דרושים » אבטחת מידע וסייבר » Security Operations Team Lead - Israel

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 5 שעות
Location: Tel Aviv-Yafo
Job Type: Full Time
The Security & Information team is looking for someone who is passionate about technology and has a roll-up-their-sleeves mentality to join our global team. Youll play a crucial role in enhancing our security infrastructure, improving networking, ensuring scalability, and maintaining strong security as we continue to grow. If you want to be an industry leader, on a team experiencing hyper-growth, look no further!
Responsibilities :
Operates as the primary escalation point for critical security alerts, performing deep-dive DFIR investigations, analyzing attacker techniques and vectors, proactively hunting threats, and directing incident response activities.
Lead SecOps projects from inception to execution, ensuring effective implementation and ongoing maintenance.
Mentor a team of SecOps experts, providing technical guidance in a fast-paced environment.
Research how to leverage security telemetry and existing security solutions to improve triage and automated response.
Work cross-functionally to refine and evolve agentic workflows that drive automated security operations.
Coordinate investigation, containment, and other response activities with business stakeholders and groups.
Perform hands-on forensic investigations, log reviews, cloud investigations, and root-cause analysis
Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement.
Requirements:
5+ years experience working in an Incident Response/Cyber Security Operations Center (in-house or outsourced) addressing, escalating, and managing security incidents and creating incident reports.
Extensive experience in managing the lifecycle of security incidents in a global, 24/7 production environment..
Collaborating with various cross-organizational stakeholders to drive incident response and remediation.
Development of common runbooks for most frequent or critical incident types.
Strong development fundamentals with experience delivering and maintaining production-grade code.
Coding & Scripting: Hands-on programming experience (Python, Bash, etc.) with proven ability to build automation processes.
Proven expertise in attack and mitigation methods within Cloud and SaaS environments
Solid understanding of system and security controls on at least two OSs (Windows, Linux / Unix, and MacOS (Advantage), including host-based forensics and experience with analyzing OS artifacts.
Problem solver, an in-depth thinker with a growth mindset.
Excellent communication skills and ability to work collaboratively with other teams
Preferred Qualifications:
Bachelor's degree in Computer Science, Information Technology, or related field
Solid understanding of LLM concepts and architectures, with hands-on experience applying them in practice.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569113
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 7 שעות
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a senior, hands-on Security Operations Lead to build, mature, and operate Zenitys detection, response, and corporate security capabilities. You will own the engineering, workflows, and processes that keep Zenity secure day-to-day, while continuously improving visibility, automation, and operational resilience across both corporate and production environments. This role requires a technical operator who can architect scalable detection and response pipelines, manage endpoint and identity security controls, streamline GTM security enablement, and collaborate across the company to reduce risk. You will balance strategic direction with hands-on execution-ensuring threats are identified quickly, incidents are handled effectively, and the organizations operational security posture remains strong as Zenity grows.
Responsibilities:
Own and mature Zenitys Detection & Response program, including alerting, triage workflows, incident playbooks, and end-to-end response processes.
Build and maintain detection logic, integrations, and automation across logging, SIEM, EDR, cloud telemetry, and internal monitoring systems.
Lead incident investigations, coordinate response across engineering and business teams, and ensure clear communication and post-incident reviews.
Manage Zenitys Corporate Security Program, including identity and access management, endpoint posture management, corporate data security controls, and DLP practices.
Oversee privileged access workflows and JIT access for corporate and production systems in alignment with least-privilege principles.
Partner with engineering teams to ensure production environments maintain strong security baselines, logging, and monitoring coverage.
Collaborate with GTM/Sales teams to support Security Enablement, including third-party security questionnaires, customer assurance needs, and auditor inquiries.
Build automation-first operational processes that reduce manual overhead and provide consistent, repeatable security outcomes.
Develop and refine detection and response runbooks, escalation paths, and cross-team coordination models.
Maintain and improve incident and operational metrics, dashboards, and KPIs to measure operational efficiency and threat coverage.
Drive the intake and prioritization of security operations requests through Jira and internal workflows.
Work closely with Product Security, Cloud/DevOps, and GRC to ensure shared visibility and aligned operational practices.
Identify operational security gaps, propose improvements, and lead implementation efforts across tooling, processes, and controls.
Promote a culture of proactive detection, fast response, and shared responsibility for organizational security.
Requirements:
Five (5) + years of experience in Engineering / Security Engineering
We build solutions when faced with a capability gap
Youre very comfortable with Kubernetes, Helm, and Terraform
Youre very comfortable with Python, Typescript, or Go
Two (2) + years of experience in Incident Response role
Youve led at least 2 high risk production security incidents
Youve handled the investigation of hundreds of client endpoint security alerts
Bonus points for significant experience in macOS
Youve developed or improved threat detection and signal triage programs
Two (2) + years of experience managing enterprise wide security projects
You have a strong opinion on what a project plan doc should look like
Youve owned and delivered the migration of a high impact security tool (EDR, SIEM, ZTNA, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8568946
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Engineer to join our security operations team with a strong focus on detection and response.
This is a unique opportunity to leverage your threat detection and response experience and build some of the foundational systems and services to keep our infrastructure free from malicious actors and threats. You will partner closely with all engineering teams, IT administrators, and compliance analysts to ensure that we maintain sufficient visibility into our environments and develop effective programs and practices to ensure that our environments are always secure. Tooling and automation will be key to success as we scale our environments to meet customer demand.
What You Will Do:
Collaborate with different teams for building and setting up pipelines needed to gather relevant security telemetry.
Build and maintain an effective and scalable security monitoring infrastructure solution.
Develop detection strategies to identify anomalous activity and ensure that our critical infrastructure and services operate in a safe environment.
Triage alerts and drive security incidents to closure while reducing their potential impact to Semperis.
Build processes and workflows to triage security alerts and respond to real incidents.
Research new threat attack vectors and ensure that our detection and response capability is in line with the current threat landscape.
Proactively improve the quality of our detection rules and strive to eliminate classes of issues by working directly with engineering teams.
Contribute to strategy, risk management, and prioritization for all efforts around detection and response.
Collaborate with the compliance team to maintain and audit security controls and processes, ensure compliance with relevant security frameworks and certifications.
Pragmatic implementing business-focused controls to safeguard the companys multi-cloud entities.
Requirements:
5+ years of relevant industry experience.
Strong domain knowledge in security incident detection and response, with a proven ability to operate, optimize, and enhance the effectiveness of the Security Operations Center (SOC).
Demonstrated experience with effective incident response and containment practices, preferably in a cloud-first environment.
Hands-on experience in instrumenting and deploying telemetry solutions.
Experience with operating open-source and/or commercial solutions for logging and security event management, including SIEM and SOAR platforms such as Splunk, Microsoft Sentinel, SolarWinds, Trellix, and similar tools.
Experience in managing and fine tunning CNAPP platforms such as WIZ, Orca, Defender, Singularity or other similar solutions.
Ability to script or code fluently in an interpreted language like Python, PowerShell or Javascript.
Proficiency in automation using tools such as Logic Apps, Azure Functions, AWS Lambda, and Runbooks.
Strong experience in analyzing IAM configurations and entities behavior across multi-cloud and multi-account environments, detecting potential breaches, identifying security gaps, and responding to threats in real time.
Decision-maker with the ability to operate with freedom and autonomy.
Experience working with distributed teams and other cross-functional stakeholders.
Ability to manage competing priorities and workload.
Experience or strong familiarity with DevOps practices and Agile methodologies is a plus.
Experience with cloud deployments in AWS, GCP, or Azure is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8553433
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Security Incident Response Group Lead - (250000G4)
What will you do?
A global provider of cybersecurity protection solutions for networks and applications. We are looking to enhance our Cloud Services, the fastest growing business, in key markets.
Security operation leadership - Oversee the daily operation by leading projects & processes, tracking tasks & progress, and mentoring of a global Incident Response (IR) group that is specialized in detection & mitigation of various network threats, such as Denial-of-service attacks, application server-side & client-side threats, botnets, and more.
Incident response leadership - Oversee & coordinate RT security incidents globally by maintaining & developing solid IR processes & playbooks, crisis management & de-escalation techniques, lead escalation calls, and identify & improve gaps in technical & operational procedures among the global security group.
Global IR team leadership - Lead and mentor a multidisciplinary cloud security group consists of security IR analysts & security experts, fostering a collaborative and high-performance culture, oversee the global recruitment & training process of new employees, and develop & maintain high performance teams with deep technical knowledge, customer orientation, and operational attitude.
Customer engagement - Ensure customer's SLA & satisfaction, build and maintain strong relationship with customers & stakeholders, and maintain regular communication through meetings, reports, and updates to ensure stakeholders are informed about security initiatives, incident responses, and risk posture.
Strategic planning - Develop & execute roadmaps, strategies, and frameworks aligned with organizational goals.
Requirements:
What you need:
At least 8 years of experience in the domain of cybersecurity operations & investigations, especially in network security & incident response.
A proven & solid experience in leading & overseeing a global group from the technical & operational points of view.
A proven & solid experience in recruiting & training new employees.
Strong & deep knowledge & experience in networking, especially network protocols of various OSI layers - application layer protocols, transport and network layer protocols.
Strong & deep knowledge & experience in the domain of network security threats such as DDoS/DoS, API security, OWASP T10, etc.
Strong & deep knowledge & experience with security controls and tools such as FW, SIEM, IDS/IPS, and vulnerability scanners.
Solid experience in customer service & customer engagement during incidents and crisis.
Proven problem-solving capabilities under pressure.
Strong leadership skills.
Good communication skills and customer experience.
Fluent English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565198
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced SOC Manager to lead our Security Operations Center (SOC), with full responsibility for detection, response, and operational excellence. This role combines hands-on technical leadership with people management, process ownership, and alignment to business risk.
The SOC Manager will be accountable for the effectiveness, maturity, and scalability of security operations across the organization.
What you will do?
Oversee day-to-day SOC operations, ensuring timely threat detection, incident response, and threat mitigation. Own day-to-day SOC operations, ensuring effective threat detection, incident response, and containment across all environments.
Develop and implement SOC policies, processes, and playbooks to improve security effectiveness.
