH, CISSP, or Rapid7 certifications. • Experience with ticketing systems (e.g., ServiceNow, Jira). • Exposure to compliance standards (e.g., ISO 27001, NIST, PCI-DSS). Regards, Kanchana CES LTD!

Posted 3 months ago

Apply

0.0 - 3.0 years

2 - 5 Lacs

Hyderabad

Work from Office

What you will do In this vital role supports the identification, assessment, and tracking of vulnerabilities across the organizations IT landscape. The Junior Vulnerability Management Analyst assists senior team members in analyzing vulnerability data, correlating risk indicators (e.g., KEV, EPSS), and supporting remediation efforts. This position offers an opportunity to grow technical expertise while contributing to the organizations security posture through structured vulnerability management processes. Roles & Responsibilities: Assist with analyzing vulnerability scan results from tools such as Tenable, Qualys, or Rapid7. Support prioritization efforts using CVSS scores, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), and asset criticality. Collaborate with IT and security teams to track remediation status and escalate high-risk findings. Monitor public threat intelligence sources to understand the context of vulnerabilities. Contribute to the development of dashboards and reports for tracking vulnerabilities and trends. Assist in documenting vulnerability management processes and remediation workflows. Support compliance and audit requests by providing vulnerability data as needed. Learn and follow policies related to patch management and secure configurations. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelors degree and 0 to 3 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools OR Diploma and 4 to 7 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools Must-Have Skills: Basic familiarity with vulnerability management platforms (e.g., Tenable, Qualys, or Rapid7) Understanding of basic CVSS scoring and vulnerability classification Awareness of cybersecurity concepts such as threat intelligence, patching, and risk assessment Foundational knowledge of networking and common IT systems Willingness to learn and grow in the field of vulnerability management Preferred Qualifications: Good-to-Have Skills: Exposure to KEV, EPSS, or similar threat-based scoring frameworks Basic experience with scripting languages (e.g., Python, PowerShell) Awareness of cloud security tools (e.g., AWS Inspector, Azure Defender) Familiarity with compliance standards such as NIST, ISO, or PCI-DSS CompTIA Security+ (preferred) Tenable Certified Nessus Auditor (Preferred) Qualys Vulnerability Management Specialist (Preferred) Soft Skills: Analytical Thinking Comfortable working with data and identifying patterns Attention to Detail Careful review and tracking of vulnerabilities Communication Skills Able to clearly document and explain findings Collaboration & Teamwork Works well with cross-functional teams Curiosity & Continuous Learning Strong interest in cybersecurity and professional growth Problem-Solving Mindset Seeks practical solutions to real-world security issues

Posted 3 months ago

Apply

5.0 - 9.0 years

5 - 9 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

The Vulnerability Manager position is responsible for managing the identification of vulnerabilities in EagleView's on-premise and cloud environment and working with systems owners to remediate findings. The Vulnerability Manager will convert raw vulnerability reports to actionable and prioritized information to enable engineers to focus on mitigating the highest levels of risk. As an additional duty, this role will also perform asset management for enterprise assets, combining asset discovery with vulnerability scanning to ensure comprehensive coverage of all assets. This position will serve as a critical member of the Cyber Security Team and will enable EagleView to achieve compliance with on-going assessment programs and reduce risk to company systems and services. Primary Responsibilities: Define and operate a formal Vulnerability Management Program and framework that defines the vulnerability priorities aligned with business criticality Establish an agile approach for vulnerability management capability improvements Provide risk-based mitigation and remediation recommendations and guidance Responsible for researching and analyzing vulnerabilities, identifying relevant threats, and providing risk-based mitigation and remediation recommendations Develop and optimize tools and services to provide comprehensive visibility, situational awareness, and response readiness Support the implementation of vulnerability management projects Refine scan results to identify and resolve any false positive findings, and produce vulnerability reports with actionable and prioritized information for system owners Track and report status of vulnerability remediation Assist in the development of baseline security configurations for operating systems, applications, and networking equipment Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology partners and support teams Develop baseline asset inventories using endpoint management applications (on-premise assets) and custom databases (cloud assets) Identify and maintain owners for systems in the asset inventory Skills/Requirements Required Knowledge, Skills and Experience: Bachelor's degree in a technology or business-related field (BSc or BBA preferred) 5 years of experience in Vulnerability Management Advanced understanding of operating system and application security, administration, and debugging Advanced understanding of technical information security concepts related to threat landscapes Experience with vulnerability scanners, vulnerability management systems, patch management, and host-based security systems (Rapid7 preferred) Experience working with asset management systems and databases Demonstrable conceptual, analytical and innovative problem-solving and evaluative skills Ability to conduct independent research and analysis, identifying issues, formulating options, and making conclusions and recommendations Demonstrated ability to recognize, interpret, and communicate vulnerability management information Working knowledge of business and risk assessment methodologies/ mitigation strategies using industry standards (e.g., COBIT, ITIL, ISO 27001:2013, NIST, OWASP, etc.) Very high attention to detail, with strong skills in managing/presenting data and information Strong skills in documentation, including policies, standards, processes and procedures Preferred Knowledge, Skills and Experience: Certification such as SANS GIAC, CISA, or CISSP preferred SQL database query language, and scripting experience in Python or other commonly used languages

Posted 3 months ago

Apply

8.0 - 13.0 years

15 - 30 Lacs

bengaluru

Hybrid

Required Skills and Experience Provide and manage vulnerability scanning and assessment tools for traditional IT assets. 6 - 8 years of security analyst experience, preferably in a managed services environment Analyze scan results, prioritize findings using risk-based methodology. Deliver actionable remediation and mitigation recommendations. Maintain continuous visibility and reporting for servers, endpoints, and network infrastructure. Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Ticketing Integration: ServiceNow, Jira Reporting: Custom dashboards (Power BI/Tableau) or native tool reports Experience with cloud security, devops, cyber resiliency/incident management, Zero Trust, network/EDGE security, and emerging technologies such as IoT and AI. Experience threat hunting, proactively and iteratively searching to detect advanced threats that evade existing security solutions. Deep understanding of the current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks Expertise with security incident response process.

Posted Date not available

Apply
Page 2 of 2
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies