דרושים » אבטחת מידע וסייבר » cyber threat intelligence analyst- 2525

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Merkaz
Collecting data from various sources (Open source, feeds and intelligence portal).
Conducting investigations using advanced tools and intelligence sources.
Conducting Cyber Threat analysis based on SPLUNK.
Work closely with leading Cyber, intelligence and operational professionals.
Identify emerging threats and attack patterns.
Tracking threat actor groups and methods.
Requirements:
Strong understanding of cyber threats, attack vectors and threat actor tactics, techniques and TTPs.
2 years experience in cybersecurity, preferably with a focus on threat intelligence.
Knowledge of Cyber Security methodology and Frameworks.
Strong familiarity with Networking protocols and infrastructure, Databases and Operating Systems.
Familiarity with OSINT gathering techniques based on open-source intelligence platform.
Ability to analyze raw cyber technology reports in both Hebrew and English.
Experience working with threat intelligence platforms and sources.
Excellent written and verbal communication skills in English.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8293967
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: More than one
our company Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8342590
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
our company Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8342639
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
31/08/2025
Location: Herzliya
Job Type: Full Time
We are looking for a talented Cyber Threat Intelligence analyst to join the automotive CTI team, and focus on investigating global automotive and smart mobility related cyber incidents and emerging deep and dark web threats.
As a Cyber Threat Intelligence Analyst you will be responsible to utilize our clear, deep and dark web threat intelligence platforms and tools to identify vulnerabilities, exploits, counterfeit and fraud within the automotive ecosystem.
We are looking for an independent analyst, capable of producing accurate intelligence in the automotive threat landscape to protect the software-defined vehicles of tomorrow.
This role is full-time and is Herzliya, Israel based.
Responsibilities
Perform clear, deep and dark web research and social media monitoring related to automotive products, components and various threat actors targeting the automotive ecosystem.
Producing actionable CTI and mitigation recommendations to our customers in our CTI service and platform.
Research and implement new tools and data sources to expand analysis on emerging automotive related cyber threats.
Monitor and detect vulnerabilities impacting IT and automotive related components and software.
Identify threat actors across the clear, deep, and dark web to gain further intel.
Constant interaction with customers as well as Research, Product, CSM teams to consult, guide and provide best-in-class CTI deliverables.
Requirements:
Experience in cyber threat intelligence or equivalent role with familiarity with product intelligence, cybercrime communities and OSINT sources and tools.
Familiarity of IT-Product based threat intelligence deep and dark web monitoring experience.
Strong analytical, critical thinking, and communication skills.
Experience in a customer-facing role and able to summarize and present complex concepts in a clear and engaging manner.
English - full professional proficiency - a must
Vulnerability management background - advantage
Automotive threat intelligence background advantage
Proficient in multiple languages - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8325289
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/08/2025
Location: Herzliya
Job Type: Full Time and Hybrid work
we are looking for a cyber threat intelligence analyst to join our CTI team.
As a member of the CTI team, you will take part in intelligence gathering, deep technological and operational analysis, use of advanced intelligence systems, helping customers understand their threats, and engaging in IR investigations.
Responsibilities:
Monitoring and analyzing threats to customers
Utilizing your technical expertise to understand adversary capabilities and tactics and improve threat detection
Providing actionable intelligence to security teams within customers management
Collaborating closely with the DFIR team as part of all IR events
Identifying intelligence gaps for customers and proactively suggesting ways to close them.
Requirements:
1+ years in Cyber Intelligence role
Strong analytical skills, including high-level threat analysis and operational and tactical skills
Skilled at writing reports that non-technological audiences can easily understand
Strong communication skills and investigative practices
Familiarity with CTI tools for data analysis
Technological background in information systems and networks
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8320504
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7, tiers 1-2. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.
Responsibilities:
Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers an advantage.
Fluent English (written, spoken) a must. Another language an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8320541
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/08/2025
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a driven problem solver to join our Unit 42 MDR team. Our team is responsible for customers internal security monitoring, threat hunting and incident response. As a MDR Analyst, we will rely on you to detect and respond to cyber incidents facing customers internal business.
The ideal candidate is a quick learner and good communicator who will be able to follow established processes for analyzing threat alerts that fire from our Cortex XDR. The candidate should be a creative thinker who takes pride in solving tough problems.
