דרושים » אבטחת מידע וסייבר » Malware Analysis Team Leader

דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
6 ימים
Check Point
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Check Point Research is expanding and establishing a new international force of talented Researchers. We are looking for a Malware Analysis Team Leader with a deep focus on cybercrime investigations to lead a dynamic team of experts dedicated to identifying, analyzing, publishing, and mitigating cybercrime-related threats. This leadership role will drive advanced malware analysis efforts, conduct threat research, publish in top conferences and blogs, and coordinate with internal and external stakeholders to combat and prevent cybercriminal activities. The ideal candidate will have strong technical expertise in malware reverse engineering, a deep understanding of cybercrime tactics, and excellent communication skills, including the ability to present findings clearly and publish research for internal stakeholders and the broader cybersecurity community.

The work of our researchers is constantly presented at international conferences and covered by major media outlets globally. Threat research is an exciting area for us, and we give the CP members the freedom and means to practice it.

Key Responsibilities
Lead the Malware Analysis Team: Manage and mentor a team of skilled researchers on identifying, analyzing, and mitigating malware associated with cybercrime, including ransomware, banking Trojans, exploit kits, and other forms of cybercriminal malware.
Cybercrime Threat Intelligence: Collaborate with threat intelligence teams to analyze malware in the context of cybercrime syndicates and criminal activity. Identify trends, tactics, and patterns in malware usage by cybercriminal groups and provide actionable intelligence to relevant teams and external partners.
Malware Reverse Engineering: Lead efforts in reverse-engineering malicious software, tracking variants, and identifying attack techniques, tactics, and procedures (TTPs) cybercriminal actors use.
Cross-Functional Collaboration: Work closely with internal teams (e.g., Incident Response, Threat Intelligence, SOC) and external stakeholders (e.g., law enforcement, CERT, threat intelligence providers) to share findings, collaborate on investigations and coordinate actions to disrupt cybercrime activities.
Publication and Thought Leadership: Produce detailed, high-quality research reports and technical papers based on malware analysis and cybercrime investigations. Contribute to the publication of findings in industry-leading forums, conferences, and journals, establishing the organization as a thought leader in cybersecurity.
Presentations and Reporting: Prepare and deliver presentations to technical and non-technical stakeholders, including executives, legal teams, and law enforcement. Communicate complex findings, research insights, and actionable intelligence on cybercrime and malware trends.
Training and Development: Mentored junior team members, providing guidance on malware analysis techniques, threat hunting, and reporting. Foster a culture of continuous improvement, encouraging knowledge sharing and professional development within the team.
Stay Informed on Emerging Threats: Regularly monitor and research new and evolving cybercrime tactics, malware trends, and global threat intelligence. Leverage this knowledge to enhance the organization's defense posture and share updates with relevant stakeholders.
Requirements:
5+ years of experience in malware analysis, cybercrime investigations, or related fields.
2+ years in a leadership or team management role with experience leading cybersecurity operations in high-stakes environments.
Expertise in malware reverse engineering (static and dynamic analysis).
Proficiency in using industry-standard tools such as IDA Pro, X64, VT, Etc.
Strong understanding of common malware types used in cybercrime (e.g., ransomware, keyloggers, exploit kits, mobile threats).
Development skills with Python, C/C++, Assembly, or other scripting languages for malware analysis and automation.
.המשרה מיועדת לנשים ולגברים כאחד
 
Hide
הגשת מועמדות
עדכון קורות החיים לפני שליחה
107461
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
6 ימים
Check Point
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Check Point Research (CPR) is looking for a Threat Researcher to join its Threat Intelligence Analysis (TIA) team. The team is responsible of discovering, analyzing and tracking advanced threat actors and campaigns, with a strong focus on high-end cybercrime and state-sponsored activities. You will join a team of motivated, independent & highly technical individuals and contribute the effort to protect Check Point customers and empower the Check Point brand.

Key Responsibilities
Identify, understand and monitor advanced campaigns using publicly available sources as well as internal telemetry.
Analyze malware and other hacking tools utilized by threat actors in active campaigns and intrusions.
Create technical research content for public and private intelligence reports.
Help build protections and detections based on deep understanding of advanced threat actors Tactics Techniques and Procedures (TTPs).
Collaborate with other security teams to assist threat intelligence and research tasks.
Requirements:
3+ years of experience as a threat researcher, incident responder, malware analyst, detection engineer or other relevant roles.
Practical experience in tracking state-sponsored or advanced financially motivated actors including malware, infrastructure and TTPs.
Profound knowledge and understanding of malware and common attacking techniques.
Hands-on experience in automating and optimizing hunting and enrichment processes using code (preferably Python).
Familiarity with query languages and data exploration tools.
Ability to translate technical findings into actionable detection and prevention signatures.
Experience in writing technical blog posts and technical analysis reports.
Experience in public speaking and presentation of research in cyber security conferences.
Fluent English.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
107614
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
MICROSOFT ISRAEL
Location: Herzliya and Tel Aviv-Yafo
Job Type: Full Time
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsofts mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced Threat Intelligence leaders with highly honed threat intelligence analysis skills. MSTIC provides unique insight on threats to protect Microsoft and our customers and is responsible for delivering timely threat intelligence across our product and services teams.

Microsofts mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.

Responsibilities
Review threat intelligence deliverables to ensure customer satisfaction and develop standards for quality control. 
* Create and track threat intelligence production workflows and pipelines to support customers and internal stakeholders. 
* Engage with internal stakeholders to ensure threat intelligence content integrates with various product and service groups within Microsoft.
* Curate catalog of threat intelligence deliverables to ensure coverage of critical threats and create new content types to fill identified gaps.
* Develop metrics to measure effective delivery and customer satisfaction. 
Requirements:
5+ years proven technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement techniques both to discover and track the adversaries of today and identify the attacks of tomorrow.

Expertise tracking APT adversaries leveraging the Diamond Model to identify and characterize various TTPs, capabilities, infrastructure, and operational campaigns In depth experience producing actionable threat intelligence on targeted and advanced persistent adversaries, enabling network and host defenses in external organizations with demonstrable impact.

Applied knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics, including methods of data collection and analytic techniques; and network forensics, including common protocols and how those are used in adversary operations.

Applied knowledge of a variety of adversary command and control methods and protocols. Strong experience supporting incident response and being deeply familiar with common incident response procedures, processes, and tools.

Proven track record of working across cross-functional teams including threat hunters, incident responders, and customer delivery representatives.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
106531
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
MICROSOFT ISRAEL
Job Type: Full Time
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions.

The Microsoft Security organization accelerates Microsofts mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

Are you passionate about disrupting #CloudSecurity? Join us at Microsoft, the largest security company in the world, and work on leading planet-scale products! 🚀 At the Microsoft Cloud Security team, we take immense pride in developing a diverse set of security products and services that are leaders in their respective market segments. Our innovative solutions have set new industry standards, earning global recognition for safeguarding critical infrastructure at the highest scale. Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) designed to protect cloud-based applications running in all major cloud providers. It includes cloud security posture management (CSPM) to identify and mitigate weak spots in cloud configurations, and cloud workload protection (CWP) to detect real-time attacks and help the SOC respond and mitigate threats.



We are a diverse group of talented professionals, including software engineers, security researchers, product managers, and data scientists, collaborating to develop products that secure our customers, including the biggest companies in the world. You will work in a supportive and inclusive environment where you will learn and collaborate with the best and brightest minds in the industry, make a significant impact, grow your skills, and advance your career
Responsibilities
Conduct in-depth analysis and research on cloud and containerized environments to identify threats, vulnerabilities, and potential risks.
Investigate, analyze, and learn from security researchers, attackers, and real incidents to develop durable detection strategies across the entire kill-chain.
Collaborate with internal and external teams to forge new defenses and concepts that help mature Microsoft security products.
Demonstrate leadership in an exceptionally challenging and rewarding environment and influence the organization.
Requirements:
7+ years of hands-on experience in security research.
Previous experience with Azure, AWS, GCP, and/or Kubernetes and container security.
Strong understanding of attackers mindset and ability to apply defensive tactics to protect against them.
B.Sc./M.Sc. degree in Computer Science or a related technical discipline.
Team player with excellent collaboration and communication skills.
Strong problem-solving skills and the ability to navigate ambiguity and make informed decisions in a fast-paced environment.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
106533
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
MICROSOFT ISRAEL
Job Type: Full Time
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions.

The Microsoft Security organization accelerates Microsofts mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.

Are you passionate about disrupting #CloudSecurity? Join us at Microsoft, the largest security company in the world, and work on leading planet-scale products! 🚀 At the Microsoft Cloud Security team, we take immense pride in developing a diverse set of security products and services that are leaders in their respective market segments. Our innovative solutions have set new industry standards, earning global recognition for safeguarding critical infrastructure at the highest scale. Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) designed to protect cloud-based applications running in all major cloud providers. It includes cloud security posture management (CSPM) to identify and mitigate weak spots in cloud configurations, and cloud workload protection (CWP) to detect real-time attacks and help the SOC respond and mitigate threats.

