דרושים » אבטחת מידע וסייבר » Cyber Threat Intelligence Analyst - Spanish speaker 24770

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 3 שעות
Location: Tel Aviv-Yafo
Job Type: Full Time
our company Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Native Spanish speaker
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541072
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 19 שעות
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Native French speaker
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8540425
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
02/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are backed by top-tier global investors, including Sequoia Capital, Ribbit Capital, and Cyberstarts-firms known for supporting the most innovative and influential companies in technology and cybersecurity.

In this role, you will be responsible for:

Tracking and evaluating crypto-focused cybercriminals, including the tools, techniques, and procedures (TTPs) used by attackers, their motivations, and industry-wide trends.
Producing and presenting intelligence reports on relevant threat groups and campaigns, detailing methodologies and the motivations driving the activities.
Conducting research into both on-chain and off-chain crypto attack vectors, identifying attacker interests, and uncovering root causes behind incidents.
Assisting in the development of prevention strategies and detection mechanisms to mitigate future attacks.
Collecting and managing information from diverse sources such as social media platforms, messaging apps, forums, the dark web, news feeds, and other open and covert channels.
Utilizing advanced tools and investigative techniques, including OSINT and HUMINT methodologies, to generate accurate and relevant intelligence.
Communicating with customers regarding potential risks and threats, as well as working closely with Customer Success, Marketing, and Sales teams.
Requirements:
Minimum of 3 years of experience in intelligence analysis, with a focus on WEBINT / OSINT.
Strong understanding of Cyber Threat Intelligence (CTI), the cybercrime ecosystem, and underground information sources.
Excellent analytical thinking and report-writing capabilities, supported by a proven track record.
Fluent in English, both written and spoken.
A proactive, team-oriented attitude and strong multitasking skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8528643
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/01/2026
Location: Tel Aviv-Yafo and Yokne`am
Job Type: Full Time
We are seeking a highly skilled and proactive Senior Cyber Security Threat Intelligence (CTI) Analyst to join the Networking product security team. In this critical role, you will function as a key defender of the technologies powering the worlds largest AI clusters. You will act as the eyes and ears of our product security organization, conducting investigative research into sophisticated adversaries and translating complex threat data into actionable intelligence. This is a hands-on role where your insights will directly influence our defensive posture and help eliminate threats before they manifest in the core of global AI infrastructure.

What You Will Be Doing:

You will serve as the intelligence core of our team dedicated to identifying, analyzing, and mitigating threats against our products and ecosystem:

Lead deep-dive OSINT and WEBINT research to identify emerging threats, conducting intelligence collection and analysis that leads to clear, actionable mitigation recommendations.
Leverage scripting (Python, Bash, etc.) and Generative AI tools to automate intelligence collection, triage, and analysis workflows.
Analyze Advanced Persistent Threats (APTs) and sophisticated adversaries, collaborating with multi-functional teams to detect, track, and eliminate potential risks to our networking portfolio.
Apply extensive insight into cyber operation phases to map adversary behavior, anticipate future movements, and harden our product development lifecycle with adoption of security improvements.
Drive threat hunting methodologies, proactively searching for indicators of compromise (IoCs) and hidden vulnerabilities within the products.
Translate complex technical findings into strategic intelligence reports for both technical collaborators and leadership, ensuring a clear and unified insight into the threat landscape.
Collaborate closely with incident response and engineering teams to ensure intelligence findings are seamlessly coordinated into other defensive tools and product security processes.
Requirements:
What We Need To See:
BSc or MSc in Computer Science, Computer Engineering, Cyber Security, or a related technical domain (or equivalent experience).
5+ years of proven experience in a dedicated Cyber Threat Intelligence (CTI) role within a large-scale or high-tech environment.
Technical proficiency in building automated intelligence pipelines through programming and the strategic use of Generative AI.
Expert-level knowledge of the CTI lifecycle, with a proven record of uncovering sophisticated cyber operations using diverse sources and techniques.
Strong technical background in analyzing advanced threats, capable of navigating through complex data to identify adversary infrastructure, intent, and tooling.
Deep understanding of the unique security concerns faced by global tech companies, including supply chain risks and intellectual property protection.
Outstanding analytical and interpersonal skills, with the ability to drive accountability and ensure intelligence leads to concrete security improvements.

