דרושים » אבטחת מידע וסייבר » Cyber Security Analyst

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Cyber Security Analyst
About the Role:
As a Cyber Security Analyst, you will play a critical role in safeguarding our cloud-based IT infrastructure, products and customers. You will proactively manage security incidents, collaborate closely with various teams, and continuously enhance our security operations and response capabilities.
Key Responsibilities:
Investigate, analyze, and respond to security incidents escalated by our SIEM/SOC service and other internal sources.
Serve as the primary focal point with our SIEM/SOC provider, maintaining high service standards, expanding log coverage, enhancing detection capabilities, and optimizing workflows.
Lead and coordinate incident response activities, ensuring thorough reporting and actionable insights.
Actively participate in developing and refining our incident response playbooks, policies, and security procedures.
Own the handling of hacking and abuse incidents affecting our products and customers, conducting thorough investigations with various tools, proactively blocking abusive accounts, and updating security rules.
Collaborate cross-functionally with IT, Devops, Customer Support, Legal, and other stakeholders to effectively remediate security incidents and strengthen our overall security posture.
Requirements:
3+ years of experience in Security Operation Centers (SOC), Incident Response, or similar roles, ideally within cloud-native or SaaS-based environments.
Proven experience handling cyber security alerts and incidents, analyzing threats, creating reports, playbooks and procedures.
Proficiency with various operating systems (Windows, Linux, MacOS) and familiarity with diverse IT environments.
Hands-on experience with IR tools and technologies such as SIEM, log management, threat intelligence, forensics, malware testing etc.
Solid knowledge of security tools such as malware detection (EDR/XDR), email & web filtering, firewalls, and identity management.
Solid knowledge of cloud infrastructure security practices (Azure, a must), including understanding cloud architecture, identity management, and security controls.
Self motivated, with excellent analytical and problem-solving abilities, with the capability to handle multiple tasks simultaneously.
Strong interpersonal and communication skills, with the ability to collaborate effectively with technical and non-technical stakeholders.
Fluent in Hebrew, with strong English communication skills, both written and verbal.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8162643
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
The SOC Analyst is responsible for monitoring, analyzing, and responding to security threats and incidents to ensure the protection of the organizations IT and Security infrastructure. This role serves as the first line of defense against cyber threats.

Key Responsibilities:
Monitor security alerts and logs using our Platform, SIEM, EDR, OSINT and other security tools to identify potential threats or unusual activities.
Triage and investigate alerts, determining their relevance and urgency, and escalate incidents as needed.
Respond to security incidents by investigating, containing, and mitigating threats.
Analyze and interpret security data to identify vulnerabilities and anticipate emerging threats.
Review and analyze logs from various sources (network, endpoint, application) to detect anomalies and breaches.
Operate and manage security tools and technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), and vulnerability scanners.
Document incidents, actions taken, and resolutions; prepare detailed reports for management and compliance purposes.
Participate in Security meetings and working groups to improve processes and share knowledge.
Assist with the development and implementation of basic SSDLC processes
Stay current with the latest security threats, vulnerabilities, and industry best practices.
Requirements:
Required Skills & Qualifications:
2-3 years in a cybersecurity role, preferably in a SOC environment.
Experience with AWS, Azure, or GCP Required.
CompTIA Security+, CEH, , or similar certifications are preferred.
Proficiency with SIEM tools, security monitoring, network/system administration, basic scripting.
Strong analytical and problem-solving abilities to analyze and address complex security issues.
Good English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8180977
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
The position includes multiple challenging aspects, such as creation of detection analyses, attack scenarios research, team capabilities developments, client interactions, and in-depth investigation, which include host forensics work in both Windows and Linux systems, and cloud environments (e.g., AWS, GCP and Azure).



