Full-Time
Provides cloud-based security analytics and automation
No salary listed
Florida, USA + 1 more
More locations: Virginia, USA
Hybrid
Rapid7 provides cloud-based tools for visibility, analytics, and automation to help security teams protect organizations. Its Insight Cloud collects telemetry from networks and systems to identify vulnerabilities, detect malicious activity, investigate incidents, and automate tasks. The company combines threat analytics, vulnerability management, and security automation in a single platform, sold via subscriptions to enterprises and government agencies worldwide. Unlike some competitors with separate tools, Rapid7 focuses on an integrated cloud-native platform that automates routine security work to improve efficiency and incident response.
Company Size
1,001-5,000
Company Stage
IPO
Headquarters
Boston, Massachusetts
Founded
2000
Help us improve and share your feedback! Did you find this helpful?
People at Rapid7 who can refer or advise you
Health Insurance
Dental Insurance
Vision Insurance
Unlimited Paid Time Off
Flexible Work Hours
Remote Work Options
Paid Vacation
Paid Holidays
Sabbatical Leave
Company Equity
Stock Options
401(k) Retirement Plan
401(k) Company Match
Wellness Program
Mental Health Support
Gym Membership
Professional Development Budget
Conference Attendance Budget
Training Programs
Tuition Reimbursement
Tuition Reimbursement
Metasploit wrap-up 04/03/2026. Additional adapters and more modules. This week, Rapid7, Inc. added a whole new bunch of HTTP/HTTPS-based CMD payloads for X64 and X86 versions of Windows. The additional breadth of selectable payloads and delivery techniques allows users new options to tailor the attack workflow for their environment. This was contributed by bwatters-r7. Adding new architectures for adapted payloads is surprisingly easy and something a first-time contributor might want to look into! New modules added to Metasploit Framework also allow for targeting FreeScout and Grav CMS, both of which result in remote code execution. These modules were contributed by Chocapikk and x1o3 respectively. Thanks! Thanks to g0tmi1k, Metasploit Framework now also includes an exploit module, multi/http/os_cmd_exec, which allows for targeting generic HTTP command execution vulnerabilities where user-supplied input is directly passed to system execution functions via an HTTP request. This can result in a Meterpreter shell on the remote target. To round this week off, Rapid7, Inc. has a new persistence technique on Windows, thanks to Nayeraneru, which abuses the HKCU\Environment\UserInitMprLogonScript registry value to execute a payload at user logon. New module content (5). FreeScout unauthenticated RCE via ZWSP .htaccess bypass. Authors: Moses Bhardwaj (MosesOX), Nir Zadok (nirzadokox), Valentin Lobstein [email protected], and offensiveee Type: Exploit Path: multi/http/freescout_htaccess_rce Description: This adds an exploit module for CVE-2026-28289, an unauthenticated remote code execution vulnerability in FreeScout versions prior or equal to 1.8.206. Grav CMS Admin Direct Install authenticated plugin upload RCE. Type: Exploit Pull request: #21029 contributed by x1o3 Path: multi/http/grav_admin_direct_install_rce_cve_2025_50286 Description: This adds a new exploit module for CVE-2025-50286, an authenticated RCE vulnerability in Grav CMS 1.1.x-1.7.x with Admin Plugin 1.2.x-1.10.x. The module exploits the Direct Install feature to upload a malicious plugin ZIP and execute an arbitrary PHP payload as the web server user. Generic HTTP command execution. Type: Exploit Path: multi/http/os_cmd_exec Description: Adds a new exploits/multi/http/os_cmd_exec module that targets generic HTTP command execution vulnerabilities where user-supplied input is directly passed to system execution functions via an HTTP request. Windows persistence via userinitmprlogonscript. Type: Exploit Path: windows/persistence/userinit_mpr_logon_script Description: This adds a new Windows persistence module that abuses the HKCU\Environment\UserInitMprLogonScript registry value to execute a payload at user logon. HTTP and HTTPS fetch. Authors: Brendan Watters, Chris John Riley, hdm [email protected], sf [email protected], and vlad902 [email protected] Type: Payload (Adapter) Description: This adds HTTP and HTTPS fetch payloads for 32-bit Windows targets. Enhancements and features (8). * #20999 from Aaditya1273 - Removes the legacy windows/local/persistence module, which has been superseded by the modernized windows/persistence/registry module. A moved_from alias ensures that existing scripts and workflows referencing the old module path are automatically redirected to the new one with a deprecation warning. * #21090 from g0tmi1k - Updates multiple modules to make use of report_service. * #21097 from g0tmi1k - Updates auxiliary/scanner/ftp/anonymous.rb to report the FTP service regardless of anonymous being enabled. * #21144 from Nayeraneru - Improves YARD documentation for lib/msf/core/auxiliary/web/http.rb by documenting the Request and Response helpers, the public HTTP request APIs, and the internal custom-404/request-handling flow. * #21145 from Nayeraneru - Adds YARD docs to lib/msf/core/auxiliary/auth_brute.rb, focusing on the AuthBrute mixin's credential-building, brute-force state, logging, and cleanup helpers. * #21150 from Nayeraneru - Adds YARD documentation to lib/msf/core/payload/adapter/fetch.rb to improve consistency and clarify how the fetch adapter generates URIs, builds fetch commands, and