Your Impact
Join a new emerging team who is going to be part of our companys Unit 42, Working closely with global customers providing the best security in the market
Own an incident lifecycle from outbreak to full remediation
Provide critical feedback to the different product, research and engineering and threat hunting teams to help improve the products for the entire companys customer base
Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats
This position is a Shift Position (Sunday - Friday Evening & Saturday Evening).
Requirements:
Your Experience
1+ years of experience in a multi tiered SOC/IR is a must
Experienced with Technologies such as EDR, SIEM, SOAR, FW
A well established familiarity with attack trends and vectors
Excellent written and oral communication skills in English
Some degree of Malware Analysis - An advantage
CEH / CompTIA CYSA+ certifications - An advantage
Hands-on experience with Cortex XSOAR or Cortex XDR - An advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8290263
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
we are at the forefront of worldwide data detection and response services. We lead and redefine how data should be monitored, and protected and how data breach incidents should be handled. Its a 24/7 global security service assisting customers to investigate and respond to security incidents.
A Senior (Level 3) Security Analyst within our MDR team is expected to serve as their teams technical lead and a key escalation point for complex security incidents.
In your role, you will lead complex investigations, working directly with customers by assisting them in investigating and responding to security incidents.
As a senior staff in your team, you are expected to mentor junior analysts, and drive continuous improvement of our detection and response capabilities. You will collaborate with internal and external stakeholders, and ensure best practices are followed across monitoring, detection, and incident response processes. This position requires a strong foundation in cybersecurity operations, a deep understanding of SIEM technologies and log sources, as well as the ability to train and document processes for others.
Responsibilities:
Incident Escalations & Investigations
Serve as an escalation point for security alerts and incidents, ensuring timely and thorough investigations.
Perform end-to-end incident handling, including scoping, containment, and eradication activities.
Coordinate and communicate with customers, leadership, and other stakeholders throughout the incident response lifecycle.
Understand, interpret, and analyze a diverse range of log sources (Exchange Online, Entra, Active Directory, Windows events, Azure, DNS, VPN, etc.).
Proactively identify potential threats and anomalies, recommending and implementing improvements in detection logic.
Training & Mentorship:
Assist in training and upskilling junior and mid-level analysts, including sharing best practices in investigations, threat hunting, and emerging threats.
Provide guidance in troubleshooting escalated issues, ensuring efficient knowledge transfer and professional growth within the team.
Contribute to the development, documentation, analysis, testing, and modification of threat detection systems and playbooks.
Provide feedback on gaps or improvements needed in processes, documentation, or technology.
Work closely with Team Leads and other senior staff to align on operational goals, SLA adherence, and service delivery standards.
Communicate findings, root causes, and recommended actions to both technical and non-technical stakeholders clearly and effectively.
Share insights and best practices with the broader team, championing a culture of continuous learning.
Requirements:
3+ years of experience in cybersecurity operations (monitoring, detection, investigation, and incident response) at a global cybersecurity company.
Advanced knowledge of SIEM technologies, including log collection, analysis, and correlation.
Expertise with various log sources (Exchange Online, Entra, Active Directory, Windows Events, SharePoint_0365, Azure, Syslog, DNS, OneDrive, VPN) and the ability to interpret and analyze these logs for security incidents.
Strong understanding of authentication protocols, both modern and legacy (Kerberos, NTLM).
Proven ability to handle escalations from end to end, including incident scoping, containment, eradication, and post-incident activities such as lessons learned and documentation.
Excellent communication skills in English (written and oral) to interface effectively with customers, peers, and leadership.
Ability to mentor and train junior analysts, providing feedback and sharing best practices.
Strong analytical and problem-solving skills, with an eye for detail and the capability to deliver autonomously.
Familiarity with common security tools and technologies, such as EDR, AV, DLP, DSPM, PAM, IAM, firewalls, and IDS/IPS.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8306556
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location:
Job Type: Full Time and Public Service / Government Jobs
Were looking for top-tier Cyber OpSec expert - someone who lives and breathes cyber security, with deep knowledge of both technology and threat analysis.
Develop an intimate understanding of our products and systems.
Analyze our capabilities alongside advanced threat models.
Combine technological insight with a sharp understanding of threats.
Drive impactful changes and improvements to elevate our overall OpSec posture.
Requirements:
Hands-on experience in cyber security, particularly in advanced research.
Deep knowledge of networks architecture and communications.
4+ years of experience in the cyber security industry.
Advantages:
Experience in threat intelligence.
