דרושים » אבטחת מידע וסייבר » Cyber Threat Intelligence Analyst- Thai Speaker

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
3 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time and Multilingual
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.

Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8184834
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/05/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are seeking a Senior Threat Analyst to strengthen our cybersecurity threat intelligence capabilities. The ideal candidate will analyze complex datasets, identify and assess cyber threats, and develop actionable intelligence to mitigate risks from advanced persistent threats (APTs) and cybercriminal groups.
Responsibilities:
Analyze and interpret data from diverse internal and external sources to identify malicious activities and emerging threats.
Develop and maintain intelligence reports, threat actor profiles, and assessments of attack vectors and TTPs.
Enhance and maintain intelligence tools, processes, and platforms.
Collaborate with external threat intelligence communities to stay ahead of evolving threats.
Automate threat hunting and intelligence gathering through high-level programming and ETL pipelines.
Requirements:
5+ years of experience in Cybersecurity Threats Intelligence domain.
Proficiency in analyzing complex datasets and identifying threat patterns.
In-depth knowledge of APT tactics, attack vectors, and cybersecurity frameworks (e.g., MITRE ATT&CK, NIST).
Experience with sophisticated campaigns, including nation-state or cybercrime-driven operations.
Functional understanding of vulnerabilities, exploits, and CVEs with the ability to write automation/detection scripts.
Fluency in at least one programming language (Python, Go, Ruby, etc.).
Strong communication skills for both technical and non-technical audiences.
Ability to thrive in a fast-paced, collaborative environment.
Preferred Qualifications :
Expertise in hunting threat actors, analyzing campaigns, malware, and C2 servers.
Experience with advanced attack scenarios like DDoS, credential leaks, and network intrusions.
Background in designing and consuming data from ETL pipelines for intelligence collection.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8162456
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Malware Analysis Team Leader with a deep focus on cybercrime investigations to lead a dynamic team of experts dedicated to identifying, analyzing, publishing, and mitigating cybercrime-related threats. This leadership role will drive advanced malware analysis efforts, conduct threat research, publish in top conferences and blogs, and coordinate with internal and external stakeholders to combat and prevent cybercriminal activities. The ideal candidate will have strong technical expertise in malware reverse engineering, a deep understanding of cybercrime tactics, and excellent communication skills, including the ability to present findings clearly and publish research for internal stakeholders and the broader cybersecurity community.