Ways To Stand Out From The Crowd:
Direct experience with hardware and embedded devices technologies, specifically relating to networking or silicon security.
Professional background in Digital Forensics and Incident Response (DFIR), providing a comprehensive view of the threat actor journey.
Relevant industry certifications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8496501
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
27/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Our Counter Adversary Operations (CAO) Elite is looking for a highly motivated, self-driven, detailed-oriented, and experienced Senior Analyst dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world.
In this role, you will leverage CrowdStrike CAO's extensive resources to provide advanced threat hunting expertise and intelligence analysis to safeguard our customers'; environments. You will develop a trusted partnership by helping customers identify and operationalize timely, actionable, and relevant threat intelligence and threat hunt findings.
This position offers exceptional growth opportunities, blending technical mastery with strategic advisory services, all powered by CrowdStrike's world-class intelligence and hunting capabilities.

After a period of learning our custom-built tool suite, workflows, and methodologies you will join other CAO Elite Analysts protecting our customer's networks by performing tailored threat hunting and customer specific threat intelligence operations, including:

Executing sophisticated threat hunting operations.

Providing high value, actionable, threat intelligence aligned to the customer's.

requirements using your expertise and knowledge of the threat landscape.

Delivering high-impact briefings and recommendations spanning threat hunting, dark web, and intelligence information relevant to your customer.

Responding to customers ad hoc requests for information and support.

Building lasting partnerships with customers.

What Youll Do:

Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for CAO Elite customers.

Perform threat hunting, research dark web data, and research tailored threat intelligence for CAO Elite customers based on their specific requirements and environment.

Prepare and deliver customer presentations relating to intelligence reports, dark web alerts, and threat hunting findings on a regular basis.

Respond to customer requests relating to threat intelligence, threat hunting, and dark web monitoring.
Requirements:
All candidates must possess the following qualifications:

5+ years of experience in two (or more) of the following areas:

Incident response or security operations.

Threat hunting.

Cyber Threat intelligence.

Dark web monitoring.

Exemplary organizational skills with the ability to communicate both executive and detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.

Presentation Delivery: a background in presenting, briefing, and delivering reports to stakeholders ranging from individual contributors to executives.

Incident Handling: experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists.

Intelligence Tradecraft: knowledge of cyber threat intelligence terminology and data communication concepts and technologies.

Ability to travel on short notice, up to 5% of the time.


Security Clearance:

Must hold an active Israeli Level 2 Security Clearance.


Location & Work Arrangement:

Must reside in Tel Aviv or surrounding metropolitan area.

Position requires onsite presence up to 5 days per week.


Bonus Points:

Understanding of contemporary scripting languages.

Familiarity with application programming interfaces (API).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8520030
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
our company Intelligence seeks a Senior Intelligence Analyst for its Global Threat Analysis Cell (GTAC) to track and analyze targeted intrusion activity associated with Democratic Peoples Republic of Korea (DPRK)-nexus adversaries. The Analyst will monitor DPRK-nexus cyber operations, identify emerging trends and threats, investigate suspected DPRK-related adversary activity, and produce strategic and tactical intelligence assessments and products that directly inform our company customers.
What You'll Do:
Track adversary campaigns, tactics, techniques, and procedures (TTPs) through analysis of our companys unique telemetry, open-source data sets, and third-party intelligence
Author short and long format written reports with minimal supervision that apply analytic tradecraft, including appropriate use of estimative language, confidence levels, and structured analytic techniques. Collaborate across teams to inform various functions within our company Intelligence, as well as other company business units, to ensure comprehensive adversary tracking and deconfliction
Identify intelligence gaps, propose new research projects to address collection shortfalls, and develop initiatives to explore understand adversary intent, capabilities, and infrastructure
Conduct peer review of reporting by team members, and ensure all products meet our company Intelligences analytic standards for accuracy, clarity, and objectivity.
Prioritize, categorize, and respond to requests for information from internal and external customers
Conduct briefings as needed for a variety of levels of customers as requested (via either phone, video conference, webcast, in-person briefing, or industry conference).
Requirements:
Required:
Motivated self-starter with 2+ years experience in a threat intelligence environment, preferably with a practical focus on DPRK cyber operations
Hands-on knowledge of threat intelligence research/collection tools and analytical tradecraft methods
Ability to identify, organize, catalog, and track adversary tradecraft trends - often with incomplete data
Ability to produce quality finished intelligence products on short deadlines, as well as continuing to maintain analysis for and report on long-term strategic assessments with minimal assistance
Understanding of technical terminology, tools, and tactics employed by threat actors
Ability or willingness to learn to conduct basic technical analysis of the tools and tradecraft employed by threat actors, as well as to enumerate and monitor threat actors infrastructure
Experience effectively coordinating both research projects and written products among various sets of subject matter experts and technical specialists
Knowledge of geopolitical issues specific to DPRK (including Korean Peninsula affairs) and ability to use that information to support understanding
Undergraduate degree, military training or relevant experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8498479
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a customer-focused Security Analyst to join our managed services team. As a Customer-Facing Security Analyst, you will play a critical role in delivering top-notch exposure remediation services to our clients. You will work closely with customers to assess, analyze, and mitigate exposures in their IT and cloud infrastructure, while providing expert guidance and maintaining strong client relationships.

