דרושים » אבטחת מידע וסייבר » Security Analyst, Security Operations and Incident Response

דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Meta
Location: Tel Aviv-Yafo
Job Type: Full Time
Meta is seeking a Security Analyst to join the Global Security Operations and Incident Response team. The Analyst will serve on the front lines of Metas Security team and will lead and support security investigations across the companys global infrastructure as well as respond to escalations from the Tier1 team. The analyst will leverage an armory of tools to investigate and respond to both external and internal security threats. Utilizing Metas tooling, you will monitor security events in real-time, assess external and internal threats, and provide accurate and timely response. You will collaborate closely with technical teams, with a diverse set of skills to tackle the panoply of unique security challenges that we encounter at Meta scale.
Security Analyst, Security Operations and Incident Response Responsibilities
Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediation.
Act as an escalation point for Tier1 investigations, contribute to the development of the Tier1 capability, and ensure adherence to internal service level objectives.
Document security investigations and produce high quality and accurate reports for a wide range of stakeholders.
Collaborate with Security Engineers and cross-functional teams to investigate and remediate large scale security incidents.
Support security incident root cause analysis, identify control gaps, and recommend mitigation strategies.
Collaborate with cross-functional teams to drive improvements to security tools, policies and processes.
Improve the effectiveness and efficiency of the Security Operations and Incident Response team including the development and refinement of processes and technical capabilities.
Understand and support requirements of internal and external stakeholders, regulators, and auditors.
Requirements:
4+ years of professional experience in a Security Operations Center or in a relevant investigative role.
4+ years of experience navigating and understanding Windows, macOS, and Linux operating systems.
Experience analyzing network and host-based security events.
Professional experience using a wide range of investigative tools including EDR, SIEM/SOAR, UBA.
Knowledge of networking technologies, specifically TCP/IP and related protocols.
Experience with attacker tactics, techniques, and procedures.
Experience making important decisions independently and multi-tasking under pressure.
Experience responding quickly to changing situations without compromising quality.
Preferred Qualifications
Experience in a Security Operations, Incident Response, or investigation role in a large and regulated organization.
Experience with database query languages.
Experience handling and triaging malware.
Experience handling digital forensic evidence and writing reports to support internal investigations.
Experience driving changes to processes that can scale across teams and regions and affect organizations outside Security.
.המשרה מיועדת לנשים ולגברים כאחד
 