Technological military background.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8293817
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and English Speakers
we are looking for an Incident Response Team Leader to lead investigations and response activities in support of organizations worldwide.
Cyber threats are constantly growing in volume, velocity and sophistication. When an organization is confronted with an advanced attack, it needs the strongest capabilities on its side. In many cases, an incident response engagement is in fact a battle within a network. The operational art, experience, focus, and speed of response teams can mean the difference between a minor blow, and a devastating impact on an organizations performance and reputation.
The Incident Response Team Leader will be key to the success of Incident Response projects worldwide, and should possess strong leadership skills, be highly technical and thrive in a fast-paced and dynamic environment.
Main Responsibilities:
Lead a team of top-tier cyber security researchers and forensic experts conducting assessments and in-depth analysis in complex investigations, as well as security assessments.
Guide and empower team members, enhancing their technical and research skills.
Lead client-facing projects including incident response and hunting efforts for large-scale sophisticated attacks, to contain and defeat real-world cyber theats.
Collaborate and work with clients IT and Security teams during investigations.
Design and improve internal incident response technologies, methodologies, and processes.
Requirements:
At least 3 years experience in team management (from military service and/or industry).
Excellent English spoken and written.
In-depth understanding of the lifecycle of advanced security threats, attack vectors and methods of exploitation.
Strong technical understanding of network fundamentals, common internet protocols and system and security controls.
Experience with the tools and techniques used in security event analysis, incident response, computer forensics, malware analysis, or other areas of security operations.
Multidisciplinary knowledge and competencies, such as:
o Hands-on experience in data analysis (preferably network traffic or log analysis) in relevant data analysis and data science platforms (Jupyter, Splunk, pandas, SQL).
o Familiarity with cloud infrastructure, web application and servers, Android and iOS mobile platforms.
o Experience with malware analysis and reverse engineering.
o Familiarity with enterprise SIEM platforms (e.g. Splunk, QRadar, ArcSight).
Exceptional reporting and analytics abilities, written and oral presentation skills must be able to articulate complex technical issues in a concise and confident manner, and provide status updates to a variety of audiences, including technical personnel and executive-level management.
Ability to work in a dynamic matrix organizational structure, with people across all levels in the company, including executives and technical stakeholders.
Team-oriented, with excellent communication skills.
Decisive, bright, and positive leader, who strives for excellencee.
Previous experience in strategy or cybersecurity consulting an advantage.
Willingness for extensive travel abroad.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8320579
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
07/08/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a high-energy, driven Security Analyst with a strong security mindset to join our fast-growing team of ambitious professionals. This is a unique opportunity to be part of an exciting data-cybersecurity startup.

Responsibilities:
Conduct in-depth security research to identify emerging cloud and AI-related threats and incorporate insights into our detection and prevention strategies.
Develop and maintain advanced security detections and best practices to identify and mitigate threats to customer data across diverse cloud platforms.
Collaborate closely with Product and R&D teams to translate security research findings into impactful product features and detection capabilities.
Design and prototype advanced detection techniques and automated workflows to continuously strengthen our ability to identify and safeguard sensitive data across complex, multi-cloud environments.
Continuously evaluate emerging cloud services, APIs, and data flows, integrating industry best practices and customer-driven insights to ensure our detection capabilities remain cutting-edge and adaptable.
Requirements:
Requirements:
3+ years of hands-on experience in a security-focused role with a strong emphasis on cloud environments.
Proficiency with at least one major cloud platform (AWS, Azure, or GCP) and practical experience securing various database technologies from a security perspective.
Strong hands-on skills with Linux, Python, Bash, SQL, or other query and policy languages (e.g., Rego).
Deep understanding of the cloud attack surface landscape, including emerging threats and modern attacker techniques.
Demonstrated ability to apply cybersecurity best practices to detect, analyze, and mitigate real-world threats in dynamic environments.
Proven experience analyzing large-scale cloud telemetry to produce actionable, data-driven security insights.
Self-motivated and capable of working independently as well as collaboratively within a multidisciplinary team.
Excellent communication skills, both written and verbal, with the ability to convey complex technical concepts clearly.
A passion for continuous learning and an innovative mindset, with a proven ability to think creatively and drive complex research projects from concept to impactful delivery.

Advantages:
Practical experience in incident response, threat hunting, or red teaming.
Hands-on expertise in building and operationalizing detection logic that enhances product security posture.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8293223
סגור
שירות זה פתוח ללקוחות VIP בלבד