דרושים » אבטחת מידע וסייבר » Cyber Threat Intelligence Analyst - French speaker

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time and Multilingual
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers
Job Id: 25042
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
Native French speaker
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597313
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 13 שעות
דרושים בSpecial Job – חברת השמה בהייטק
Job Type: Full Time
The company develops AI-powered endpoint sensors that detect proof of security in real time.
The product combines high-performance on-device algorithms with scalable cloud-based backend systems
and is now scaling to serve its first enterprise customers.

Job Description:

Responsibilities:
Design and build endpoint sensors and backend services for data ingestion, processing, and analytics
Lead technical design of new services and major product components
Implement high-performance algorithms running both on-device and in the cloud
Take ownership from concept through production
Improve reliability, scalability, observability, and operational readiness
Support production operations and incident response
Requirements:
5+ years of backend engineering experience (Go, Python, or similar)
Experience with distributed systems or event-driven architectures
Strong systems thinking and debugging skills
Ability to work independently and lead projects end to end
Advantage: endpoint engineering, cybersecurity products (EDR/XDR/DLP), event sourcing,
B2B SaaS, startup experience
Languages: Go, Rust, C, C ++
*
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8506687
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 12 שעות
דרושים בNishapro
סוג משרה: משרה מלאה
התפקיד כולל חקירה מעמיקה של התראות אבטחה מורכבות, ניהול אירועי סייבר (Incident Response), כתיבת חוקי ניטור מתקדמים ושיתוף פעולה עם צוותי התשתית והפיתוח לצמצום משטחי התקיפה.
דרישות:
1-2 שנים ניסיון כ- SOC Analyst tier 2
ניסיון מוכח בתחקור, ניתוח ותגובה לאירועי אבטחת מידע
ניסיון מוכח בעבודה וחקירה בסביבת multi-cloud (AWS/Azure)
יכולת ביצוע ניתוח סטטי ודינמי בסיסי של קבצים חשודים
יכולת כתיבת דוחות טכניים (בעברית ובאנגלית)
ניסיון מעשי מול מערכות אבטחה, כגון: FW, IPS, WAF, XDR/EDR, SIEM, Mail Relay/Email Security, Deception Technology, etc.
הבנה מעמיקה של פרוטוקולי תקשורת (TCP/IP, DNS, HTTP/S) וניתוח תעבורת רשת על בסיס לוגים / כלים ייעודים, כגון WireShark המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8586056
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
6 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
our company is the world leader in accelerated computing, defining the future of ai and high-performance networking. we are seeking a highly skilled and proactive senior Cyber security threat intelligence (cti) analyst to join the networking product security team. in this critical role, you will function as a key defender of the technologies powering the worlds largest ai clusters. you will act as the eyes and ears of our product security organization, conducting investigative research into sophisticated adversaries and translating complex threat data into actionable intelligence. this is a hands-on role where your insights will directly influence our defensive posture and help eliminate threats before they manifest in the core of global ai infrastructure.
what you will be doing:
you will serve as the intelligence core of our team dedicated to identifying, analyzing, and mitigating threats against our products and ecosystem:
lead deep-dive osint and webint research to identify emerging threats, conducting intelligence collection and analysis that leads to clear, actionable mitigation recommendations.
leverage scripting ( Python, bash, etc.) and generative ai tools to automate intelligence collection, triage, and analysis workflows.
analyze advanced persistent threats (apts) and sophisticated adversaries, collaborating with multi-functional teams to detect, track, and eliminate potential risks to our networking portfolio.
apply extensive insight into cyber operation phases to map adversary behavior, anticipate future movements, and harden our product development lifecycle with adoption of security improvements.
drive threat hunting methodologies, proactively searching for indicators of compromise (iocs) and hidden vulnerabilities within the products.
translate complex technical findings into strategic intelligence reports for both technical collaborators and leadership, ensuring a clear and unified insight into the threat landscape.
collaborate closely with incident response and engineering teams to ensure intelligence findings are seamlessly coordinated into other defensive tools and product security processes.
