COME TO WORK WITH US
We are always looking for inspiring people that would like to learn & work in a reliable cybersecurity company, at one of the growing industries in the world.
Collecting & analyzing data from various sources.
Monitoring client’s cybersecurity workflow.
Managing ongoing security alerts and events through the use of various technological system writing reports.
Basic knowledge of cyber security domain
Previous work experience with remote access platforms
Strong communication skills
Team player, high level of integrity
Good verbal & written capabilities
English – high level (speaking and writing)
Relevant experience with SIEM/SOC platforms – advantage
Basic networking background – an advantage
The tier 3/4 malware analysts will take part in a team of expert’s incident response team the investigate advanced word wide cyber-security attacks. The investigations include deep analysis of “phishing” and malicious emails, analysis suspicious files, and producing relevant IOC’s reports.
Analyze IT, OS and network communication. Writing and proofing work procedures, reports and roles to prevent cyber incidents to various systems (YARA, Snort).
The analyst will work closely with our intelligence team to identify cyber campaigns that are relevant to the company customers and to increase our IOC’s database.
Provide an expert, quick response and reliable to the company customers.
Cyber-attack investigations and real-time response.
Previous experience in malware analysis – Must
Previous experience in sandbox – Must
Familiar with IOC’s standards – Must
Scripts writing experience – Must
Familiar with debuggers and IDA – Must
Previous experience with memory file investigation (Redline, volatility) – Must
Deep OS understanding (Unix, Windows, Linux, Mac) – Must
Familiar with various organization technologies – Must
Familiar with various hacking and cracking methods – Must
Ability to express in English (oral and writing) – Must
Previous experience in static file investigation (Reverse engineering) – advantage
Experience with forensic tools (FTK, EnCase) – advantage
Experience incident response – advantage
Deep understanding of communication protocols – advantage
Experience in writing technical documentation, methodologies, procedures – advantage
Willingness to travel
Characterizing and configuring system needs based on requirements.
Configuring job processes based on an understanding of customer needs.
Designing and characterizing system specification.
Experience in aggregating and defining system requirements
Expertise in server’s database architecture
Ability to write requirement documentation
Good communications skills, both written and oral, in both English and Hebrew
English – high level both Verbal and Writing