דרושים » אבטחת מידע וסייבר » Intelligence Analyst

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly motivated and skilled intelligence analyst with hands-on Python programming experience to join our Operation Security (OpSec) team. This role focuses on monitoring, analyzing, and automating the processing of intelligence-related data from multiple sources to ensure the stability, performance, and security of operations.
The ideal candidate has a strong background in cybersecurity monitoring combined with the ability to develop Python-based automations and analytical workflows to detect, investigate, and prevent security threats.
Key Responsibilities
Provide timely response to Operational Security (OpSec) incidents, triage alerts, and categorize issues for escalation to appropriate technical teams.
Monitor and analyze security data from multiple sources, including network logs, system logs, performance metrics, and customer reports.
Develop and maintain Python-based scripts and automations to:
Parse, normalize, and analyze large volumes of log and security data
Automate alert triage, reporting, and repetitive SOC workflows
Improve detection efficiency and response times
Communicate effectively with internal teams and customers to provide incident status updates and resolution details.
Requirements:
Experience working with network and system logs, security events, and performance metrics.
Ability to combine and analyze multiple datasets to identify security patterns and trends.
Experience with network monitoring and troubleshooting tools.
Hands-on experience with network sniffing tools.
Proficiency in Excel for data analysis and reporting.
Background in intelligence operations or intelligence analysis.
Strong Python programming skills, with experience in:
Data analysis (e.g., parsing logs, statistical analysis, trend detection)
Automation of monitoring, alerting, and reporting workflows
Education
Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field or equivalent hands-on experience in intelligence operations, automation, or security analysis.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547777
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/01/2026
Location: Tel Aviv-Yafo and Yokne`am
Job Type: Full Time
We are seeking a highly skilled and proactive Senior Cyber Security Threat Intelligence (CTI) Analyst to join the Networking product security team. In this critical role, you will function as a key defender of the technologies powering the worlds largest AI clusters. You will act as the eyes and ears of our product security organization, conducting investigative research into sophisticated adversaries and translating complex threat data into actionable intelligence. This is a hands-on role where your insights will directly influence our defensive posture and help eliminate threats before they manifest in the core of global AI infrastructure.

What You Will Be Doing:

You will serve as the intelligence core of our team dedicated to identifying, analyzing, and mitigating threats against our products and ecosystem:

Lead deep-dive OSINT and WEBINT research to identify emerging threats, conducting intelligence collection and analysis that leads to clear, actionable mitigation recommendations.
Leverage scripting (Python, Bash, etc.) and Generative AI tools to automate intelligence collection, triage, and analysis workflows.
Analyze Advanced Persistent Threats (APTs) and sophisticated adversaries, collaborating with multi-functional teams to detect, track, and eliminate potential risks to our networking portfolio.
Apply extensive insight into cyber operation phases to map adversary behavior, anticipate future movements, and harden our product development lifecycle with adoption of security improvements.
Drive threat hunting methodologies, proactively searching for indicators of compromise (IoCs) and hidden vulnerabilities within the products.
Translate complex technical findings into strategic intelligence reports for both technical collaborators and leadership, ensuring a clear and unified insight into the threat landscape.
Collaborate closely with incident response and engineering teams to ensure intelligence findings are seamlessly coordinated into other defensive tools and product security processes.
Requirements:
What We Need To See:
BSc or MSc in Computer Science, Computer Engineering, Cyber Security, or a related technical domain (or equivalent experience).
5+ years of proven experience in a dedicated Cyber Threat Intelligence (CTI) role within a large-scale or high-tech environment.
Technical proficiency in building automated intelligence pipelines through programming and the strategic use of Generative AI.
Expert-level knowledge of the CTI lifecycle, with a proven record of uncovering sophisticated cyber operations using diverse sources and techniques.
Strong technical background in analyzing advanced threats, capable of navigating through complex data to identify adversary infrastructure, intent, and tooling.
Deep understanding of the unique security concerns faced by global tech companies, including supply chain risks and intellectual property protection.
Outstanding analytical and interpersonal skills, with the ability to drive accountability and ensure intelligence leads to concrete security improvements.