Continuously evaluate and enhance SIEM configurations, alerting mechanisms, and automation. Continuously optimize SIEM content, alert quality, detection coverage, and automation capabilities.
Team Management & Training- Recruit, mentor, and manage a team of SOC analysts and incident responders.
Lead incident investigation, containment, and remediation efforts, coordinating with internal teams and external partners.
Align security operations with MITRE ATT&CK, NIST, and other cybersecurity frameworks.
Produce clear, executive-level incident reporting and risk summaries for security leadership and stakeholders.
Stay updated on emerging threats, attack techniques, and security technologies to drive continuous improvements.
Requirements:
5+ years of experience in SOC leadership, cybersecurity operations, or incident response.
Strong hands-on experience with SIEM platforms (Splunk preferred) and threat detection methodologies.
Deep expertise in incident response, threat hunting, and forensic analysis.
Knowledge of cloud security (AWS, Azure, GCP) and network defense strategies.
Proficiency in scripting (Python, PowerShell, or Bash) for security automation.
Familiarity with MITRE ATT&CK, NIST, CIS, and other security frameworks.
Excellent communication and leadership skills with a track record of team development and cross-functional collaboration.
Preferred Qualifications:
Security certifications such as CISSP, GCIH, GCFA, OSCP, or SIEM-specific certifications.
Experience leading SOC optimization projects and implementing SOAR solutions.
Background in offensive security (Red Team/Purple Team) is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8567103
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are seeking an Incident Response Lead to own and mature the companys global cyber incident response capability. This role sits within the CISO Office and is accountable for response execution, post-incident learning, and executive-level coordination across our companys cloud, infrastructure, and platform environments.
The Incident Response Lead will act as the single accountable owner for high-severity security incidents, ensuring rapid containment, accurate impact assessment, regulatory-compliant communications, and continuous improvement of detection and response capabilities.
This role requires deep technical expertise, strong crisis leadership, and the ability to operate under pressure in highly regulated, high-availability environments.
Key Responsibilities
Incident Response Leadership
Lead and coordinate of security incidents across our companys cloud, infrastructure, and corporate environments.
Act as Incident Commander during major incidents, driving containment, eradication, and recovery efforts.
Support and maintain clear incident classification, escalation, and decision-making frameworks.
Ensure 24/7 readiness through on-call structures, runbooks, and playbooks.
Detection, Triage, and Investigation
Oversee advanced incident triage and forensic investigations across:
Cloud platforms
Network and perimeter security
Identity and access systems
Supply chain and third-party risks
Partner with SOC, Threat Intelligence, and Threat Hunting teams to improve detection fidelity and reduce MTTR.
Ensure evidence handling meets legal, regulatory, and forensic standards.
Lead regulatory-ready incident documentation, timelines, and root cause analysis (RCA).
Support audits, regulatory inquiries, and executive reporting related to security incidents.
Executive & Cross-Functional Coordination
Serve as the primary incident response interface to:
CISO and executive leadership
Legal, Privacy, Compliance, and Communications teams
Infrastructure, Network, IT, Platform, and Engineering leadership
Deliver clear, factual, and risk-based incident briefings to senior leadership.
Support customer and partner communications when security incidents impact trust or service availability.
Program Development & Continuous Improvement
Support our companys incident response program, including:
Playbooks and runbooks
Tabletop exercises and simulations
Red/blue/purple team coordination
Drive lessons-learned processes and ensure findings result in measurable control improvements.
Define and track incident response KPIs (MTTD, MTTR, containment effectiveness).
Requirements:
Experience
8+ years in cybersecurity, with significant hands-on incident response leadership experience.
Proven experience leading large-scale, high-impact security incidents in cloud or infrastructure-heavy environments.
Experience operating in regulated or compliance-driven environments (SOC, ISO, financial services, cloud providers, etc.).
Technical Expertise
Strong understanding of:
Cloud security architectures
Network security, IAM, endpoint security, and logging pipelines
Threat actor tactics, techniques, and procedures (MITRE ATT&CK)
Practical experience with SIEM, SOAR, EDR, NDR, and forensic tooling.
Ability to validate technical findings independently and challenge assumptions.
Leadership & Communication
Demonstrated ability to lead under pressure and make high-quality decisions with incomplete data.
Clear, concise communicator capable of briefing executives and non-technical stakeholders.
Strong cross-functional leadership skills without relying on direct authority.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547875
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As the Technical Director for Reactive Services, you will serve as a senior-level consultant and client advocate, providing expert guidance on all facets of cybersecurity and data breach response. You will deliver strategic and technical leadership to a diverse range of clients, helping them navigate complex security incidents. Your expertise will be critical in shaping response strategies and ensuring clients effectively mitigate and recover from cyber threats.
Key Responsibilities
Provide expert-level strategic and technical guidance to clients during active data breach response and cybersecurity incidents.
Lead complex client engagements from initial scoping and resource allocation through to technical execution and final reporting.
Apply deep knowledge of forensic processes, including chain of custody, and advanced computer and memory acquisition techniques.
Utilize industry-standard forensics tools (e.g., EnCase, FTK, SleuthKit, Volatility) for in-depth analysis across major operating systems.
Challenge curiously by maintaining hyper-current knowledge of the threat landscape, emerging vulnerabilities, and attacker TTPs to inform response strategies.
Conduct detailed analysis of malware, identify persistence mechanisms, and triage threats to determine root cause and impact.
Proactively collaborate with internal teams and client stakeholders, ensuring alignment and communicating clear, actionable findings.
