דרושים » אבטחת מידע וסייבר » Cyber Threat Intelligence Analyst

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/06/2025
Location: Herzliya
Job Type: Full Time
We are looking for a talented Cyber Threat Intelligence analyst to join the AutoThreat automotive CTI team, and focus on investigating global automotive and smart mobility related cyber incidents and emerging deep and dark web threats.

As a Cyber Threat Intelligence Analyst you will be responsible to utilize our clear, deep and dark web threat intelligence platforms and tools to identify vulnerabilities, exploits, counterfeit and fraud within the automotive ecosystem.

We are looking for an independent analyst, capable of producing accurate intelligence in the automotive threat landscape to protect the software-defined vehicles of tomorrow.

This role is full-time and is Herzliya, Israel based.

Responsibilities:
Perform clear, deep and dark web research and social media monitoring related to automotive products, components and various threat actors targeting the automotive ecosystem.
Producing actionable CTI and mitigation recommendations to our customers in our CTI service and platform.
Research and implement new tools and data sources to expand analysis on emerging automotive related cyber threats.
Monitor and detect vulnerabilities impacting IT and automotive related components and software.
Identify threat actors across the clear, deep, and dark web to gain further intel.
Constant interaction with customers as well as Research, Product, CSM teams to consult, guide and provide best-in-class CTI deliverables.
Requirements:
Experience in cyber threat intelligence or equivalent role with familiarity with product intelligence, cybercrime communities and OSINT sources and tools.
Familiarity of IT-Product based threat intelligence deep and dark web monitoring experience.
Strong analytical, critical thinking, and communication skills.
Experience in a customer-facing role and able to summarize and present complex concepts in a clear and engaging manner.
English - full professional proficiency - a must
Vulnerability management background - advantage
Automotive threat intelligence background advantage
Proficient in multiple languages - advantage.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8231203
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 28 דקות
GotFriends
דרושים בGotFriends
מיקום המשרה: מספר מקומות
סוג משרה: משרה מלאה
החברה מפתחת שכבת אבטחה קריטית לכל ישום Blockchain, להבדל מהמתחרים הטכנולוגיה שלהם מותאמת לכל רשתות ה-Blockchain. נמצאים כעת לקראת צמיחה משמעותית בזכות ההישגים המרשימים של הטכנולוגיה והגדלת נפח הלקוחות.
החברה ממוקמת בתל אביב- קו רכבת, משלבת מודל עבודה היברידי ומונה 100 עובדים גלובלית.
מהות התפקיד: מעקב וניתוח איומי סייבר ממוקדים בתחום הקריפטו, הפקת דוחות מודיעיניים על קבוצות איומים, ומחקר על וקטורי התקפה בתחום הקריפטו, התחקות אחר תוקפים והצגת מגמות. עובדים עם Python, Elasticsearch, Kibana.
דרישות:
- 5 שנות ניסיון כ-Threat Intelligence Analyst
- ניסיון עם WEBINT/OSINT המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8238595
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/06/2025
Location: Herzliya
Job Type: Full Time
we are looking for a talented Cyber Threat Intelligence analyst to join the AutoThreat automotive CTI team, and focus on investigating global automotive and smart mobility related cyber incidents and emerging deep and dark web threats.
As a Cyber Threat Intelligence Analyst you will be responsible to utilize our clear, deep and dark web threat intelligence platforms and tools to identify vulnerabilities, exploits, counterfeit and fraud within the automotive ecosystem.
We are looking for an independent analyst, capable of producing accurate intelligence in the automotive threat landscape to protect the software-defined vehicles of tomorrow.
This role is full-time and is Herzliya, Israel based.
Responsibilities
Perform clear, deep and dark web research and social media monitoring related to automotive products, components and various threat actors targeting the automotive ecosystem.
Producing actionable CTI and mitigation recommendations to our customers in our CTI service and platform.
Research and implement new tools and data sources to expand analysis on emerging automotive related cyber threats.
Monitor and detect vulnerabilities impacting IT and automotive related components and software.
Identify threat actors across the clear, deep, and dark web to gain further intel.
Constant interaction with customers as well as Research, Product, CSM teams to consult, guide and provide best-in-class CTI deliverables.
Requirements:
Experience in cyber threat intelligence or equivalent role with familiarity with product intelligence, cybercrime communities and OSINT sources and tools.
Familiarity of IT-Product based threat intelligence deep and dark web monitoring experience.
Strong analytical, critical thinking, and communication skills.
Experience in a customer-facing role and able to summarize and present complex concepts in a clear and engaging manner.
English - full professional proficiency - a must
Vulnerability management background - advantage
Automotive threat intelligence background advantage
Proficient in multiple languages - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8232227
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/05/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
Required Intelligence Analyst
As an Intelligence Analyst, you will:
Create and manage relevant data collection while utilizing open sources as well as advanced collection tools
Grow expertise in the companys fields of interest, and become a domain expert
Identify gaps, inform and influence stakeholders through presentation of data-based recommendations
Support multiple teams and the decision-makers by providing them with both data and insights per ad-hoc assignments
Produce intelligence products at tactical, operational and strategic levels.
Requirements:
Minimum 4 years of experience in research or a related field with expertise in geopolitical/strategic and cyber threat intelligence analysis
Proficient knowledge and experience of online data collection
A combination of strong attention to details and seeing the whole picture
Familiarity with the cyber domain or a solid understanding of technology
Then we might have a match!
It would be great if you also:
Sc. in Industrial Engineering or other relevant education.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8197318
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/06/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
Position Overview:
our MDR team is at the forefront of worldwide data detection and response services. We lead and redefine how data should be monitored, and protected and how data breach incidents should be handled. Its a 24/7 global security service assisting customers to investigate and respond to security incidents.
A Senior (Level 3) Security Analyst within our MDR team is expected to serve as their teams technical lead and a key escalation point for complex security incidents.
In your role, you will lead complex investigations, working directly with customers by assisting them in investigating and responding to security incidents.
As a senior staff in your team, you are expected to mentor junior analysts, and drive continuous improvement of our detection and response capabilities. You will collaborate with internal and external stakeholders, and ensure best practices are followed across monitoring, detection, and incident response processes. This position requires a strong foundation in cybersecurity operations, a deep understanding of SIEM technologies and log sources, as well as the ability to train and document processes for others.
Responsibilities:
Incident Escalations & Investigations
Serve as an escalation point for security alerts and incidents, ensuring timely and thorough investigations.
Perform end-to-end incident handling, including scoping, containment, and eradication activities.
Coordinate and communicate with customers, leadership, and other stakeholders throughout the incident response lifecycle.
Understand, interpret, and analyze a diverse range of log sources (Exchange Online, Entra, Active Directory, Windows events, Azure, DNS, VPN, etc.).
Proactively identify potential threats and anomalies, recommending and implementing improvements in detection logic.
Training & Mentorship:
Assist in training and upskilling junior and mid-level analysts, including sharing best practices in investigations, threat hunting, and emerging threats.
Provide guidance in troubleshooting escalated issues, ensuring efficient knowledge transfer and professional growth within the team.
Contribute to the development, documentation, analysis, testing, and modification of threat detection systems and playbooks.
Provide feedback on gaps or improvements needed in processes, documentation, or technology.
Work closely with Team Leads and other senior staff to align on operational goals, SLA adherence, and service delivery standards.
Communicate findings, root causes, and recommended actions to both technical and non-technical stakeholders clearly and effectively.
Share insights and best practices with the broader team, championing a culture of continuous learning.
Requirements:
3+ years of experience in cybersecurity operations (monitoring, detection, investigation, and incident response) at a global cybersecurity company.
Advanced knowledge of SIEM technologies, including log collection, analysis, and correlation.
Expertise with various log sources (Exchange Online, Entra, Active Directory, Windows Events, SharePoint_0365, Azure, Syslog, DNS, OneDrive, VPN) and the ability to interpret and analyze these logs for security incidents.
Strong understanding of authentication protocols, both modern and legacy (Kerberos, NTLM).
Proven ability to handle escalations from end to end, including incident scoping, containment, eradication, and post-incident activities such as lessons learned and documentation.
Excellent communication skills in English (written and oral) to interface effectively with customers, peers, and leadership.
Ability to mentor and train junior analysts, providing feedback and sharing best practices.
Strong analytical and problem-solving skills, with an eye for detail and the capability to deliver autonomously.
Familiarity with common security tools and technologies, such as EDR, AV, DLP, DSPM, PAM, IAM, firewalls, and IDS/IPS.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8225615
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/06/2025
חברה חסויה
Location: Herzliya
Job Type: More than one
Are you a SOC Analyst?

