Join one of Israel’s leading financial institutions in a critical Tier 3 Cyber Security Analyst role, where you'll drive advanced cyber investigations, threat hunting initiatives, and continuous improvements to cyber defense capabilities. This is a high-impact position in a dynamic, regulated environment requiring both technical excellence and strategic thinking.
What You’ll Do:
- Lead end-to-end investigations of complex cybersecurity incidents (E2E), including deep dive forensic analysis.
- Conduct proactive threat hunting using cyber intelligence and hypothesis-based detection in on-prem and cloud environments.
- Define and optimize advanced SIEM detection rules, including Sigma/YARA signatures and logic enhancement.
- Collaborate with Red/Blue/Purple Teams to analyze penetration test findings and validate security weaknesses.
- Mentor and guide Tier 1 and Tier 2 SOC analysts, elevating team capabilities and knowledge.
- Contribute to strengthening the organization’s cyber resilience by enhancing detection, response, and mitigation strategies.
Requirements:
- 3+ years of hands-on experience as a SOC Analyst or Cyber Investigator.
- Deep knowledge of Linux & Windows internals and kernel-level behavior.
- Proven experience with SIEM/XDR/SOAR platforms: writing complex queries, dashboards, and detection rules.
- Experience in forensic investigations using tools like FTK, EnCase, Volatility, or open-source equivalents.
- Scripting and automation capabilities using Bash, PowerShell, or Python.
- Strong understanding of network protocols and infrastructure.
- Excellent English communication skills (written and technical reading comprehension).
Nice to Have:
- Experience in financial institutions or regulated environments, including familiarity with banking regulations (e.g., 361/364).
- Hands-on experience with Splunk and CrowdStrike.
- Relevant certifications such as GCIH, GCFA, OSCP, or CISSP.
- Experience in cloud-based security investigation (AWS/Azure).
- Background in reverse engineering or malware analysis.