Develop and automate scripts and processes to simplify and enhance the efficiency of incident response scenarios.
Requirements:
Bachelors Degree in Information Security, Computer Science, Digital Forensics, or a related field, or equivalent military experience.
10+ years of direct incident response or digital forensics consulting experience.
Demonstrated experience leading complex technical engagements, including scoping, client interfacing, and hands-on technical execution.
Proficiency in enterprise-wide data acquisition, host and network level analysis, and creating automation scripts for incident response.
Expert operational understanding of at least one major operating system (Microsoft Windows, Linux, or Mac) from a forensic perspective.
Preferred Qualifications
Established external presence through public speaking, conference presentations, or cybersecurity publications.
Exceptional credibility and executive presence, with the ability to advise senior leadership and build strong client relationships.
Proven ability to collaborate and build relationships across internal functions, including sales and research teams.
An excellent understanding of the company product portfolio and its application in security solutions.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522171
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly skilled and experienced Head of Application Security to join our dynamic team. This role is pivotal in driving the security of our software development lifecycle and ensuring the robustness of our applications against potential threats. The ideal candidate will have a strong background in secure software development practices, including SSDLC implementation, and a deep understanding of security risks & tools. This position reports directly to an R&D VP.
Key Responsibilities
Lead the application security team, providing strategic direction and mentorship.
Develop and implement a comprehensive Secure Software Development Lifecycle (SSDLC) framework.
Oversee the integration of security practices into all phases of the software development lifecycle, including CI/CD guardrails.
Conduct risk assessments and threat modeling to identify and mitigate potential security vulnerabilities.
Collaborate with development teams to ensure secure coding practices and adherence to security standards, while maintaining developer productivity.
Implement and manage security automation tools and processes to enhance the efficiency of security operations.
Stay up-to-date on the latest security trends, vulnerabilities, and technologies to continuously improve our security posture.
Provide expert guidance on security architecture and design for new and existing applications.
Lead incident response efforts related to application security breaches and vulnerabilities.
Foster a culture of security awareness and continuous improvement within the organization.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field.
Minimum of 7 years of experience in application security, with at least 3 years in a leadership role.
Proven experience in implementing and managing SSDLC frameworks.
In-depth knowledge of security frameworks and methodologies.
Strong understanding of threat modeling methodologies, secure coding practices and common vulnerabilities (e.g., OWASP Top Ten).
Proficiency in programming languages such as Java, Python, C#, or similar.
Experience in implementing security tools and technologies such as ASPM, SAST, DAST in complex and high-scale environment.
Excellent communication and leadership skills, with the ability and passion to drive change across the organization.
Relevant certifications such as CISSP, CISM, or CSSLP are desirable.
Proven experience in a similar role at another leading software development company.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8540450
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565016
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo and Haifa
Job Type: Full Time
Systems Development Engineering (SDE) at our company is a role where you manage services and systems at scale. SDEs creatively put their engineering discipline to use automating the mundane and reducing toil. We dont just write code to fix bugs, but emphasize the development of tools and solutions that fix classes of problems. We know its hard to control what you cant measure - so we focus on observability: instrumenting first, then turning data into knowledge, and finally knowledge into action. We know that the operational efficiency of our company systems, services, virtual compute environments and the operating systems that power them impact the environment, not just the bottom line. We know that working together we can do more, and that community matters.
our company brings together people with a wide variety of backgrounds, experiences and perspectives. We encourage them to collaborate, think big and take risks in a blame-free environment. We promote self-direction to work on meaningful projects, while we also strive to create an environment that provides the support and mentorship needed to learn and grow.
Together we engineer and build the infrastructure, tools, access and telemetry for systems that enable orchestration of our company-scale services. Come build things that matter.
The Managed Services Technology team plays a vital role in the Managed Threat Defense service delivery life-cycle. We are responsible for provisioning Security Operations (SecOps) and third-party security technology. This role focuses on deploying and integrating customer security technologies.
In this role, you will collaborate with enterprise clients, customers, internal stakeholders, and cross-functional teams to quickly and accurately provision and integrate SecOps and other customer-managed security technologies.
Part of our company Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
Responsibilities
Oversee the security technology provisioning lifecycle for new and existing customers.
Develop technical implementation plans based on customer expectations and shared information.
Facilitate project management and technical support during onboarding. Collaborate closely with customers and internal teams.
Collaborate with customers to triage and implement remediations and recommendations.
Document all implementation details and collaboration meeting notes in the internal tracking system.
Requirements:
Minimum qualifications:
Bachelor's degree in Computer Science, or IT related fields, or equivalent practical experience.
5 years of experience with technical infrastructure (e.g., deployment, maintenance, troubleshooting).
Experience in network architecture, computers, and networking protocols.
Experience with Linux operating systems.
Experience in computer discipline (e.g., network administration, systems administration, or development).

