Назад
Company hidden
18 часов назад

Sr Cyber Defense Analyst (Cybersecurity)

Формат работы
hybrid
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
Israel
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Sr Cyber Defense Analyst (Cybersecurity): Monitoring, investigating, and responding to security events across corporate and product infrastructure with an accent on AI-augmented detection, triage, and response workflows. Focus on reducing false positives, implementing detection rules mapped to MITRE ATT&CK, and integrating LLM-based automation pipelines into SOC operations.

Location: Hybrid Tel Aviv, Israel

Company

hirify.global is a global identity security leader providing a cybersecurity SaaS portfolio focused on privileged access management.

What you will do

  • Monitor and triage security alerts across SIEM, EDR, and CSPM platforms for corporate and product environments.
  • Lead incident response engagements, including evidence collection, forensic analysis, and root cause determination.
  • Design and tune detection rules to close coverage gaps and reduce false positives, mapping them to MITRE ATT&CK.
  • Integrate AI-driven tools, LLM-based pipelines, and agent workflows to augment analyst capabilities.
  • Collaborate with threat hunting peers to validate detection logic and refine IR runbooks.
  • Track and report operational metrics such as MTTD, MTTR, and false positive rates.

Requirements

  • 2+ years of experience in a SOC, security operations, or incident response role.
  • Proficiency with SIEM and EDR platforms and writing detection queries.
  • Deep understanding of MITRE ATT&CK framework, network protocols, and endpoint behavior.
  • Experience working with cloud environments (IaaS preferred).
  • Comfort using AI systems and LLM-based assistants in security workflows.
  • Must be based in Tel Aviv, Israel for hybrid work.

Nice to have

  • Experience leading complex IR engagements from triage through remediation.
  • Scripting skills in Python or PowerShell applied to security automation.
  • Experience with SOAR platforms, AI agent architectures, or prompt engineering.
  • Knowledge of the privileged access management (PAM) landscape.
  • Experience building threat intelligence programs or detection-as-code pipelines.

Culture & Benefits

  • Culture of flexibility, trust, and continual learning.
  • Collaborative environment that values analytical thinking over checkbox compliance.
  • Strong commitment to diversity and inclusion.
  • Support for professional growth and recognition of impact on company success.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →