Cyber Security Analyst (Tier 3)

Tel Aviv
One of Israel’s leading financial institutions
FULL TIME

Join one of Israel’s leading financial institutions in a critical Tier 3 Cyber Security Analyst role, where you'll drive advanced cyber investigations, threat hunting initiatives, and continuous improvements to cyber defense capabilities. This is a high-impact position in a dynamic, regulated environment requiring both technical excellence and strategic thinking.

Join one of Israel’s leading financial institutions in a critical Tier 3 Cyber Security Analyst role, where you'll drive advanced cyber investigations, threat hunting initiatives, and continuous improvements to cyber defense capabilities. This is a high-impact position in a dynamic, regulated environment requiring both technical excellence and strategic thinking.

What You’ll Do:

  • Lead end-to-end investigations of complex cybersecurity incidents (E2E), including deep dive forensic analysis.
  • Conduct proactive threat hunting using cyber intelligence and hypothesis-based detection in on-prem and cloud environments.
  • Define and optimize advanced SIEM detection rules, including Sigma/YARA signatures and logic enhancement.
  • Collaborate with Red/Blue/Purple Teams to analyze penetration test findings and validate security weaknesses.
  • Mentor and guide Tier 1 and Tier 2 SOC analysts, elevating team capabilities and knowledge.
  • Contribute to strengthening the organization’s cyber resilience by enhancing detection, response, and mitigation strategies.

Requirements:

  • 3+ years of hands-on experience as a SOC Analyst or Cyber Investigator.
  • Deep knowledge of Linux & Windows internals and kernel-level behavior.
  • Proven experience with SIEM/XDR/SOAR platforms: writing complex queries, dashboards, and detection rules.
  • Experience in forensic investigations using tools like FTK, EnCase, Volatility, or open-source equivalents.
  • Scripting and automation capabilities using Bash, PowerShell, or Python.
  • Strong understanding of network protocols and infrastructure.
  • Excellent English communication skills (written and technical reading comprehension).

Nice to Have:

  • Experience in financial institutions or regulated environments, including familiarity with banking regulations (e.g., 361/364).
  • Hands-on experience with Splunk and CrowdStrike.
  • Relevant certifications such as GCIH, GCFA, OSCP, or CISSP.
  • Experience in cloud-based security investigation (AWS/Azure).
  • Background in reverse engineering or malware analysis.

Apply Here

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.