דרושים » אבטחת מידע וסייבר » Cyber Threat Intelligence Analyst

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 1 שעות
Location: Merkaz
Job Type: Full Time and Hybrid work
we are looking for a Cyber Threat Intelligence Analyst to join our Cyber team
mission is to provide easy access to high quality web content to companies who wish to focus on data analysis and not data collection.
We work to provide access to the biggest data repositories in each vertical we serve, and we take pride in our ability to quickly take care of our clients, and fulfill their data requirements.
What Youll be Doing:
Maintain deep, ongoing knowledge of deep and dark web sources, actively tracking forums, marketplaces, blogs, and chat platforms, while ensuring data coverage, quality, and continuity.
Perform continuous cyber threat research across the cyber landscape, maintaining up-to-date knowledge of trends and incidents across malware campaigns, ransomware attacks, and data breaches, including threat profiling and ecosystem analysis to enhance detections and customer outcomes.
Own the technical delivery of cyber trials by building tailored POCs, validating data relevance, and demonstrating measurable value aligned with customer KPIs.
Act as a technical point of contact for customers, supporting investigations, resolving data and coverage issues, and contributing to retention and expansion efforts.
Collaborate closely with Product and Development teams to improve data deliverables and help define and develop new product capabilities and features based on customer needs and threat-landscape insights.
Requirements:
2-4 years of experience as an OSINT / WEBINT analyst, cyber intelligence analyst, or in a similar investigative role.
Hands-on experience conducting cyber investigations, analyzing online sources, and producing actionable intelligence.
Strong familiarity with deep and dark web environments, forums, marketplaces, and underground ecosystems (advantage).
Experience working with global customers in a B2B SaaS environment and supporting customer-facing technical engagements.
Fluent English (written, spoken, and reading).
Strong ability to multitask, manage priorities, and operate effectively in a fast-paced environment.
Excellent communication and collaboration skills, with the ability to work cross-functionally with Sales, Product, and Development teams.
Good technological understanding, fast learning capabilities, and strong analytical thinking.
Highly motivated, ambitious, and driven to grow within a cyber intelligence environment.
At least 1 year of experience as a Cyber Analyst - an advantage.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565096
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
our company Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Native Spanish speaker
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541072
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
02/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are backed by top-tier global investors, including Sequoia Capital, Ribbit Capital, and Cyberstarts-firms known for supporting the most innovative and influential companies in technology and cybersecurity.

In this role, you will be responsible for:

Tracking and evaluating crypto-focused cybercriminals, including the tools, techniques, and procedures (TTPs) used by attackers, their motivations, and industry-wide trends.
Producing and presenting intelligence reports on relevant threat groups and campaigns, detailing methodologies and the motivations driving the activities.
Conducting research into both on-chain and off-chain crypto attack vectors, identifying attacker interests, and uncovering root causes behind incidents.
Assisting in the development of prevention strategies and detection mechanisms to mitigate future attacks.
Collecting and managing information from diverse sources such as social media platforms, messaging apps, forums, the dark web, news feeds, and other open and covert channels.
Utilizing advanced tools and investigative techniques, including OSINT and HUMINT methodologies, to generate accurate and relevant intelligence.
Communicating with customers regarding potential risks and threats, as well as working closely with Customer Success, Marketing, and Sales teams.
Requirements:
Minimum of 3 years of experience in intelligence analysis, with a focus on WEBINT / OSINT.
Strong understanding of Cyber Threat Intelligence (CTI), the cybercrime ecosystem, and underground information sources.
Excellent analytical thinking and report-writing capabilities, supported by a proven track record.
Fluent in English, both written and spoken.
A proactive, team-oriented attitude and strong multitasking skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8528643
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
27/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Our Counter Adversary Operations (CAO) Elite is looking for a highly motivated, self-driven, detailed-oriented, and experienced Senior Analyst dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world.
In this role, you will leverage CrowdStrike CAO's extensive resources to provide advanced threat hunting expertise and intelligence analysis to safeguard our customers'; environments. You will develop a trusted partnership by helping customers identify and operationalize timely, actionable, and relevant threat intelligence and threat hunt findings.
This position offers exceptional growth opportunities, blending technical mastery with strategic advisory services, all powered by CrowdStrike's world-class intelligence and hunting capabilities.