resolves platform-specific execution behavior. * #21194 from bcoles - This updates the post/linux/gather/enum_protections module by adding documentation and additional checks for modern protections and applications. * #21214 from adfoster-r7 - Adds additional validation to db_import before attempting to import values. * #21048 from zeroSteiner - Not written - add release notes directly to the pull request, then regenerate. Do not edit manually without ensuring the pull request has the release note present. Bugs fixed (6). * #21004 from EclipseAditya - This fixes a bug in the #normalize_key method provided by the Windows Registry mixin. The result is correct behavior when using shell sessions to check for keys with trailing \ characters. * #21138 from g0tmi1k - Fixes a bug that stopped the auxiliary/server/dhcp module from running as a background job when RHOSTS had been set. * #21188 from adfoster-r7 - Fixes a crash on older Ruby versions when scanning binary files. * #21199 from Hemang360 - Fixes crash in auxiliary/scanner/http/wp_perfect_survey_sqli when run against invalid or unreachable targets. * #21207 from zeroSteiner - Fixes warning when running the linux/gather/enum_protections module. * #21208 from adfoster-r7 - Fixes multiple warnings in modules that reported notes incorrectly. * #21073 from Hemang360 - Fixes a bug where running exploit/multi/handler with a reverse HTTP/HTTPS payload multiple times on the same port caused cleanup issues. Documentation added (6). * #21149 from Adithyadspawar - Adds documentation to the following login scanners: ftp/bison_ftp_traversal, http/apache_activemq_traversal, http/coldfusion_version, http/drupal_views_user_enum and http/elasticsearch_traversal. * #21186 from Devansh7006 - Adds documentation for the wordpress_pingback_access module. * #21187 from Devansh7006 - Updates documentation for auxiliary/scanner/http/http_put. * #21200 from dineshg0pal - Updates the example code snippet for writing Metasploit Go modules. * #21201 from aryan9190 - Adds YARD documentation for Rex::Post::IO class. * #21217 from dineshg0pal - Fixes minor errors in documentation files. You can always find more documentation on its docsite at docs.metasploit.com. Get it. As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub: If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest. To install fresh without using git, you can use the open-source-only Nightly Installers or the commercial edition Metasploit Pro
RSAC 2026 | Rapid 7 - San Francisco, CA. Rapid7 & Boothtube secure the spotlight at RSAC 2026 with the Roaming AI Photo Bot. The RSA Conference (RSAC) remains the premier global stage for cybersecurity, where the industry's top innovators gather at the Moscone Center in San Francisco to redefine cloud security. At RSAC 2026, the competition for attention on the expo floor was higher than ever. Rapid7, a powerhouse in the tech field, wanted to provide a high-tech, interactive experience that mirrored their forward-thinking approach to security. Their goal was to move beyond the traditional booth setup and engage with attendees in a way that was impossible to ignore. To achieve this, Rapid7 partnered with Boothtube to introduce "Missy" - its sophisticated Roaming AI Photo Bot. Instead of waiting for lead traffic to come to them, Rapid7 took the experience directly to the crowd. Missy became an instant icebreaker, navigating the busy convention floor and drawing the eyes of thousands of cybersecurity professionals. The user journey was seamless and futuristic: guests would approach the bot, select their experience on the large screen, and strike a pose. Its advanced AI then went to work, instantly transforming the guest's photo into a hyper-styled, futuristic "Rapid Speedster" - a custom AI persona designed specifically for the Rapid7 theme. The result was a stunning, pro-quality masterpiece delivered in seconds, creating a "wow" factor that resonated across the entire Moscone Center. The future of mobile engagement: the Roaming AI Photo Bot. Missy is a unique innovation in the world of event technology. As a mobile robot equipped with a high-quality internal camera and a massive 4K touch-screen display, she offers a level of interaction that stationary booths simply cannot match. Throughout the three-day conference, Missy roamed flawlessly through the crowds, inviting attendees to engage with her customizable interface. * Custom AI Branding: The "Rapid Speedster" By leveraging generative AI, Boothtube provided guests with more than just a photo; Boothtube gave them a digital identity tied to the Rapid7 brand. Turning attendees into "Rapid Speedsters" created a deep, personalized connection to the conference theme, resulting in a high-value keepsake that guests were proud to keep. * Social Media Buzz & Lead Generation The activation was a powerhouse for digital growth. Rapid7 integrated the photos into a massive LinkedIn community activity, where guests shared their AI portraits to win exclusive prizes. This strategy drove immense brand awareness and generated high-quality social media content that extended the event's reach far beyond the physical venue. * Seamless Physical & Digital Delivery To provide maximum value, Missy delivered both instant digital copies for social sharing and high-quality physical prints on the spot. This dual-delivery system ensured that the Rapid7 message stayed on top of mind, whether the guest was scrolling through their phone or looking at their printed souvenir back at the office.