Preferred qualifications:
Understanding of tools and technologies used for enterprise security.
Ability to manage and exceed customer expectations.
Ability to comprehend information security principles and risk management.
Ability to deliver succinct, fact-based communications, both verbally and in writing.
Excellent project management skills in planning, tracking, and reporting.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8544062
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
02/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Lead to join our team and play a key role in securing and scaling our production environments. This is a hands-on position with direct impact on system reliability, security posture, and operational excellence across the organization.

Responsibilities:

Own day-to-day security operations in a fast-moving, cloud-native environment

Lead end-to-end incident detection, investigation, and response

Own and operate core security tooling (SIEM, CSPM, CNAPP, SSDLC, EDR)

Work closely with R&D, DevOps, and IT to bake security into development and operations

Build and maintain incident response runbooks and security playbooks

Own security compliance and GRC efforts, including SOC 2
Requirements:
5+ years of experience in SecOps, Security Engineering, or DevSecOps roles
Hands-on experience with cloud environments (AWS preferred)
Strong background in Kubernetes, Microservices and CI/CD pipelines
Experience with SIEM, CSPM, EDR, and vulnerability scanning tools
Solid understanding of threat models, attack vectors, and incident response
Ability to work independently with strong ownership and problem-solving skills
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8528646
סגור
שירות זה פתוח ללקוחות VIP בלבד