We are expanding our global security group that helps protect our system, and we are looking for YOU!

As a SOC Analyst, you will identify and resolve highly complex issues to prevent cyber-attacks on our system, keep our information secure, and protect our systems from interruption of service, financial theft, and theft of sensitive data.

The position is hybrid.

We are located in Herzliya.

Scope of work:

Sunday-Thursday

Morning shift 06:00-14:00
Evening shift 14:00-22:00
Night shift 22:00-06:00
Friday

Morning shift 06:00-14:00
Saturday

Night shift 22:00-06:00
In total- 2-3 shifts per week

Your day 2 day:
Monitor and analyze security events and alerts from organization SIEM.
Respond to various notifications from monitoring systems to improve security.
Create tickets and escalate them to Security Engineers.
Conduct proactive threat hunting and help the security team build automation and dashboards from existing logs on the central SIEM system.
Answer technical security service requests.
Perform forensic investigations on security incidents.
Maintain strong knowledge and awareness of the current threat landscape.
Responding to mission-critical job failures.
Monitor for system failures and work according to pre-defined playbooks.
Monitor and alert for specific network operations failures.
Requirements:
Requirements:
1 year experience as a SOC analyst.
Knowledge of SIEM systems.
Knowledge in Systems, Networking, Security architecture, WAF, IPS, and EDR.
Understanding cybersecurity attacks and threats.
Strong written and verbal communication skills in English.
Analytical Skills for Incident Investigations.

Advantage:
Experience with Splunk.
Experience investigating cybersecurity incidents.
Office365 experience.
Experience with mail protection systems.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8218892
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/05/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
Required SOC Analyst Tier 1
As a SOC Analyst Tier 1, you will:
Work in shifts 247, including weekends and holidays
Proactively hunt and monitor cyber threats
Analyze raw data, traffic and TTPs to maintain a dynamic comprehensive threat model
Develop dashboard to handle security alerts and incidents
Work with forensic tools.
Requirements:
At least 1 year of experience as a SOC analyst
Knowledge in security analysis technologies (e.g., SIEM, FW, AV, IPS or EDR)
Experience in technical-oriented intelligence collection from open sources
Knowledge of cyberattack methodologies and tools
It would be great if you also:
Experience in querying and basic coding (e.g., SIEM languages)
Knowledge in Windows, Linux and security components
Completion of Cyber security courses and certificates.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8197313
סגור
שירות זה פתוח ללקוחות VIP בלבד