After a period of learning our custom-built tool suite, workflows, and methodologies you will join other CAO Elite Analysts protecting our customer's networks by performing tailored threat hunting and customer specific threat intelligence operations, including:

Executing sophisticated threat hunting operations.

Providing high value, actionable, threat intelligence aligned to the customer's.

requirements using your expertise and knowledge of the threat landscape.

Delivering high-impact briefings and recommendations spanning threat hunting, dark web, and intelligence information relevant to your customer.

Responding to customers ad hoc requests for information and support.

Building lasting partnerships with customers.

What Youll Do:

Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for CAO Elite customers.

Perform threat hunting, research dark web data, and research tailored threat intelligence for CAO Elite customers based on their specific requirements and environment.

Prepare and deliver customer presentations relating to intelligence reports, dark web alerts, and threat hunting findings on a regular basis.

Respond to customer requests relating to threat intelligence, threat hunting, and dark web monitoring.
Requirements:
All candidates must possess the following qualifications:

5+ years of experience in two (or more) of the following areas:

Incident response or security operations.

Threat hunting.

Cyber Threat intelligence.

Dark web monitoring.

Exemplary organizational skills with the ability to communicate both executive and detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.

Presentation Delivery: a background in presenting, briefing, and delivering reports to stakeholders ranging from individual contributors to executives.

Incident Handling: experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists.

Intelligence Tradecraft: knowledge of cyber threat intelligence terminology and data communication concepts and technologies.

Ability to travel on short notice, up to 5% of the time.


Security Clearance:

Must hold an active Israeli Level 2 Security Clearance.


Location & Work Arrangement:

Must reside in Tel Aviv or surrounding metropolitan area.

Position requires onsite presence up to 5 days per week.


Bonus Points:

Understanding of contemporary scripting languages.

