Evaluate tools and best practices for tracking advanced threats, Tools, Techniques, and Procedures (TTPs) of attackers motivations, and industry and attacker trends.
Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity and convey the importance of findings to a variety of audiences.
Track, research, and contribute Cyber Threat Intelligence (CTI) analysis within Google Threat Intelligence, of customer's priority threat concerns.
Embed within and build an understanding of the customers' cyber threat intelligence requirements. Identify their needs and opportunities for deployment of CTI to have the greatest defensive impact.
Generate CTI and perform analysis of customer data, taking their bespoke sources to identify threat activity, or to build and automate analytical workflows.
Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity and convey the importance of findings to a variety of audiences.
Track, research, and contribute Cyber Threat Intelligence (CTI) analysis within Google Threat Intelligence, of customer's priority threat concerns.
Embed within and build an understanding of the customers' cyber threat intelligence requirements. Identify their needs and opportunities for deployment of CTI to have the greatest defensive impact.
Generate CTI and perform analysis of customer data, taking their bespoke sources to identify threat activity, or to build and automate analytical workflows.
Requirements:
Bachelor's degree or equivalent practical experience.
7 years of experience in a customer-facing analytical role in cyber security (e.g. Network Forensics Analyst, Threat Intelligence Analyst).
Experience engaging with, and presenting to, technical stakeholders and executive leaders.
Ability to communicate in Hebrew fluently as this is a client facing role.
Ability to travel 30% of the time.
Ability to attain Israel Active Clearance (or previous Israel Security Clearance).
Bachelor's degree or equivalent practical experience.
7 years of experience in a customer-facing analytical role in cyber security (e.g. Network Forensics Analyst, Threat Intelligence Analyst).
Experience engaging with, and presenting to, technical stakeholders and executive leaders.
Ability to communicate in Hebrew fluently as this is a client facing role.
Ability to travel 30% of the time.
Ability to attain Israel Active Clearance (or previous Israel Security Clearance).
Preferred qualifications:
Active Israel Security Clearance.
7 years of experience evaluating forensic reports of electronic media, packet capture, log data, malware triage, or enterprise-level information security operations.
Experience with CTI methodologies and applications within cyber security organizations, including analysis supporting monitoring, detection and response capabilities.
Experience in deploying and analyzing data from technical security controls (e.g. web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, network analyzers).
Experience with standard network logging formats, network management systems and network security monitoring systems, and security information and event management.
This position is open to all candidates.