Main Responsibilities

Perform Post-Breach monitoring activities in global clients environment including in-depth triage of alerts and host forensics analysis.
Develop out-of-the-box and tailor-made analyses and detection to monitor the clients environment, often based on known threat actor tactics, techniques and procedures. This work may include research activities to support the detection development.
Support major Incident Response engagements with accurate detection after a potential active threat actor in the clients network.
Work on maintaining the necessary visibility and log forwarding for the ongoing monitoring engagements, including host-based data, Cloud environments, network devices, etc.
Apply proactive threat hunting approach in ongoing monitoring engagements, including forensic host and network-based analysis, malware hunt and wide IOC searches.
Develop capabilities and automations for alerts handling, triage and escalation, visibility maintenance, reporting, and more.
Onboard new customers by assessing their security posture, tailoring monitoring systems to their environment, and integrating their security frameworks into our services.
Often work alongside global clients security personnel when providing regular updates and following-up on alerts and security events.
Generate and provide reports and metrics on actionable data: incidents, weekly aggregation/trending, follow up procedures, visibility status, etc.
Requirements:
3-5 years of a relevant experience in the cyber security field from military service and/or industry in cyber defense roles.
Strong analytical thinking, problem-solving mindset and independency.
Independent, bright and positive analyst, who strive for excellency, and able to succeed in a dynamic environment.
Basic understanding of the life cycle of advanced security threats, attack vectors and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Good familiarity of common data and log sources for monitoring, detection and analysis (e.g., Event Logs, Firewall, EDR).
Strong technical understanding of network fundamentals, common Internet protocols and system and security controls.
Familiarity of system and security controls, including basic knowledge of host-based forensics and OS artifacts.
Proficient knowledge and experience with scripting (e.g., Python).
Familiarity with cloud infrastructure, web application and servers advantage.
Fluent English (written, spoken) a must.
Proven expertise in engaging with clients through effective communication and interpersonal skills.
Willingness to work off hours as required, with a potential traveling to clients
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8158621
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7, tiers 1-2. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8158584
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required SOC Analyst - US Market
Who We Are
Were passionate about what we do. We work as a team and embrace new ideas, wherever they come from. We also enjoy all the benefits of a startup environment, including quickly seeing the results of your work, making an outsized impact on our company, and solving a diverse set of engineering challenges.
Want to make a big difference? We encourage you to apply!
What will you do?
Proactively monitor and analyze security events and alerts for global customers.
Perform triage of incoming alerts - assess the priority, determine risk, and respond.
Create tickets and escalate them to higher-level security analysts and developers.
Maintain strong knowledge and awareness of the current threat landscape.
Develop internal tools and procedures to automate security analysis tasks.
Work outbound with global customers to create the best insights and actionable data for their needs.
Requirements:
Minimum of 1 year of experience in the Information Security field.
Native or near-native English communication skills, both written and verbal - MUST
Ability to work evening shifts and provide support for customers in U.S. time zones - MUST
Solid knowledge of network fundamentals, web application security (e.g., OWASP Top 10), and API protocols like REST, SOAP, and GraphQL.
At least 1 year of experience with Python and SQL for automation, scripting, and data manipulation tasks.
Ability to document technical topics clearly and effectively for both technical and non-technical audiences.
A collaborative team player with a customer-focused approach, balancing company priorities with user needs.
Advantage
Experience with a variety of Query Languages.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8140568
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Cloud Security Analyst to join our Product team and help expand the power.
In this role, youll play a key role in protecting our customers' cloud environments from cyber threats. Your work will directly contribute to customer success and push the boundaries of cloud security.
This isnt just a jobits a unique growth opportunity. Youll gain hands-on experience that can pave the way for exciting career paths in product management, security research, or development.
WHAT YOULL DO
Innovate and develop advanced detection mechanisms, algorithms, and automated solutions to accurately identify and classify technologies within cloud environments, enhancing our vulnerability management offering.
Analyze cloud services, APIs, and log payloads to ensure compliance with industry standards and customer requirements.
Stay current with the latest technologies and industry trends.
Implement customer requests and industry standards to position us as a market leader.
Collaborate with our Research and Backend teams.
Requirements:
Hands-on proficiency in Linux, Windows, Python, Bash, Docker, Kubernetes, PowerShell, and a strong understanding of the OSI model.
Solid knowledge of networking concepts and cloud infrastructure.
Proven experience in applying cybersecurity best practices to real-world scenarios.
Self-motivated and capable of working both independently and collaboratively within a team.
Strong communication skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8138730
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Malware Analysis Team Leader with a deep focus on cybercrime investigations to lead a dynamic team of experts dedicated to identifying, analyzing, publishing, and mitigating cybercrime-related threats. This leadership role will drive advanced malware analysis efforts, conduct threat research, publish in top conferences and blogs, and coordinate with internal and external stakeholders to combat and prevent cybercriminal activities. The ideal candidate will have strong technical expertise in malware reverse engineering, a deep understanding of cybercrime tactics, and excellent communication skills, including the ability to present findings clearly and publish research for internal stakeholders and the broader cybersecurity community.