Ways To Stand Out From The Crowd:
Direct experience with hardware and embedded devices technologies, specifically relating to networking or silicon security.
Professional background in Digital Forensics and Incident Response (DFIR), providing a comprehensive view of the threat actor journey.
Relevant industry certifications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8496501
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Managed Cloud Detection and Response Analyst to join our newly established team. The team is responsible for monitoring customers cloud environments and workloads, triaging security alerts, and mitigating cyber incidents.
WHAT YOULL DO
Continuously monitor customers cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents.
Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively.
Work closely with customer teams to guide and assist with investigation and remediation of incidents.
Create and deliver incident reports that document findings and response actions taken for customers.
Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customers specific cloud environment.
Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team.
Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods.
Requirements:
2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments.
Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure).
Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights.
Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security.
Excellent communication skills verbal and written both in Hebrew and English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8515991
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Cloud Security Analyst
Tel Aviv
We are using technology to transform transportation around the world. From changing a single persons daily commute to reducing humanitys collective environmental footprint - weve got huge goals.
As a Cloud Security Analyst, you will join our global SOC team. A small, highly technical team that owns key parts of our security operations. This role is perfect for someone who is motivated and eager to make an impact, and who wants to take meaningful ownership in a cloud-native environment.You will investigate real incidents, improve detections, collaborate with engineering, support AI initiatives, and strengthen our security posture end-to-end.
What Youll Do:
Monitor, investigate, and respond to security events across cloud and SaaS environments
Tune detections, signatures, and guardrails to reduce noise and improve accuracy
Develop and maintain SOC playbooks, processes, and response guidelines
Perform intrusion analysis and contribute to threat intelligence correlation
Conduct proactive threat hunting and surface emerging risks
Lead hands-on technical investigations and incident containment
Work with SecOps engineers to design automated remediation flows
Build dashboards, advanced alerts, and visibility for critical events
Continuously improve SOC capabilities by bringing new ideas and approaches.
Requirements:
Who You Are:
2-3 years hands-on experience in security operations, incident response, or a similar cybersecurity role.
Strong analytical and investigative skills with hands-on experience handling alerts
Motivated and eager to make an impact in a small, high-ownership team
Able to prioritize, multitask, and work independently in a fast-moving environment
A team player with strong communication and a proactive mindset
Solid understanding of cloud platforms (AWS) and practical experience improving cloud security.
Solid understanding of modern attack techniques, threat trends, and detection logic
Proven experience with attack and mitigation methods in complex cloud and SaaS environments
Proven experience in the following domains:
Public cloud(AWS) & SaaS security tools
Endpoint protection(XDR/EDR)
Email Protection
SIEM, SOAR, and Security monitoring and analytics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8519792
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
27/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Our Counter Adversary Operations (CAO) Elite is looking for a highly motivated, self-driven, detailed-oriented, and experienced Senior Analyst dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world.
In this role, you will leverage CrowdStrike CAO's extensive resources to provide advanced threat hunting expertise and intelligence analysis to safeguard our customers'; environments. You will develop a trusted partnership by helping customers identify and operationalize timely, actionable, and relevant threat intelligence and threat hunt findings.
This position offers exceptional growth opportunities, blending technical mastery with strategic advisory services, all powered by CrowdStrike's world-class intelligence and hunting capabilities.

After a period of learning our custom-built tool suite, workflows, and methodologies you will join other CAO Elite Analysts protecting our customer's networks by performing tailored threat hunting and customer specific threat intelligence operations, including:

Executing sophisticated threat hunting operations.

Providing high value, actionable, threat intelligence aligned to the customer's.

requirements using your expertise and knowledge of the threat landscape.

Delivering high-impact briefings and recommendations spanning threat hunting, dark web, and intelligence information relevant to your customer.

Responding to customers ad hoc requests for information and support.

Building lasting partnerships with customers.

What Youll Do:

Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for CAO Elite customers.

Perform threat hunting, research dark web data, and research tailored threat intelligence for CAO Elite customers based on their specific requirements and environment.

Prepare and deliver customer presentations relating to intelligence reports, dark web alerts, and threat hunting findings on a regular basis.

Respond to customer requests relating to threat intelligence, threat hunting, and dark web monitoring.
Requirements:
All candidates must possess the following qualifications:

5+ years of experience in two (or more) of the following areas:

Incident response or security operations.

Threat hunting.

Cyber Threat intelligence.

Dark web monitoring.

Exemplary organizational skills with the ability to communicate both executive and detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.

Presentation Delivery: a background in presenting, briefing, and delivering reports to stakeholders ranging from individual contributors to executives.

Incident Handling: experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists.

Intelligence Tradecraft: knowledge of cyber threat intelligence terminology and data communication concepts and technologies.

Ability to travel on short notice, up to 5% of the time.


Security Clearance:

Must hold an active Israeli Level 2 Security Clearance.


Location & Work Arrangement:

Must reside in Tel Aviv or surrounding metropolitan area.

Position requires onsite presence up to 5 days per week.


Bonus Points:

Understanding of contemporary scripting languages.

Familiarity with application programming interfaces (API).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8520030
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We're looking for a Application Security Product Analyst to join our Product team and spread our power. In this pivotal role, you will be the primary operator of our cutting-edge AI-driven Dynamic Application Security Testing (DAST) agent. You will bridge the gap between automated AI testing and security policy, defining the "rules of engagement" for our agents and ensuring they effectively simulate sophisticated attacks while maintaining operational safety.
WHAT YOULL DO
Oversee the daily deployment, health, and operation of DAST and penetration testing capabilities to ensure optimal scanning across diverse customer environments.
Develop and maintain attack policies and rules by creating and fine-tuning the logic that defines how the system identifies, prioritizes, and exploits vulnerabilities.
Analyze and validate findings by reviewing complex attack paths to reduce false positives and improve the core logic's performance.
Research novel attack vectors and emerging web/API threats to translate new techniques into executable behaviors for the DAST engine.
Collaborate on product evolution with R&D and Product teams, using operational insights to drive feature requests and continuous improvement.
Requirements:
Over 2 years of DAST and penetration testing expertise, including hands-on experience in application security or operating enterprise tools like Burp Suite, OWASP ZAP, or Acunetix.
Proven ability in security rule and policy development, specifically in writing custom scripts or signatures to translate vulnerability classes into detection rules.
Technical proficiency in web protocols and API standards, with a strong command of HTTP/S, REST, GraphQL, and authentication mechanisms like OAuth and SAML.
Proficiency in scripting languages such as Python, Go, or JavaScript to automate tasks and interact with the codebase.
An analytical mindset with the ability to diagnose complex logs and scans to distinguish between tool failures, configuration issues, and valid security findings.
BONUS POINTS
Knowledge of AI/ML and how LLMs or reinforcement learning agents operate within a cybersecurity context.
SaaS and cloud experience with familiarity in AWS, Azure, or GCP environments and modern cloud-native architectures.
A red teaming background with experience in simulated adversarial attacks and bypassing standard WAF or security controls.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8515912
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Analyst to join our MDR team. In this role, you will be part of our security function, focusing on proactive reviews and providing advanced guidance to customers. This is an opportunity to develop your expertise in cloud security while working closely with analysts, researchers, and engineers.
Responsibilities
Assist in fine-tuning our companys detection and response mechanisms.
Support proactive reviews of customer environments to identify risks, exposed attack surfaces, and recommend improvements.
Lead and conduct in-depth security investigations, documenting outcomes and developing playbooks to enhance future detection and response.
Collaborate with Security Analysts, Research, and Backend teams to enhance detection quality.
Contribute to the handling of complex or critical incidents escalated from Tier 1/2.
Participate in recurring customer meetings, helping translate security findings into clear, actionable recommendations.
Stay up to date with emerging threats, attack techniques, attack surfaces, and best practices in cloud security.
Contribute to the development and training of AI-driven detection models, leveraging machine learning to improve investigation accuracy and response efficiency.
Requirements:
1+ year of experience in cybersecurity, preferably in cloud or containerized environments.
Knowledge of detection engineering, incident response, or threat analysis.
Familiarity with Linux, networking fundamentals, and scripting (Python/Bash).
Exposure to cloud platforms (AWS/GCP/Azure) and container technologies (Docker/Kubernetes).
Strong communication and presentation skills, with the ability to engage directly with customers.
Ability to work under pressure and manage multiple tasks in a fast-paced environment.
Curiosity, problem-solving mindset, and willingness to learn and grow.
B.Sc. in Computer Science / Information Security - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522497
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
our company Intelligence seeks a Senior Intelligence Analyst for its Global Threat Analysis Cell (GTAC) to track and analyze targeted intrusion activity associated with Democratic Peoples Republic of Korea (DPRK)-nexus adversaries. The Analyst will monitor DPRK-nexus cyber operations, identify emerging trends and threats, investigate suspected DPRK-related adversary activity, and produce strategic and tactical intelligence assessments and products that directly inform our company customers.
What You'll Do:
Track adversary campaigns, tactics, techniques, and procedures (TTPs) through analysis of our companys unique telemetry, open-source data sets, and third-party intelligence
Author short and long format written reports with minimal supervision that apply analytic tradecraft, including appropriate use of estimative language, confidence levels, and structured analytic techniques. Collaborate across teams to inform various functions within our company Intelligence, as well as other company business units, to ensure comprehensive adversary tracking and deconfliction
Identify intelligence gaps, propose new research projects to address collection shortfalls, and develop initiatives to explore understand adversary intent, capabilities, and infrastructure
Conduct peer review of reporting by team members, and ensure all products meet our company Intelligences analytic standards for accuracy, clarity, and objectivity.
Prioritize, categorize, and respond to requests for information from internal and external customers
Conduct briefings as needed for a variety of levels of customers as requested (via either phone, video conference, webcast, in-person briefing, or industry conference).
Requirements:
Required:
Motivated self-starter with 2+ years experience in a threat intelligence environment, preferably with a practical focus on DPRK cyber operations
Hands-on knowledge of threat intelligence research/collection tools and analytical tradecraft methods
Ability to identify, organize, catalog, and track adversary tradecraft trends - often with incomplete data
Ability to produce quality finished intelligence products on short deadlines, as well as continuing to maintain analysis for and report on long-term strategic assessments with minimal assistance
Understanding of technical terminology, tools, and tactics employed by threat actors
Ability or willingness to learn to conduct basic technical analysis of the tools and tradecraft employed by threat actors, as well as to enumerate and monitor threat actors infrastructure
Experience effectively coordinating both research projects and written products among various sets of subject matter experts and technical specialists
Knowledge of geopolitical issues specific to DPRK (including Korean Peninsula affairs) and ability to use that information to support understanding
Undergraduate degree, military training or relevant experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8498479
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
7 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
our company Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Native Spanish speaker
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541072
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
At our company, we empower people to be their best selves and do their best work. The Security Analyst role strengthens our ability to detect and respond to emerging mobile threats. With increasing mobile attacks and zero-day exploits, we need dedicated analysts to proactively protect our customers and expand detection coverage. As the analysts team has grown, this role now allows for broader coverage of emerging mobile threats and enables analysts to take on more diverse responsibilities. The expanded scope supports comprehensive threat research, detection development, and incident response, ensuring work is thorough, prioritized, and aligned with evolving security challenges.