Hide
הגשת מועמדות
עדכון קורות החיים לפני שליחה
69948
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Meta
Location: Tel Aviv-Yafo
Job Type: Full Time
Meta Security is looking for an Incident Response Engineer with experience in the identification, containment and mitigation of security incidents. You will be analyzing different data sources to detect, investigate and respond to internal and external threats. You will also be working with our software and production engineering teams to develop scalable systems to automate detection and remediation and help us build the next generation of security operations and response platforms.
Security Engineer, Incident Response Responsibilities
Lead security incident response in a cross-functional environment and drive incident resolution.
Contribute to Incident Response initiatives that improve Metas capabilities to effectively respond and remediate security incidents.
Perform digital forensic acquisition and analysis of a wide variety of assets including endpoints, mobile, servers and networking equipment.
Perform log analysis from a variety of sources (e.g., individual host logs, network traffic logs) to identify potential threats.
Perform security incident root cause analysis and drive implementation of containment and mitigation strategies.
Build automation for response and remediation of malicious activity.
Requirements:
5+ years in Security Incident Response and Detection & Response Engineering.
Knowledge of networking technologies and experience analyzing network-based security events.
Knowledge of operating systems, file systems, and memory structures and experience in host and memory forensics (including live response) on Windows, macOS and Linux.
Experience investigating and responding to both external and insider threats.
Coding/scripting experience in one or more general purpose languages.
Experience with attacker tactics, techniques, and procedures.
Bachelor's degree or equivalent experience in Security.
Preferred Qualifications
Experience as a Security Incident Responder and Investigator in a large and regulated organization.
Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence.
Experience in threat hunting including the ability to leverage intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems.
Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
69947
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Meta
Location: Tel Aviv-Yafo
Job Type: Full Time
Meta Security is looking for a Security Engineer with experience in threat modeling, TTP identification, and detection engineering. Youll work alongside Software Engineers and Offensive Security Engineers to identify critical assets, assess the top risks, and evaluate potential attacks against Meta systems. You will be working across engineering teams supporting Production and Corporate systems to develop detection and response automation leveraging both industry-standard and custom detection and response platforms. Youll generate detection ideas utilizing some of the worlds largest data sets and build on top of hyper-scale data pipelines.
Security Engineer - Surface Coverage, Detection Engineering Responsibilities
Lead cross-functional projects to improve our capabilities to effectively detect and respond to security incidents
Review security architecture of large-scale custom and commercial systems and independently propose logging, detection and prevention controls
Perform TTP-based Threat Modeling for a wide variety of assets including endpoints, mobile, servers, internal services, public & private cloud environments and networking equipment
Perform analysis against logs from a variety of sources (e.g., individual host logs, network traffic logs) to identify potential threats and detection ideas
Build response workflows and actions that auto-resolve false positives and provide context scaling our ability to investigate
Support security incident response in a cross-functional environment and drive incident resolution
Design and implement attack testing automation to validate detection coverage
Build logging pipelines using our custom datasets and infrastructure
Requirements:
7+ years of experience in Detection & Response Engineering or similar Security Engineering role
Experience building complex automations and integrations using SOAR platforms
Bachelor's degree or equivalent experience in Security
Experience designing systems used for responding to both external and insider threats
Experience analyzing network and host-based security events
Knowledge of networking technologies, specifically TCP/IP and the related protocols
Knowledge of operating systems, file systems, and memory structures on Windows, MacOS and Linux
Coding/scripting experience in one or more general purpose languages
Experience with attacker tactics, techniques, and procedures
Preferred Qualifications
Background in security-focused software engineering, designing large scale systems and data pipelines, or offensive security
Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Offensive Security Testing, Detection and/or Response tooling development
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
69971
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Meta
Location: Tel Aviv-Yafo
Job Type: Full Time
Meta Security is looking for a Security Analyst to join our Bug Bounty program. You will be responsible for communicating with and validating security vulnerabilities from a community of security researchers around the globe. You will gain insights of Meta's codebase to understand the root cause of each vulnerability, and have the opportunity to play a key role in one of the largest bug bounty programs in the world.

The Bug Bounty program incentivizes security researchers to search for, find and report security vulnerabilities across Meta's family of products, including Facebook, Instagram, WhatsApp and Quest. The program serves as the final level of protection per Metas Shift Left operating model, aiming to discover and resolve vulnerabilities that have landed in production and are at risk of being exploited, and acts as a feedback loop for other security efforts.
Security Analyst - Bug Bounty Responsibilities
Analyze, assess, and respond to various security vulnerabilities we receive as part of our Bug Bounty program.
Follow up with researchers on unclear reports.
Understand the root cause of security vulnerabilities to help the product team fix them.
Play an active role in continuing to grow and develop the bug bounty program and other internal security and privacy initiatives.
Own expansions to the program, including private bounties.
Own critical submissions to resolution - liaise a plan with product teams, advise on the right mitigation strategy.
Implement bug fixes and feature enhancements to the program's public and internal code base.
Requirements:
Familiarity with web security issues (e.g. OWASP top 10).
Ability to follow bug reports, reproduce and triage them.
Excellent written and verbal communication skills.
Preferred Qualifications
Participation in bug bounty programs (not necessarily Meta's bug bounty program).
Entry-level experience with analyzing source code to find security vulnerabilities.
Contributions to the security community (public research, blogging, presentations, etc).
Experience writing in scripting languages and willingness to learn new languages.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
69966
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Check Point
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Why Join Us?
Check Point Research (CPR) is looking for a Threat Researcher to join its Threat Intelligence Analysis (TIA) team. The team is responsible of discovering, analyzing and tracking advanced threat actors and campaigns, with a strong focus on high-end cybercrime and nation-state activities. You will join a team of motivated, independent and highly technical individuals to contribute the effort to protect Check Point customers and empower the Check Point brand.

