Collecting data from various sources (Open source, feeds and intelligence portal).
Conducting investigations using advanced tools and intelligence sources.
Conducting Cyber Threat analysis based on SPLUNK.
Work closely with leading Cyber, intelligence and operational professionals.
Identify emerging threats and attack patterns.
Tracking threat actor groups and methods.
Conducting investigations using advanced tools and intelligence sources.
Conducting Cyber Threat analysis based on SPLUNK.
Work closely with leading Cyber, intelligence and operational professionals.
Identify emerging threats and attack patterns.
Tracking threat actor groups and methods.
Requirements:
Strong understanding of cyber threats, attack vectors and threat actor tactics, techniques and TTPs.
2 years experience in cybersecurity, preferably with a focus on threat intelligence.
Knowledge of Cyber Security methodology and Frameworks.
Strong familiarity with Networking protocols and infrastructure, Databases and Operating Systems.
Familiarity with OSINT gathering techniques based on open-source intelligence platform.
Ability to analyze raw cyber technology reports in both Hebrew and English.
Experience working with threat intelligence platforms and sources.
Excellent written and verbal communication skills in English.
Strong understanding of cyber threats, attack vectors and threat actor tactics, techniques and TTPs.
2 years experience in cybersecurity, preferably with a focus on threat intelligence.
Knowledge of Cyber Security methodology and Frameworks.
Strong familiarity with Networking protocols and infrastructure, Databases and Operating Systems.
Familiarity with OSINT gathering techniques based on open-source intelligence platform.
Ability to analyze raw cyber technology reports in both Hebrew and English.
Experience working with threat intelligence platforms and sources.
Excellent written and verbal communication skills in English.
This position is open to all candidates.