We are a diverse group of talented professionals, including software engineers, security researchers, product managers, and data scientists, collaborating to develop products that secure our customers, including the biggest companies in the world. You will work in a supportive and inclusive environment where you will learn and collaborate with the best and brightest minds in the industry, make a significant impact, grow your skills, and advance your career.

Responsibilities
Conduct in-depth analysis and research on cloud and containerized environments to identify threats, vulnerabilities, and potential risks.
Investigate, analyze, and learn from security researchers, attackers, and real incidents to develop durable detection strategies across the entire kill-chain.
Collaborate with internal and external teams to forge new defenses and concepts that help mature Microsoft security products.
Demonstrate leadership in an exceptionally challenging and rewarding environment and influence the organization.
Requirements:
4+ years of hands-on experience in security research.
Previous experience with Azure, AWS, GCP, and/or Kubernetes and container security.
Strong understanding of attackers mindset and ability to apply defensive tactics to protect against them.
B.Sc./M.Sc. degree in Computer Science or a related technical discipline.
Team player with excellent collaboration and communication skills.
Strong problem-solving skills and the ability to navigate ambiguity and make informed decisions in a fast-paced environment.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
106532
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
6 ימים
Check Point
Location: Tel Aviv-Yafo
Job Type: More than one
Check Point Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.

We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.

Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams
Requirements:
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
107372
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
MICROSOFT ISRAEL
Location: Haifa and Tel Aviv-Yafo
Job Type: Full Time
Come and be part of a dynamic team focused on securing cutting-edge AI and cloud technologies in a rapidly evolving threat landscape. We are leading new initiatives and research projects across AI Security, Identity Protection, and SaaS Defense, and this role offers a unique opportunity to help define the rules of the game. AI is transforming the way we interact with computers and machines and defining new cybersecurity problems and opportunities - we are looking for a Principal Researcher who can help us stay ahead of the curve.

In this role, youll research and build defenses across AI systems, agentic protocols, Identity platforms, and SaaS applications. One day you might analyze a new class of AI prompt injection attacks or Agents abuse, the next youll be hunting through data or creating novel protection mechanisms for them. Youll work closely with product teams to turn research prototypes into real security features.

Join our threat protection research team and be part of a team who contributes to Microsofts most advanced and innovative security solutions. Our mission is to help everyone to counter cyber threats by strengthening their security capabilities across their entire environment, including Identities, Agentic AI systems, Cloud and Applications.
Responsibilities
Research and develop detection methods for new and advanced attack techniques -from exploits to implants. Build end-to-end PoCs, from offensive testing to scalable detection, across all our cloud and identity platforms.
Stay up to date on the latest attack trends and build strong detections across the kill chaincovering agentic AI & LLM threats, cloud and identity-based attacks.
Collaborate with multiple product and engineering teams to design the next iteration of security products, implement detection ideas and validate their effectiveness using a data-driven approach.
Collaborate with data science teams to drive ML based protections, understand, and identify detection gaps, capabilities, assumptions, and improvements.
Provide cybersecurity expertise as needed during security escalations and incidents to help protect Microsoft and our customers.
Requirements:
10+ years of computer security industry experience with knowledge of adversary tradecraft, security operations, incident response, threat hunting, and of emerging threats and techniques for attacks against modern cloud environments. 
4+ years of experience researching, prototyping, and driving engineering requirements for threat protection systems.
BSc. or M.Sc. in Computer Science, Software Engineering, or relevant practical experience (e.g. service in elite technology unit in IDF).
Code fluency in either C#, Python or Rust.
A drive to tackle hard problems with level of ambiguity.
Strong knowledge of the security threat landscape, with experience in the modern attacker kill chain and MITRE ATT&CKespecially in cloud, application, identity, and AI-related threat scenarios.
Team player open to ideas and enjoys working with others to achieve shared goals.
Experience leading a project from start to finishincluding idea, design, coding, testing, and ongoing maintenance.
Familiarity with cloud environments, and hybrid cloud enterprise services.
.המשרה מיועדת לנשים ולגברים כאחד
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
106526
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
Software AG-SPL
מיקום המשרה: תל אביב יפו
סוג משרה: משרה מלאה
חברת Software AG מגייסת data security analyst לחברת ביטוח בתל אביב.
דרישות:
ניסיון של למעלה מ-4 שנים בתפקיד מיישם /ת סייבר.
ניסיון בתחזוקה והקמה של מערכת DLP -חובה!
ניסיון בהגדרת מדיניות והגבלות.
הכרות מעמיקה עם סביבות AZURE ו- 365O.
הכרות מעמיקה עם AD + GPO.
כתיבת סקריפטים ב- PowerShell. המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
106404
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 

חברת השמה / כח אדם

לפני 15 שעות
ריקרוטיקס בע"מ
מיקום המשרה: תל אביב יפו
סוג משרה: משרה מלאה ועבודה היברידית
התפקיד דורש הבנה עמוקה בסיכוני סייבר, תקנות רגולציה, ניהול מדיניות ונהלים ארגוניים, ויכולת להוביל תהליכים חוצי ארגון בסביבה דינמית.