What you can expect to do in this role:
Research new ways to detect malicious activity on using a wide variety of custom-built tooling.
Participate on research how to protect users from 0-day attacks.
Perform analysis of detections according to the assignment to determine accuracy and precisions and tune detections accordingly based on results.
Stay up to date on the latest malware trends and design detections accordingly.
Support sales and marketing by timely information about emerging threats and trends.
Analyze device logs and search for malicious signs.
Write and manage detection patterns and algorithms to detect malicious mobile threats in Android and iOS devices.
Perform other duties and special projects as assigned.
Requirements:
What we are looking for:
Minimum 1-2 years of relevant professional experience.
Experience in extracting and analyzing data from mobile devices.
An understanding of cyber security and intrusion detection.
Excellent programming/scripting skills (Python).
Mobile Malware Analysis expertise and strong interest in mobile security.
Great presentation skills and fluency in English.
Experience with detecting malware using Yara rules, an overall comprehensive understanding of incident response, a knowledge of using databases and writing queries (e.g. SQL, KQL) and ability to find and run a mobile exploits are a plus.
Customer value focus with the ability to quickly iterate based on emerging threats and customer feedback is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8495641
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a SaaS / AI Security Analyst to join our Security Research team in a newly created, high-impact role.

This position sits at the intersection of security research, analytical thinking, AI systems, and product impact, and plays a key role in shaping how AI-driven insights are delivered to our customers.

About the Role

As a SaaS / AI Security Analyst, your work will directly influence how security insights, alerts, and intelligence are generated, structured, and presented to customers, and improve and scale the AI capabilities that power our security platform. We are looking for someone with strong cyber security understanding, AI passion, technical and analytical skills.



Responsiblities:

Improve and optimize internal AI systems used to generate security content and insights for customers
Scale SaaS/AI discovery, posture management and threat detection capabilities across the platform
Translate security context, intent, and reasoning into structured, engineering-ready AI workflows
Work with LLMs to make security intelligence and data accessible, clear, and actionable for customers
Collaborate closely with the field, customers and prospects and internally with Product, and Engineering teams
Take full ownership of ideas and initiatives, from concept to production impact
Requirements:
3+ years of experience in Security Research / Data Science / Product Analysis from product companies or military service
Security background from cyber companies / military service - a must
Passion for AI tools and hands-on experience in different AI tools
Comfortable working hands-on with code.
Creative problem solver with strong intuition and resourcefulness
Strong communication and collaboration skills; customer- and service-oriented mindset
High ownership, proactivity, hunger to learn, and motivation to build
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522350
סגור
שירות זה פתוח ללקוחות VIP בלבד