Responsibilities:

Own and manage the primary technical relationship for a portfolio of enterprise customers, establishing yourself as their trusted security advisor and focusing on strategic security outcomes.
Deliver continuous security posture assessments by leveraging the XM Cyber platform to translate complex technical findings into actionable, risk-based insights for customers.
Master the platform to drive maximum value for customers, guiding them on configuration, best practices, and new features to ensure successful adoption and ROI.
Drive remediation outcomes by acting as the liaison between customers and their internal teams (e.g., IT Operations, DevOps, Cloud Security), helping them prioritize efforts based on attack path analysis.
Proactively track and report on progress, delivering regular status updates and executive-level business reviews (QBRs) that demonstrate risk reduction and program success.
Act as a trusted advisor on exposure and attack path management, translating industry trends into proactive, tailored recommendations that enhance your customers' security posture.
Partner with the broader account team, including Customer Success Managers and Support Engineers, to ensure a seamless customer experience. Act as the lead technical escalation point to resolve complex challenges and champion customer needs with internal teams like Product and R&D.
Requirements:
5+ years in a customer-facing cybersecurity role (e.g., Customer Success Manager, TAM, Security Consultant), with proven experience managing and retaining a portfolio of large enterprise clients. Experience in a managed security service (MSSP) or cybersecurity SaaS company is a strong plus.
A strong technical foundation in security operations, specifically in vulnerability management, exposure remediation, and/or attack path management.
Hands-on experience with major cloud platforms (AWS, GCP, Azure) and their security principles.
Experience applying and advising clients on common security frameworks (NIST, CIS Controls, ISO 27001) and regulations (GDPR, HIPAA).
Exceptional communication and presentation skills, with the ability to articulate complex technical concepts to both technical practitioners and executive stakeholders.
Outstanding analytical abilities and an autonomous, self-driven learning style.
Native-level fluency in English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8496598
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a SaaS / AI Security Analyst to join our Security Research team in a newly created, high-impact role.

This position sits at the intersection of security research, analytical thinking, AI systems, and product impact, and plays a key role in shaping how AI-driven insights are delivered to our customers.

About the Role

As a SaaS / AI Security Analyst, your work will directly influence how security insights, alerts, and intelligence are generated, structured, and presented to customers, and improve and scale the AI capabilities that power our security platform. We are looking for someone with strong cyber security understanding, AI passion, technical and analytical skills.



Responsiblities:

Improve and optimize internal AI systems used to generate security content and insights for customers
Scale SaaS/AI discovery, posture management and threat detection capabilities across the platform
Translate security context, intent, and reasoning into structured, engineering-ready AI workflows
Work with LLMs to make security intelligence and data accessible, clear, and actionable for customers
Collaborate closely with the field, customers and prospects and internally with Product, and Engineering teams
Take full ownership of ideas and initiatives, from concept to production impact
Requirements:
3+ years of experience in Security Research / Data Science / Product Analysis from product companies or military service
Security background from cyber companies / military service - a must
Passion for AI tools and hands-on experience in different AI tools
Comfortable working hands-on with code.
Creative problem solver with strong intuition and resourcefulness
Strong communication and collaboration skills; customer- and service-oriented mindset
High ownership, proactivity, hunger to learn, and motivation to build
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522350
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
29/12/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and English Speakers
XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across cloud and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. We are seeking a customer-focused Security Analyst to join our managed services team. As a Customer-Facing Security Analyst, you will play a critical role in delivering top-notch exposure remediation services to our clients. You will work closely with customers to assess, analyze, and mitigate exposures in their IT and cloud infrastructure, while providing expert guidance and maintaining strong client relationships. Responsibilities:
* Own and manage the primary technical relationship for a portfolio of enterprise customers, establishing yourself as their trusted security advisor and focusing on strategic security outcomes.
* Deliver continuous security posture assessments by leveraging the XM Cyber platform to translate complex technical findings into actionable, risk-based insights for customers.
* Master the XM Cyber platform to drive maximum value for customers, guiding them on configuration, best practices, and new features to ensure successful adoption and ROI.
* Drive remediation outcomes by acting as the liaison between customers and their internal teams (e.g., IT Operations, DevOps, Cloud Security), helping them prioritize efforts based on attack path analysis.
* Proactively track and report on progress, delivering regular status updates and executive-level business reviews (QBRs) that demonstrate risk reduction and program success.
* Act as a trusted advisor on exposure and attack path management, translating industry trends into proactive, tailored recommendations that enhance your customers' security posture.
* Partner with the broader account team, including Customer Success Managers and Support Engineers, to ensure a seamless customer experience. Act as the lead technical escalation point to resolve complex challenges and champion customer needs with internal teams like Product and R&D.
Requirements:
* 5+ years in a customer-facing cybersecurity role (e.g., Customer Success Manager, TAM, Security Consultant), with proven experience managing and retaining a portfolio of large enterprise clients. Experience in a managed security service (MSSP) or cybersecurity SaaS company is a strong plus.
* A strong technical foundation in security operations, specifically in vulnerability management, exposure remediation, and/or attack path management.
* Hands-on experience with major cloud platforms (AWS, GCP, Azure) and their security principles.
* Experience applying and advising clients on common security frameworks (NIST, CIS Controls, ISO 27001) and regulations (GDPR, HIPAA).
* Exceptional communication and presentation skills, with the ability to articulate complex technical concepts to both technical practitioners and executive stakeholders.
* Outstanding analytical abilities and an autonomous, self-driven learning style.
* Native-level fluency in English.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8358959
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8488240
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Cloud Security Analyst
Tel Aviv
We are using technology to transform transportation around the world. From changing a single persons daily commute to reducing humanitys collective environmental footprint - weve got huge goals.
As a Cloud Security Analyst, you will join our global SOC team. A small, highly technical team that owns key parts of our security operations. This role is perfect for someone who is motivated and eager to make an impact, and who wants to take meaningful ownership in a cloud-native environment.You will investigate real incidents, improve detections, collaborate with engineering, support AI initiatives, and strengthen our security posture end-to-end.
What Youll Do:
Monitor, investigate, and respond to security events across cloud and SaaS environments
Tune detections, signatures, and guardrails to reduce noise and improve accuracy
Develop and maintain SOC playbooks, processes, and response guidelines
Perform intrusion analysis and contribute to threat intelligence correlation
Conduct proactive threat hunting and surface emerging risks
Lead hands-on technical investigations and incident containment
Work with SecOps engineers to design automated remediation flows
Build dashboards, advanced alerts, and visibility for critical events
Continuously improve SOC capabilities by bringing new ideas and approaches.
Requirements:
Who You Are:
2-3 years hands-on experience in security operations, incident response, or a similar cybersecurity role.
Strong analytical and investigative skills with hands-on experience handling alerts
Motivated and eager to make an impact in a small, high-ownership team
Able to prioritize, multitask, and work independently in a fast-moving environment
A team player with strong communication and a proactive mindset
Solid understanding of cloud platforms (AWS) and practical experience improving cloud security.
Solid understanding of modern attack techniques, threat trends, and detection logic
Proven experience with attack and mitigation methods in complex cloud and SaaS environments
Proven experience in the following domains:
Public cloud(AWS) & SaaS security tools
Endpoint protection(XDR/EDR)
Email Protection
SIEM, SOAR, and Security monitoring and analytics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8519792
סגור
שירות זה פתוח ללקוחות VIP בלבד