תחומי אחריות עיקריים:
- הובלה ואחריות כוללת על תחום אבטחת המידע והסייבר בארגון
- בניית מדיניות, נהלים ותהליכים בתחום אבטחת המידע וה-GRC
- ניהול סיכוני סייבר והובלת תהליכי ניהול סיכונים ארגוניים
- ליווי והיערכות לביקורות חיצוניות ופנימיות (SOX, ISO 27001, SOC2, NIST,
GDPR ועוד)
- ניהול תגובת הארגון לאירועי סייבר ותרחישי חירום (IR)
- עבודה שוטפת מול צוותי IT, משפטית, רגולציה, ניהול סיכונים והנהלה בכירה
- דיווח שוטף להנהלה ודירקטוריון על מצב אבטחת המידע והסיכונים
- ניהול ספקים בתחום אבטחת מידע ו-GRC, כולל מערכות ייעודיות
- הובלת תהליכי הדרכה והעלאת מודעות לאבטחת מידע בארגון
דרישות:
ניסיון מוכח של לפחות 3 שנים בתפקידי GRC / CISO / אבטחת מידע בארגון בינוני-גדול
היכרות מעמיקה עם רגולציות ותקנים רלוונטיים: ISO 27001, SOC 2, SOX, NIST, GDPR, DORA חובה
ניסיון בהובלת ביקורות וניהול ממשקי עבודה מול גופים רגולטוריים
הבנה טכנולוגית עמוקה ויכולת לתרגם סיכונים טכנולוגיים להיבטים עסקיים
ניסיון עם מערכות GRC ופתרונות אבטחה יתרון משמעותי
אנגלית ברמה גבוהה מאוד (קריאה, כתיבה, דיבור) חובה
תואר ראשון בתחום רלוונטי - יתרון
הסמכות מקצועיות רלוונטיות (CISM, CISA, CISSP ) יתרון המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
108140
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 

חברת השמה / כח אדם

2 ימים
דיאלוג
סוג משרה: משרה מלאה
לחברת הייטק מולטי-דיסציפלינארית מצליחה המתמחה בתחום מערכות אבטחה תת-ימיות, סונאר ואקוסטיקה תת-ימית דרוש/ה Cybersecurity Engineer.
החברה קיימת כבר 30 שנה וממוקמת בגבעת שמואל.
דרישות:
שנה ומעלה ניסיון בCybersecurity
תואר מדעי - יתרון למדעי המחשב
ניסיון קודם עם CIS Benchmarks
ניסיון קודם עם כלי ניתוח וניטור - SIEM, EDR, Sysmon המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
108223
שירות זה פתוח ללקוחות VIP בלבד
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 

חברת השמה / כח אדם

לפני 13 שעות
פרוסיד
מיקום המשרה: מספר מקומות
סוג משרה: משרה מלאה ועבודה היברידית
פרוסיד מגייסת Change Management & PM Team!

התפקיד כולל:
טיפול בכלל השינויים המבוצעים בסביבת ייצור ותיאומם.
ניהול, מעקב ותיעוד לכלל אירועי התקלות בסביבת ייצור.
ניהול ישיבות CAB, בניית דוחות תפעוליים.
כתיבת אפיונים לתהליכים,טיפול בהרשאות וביצוע הדרכות.
דיווחי תקלות להנהלות השונות, מעקב וניתוח כלל התקלות והשינויים בסביבת הייצור.
דרישות:
לפחות 1 שנת ניסיון בניהול מערכות מידע - חובה.
לפחות 1 שנת ניסיון בניתוח נתונים והכנת דוחות ב-Excel - חובה.
יכולת הובלת פגישות ושיקוף סטאטוסים באופן רהוט - חובה.
רקע באנליזה וניתוח נתונים יתרון.
ידע והכרת מערכת service now יתרון. המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
108074
שירות זה פתוח ללקוחות VIP בלבד