Key Responsibilities
Lead the Malware Analysis Team: Manage and mentor a team of skilled researchers on identifying, analyzing, and mitigating malware associated with cybercrime, including ransomware, banking Trojans, exploit kits, and other forms of cybercriminal malware.
Cybercrime Threat Intelligence: Collaborate with threat intelligence teams to analyze malware in the context of cybercrime syndicates and criminal activity. Identify trends, tactics, and patterns in malware usage by cybercriminal groups and provide actionable intelligence to relevant teams and external partners.
Malware Reverse Engineering: Lead efforts in reverse-engineering malicious software, tracking variants, and identifying attack techniques, tactics, and procedures (TTPs) cybercriminal actors use.
Cross-Functional Collaboration: Work closely with internal teams (e.g., Incident Response, Threat Intelligence, SOC) and external stakeholders (e.g., law enforcement, CERT, threat intelligence providers) to share findings, collaborate on investigations and coordinate actions to disrupt cybercrime activities.
Publication and Thought Leadership: Produce detailed, high-quality research reports and technical papers based on malware analysis and cybercrime investigations. Contribute to the publication of findings in industry-leading forums, conferences, and journals, establishing the organization as a thought leader in cybersecurity.
Presentations and Reporting: Prepare and deliver presentations to technical and non-technical stakeholders, including executives, legal teams, and law enforcement. Communicate complex findings, research insights, and actionable intelligence on cybercrime and malware trends.
Training and Development: Mentored junior team members, providing guidance on malware analysis techniques, threat hunting, and reporting. Foster a culture of continuous improvement, encouraging knowledge sharing and professional development within the team.
Requirements:
5+ years of experience in malware analysis, cybercrime investigations, or related fields.
2+ years in a leadership or team management role with experience leading cybersecurity operations in high-stakes environments.
Expertise in malware reverse engineering (static and dynamic analysis).
Proficiency in using industry-standard tools such as IDA Pro, X64, VT, Etc.
Strong understanding of common malware types used in cybercrime (e.g., ransomware, keyloggers, exploit kits, mobile threats).
Development skills with Python, C/C++, Assembly, or other scripting languages for malware analysis and automation.
Cybercrime Knowledge: Strong understanding of cybercriminal tactics, techniques, and procedures (TTPs). Experience with investigating ransomware campaigns, fraud schemes, financially motivated attacks, and other forms of cybercrime.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8187128
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Cyber Security Analyst
About the Role:
As a Cyber Security Analyst, you will play a critical role in safeguarding our cloud-based IT infrastructure, products and customers. You will proactively manage security incidents, collaborate closely with various teams, and continuously enhance our security operations and response capabilities.
Key Responsibilities:
Investigate, analyze, and respond to security incidents escalated by our SIEM/SOC service and other internal sources.
Serve as the primary focal point with our SIEM/SOC provider, maintaining high service standards, expanding log coverage, enhancing detection capabilities, and optimizing workflows.
Lead and coordinate incident response activities, ensuring thorough reporting and actionable insights.
Actively participate in developing and refining our incident response playbooks, policies, and security procedures.
Own the handling of hacking and abuse incidents affecting our products and customers, conducting thorough investigations with various tools, proactively blocking abusive accounts, and updating security rules.
Collaborate cross-functionally with IT, Devops, Customer Support, Legal, and other stakeholders to effectively remediate security incidents and strengthen our overall security posture.
Requirements:
3+ years of experience in Security Operation Centers (SOC), Incident Response, or similar roles, ideally within cloud-native or SaaS-based environments.
Proven experience handling cyber security alerts and incidents, analyzing threats, creating reports, playbooks and procedures.
Proficiency with various operating systems (Windows, Linux, MacOS) and familiarity with diverse IT environments.
Hands-on experience with IR tools and technologies such as SIEM, log management, threat intelligence, forensics, malware testing etc.
Solid knowledge of security tools such as malware detection (EDR/XDR), email & web filtering, firewalls, and identity management.
Solid knowledge of cloud infrastructure security practices (Azure, a must), including understanding cloud architecture, identity management, and security controls.
Self motivated, with excellent analytical and problem-solving abilities, with the capability to handle multiple tasks simultaneously.
Strong interpersonal and communication skills, with the ability to collaborate effectively with technical and non-technical stakeholders.
Fluent in Hebrew, with strong English communication skills, both written and verbal.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8162643
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/05/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
seeking an experienced Cyber Threat Researcher to join our cyber research team. This role involves in-depth research into SaaS application security, identifying misconfigurations, and providing insights that help secure our customers SaaS environments. Youll work closely with product, marketing, and R&D teams to ensure your research contributes to developing cutting-edge security features and customer value.

Key Responsibilities
Conduct Security Research: Conduct in-depth research into security risks and misconfigurations associated with SaaS applications, identifying trends and opportunities to enhance product capabilities.
API Analysis: Review SaaS application APIs to assess security functionalities, and determine how to leverage them for enhanced protection.
Cyber Threat Intelligence: Analyze emerging cyber threats and breaches to understand attack vectors, risks, and trends, applying this knowledge to enhance the security posture of our product and customers.
Collaborate Across Teams: Partner with product, R&D, and marketing teams to translate research findings into valuable product features and contribute to security-focused publications and thought leadership.
Requirements:
3+ years of experience in cyber threat research, security research, or related fields.
Experience with APIs and the ability to interpret API documentation to understand data extraction and actions possible via SaaS application APIs.
Solid knowledge of cyber attack frameworks such as MITRE ATT&CK and familiarity with TTPs and real-world cyber threats.
Excellent collaboration skills, with experience working cross-functionally with product, marketing, and R&D teams.
Strong problem-solving and critical thinking abilities, with a proven ability to analyze complex cyber threats and recommend appropriate actions.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8165205
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Cyber Security Engineer in a fast-expanding operation team, you will be responsible for onboarding new global clients to the MXDR services, developing and maintaining detection scenarios and alerts, analysing the client's environment, and providing technical support and guidance to clients. To excel in this role, you will demonstrate strong technical aptitude, dedication to delivering high-quality work, and a cooperative approach to teamwork.



Main Responsibilities:

Lead the onboarding process for all new clients joining the MXDR services, working closely with the clients IT and security teams to ensure smooth implementations.
Develop detection scenarios and alerts for XDR solution (Velocity) to ensure effective threat detection and response.
Oversee Velocity KPIs and measurements set by the client, adjusting, analyzing and maintaining them according to their needs and tracking the impact of the platform on the client's networks, endpoints, applications, and cloud environments.
Continuously improve Velocity monitoring capabilities and keep up-to-date with the latest developments in the cyber threat landscape.
Provide technical support and guidance to clients on Velocity security-related issues, including implementing security best practices and ensuring compliance with industry standards.
Requirements:
At least 4 years of hands-on experience as a Cyber Security Engineer in the cyber security industry.
Relevant experience may include working as a SOC/MSSP Integrator, SOC/MSSP Tier 3 Analyst with integration experience, or Cyber Security Engineer role.
Very high proficiency in English (written and spoken).
Experience in implementing EDR, SIEM, email security, WAF, NAC, and firewall cyber security solutions.
Experience with providing technical guidance and support to global clients.
Familiarity with log collection methodologies and systems, auditing policies, and maintaining visibility across networks, hosts, and cloud environments.
Deep understanding and proven experience working with cloud security environments, architectures, and solutions.
Demonstrated experience working with Linux operating systems (proficiency in Linux command-line tools, including file manipulation, system administration, and troubleshooting).
Experience working with relational databases, preferably SQL.
Familiarity with cyber security industry standards and best practices.
Excellent problem-solving skills and the ability to work independently.
Advanced familiarity with the cybersecurity threat landscape and attack scenarios.
Excellent communication skills, including strong ability to elaborate on a technical idea.
Proven experience with OT environments significant advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8158587
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
The position includes multiple challenging aspects, such as creation of detection analyses, attack scenarios research, team capabilities developments, client interactions, and in-depth investigation, which include host forensics work in both Windows and Linux systems, and cloud environments (e.g., AWS, GCP and Azure).



Main Responsibilities

Perform Post-Breach monitoring activities in global clients environment including in-depth triage of alerts and host forensics analysis.
Develop out-of-the-box and tailor-made analyses and detection to monitor the clients environment, often based on known threat actor tactics, techniques and procedures. This work may include research activities to support the detection development.
Support major Incident Response engagements with accurate detection after a potential active threat actor in the clients network.
Work on maintaining the necessary visibility and log forwarding for the ongoing monitoring engagements, including host-based data, Cloud environments, network devices, etc.
Apply proactive threat hunting approach in ongoing monitoring engagements, including forensic host and network-based analysis, malware hunt and wide IOC searches.
Develop capabilities and automations for alerts handling, triage and escalation, visibility maintenance, reporting, and more.
Onboard new customers by assessing their security posture, tailoring monitoring systems to their environment, and integrating their security frameworks into our services.
Often work alongside global clients security personnel when providing regular updates and following-up on alerts and security events.
Generate and provide reports and metrics on actionable data: incidents, weekly aggregation/trending, follow up procedures, visibility status, etc.
Requirements:
3-5 years of a relevant experience in the cyber security field from military service and/or industry in cyber defense roles.
Strong analytical thinking, problem-solving mindset and independency.
Independent, bright and positive analyst, who strive for excellency, and able to succeed in a dynamic environment.
Basic understanding of the life cycle of advanced security threats, attack vectors and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Good familiarity of common data and log sources for monitoring, detection and analysis (e.g., Event Logs, Firewall, EDR).
Strong technical understanding of network fundamentals, common Internet protocols and system and security controls.
Familiarity of system and security controls, including basic knowledge of host-based forensics and OS artifacts.
Proficient knowledge and experience with scripting (e.g., Python).
Familiarity with cloud infrastructure, web application and servers advantage.
Fluent English (written, spoken) a must.
Proven expertise in engaging with clients through effective communication and interpersonal skills.
Willingness to work off hours as required, with a potential traveling to clients
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8158621
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7, tiers 1-2. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8158584
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Provide immediate onboarding activities such as installation and training for IL and APAC, commercial customers
Manage the assigned customers to the established SLA
Assist and provide expert deployment, operational best practice
Translate customer product usage data into actionable advice for customers
Establish regular touch-points with assigned customers per the established SLAs, to review progress against strategic and technical objectives
Take technical ownership of the entire customer lifecycle where you will develop and implement strategies to increase usage, adoption, and growth.
Assist customers with planning and execution of technical solution implementations, and removing technical blockers
Lead complex implementation and onboarding projects for products and services.
Deliver professional and technical account management services following the best practices and established procedures through proactive communication, strategic advisory, technical project management, service reviews, escalation management, training, and more.
Work closely with Product, Engineering, Support teams as well as Upper Management, and Sales to advocate customer needs, resolve technical & business issues, defining feature requests, identifying growth opportunities, and collecting customers feedback
Proactively identify issues and coordinate with teams to proactively remediate issues as they are identified. Leverage internal tools, including Gainsight, to centrally archive customer activity and other key data points.
Requirements:
A problem-solver with at least 7 years of experience in field engineering: Technical Account Manager / Technical Support Engineer (Tier 2/3) - Pre-Post Sales Engineer, Professional services consultant
Must have experience in offensive security: BAS, CTEM, threat hunting, red teaming.
Operational experience with the following technologies: SIEM (Splunk, IBM QRadar, etc), Firewalls (Palo Alto Networks), Endpoint Security, Vulnerability Management, Threat Intelligence Platforms & Pen-testing platforms.
Strong background in the cybersecurity ecosystem (Application and/or Endpoint security)
Multi-OS support experience: Windows, Mac & Linux
Experience with enterprise security products and/or offerings
Strong knowledge of cloud architecture as well as on-premise IT landscape
Solid understanding of IT security strategies
Knowledge of cloud technology (AWS, Azure, GCP)
Excellent business and written and verbal communication skills - able to simplify complex topics in a friendly and approachable manner for both executive and end-user audiences
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8142207
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Business Intelligence Specialist to partner up with our team of Business Intelligence and QA Specialists and collaborate effectively to ensure the accuracy, quality, and performance of our partnership intelligence dashboards. This role will be instrumental in ensuring our data solutions drive key business decisions for our clients, providing oversight and guidance to ensure the teams effectiveness in monitoring affiliate performance data.

