As part of our mission to provide the best real-time email security for our customers, our team plays a critical role in uncovering, understanding, and mitigating email-based threats. We work at the front line of phishing and social-engineering attacks, ensuring customers stay protected from fast-moving and constantly evolving threats.
In this role, youll dive deep into real-world attacks, quickly analyze emerging threats, and develop accurate protections that are deployed to customers in real time. Youll collaborate closely with other analysts, security researchers, and field teams, while also helping shape and improve the workflows and automation that drive our team forward. This is a hands-on, impactful role for someone who loves uncovering threat patterns, solving complex problems, and contributing to a mission-driven security team.
This is an on-site position, based in our offices (no hybrid work). The role requires working in a global environment, with strong English communication skills.
Key Responsibilities
Analyze new email-based threats and deliver real-time protection within our companys email security products.
Investigate threats using our company email-security tools, customer reports, and additional threat-intelligence sources.
Identify ongoing phishing campaigns, trends, and potential detection gaps.
Respond to alerts and requests from internal field teams and customers, providing immediate mitigation for active attacks.
Develop and test tailored mitigations for specific attacks and deploy them to customers.
Write detailed research reports and attack briefs explaining phishing campaigns, attacker techniques, and findings.
Implement automation processes to enhance operational efficiency and detection accuracy.
Contribute ideas to improve team workflows, processes, and coverage.
Use AI and LLM-powered tools to analyze attacks and extract meaningful insights.
Design processes for analyzing phishing campaign data, trends, and related attacker methodologies.
Requirements: Fluent written and verbal English - must.
1-2 years of experience in cyber security, threat analysis, or attack analysis.
Strong analytical thinking and ability to work with complex and high-volume data.
Excellent self-learning skills and the ability to quickly understand processes and complex information.
Ability to write clear, detailed research reports and attack briefs.
Proficiency in SQL for querying and analyzing complex datasets (must).
Experience with automation, scripting, or process optimization (advantage).
Background from IDF intelligence units (e.g., Unit 8200) with relevance to the security domain - significant advantage.
This position is open to all candidates.