Requirements:
what we need to see:
bsc or msc in Computer Science, computer engineering, Cyber security, or a related technical domain (or equivalent experience).
5+ years of proven experience in a dedicated cyber threat intelligence (cti) role within a large-scale or high-tech environment.
technical proficiency in building automated intelligence pipelines through programming and the strategic use of generative ai.
expert-level knowledge of the cti lifecycle, with a proven record of uncovering sophisticated cyber operations using diverse sources and techniques.
strong technical background in analyzing advanced threats, capable of navigating through complex data to identify adversary infrastructure, intent, and tooling.
deep understanding of the unique security concerns faced by global tech companies, including supply chain risks and intellectual property protection.
outstanding analytical and interpersonal skills, with the ability to drive accountability and ensure intelligence leads to concrete security improvements.
ways to stand out from the crowd:
direct experience with hardware and Embedded devices technologies, specifically relating to networking or silicon security.
professional background in Digital Forensics and incident response (dfir), providing a comprehensive view of the threat actor journey.
relevant industry certifications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8593799
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are on an expedition to find you, someone who is passionate about turning research into reliable, production-grade capabilities. Youll play a major role in building and shaping our next-gen CTI platform across attribution, pivoting, infrastructure prediction, EASM, and the STIX/OpenCTI knowledge base.
The Responsibilities
Execute the CTI research roadmap across threat actor attribution, adversary infrastructure analysis, EASM insights, and STIX-based knowledge management.
Conduct in-depth infrastructure and campaign analysis, including domain/IP relationships, hosting patterns and certificates.
Identify, validate, and track Indicators of Compromise (IOCs) and emerging threats using passive sources and approved active campaigns.
Normalize, enrich, deduplicate, and maintain intelligence in STIX 2.1, aligned with internal ontology and quality standards.
Collaborate with the Engineering, MLOps, and Data teams to translate intelligence into actionable intelligence, alerts, and customer-facing outputs.
Produce high-quality intelligence reports, threat briefs, watchlists, and early-warning assessments for internal teams and customers.
Support investigations by providing contextual analysis, confidence scoring, and evidence-backed assessments.
Ensure adherence to governance, ethics, sourcing, provenance, and data-quality standards across all intelligence outputs.
Requirements:
4+ years of experience in Cyber Threat Intelligence, SOC/IR intelligence support, or adversary infrastructure analysis.
Strong understanding of DNS, IPs, ASNs, hosting/cloud providers, TLS/PKI, domain lifecycle, and phishing infrastructure.
Hands-on experience with open-source and commercial CTI sources (OSINT, feeds, telemetry, reputation systems).
Practical knowledge of STIX 2.1, MITRE ATT&CK, TAXII; experience with OpenCTI and is a strong advantage.
Ability to perform passive discovery and controlled active validation, with a focus on accuracy, evidence discipline, and noise reduction.
Experience using Python for analysis and enrichment (pandas, notebooks); familiarity with Neo4j or Elasticsearch is a plus.
Strong analytical and threat-intelligence writing skills, able to translate technical findings into clear, actionable insights.
Comfortable working in a collaborative, version-controlled environment (Git), with attention to documentation and reproducibility.
Curious, methodical, and impact-driven mindset with a strong sense of intelligence rigor and accountability.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8561125
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Security Analyst
Security & Risk Management | Full Time | Job Id: 25168
Why Join Us?
As part of our mission to provide the best real-time email security for our customers, our team plays a critical role in uncovering, understanding, and mitigating email-based threats. We work at the front line of phishing and social-engineering attacks, ensuring customers stay protected from fast-moving and constantly evolving threats.