As a key member in our team, you will manage and lead quality assurance processes, provide actionable insights, and help streamline data monitoring and alert systems. If you have a passion for improving processes, and driving data accuracy in consumer intelligence, we want to hear from you!

Responsibilities:

In-Depth Data QA and Oversight: Continuously evaluate and improve data monitoring and QA processes to enhance team efficiency and data quality. Implement best practices and create standard operating procedures for data verification, analysis, and alert management.

Quality Assurance Supervision: Oversee the regular QA checks conducted on partnership intelligence dashboards to ensure data integrity and consistency. Take a proactive role in resolving discrepancies and ensure the timely delivery of accurate reports.

Data Analysis & Reporting: Lead the analysis of trends and patterns in affiliate performance data to uncover areas for improvement. Prepare and present findings to internal teams in an easily understandable format.

Alert Management Oversight: Supervise the alert management system to ensure relevant alerts are delivered accurately to clients in a timely manner. Work with the team to assess the impact of alerts and determine corrective actions based on client preferences.

Cross-Functional Collaboration: Work closely with internal teams to foster communication and collaboration, ensuring alignment between the QA team and other departments such as R&D.
Requirements:
Bachelor's degree in Business, Marketing, Data Science, or related field.
4+ years of experience in data quality assurance, business intelligence, or affiliate marketing, with at least 1 year in a management or supervisory role.
A proactive self-starter with the ability to multitask, navigate ambiguity, and prioritize competing demands effectively.
Proven experience in ensuring the accuracy and integrity of complex data sets.
Proficiency in data analysis tools, such as Google Sheets, Google Docs, Google Slides, MS Office Suite, MS Excel, SQL.
Strong problem-solving skills with a keen eye for detail.
Effective verbal and written communication skills, with the ability to translate complex data insights for non-technical stakeholders.
Familiarity with affiliate marketing concepts and terminology is highly desirable.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8140648
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
This executive role sits at the core of Cyber Security Services group and reports directly to the SVP Cyber Security Services. The VP will also serve as a member of the Services Management Team, contributing to the strategic direction and operational quality of service delivery. 



Main Responsibilities: 

Lead global Incident Response operations, overseeing global IR teams and ensuring standards are upheld in all engagements. 
Act as the executive escalation point for critical incidents, providing high-level guidance to C-level executives and board-level stakeholders under active attack. 
Define and execute the strategic direction of IR practices, aligning with evolving threat landscapes, client needs, and business objectives. 
Advance global IR methodologies, tools, and standards, ensuring they scale effectively and maintain the highest quality across all regions and client engagements. 
Ensure consistent, high-end service, including adaption of local market approaches to regulatory environments as needed. 
Shape the leadership culture within the IR organization by mentoring regional leads, aligning global talent development with strategic goals, and driving excellence through empowerment and accountability. 
Represent at executive briefings, industry events, and client meetings; contribute to global business development and thought leadership efforts. 
Collaborate closely with peers in the Services Management team to drive cross-functional alignment, innovation, and efficiency across all service lines. 
Requirements:
At least 10 years of cybersecurity experience, including leadership roles within Incident Response or cyber operations. 
Proven track record of leading global teams through meaningful tasks and client engagements. 
Deep understanding of attack/defense and threat intelligence strategies. 
Hands-on expertise in cybersecurity, forensics, and IR methodologies advantage. 
Strong executive communication skills, with the ability to influence and advise clients during crisis situations. Fluent in English. 
Proven experience operating in dynamic, client-facing contexts. Experience in consulting or professional services environments advantage.  
Willingness to travel internationally on short notice in support of critical engagements. 
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8158597
סגור
שירות זה פתוח ללקוחות VIP בלבד