Rapid7 (RPD) grants JANA board nominee, caps stake at 19.9% through 2027. Filing Impact Filing Sentiment Rhea-AI Filing summary. Rapid7, Inc. entered into a Nomination and Support Agreement with JANA Partners Management, LP on March 26, 2026. The company will include JANA's nominee, Kevin Galligan, in its recommended slate for election to the board at the 2026 annual meeting and will support his election on the same basis as other board nominees. JANA agreed not to acquire more than 19.9% of Rapid7's outstanding common stock without prior board consent and to vote its shares at the 2026 annual meeting for Galligan and a specified list of incumbent and mutually agreed nominees. The agreement remains in effect until the earlier of January 8, 2027 or thirty days before the start of the advance notice period for director nominations for the 2027 annual meeting. Insights. Rapid7 strikes a board-slate and ownership agreement with JANA through early 2027. Rapid7 is formalizing its relationship with JANA Partners by granting board representation to JANA's nominee, Kevin Galligan, for the 2026 annual meeting. In return, JANA accepts limits on its ownership stake and commits to support a defined slate of directors. The 19.9% ownership cap constrains how large a position JANA can hold without board consent, while references to Delaware General Corporation Law Section 203 clarify how business-combination restrictions are addressed. The voting commitments give the company greater certainty about the 2026 director election outcome. The agreement's term runs until January 8, 2027 or shortly before Rapid7's 2027 nomination window, so its influence is time-bound. Future company disclosures may show whether this collaboration leads to strategic or operational changes, but those outcomes are not detailed in this document. 8-K event classification. 2 items: 1.01, 9.01 03/30/2026 - 05:29 PM Faq. What did Rapid7 (RPD) agree with JANA Partners in this 8-K filing? Rapid7 entered into a Nomination and Support Agreement with JANA Partners. The company will include JANA's nominee, Kevin Galligan, in its recommended director slate for the 2026 annual meeting and support him on terms no less favorable than other board nominees. Who is the JANA nominee to Rapid7's board and how will he be treated? The JANA nominee is Kevin Galligan. Rapid7 agreed to place him in its 2026 annual meeting director slate and to recommend, support, and solicit proxies for his election in the same manner, and on terms no less favorable, as for the board's other nominees. What ownership limits apply to JANA under the Rapid7 Nomination and Support Agreement? JANA agreed not to acquire securities that would give it beneficial or other ownership of more than 19.9% of Rapid7's outstanding common stock without prior board consent. The agreement notes board approval of ownership up to this 19.9% level for Delaware Section 203 business-combination purposes. How is JANA required to vote its Rapid7 shares at the 2026 annual meeting? JANA must vote all Rapid7 common shares it beneficially owns, and controls voting for, in favor of a specified slate of directors. This includes the JANA nominee and named incumbents such as Corey E. Thomas and others, plus any mutually agreed nominee, and no other director candidates. When does Rapid7's Nomination and Support Agreement with JANA end? The agreement terminates at the earlier of two dates. It ends either on January 8, 2027, or thirty calendar days before the beginning of Rapid7's advance notice period for stockholder nominations of directors for the company's 2027 annual meeting. How does Delaware General Corporation Law Section 203 relate to this Rapid7 agreement? The agreement states that Rapid7's board has approved JANA's ownership of voting stock up to 19.9% in connection with the agreement. This approval addresses business-combination restrictions that Delaware General Corporation Law Section 203 would otherwise impose on significant stockholders. Filing exhibits & attachments. 4 documents Agreements & contracts.
Citi has lowered its price target on Rapid7 (NASDAQ:RPD) to $7 from $11.50, maintaining a Neutral rating. The adjustment follows discussions with the company's investor relations team, citing concerns about first-quarter and full-year 2026 outlook due to ongoing go-to-market changes, execution risks, continued customer churn and limited near-term catalysts. Rapid7, a cybersecurity software provider, recently announced updates to its 2026 PACT Partner Programme to strengthen channel partnerships and support growth in AI-integrated security solutions. Last month, the company reported fourth-quarter non-GAAP earnings per share of 44 cents, beating the 42-cent consensus, with revenue of $217 million against expectations of $215.17 million. Chief executive Corey Thomas highlighted continued traction in AI-driven security operations.
Rapid7, a cybersecurity operations company, has granted inducement awards to employees and contractors of Kenzo Security following its acquisition of the firm on 26 March 2026. The awards comprised 467,945 restricted stock units in aggregate, plus 525,769 performance-based restricted stock units each to Kenzo founders Harish Singh and Partha Naidu. The RSUs vest in thirds over three years, whilst the PSUs will be earned over two annual performance periods beginning 1 January 2027, based on Rapid7's managed MDR and SIEM recurring revenue goals. The grants were approved by Rapid7's Compensation Committee under Nasdaq Listing Rule 5635(c)(4) as material inducement for Kenzo personnel to join Rapid7.