Familiarity with application programming interfaces (API).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8520030
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Native French speaker
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8540425
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
We are on an expedition to find you, someone who is passionate about turning research into reliable, production-grade capabilities. Youll play a major role in building and shaping our next-gen CTI platform across attribution, pivoting, infrastructure prediction, EASM, and the STIX/OpenCTI knowledge base.
The Responsibilities
Execute the CTI research roadmap across threat actor attribution, adversary infrastructure analysis, EASM insights, and STIX-based knowledge management.
Conduct in-depth infrastructure and campaign analysis, including domain/IP relationships, hosting patterns and certificates.
Identify, validate, and track Indicators of Compromise (IOCs) and emerging threats using passive sources and approved active campaigns.
Normalize, enrich, deduplicate, and maintain intelligence in STIX 2.1, aligned with internal ontology and quality standards.
Collaborate with the Engineering, MLOps, and Data teams to translate intelligence into actionable intelligence, alerts, and customer-facing outputs.
Produce high-quality intelligence reports, threat briefs, watchlists, and early-warning assessments for internal teams and customers.
Support investigations by providing contextual analysis, confidence scoring, and evidence-backed assessments.
Ensure adherence to governance, ethics, sourcing, provenance, and data-quality standards across all intelligence outputs.
Requirements:
4+ years of experience in Cyber Threat Intelligence, SOC/IR intelligence support, or adversary infrastructure analysis.
Strong understanding of DNS, IPs, ASNs, hosting/cloud providers, TLS/PKI, domain lifecycle, and phishing infrastructure.
Hands-on experience with open-source and commercial CTI sources (OSINT, feeds, telemetry, reputation systems).
Practical knowledge of STIX 2.1, MITRE ATT&CK, TAXII; experience with OpenCTI and is a strong advantage.
Ability to perform passive discovery and controlled active validation, with a focus on accuracy, evidence discipline, and noise reduction.
Experience using Python for analysis and enrichment (pandas, notebooks); familiarity with Neo4j or Elasticsearch is a plus.
Strong analytical and threat-intelligence writing skills, able to translate technical findings into clear, actionable insights.
Comfortable working in a collaborative, version-controlled environment (Git), with attention to documentation and reproducibility.
Curious, methodical, and impact-driven mindset with a strong sense of intelligence rigor and accountability.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8561125
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Senior Threat Intelligence Researcher, you will be responsible for tracking advanced adversaries and leveraging your deep technical expertise across attacker capabilities, infrastructure, and tactics. You will create and refine approaches to uncover and monitor active threat actors, as well as surface irregular and emerging behaviors in the broader threat landscape. The intelligence you generate will directly strengthen our companys understanding of threat actors and will inform proactive hunting, detection engineering, and defensive decision-making.
The Responsibilities
Lead complex threat intelligence investigations through in-depth analysis of the global threat landscape, with a focus on advanced and state-linked actors.
Define and prioritize threat research focus areas (actors, campaigns, sectors, techniques) aligned with our companys customers and product roadmap.
Deliver actionable cyber threat intelligence and design and execute hunting campaigns using analytics, automation, and advanced AI capabilities.
Curate and maintain structured knowledge on actors, campaigns, infrastructure, and TTPs in our companys internal threat knowledge base.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
7+ years of experience in cyber security, with significant hands-on experience in threat intelligence research focused on APTs or state-linked actors.
Detailed understanding of existing APT groups historical activities, TTPs, motivations, and targeting patterns.
Strong investigative mindset, high level of intellectual curiosity, and comfort working with incomplete or ambiguous data.
Proficiency in infrastructure research, including WHOIS, passive DNS, SSL certificate analysis, BGP/ASN data, and platforms such as Censys and VirusTotal.
Strong written and verbal communication skills, with experience producing clear and concise threat intelligence reports or briefs.
Experience in software development and data analysis (e.g., Python, Jupyter, or similar) to support investigations and hypothesis testing.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8561086
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 2 שעות
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565016
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a SaaS / AI Security Analyst to join our Security Research team in a newly created, high-impact role.

This position sits at the intersection of security research, analytical thinking, AI systems, and product impact, and plays a key role in shaping how AI-driven insights are delivered to our customers.

About the Role

As a SaaS / AI Security Analyst, your work will directly influence how security insights, alerts, and intelligence are generated, structured, and presented to customers, and improve and scale the AI capabilities that power our security platform. We are looking for someone with strong cyber security understanding, AI passion, technical and analytical skills.



Responsiblities:

Improve and optimize internal AI systems used to generate security content and insights for customers
Scale SaaS/AI discovery, posture management and threat detection capabilities across the platform
Translate security context, intent, and reasoning into structured, engineering-ready AI workflows
Work with LLMs to make security intelligence and data accessible, clear, and actionable for customers
Collaborate closely with the field, customers and prospects and internally with Product, and Engineering teams
Take full ownership of ideas and initiatives, from concept to production impact
Requirements:
3+ years of experience in Security Research / Data Science / Product Analysis from product companies or military service
Security background from cyber companies / military service - a must
Passion for AI tools and hands-on experience in different AI tools
Comfortable working hands-on with code.
Creative problem solver with strong intuition and resourcefulness
Strong communication and collaboration skills; customer- and service-oriented mindset
High ownership, proactivity, hunger to learn, and motivation to build
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522350
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time and Hybrid work
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response. You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541605
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Managed Cloud Detection and Response Analyst to join our newly established team. The team is responsible for monitoring customers cloud environments and workloads, triaging security alerts, and mitigating cyber incidents.
WHAT YOULL DO
Continuously monitor customers cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents.
Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively.
Work closely with customer teams to guide and assist with investigation and remediation of incidents.
Create and deliver incident reports that document findings and response actions taken for customers.
Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customers specific cloud environment.
Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team.
Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods.
Requirements:
2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments.
Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure).
Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights.
Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security.
Excellent communication skills verbal and written both in Hebrew and English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8515991
סגור
שירות זה פתוח ללקוחות VIP בלבד