In this role, youll dive deep into real-world attacks, quickly analyze emerging threats, and develop accurate protections that are deployed to customers in real time. Youll collaborate closely with other analysts, security researchers, and field teams, while also helping shape and improve the workflows and automation that drive our team forward. This is a hands-on, impactful role for someone who loves uncovering threat patterns, solving complex problems, and contributing to a mission-driven security team.
Key Responsibilities
Analyze new email-based threats and deliver real-time protection within our email security products.
Investigate threats using our email-security tools, customer reports, and additional threat-intelligence sources.
Identify ongoing phishing campaigns, trends, and potential detection gaps.
Respond to alerts and requests from internal field teams and customers, providing immediate mitigation for active attacks.
Develop and test tailored mitigations for specific attacks and deploy them to customers.
Write detailed research reports and attack briefs explaining phishing campaigns, attacker techniques, and findings.
Implement automation processes to enhance operational efficiency and detection accuracy.
Contribute ideas to improve team workflows, processes, and coverage.
Use AI and LLM-powered tools to analyze attacks and extract meaningful insights.
Design processes for analyzing phishing campaign data, trends, and related attacker methodologies.
Requirements:
Fluent written English.
1-2 years of experience in cyber security, threat analysis, or attack analysis.
Ability to write clear, detailed research reports and attack briefs.
Strong self-learning capabilities with the motivation to explore new threats and technologies.
Proficiency in SQL for querying and analyzing complex datasets (must).
Experience with automation, scripting, or process optimization (advantage).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597029
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565016
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Exposure Analyst (Customer-Facing)
About XM Cyber: XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. We transform exposure management by showing our customers exactly how attackers might combine misconfigurations, vulnerabilities, and identity exposures across cloud and on-prem environments to compromise critical assets. With XM Cyber, our customers can see all the ways attackers might get in—and the best ways to stop them with a fraction of the effort. About You & The Role: Are you someone who loves connecting with people just as much as you love talking tech? We are looking for a highly empathetic, customer-focused Exposure Analyst to join our managed services team. In this role, you’ll be the friendly face and trusted advisor helping our premium customers get the absolute best out of the XM Cyber platform. You’ll dive deep into security postures, translate complex attack paths into simple, actionable steps, and build the kind of trust that makes IT and Security teams excited to work with you. Responsibilities: Be the Trusted Advisor: Own the primary technical relationship for a portfolio of enterprise and mid-market customers, establishing yourself as their go-to security partner representing XM Cyber in the customer’s organization. Daily Posture Reviews & Action: Conduct daily reviews and analyses of your customers' security postures using the XM Cyber platform. You'll turn complex findings into clear, risk-based insights and proactively open remediation tickets. Weekly Check-ins & Deep Dives: Lead engaging weekly calls with your customers, hosting targeted deep-dive sessions to guide them on configuration, best practices, and new features to ensure optimal ROI. Bridge the Gap: Drive remediation outcomes by pushing discussions directly with the customer’s IT, DevOps, and Cloud teams—not just their security teams—helping them prioritize efforts based on attack path analysis. Deliver the Big Picture: Proactively track progress and provide monthly reports to both technical and executive stakeholders. You’ll also co-host Executive Business Reviews (EBRs) alongside our Customer Success team. Champion the Customer: Act as the lead technical escalation point, partnering with our internal R&D, Product, and Support teams to make sure your customers' needs are always heard and resolved.
Requirements:
Requirements: Must have: 5+ years in a customer-facing tech role (e.g., Customer Success Manager, TAM, Security Consultant, or MSSP/SaaS Support), with a proven track record of managing large enterprise clients. Outstanding interpersonal skills: You easily break down complex tech issues. You are equally comfortable driving an IT team to take action as you are presenting to C-suite executives. Cyber orientation: Key understanding of:
* On-Prem/Active Directory, Cloud environments (AWS, GCP, Azure) and Kubernetes.
* Posture Management - KSPM, ADSPM, and CSPM.
