Required Security Operations Analyst.
Location- Rishon Lezion.
Full – time.
Hybrid.
Our company is the market leader in the IT platform for Monitoring, Self-healing and Analyzing customers virtual environments, creating solutions that save IT organizations time, money, and stress.
We are seeking a Cyber Security Analyst which monitors, investigates, and resolves escalates, reports, and raises recommendations for resolving and remediating security incidents.
What you will do:
Handle the advanced monitoring of security logs, SIEM tools, and network traffic for unusual or suspicious activity.
Experience in incident response, and in writing procedures and playbooks.
Ability to work with SecOps, IT and DevOps teams.
Provide on-call support for security emergencies and escalations.
Location- Rishon Lezion.
Full – time.
Hybrid.
Our company is the market leader in the IT platform for Monitoring, Self-healing and Analyzing customers virtual environments, creating solutions that save IT organizations time, money, and stress.
We are seeking a Cyber Security Analyst which monitors, investigates, and resolves escalates, reports, and raises recommendations for resolving and remediating security incidents.
What you will do:
Handle the advanced monitoring of security logs, SIEM tools, and network traffic for unusual or suspicious activity.
Experience in incident response, and in writing procedures and playbooks.
Ability to work with SecOps, IT and DevOps teams.
Provide on-call support for security emergencies and escalations.
Requirements:
2+ years of relevant experiences in SOC operations or Information Security industry.
Knowledge of IT including experience in multiple operating systems (Windows, Linux, MacOS) and system administration skills (Active Directory, Group Policy).
In-depth experience with SIEM.
Knowledge of log sources, log normalization, correlation rules.
Monitor enterprise network, endpoints, servers, databases and applications for security events and anomalies.
Triage security alerts from various sources like IDS/IPS, firewalls, email gateways using SIEM.
Investigate security events to determine root causes, impacts, and remediation.
Hands-on experience specific endpoint security tools such as EDR System.
Ability to be on-call on a rotational basis for 24/7 incident response.
Knowledge in cloud solutions AWS, Azure.
Knowledge in Security Solutions like Email Security, Firewall and others.
Scripting skill set (Python, PowerShell) will be considered a plus.
2+ years of relevant experiences in SOC operations or Information Security industry.
Knowledge of IT including experience in multiple operating systems (Windows, Linux, MacOS) and system administration skills (Active Directory, Group Policy).
In-depth experience with SIEM.
Knowledge of log sources, log normalization, correlation rules.
Monitor enterprise network, endpoints, servers, databases and applications for security events and anomalies.
Triage security alerts from various sources like IDS/IPS, firewalls, email gateways using SIEM.
Investigate security events to determine root causes, impacts, and remediation.
Hands-on experience specific endpoint security tools such as EDR System.
Ability to be on-call on a rotational basis for 24/7 incident response.
Knowledge in cloud solutions AWS, Azure.
Knowledge in Security Solutions like Email Security, Firewall and others.
Scripting skill set (Python, PowerShell) will be considered a plus.
This position is open to all candidates.