Key Responsibilities
Lead the Malware Analysis Team: Manage and mentor a team of skilled researchers on identifying, analyzing, and mitigating malware associated with cybercrime, including ransomware, banking Trojans, exploit kits, and other forms of cybercriminal malware.
Cybercrime Threat Intelligence: Collaborate with threat intelligence teams to analyze malware in the context of cybercrime syndicates and criminal activity. Identify trends, tactics, and patterns in malware usage by cybercriminal groups and provide actionable intelligence to relevant teams and external partners.
Malware Reverse Engineering: Lead efforts in reverse-engineering malicious software, tracking variants, and identifying attack techniques, tactics, and procedures (TTPs) cybercriminal actors use.
Cross-Functional Collaboration: Work closely with internal teams (e.g., Incident Response, Threat Intelligence, SOC) and external stakeholders (e.g., law enforcement, CERT, threat intelligence providers) to share findings, collaborate on investigations and coordinate actions to disrupt cybercrime activities.
Publication and Thought Leadership: Produce detailed, high-quality research reports and technical papers based on malware analysis and cybercrime investigations. Contribute to the publication of findings in industry-leading forums, conferences, and journals, establishing the organization as a thought leader in cybersecurity.
Presentations and Reporting: Prepare and deliver presentations to technical and non-technical stakeholders, including executives, legal teams, and law enforcement. Communicate complex findings, research insights, and actionable intelligence on cybercrime and malware trends.
Training and Development: Mentored junior team members, providing guidance on malware analysis techniques, threat hunting, and reporting. Foster a culture of continuous improvement, encouraging knowledge sharing and professional development within the team.
Requirements:
5+ years of experience in malware analysis, cybercrime investigations, or related fields.
2+ years in a leadership or team management role with experience leading cybersecurity operations in high-stakes environments.
Expertise in malware reverse engineering (static and dynamic analysis).
Proficiency in using industry-standard tools such as IDA Pro, X64, VT, Etc.
Strong understanding of common malware types used in cybercrime (e.g., ransomware, keyloggers, exploit kits, mobile threats).
Development skills with Python, C/C++, Assembly, or other scripting languages for malware analysis and automation.
Cybercrime Knowledge: Strong understanding of cybercriminal tactics, techniques, and procedures (TTPs). Experience with investigating ransomware campaigns, fraud schemes, financially motivated attacks, and other forms of cybercrime.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8187128
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/04/2025
Location: Tel Aviv-Yafo
Job Type: Full Time
In this position you will
security analyst dedicated to a major customer
Be on the customer site 4 days a week leading all their related activities and will be the liaison between and the customer, will translate their security needs to features and work closely with our Product, Security, SOC, Dev teams on implementing the requirements
Implement customized rules to match security needs for the customer
Perform ongoing security analysis and triage of escalated and critical endpoint alerts
Participate in various stages of incident investigations and threat hunting
Requirements:
Current high Israeli security clearance (Level 2 and above)
3+ years of relevant cybersecurity experience in Incident Response, Endpoint Security, Digital Forensics
Solid foundation in networking protocols and architectures
Experience with a scripting language (Python, Bash, PowerShell, etc.)
Able to work both independently as well collaborate within a team in a remote work setting
Great written and oral communication skills
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8142199
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
3 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time and Multilingual
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.

Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8184834
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/05/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are seeking a Senior Threat Analyst to strengthen our cybersecurity threat intelligence capabilities. The ideal candidate will analyze complex datasets, identify and assess cyber threats, and develop actionable intelligence to mitigate risks from advanced persistent threats (APTs) and cybercriminal groups.
Responsibilities:
Analyze and interpret data from diverse internal and external sources to identify malicious activities and emerging threats.
Develop and maintain intelligence reports, threat actor profiles, and assessments of attack vectors and TTPs.
Enhance and maintain intelligence tools, processes, and platforms.
Collaborate with external threat intelligence communities to stay ahead of evolving threats.
Automate threat hunting and intelligence gathering through high-level programming and ETL pipelines.
Requirements:
5+ years of experience in Cybersecurity Threats Intelligence domain.
Proficiency in analyzing complex datasets and identifying threat patterns.
In-depth knowledge of APT tactics, attack vectors, and cybersecurity frameworks (e.g., MITRE ATT&CK, NIST).
Experience with sophisticated campaigns, including nation-state or cybercrime-driven operations.
Functional understanding of vulnerabilities, exploits, and CVEs with the ability to write automation/detection scripts.
Fluency in at least one programming language (Python, Go, Ruby, etc.).
Strong communication skills for both technical and non-technical audiences.
Ability to thrive in a fast-paced, collaborative environment.
Preferred Qualifications :
Expertise in hunting threat actors, analyzing campaigns, malware, and C2 servers.
Experience with advanced attack scenarios like DDoS, credential leaks, and network intrusions.
Background in designing and consuming data from ETL pipelines for intelligence collection.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8162456
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Business Intelligence Specialist to partner up with our team of Business Intelligence and QA Specialists and collaborate effectively to ensure the accuracy, quality, and performance of our partnership intelligence dashboards. This role will be instrumental in ensuring our data solutions drive key business decisions for our clients, providing oversight and guidance to ensure the teams effectiveness in monitoring affiliate performance data.

As a key member in our team, you will manage and lead quality assurance processes, provide actionable insights, and help streamline data monitoring and alert systems. If you have a passion for improving processes, and driving data accuracy in consumer intelligence, we want to hear from you!

Responsibilities:

In-Depth Data QA and Oversight: Continuously evaluate and improve data monitoring and QA processes to enhance team efficiency and data quality. Implement best practices and create standard operating procedures for data verification, analysis, and alert management.

Quality Assurance Supervision: Oversee the regular QA checks conducted on partnership intelligence dashboards to ensure data integrity and consistency. Take a proactive role in resolving discrepancies and ensure the timely delivery of accurate reports.

Data Analysis & Reporting: Lead the analysis of trends and patterns in affiliate performance data to uncover areas for improvement. Prepare and present findings to internal teams in an easily understandable format.

Alert Management Oversight: Supervise the alert management system to ensure relevant alerts are delivered accurately to clients in a timely manner. Work with the team to assess the impact of alerts and determine corrective actions based on client preferences.

Cross-Functional Collaboration: Work closely with internal teams to foster communication and collaboration, ensuring alignment between the QA team and other departments such as R&D.
Requirements:
Bachelor's degree in Business, Marketing, Data Science, or related field.
4+ years of experience in data quality assurance, business intelligence, or affiliate marketing, with at least 1 year in a management or supervisory role.
A proactive self-starter with the ability to multitask, navigate ambiguity, and prioritize competing demands effectively.
Proven experience in ensuring the accuracy and integrity of complex data sets.
Proficiency in data analysis tools, such as Google Sheets, Google Docs, Google Slides, MS Office Suite, MS Excel, SQL.
Strong problem-solving skills with a keen eye for detail.
Effective verbal and written communication skills, with the ability to translate complex data insights for non-technical stakeholders.
Familiarity with affiliate marketing concepts and terminology is highly desirable.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8140648
סגור
שירות זה פתוח ללקוחות VIP בלבד