* Identity Management - CIEM, IAM
* General ethical hacking and cybersecurity principles. Self-driven learning style: You are naturally curious, highly analytical, and comfortable in a dynamic, fast-paced environment where you are always eager to expand your skills. Communication: Native-level fluency in English (written and spoken) is a must.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8555185
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Managed Cloud Detection and Response Analyst to join our newly established team. The team is responsible for monitoring customers cloud environments and workloads, triaging security alerts, and mitigating cyber incidents.
WHAT YOULL DO
Continuously monitor customers cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents.
Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively.
Work closely with customer teams to guide and assist with investigation and remediation of incidents.
Create and deliver incident reports that document findings and response actions taken for customers.
Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customers specific cloud environment.
Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team.
Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods.
Requirements:
2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments.
Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure).
Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights.
Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security.
Excellent communication skills verbal and written both in Hebrew and English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8574079
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We're looking for a Application Security Product Analyst to join our Product team and spread the power. In this pivotal role, you will be the primary operator of our cutting-edge AI-driven Dynamic Application Security Testing (DAST) agent. You will bridge the gap between automated AI testing and security policy, defining the "rules of engagement" for our agents and ensuring they effectively simulate sophisticated attacks while maintaining operational safety.
WHAT YOULL DO
Oversee the daily deployment, health, and operation of DAST and penetration testing capabilities to ensure optimal scanning across diverse customer environments.
Develop and maintain attack policies and rules by creating and fine-tuning the logic that defines how the system identifies, prioritizes, and exploits vulnerabilities.
Analyze and validate findings by reviewing complex attack paths to reduce false positives and improve the core logic's performance.
Research novel attack vectors and emerging web/API threats to translate new techniques into executable behaviors for the DAST engine.
Collaborate on product evolution with R&D and Product teams, using operational insights to drive feature requests and continuous improvement.
Requirements:
Over 2 years of DAST and penetration testing expertise, including hands-on experience in application security or operating enterprise tools like Burp Suite, OWASP ZAP, or Acunetix.
Proven ability in security rule and policy development, specifically in writing custom scripts or signatures to translate vulnerability classes into detection rules.
Technical proficiency in web protocols and API standards, with a strong command of HTTP/S, REST, GraphQL, and authentication mechanisms like OAuth and SAML.
Proficiency in scripting languages such as Python, Go, or JavaScript to automate tasks and interact with the codebase.
An analytical mindset with the ability to diagnose complex logs and scans to distinguish between tool failures, configuration issues, and valid security findings.
BONUS POINTS
Knowledge of AI/ML and how LLMs or reinforcement learning agents operate within a cybersecurity context.
SaaS and cloud experience with familiarity in AWS, Azure, or GCP environments and modern cloud-native architectures.
A red teaming background with experience in simulated adversarial attacks and bypassing standard WAF or security controls.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8573980
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Cloud Security Analyst to join our Product team and help expand the power.
In this role, youll play a key role in protecting our customers' cloud environments from cyber threats. Your work will directly contribute to customer success and push the boundaries of cloud security.
This isnt just a job-its a unique growth opportunity. Youll gain hands-on experience that can pave the way for exciting career paths in product management, security research, or development.
WHAT YOULL DO
Innovate and develop advanced detection mechanisms, algorithms, and automated solutions to accurately identify and classify technologies within cloud environments, enhancing our vulnerability management offering.
Analyze cloud services, APIs, and log payloads to ensure compliance with industry standards and customer requirements.
Stay current with the latest technologies and industry trends.
Implement customer requests and industry standards to position us as a market leader.
Collaborate with our Research and Backend teams.
Requirements:
Hands-on proficiency in Linux, Windows, Python, Bash, Docker, Kubernetes, PowerShell, and a strong understanding of the OSI model.
Solid knowledge of networking concepts and cloud infrastructure.
Proven experience in applying cybersecurity best practices to real-world scenarios.
Self-motivated and capable of working both independently and collaboratively within a team.
Strong communication skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8573987
סגור
שירות זה פתוח ללקוחות VIP בלבד