Key Responsibilities
Identify, understand and monitor advanced campaigns using publicly available sources as well as internal data.
Analyze malware and other hacking tools utilized by threat actors in active campaigns and intrusions.
Create technical research content for external publications and private intelligence reports.
Help creating protections and detections based on deep understanding of advanced threat actors Tactics Techniques and Procedures (TTPs).
Collaborate with other security teams to assist in threat intelligence and research tasks.
Requirements:
3+ years of experience as a Threat Researcher/Incident Responder/Malware Analyst/Detection Engineer or other similar roles.
Practical experience in tracking state-sponsored or advanced financially motivated actors including malware, infrastructure and TTPs.
Profound knowledge and understanding of malware and common attacking techniques.
Hands-on experience in automating and optimizing hunting and enrichment processes using code (preferably Python).
Familiarity with query languages and data exploration tools.
Ability to translate technical findings into actionable detection and prevention signatures.
Experience in writing technical blog posts and technical analysis reports.
Experience in public speaking and presentation of research in cyber security conferences.
Fluent English verbal and written.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
71215
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 16 שעות
MICROSOFT ISRAEL
Location: Tel Aviv-Yafo
Job Type: Full Time
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsofts mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

Cloud Apps and Identity Research team is covering multiple SaaS based threat scenarios including Cloud Based Ransomware, Email and Files extortion, Business Email Compromise and related Nation State activity.
Responsibilities
Perform financial motivated attacker tradecraft research and threat landscape investigation across cloud-based attacks spanning permissions, identities, applications, and data.
Partner with engineers and data scientists in a geographically distributed team to deliver innovative new product capabilities.
Threat hunting to discover real world advanced attacks together with designing and implementing automated detection and hunting analytics combining alerts and signals across Microsoft Defender security products.
Contribute to active engagement with the security ecosystem through papers, presentations, and blogs.
Provide subject matter expertise to customers based on industry attack trends and product capabilities.
Requirements:
You have at least 5+ years of experience in cyber security with a background in the modern attacker kill-chain, MITRE ATT&CK, and emerging enterprise threats including attacks against SaaS Apps (Sharepoint, Exchange, Entra ID), Oauth Apps, Enterprise Apps.
You have BS or equivalent experience in computer science, engineering, or information technology.
You have understand and deep knowledge of few commonly used attack tools and frameworks used by Redteam Proficient in at least one programming language such as Python, C#, or C++.
You have excellent cross-group and interpersonal skills, with the ability to articulate the business need for product improvements and a desire to engage directly with customers. Experience working with and manipulating large data sets (i.e. billions of events per day).
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
70025
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Check Point
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Why Join Us?
In this role, you will be leading code and containers security product offering. Using data, customer feedback, and market research you will be responsible for understanding the customer needs and will use this to define and drive code and containers security offering forward. Strong customer focus, excellent communication skill both with customers and R&D including the ability to translate customer into clear requirements.

Key Responsibilities
Manage 1-2 product managers in different, integrated product lines

Develop and execute product strategies that align with the CloudGuard platform vision and market needs. Collaborate with cross-functional teams to define product roadmaps and integrated product roadmap and prioritize feature development.
Work closely with engineering teams to define product requirements, user stories, and acceptance criteria. Ensure timely delivery of high-quality features that meet customer expectations.
Collaborate with marketing and sales teams to develop product messaging, and sales enablement materials. Support product launches and drive adoption.
Engage with customers to gather insights and validate product ideas. Use customer feedback to iterate on product features and improve user experience
Present our products and solutions in formal and informal settings.
Requirements:
5+ years of technical Product Management experience with a good understanding of outbound product management
2+ years of managerial skills, leading a team of product managers, with proven management and organizational skills
Cloud security, code security, Application Security Posture Management, container security, application security testing, vulnerability management
Work experience within enterprise security/application security/code security targeting large enterprise customers is highly desirable.
Hands-on experience delivering high-quality products
Exceptional communication and strong public speaking and presentation skills.
BA/BS or equivalent experience. MBA desirable.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
71087
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Check Point
Location: Tel Aviv-Yafo
Job Type: Full Time
Why Join Us?
Join our dynamic and innovative team at Check Point, a leading security software company committed to safeguarding digital landscapes. We are currently seeking a skilled and experienced Data Protection Officer to lead our data protection initiatives and ensure compliance with global privacy regulations.

At Check Point, we are committed to fostering a culture of innovation, collaboration, and continuous learning. As a Data Protection Officer, you will play a pivotal role in shaping and enhancing our data protection practices. Join us in our mission to create a secure digital future while enjoying professional development opportunities, and a vibrant workplace culture.

If you are passionate about data protection and privacy and eager to make a significant impact in a cutting-edge security software company, apply now to be part of our dynamic team!

* This role reports directly to the CISO.





Key Responsibilities
Policy Development: Formulate and enforce comprehensive data protection policies in alignment with relevant laws and regulations.
Data Privacy Impact Assessments (DPIA): Lead the DPIA process to evaluate and mitigate privacy risks associated with new projects and systems.
Risk Assessment: Conduct thorough risk assessments to identify and mitigate potential data protection risks within the organization.
Compliance Oversight: Stay abreast of evolving privacy laws and regulations, ensuring our company policies and practices remain in compliance.
Training and Awareness: Implement training programs to educate employees on data protection policies and best practices, fostering a culture of privacy awareness.
Data Subject Rights: Manage and respond to data subject access requests and other requests related to individual privacy rights.
Collaboration: Work closely with cross-functional teams, legal counsel, and IT security to integrate data protection principles into business processes.
Reporting: Regularly report to executive leadership on the state of data protection within the organization.
Requirements:
Experience: 3+ years of experience in data protection and privacy management, with a strong understanding of data protection practices, technologies, solutions and global privacy laws and regulations.
Certifications: Relevant Data Privacy certification (e.g. CIPP, CDPSE).
Communication Skills: Excellent communication and interpersonal skills to effectively engage with stakeholders at all levels.
Analytical Thinking: Strong analytical and problem-solving skills to assess risks and develop effective mitigation strategies.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
71002
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 

חברת השמה / כח אדם

לפני 10 שעות
Extreme Group
Job Type: Full Time
We are seeking an experienced Cybersecurity Analyst to join our monitoring team. In this role, you will be responsible for identifying, responding to, and preventing cyber threats in Real-Time.
* This is a full-time position with 24/7 shifts, 6 shifts per week.
Requirements:
At least one year of experience in handling, analyzing, responding to, and preventing cyber incidents
Familiarity with cloud environments (AWS, Azure), general services, investigation, and response tools
Experience in investigating cyber incidents in cloud environments using various tools and products (CloudTrail, Log Analytics, Wiz)
In-depth knowledge of cybersecurity products
Knowledge of communication protocols
Familiarity with analysis and response tools (Sysinternals, Wireshark)
Knowledge of writing queries for databases - Oracle, SQL, KQL
Understanding and knowledge of infrastructure and application attack investigation and analysis
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
71854
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 18 שעות
WIX
Location: Tel Aviv-Yafo
Job Type: Full Time
required Application Security Expert
Work closely with dev teams on all SDLC levels, performing security design reviews, threat modeling, and penetration tests, while acting as a security mentor for developers
Perform code reviews to identify security flaws and vulnerabilities
Research the platform code and services used by our developers
Build creative tools and services to detect and solve cross-security issues
Develop and deliver security training CTFs for Wix developers
Requirements:
2+ years of hands-on experience in offensive application security.
In-depth knowledge of web application vulnerabilities, their exploitation in the real world, and browser security mechanisms.
Passion about cutting-edge technologies
Open-minded self-learner.
Youll get bonus points if youve:

Published security research
Participated in bug bounty programs
Familiar with Node/Java/Scala programming languages
Worked with Docker containers and Kubernetes
Knowing your way around AWS and GCP environments, or cloud and microservice architectures
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
70198
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 

חברת השמה / כח אדם

לפני 16 שעות
CyWayz Recruitment & Outsourcing
Job Type: Full Time and Hybrid work
A leading cybersecurity services company is looking for a Junior Cyber security Consultant (1-2 years of experience). In this role, you'll be part of the consulting team, leading comprehensive consulting projects for large enterprises.

Key Responsibilities:
- Managing consulting projects, including timeline management and deliverable completion
Conducting client needs assessments, identifying new services, and integrating them across consulting domains
- Applying risk management methodologies and control assessment frameworks such as NIST and others to evaluate and enhance clients' cybersecurity posture
- Providing expert guidance and recommendations on cybersecurity best practices
- Presenting findings and recommendations to clients in a clear and concise manner
This is a hybrid position in Rehovot (flexible)
Requirements:
- Bachelor's degree in Information Systems/Industrial Management or other relevant technology field - required
- Relevant certifications in information security - required
- Minimum 1 year of experience as a consultant in cyber risk management and information security - required
- Experience conducting risk assessments in large, complex, and distributed organizations - significant advantage
- Familiarity with risk management methodologies and control assessment frameworks such as NIST
- Strong business understanding
- Proficiency in English

Ready to launch your career in cybersecurity consulting? Apply now!
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
71391
שירות זה פתוח ללקוחות VIP בלבד