עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!
במקום לחפש לבד בין מאות מודעות – תנו ל-Jobify לנתח את קורות החיים שלכם ולהציג לכם רק הזדמנויות שבאמת שוות את הזמן שלכם מתוך מאגר המשרות הגדול בישראל.
השימוש חינם, ללא עלות וללא הגבלה.
Why Join Us?
As a SOC Analyst - Managed XDR (MXDR) Services within the Infinity Global Services (IGS) team at Check Point, you will be part of a global security operations function that monitors and responds to cyber incidents across diverse customer environments.
You will triage security alerts, investigate potential threats, and support customers during active security events using industry-leading SIEM and XDR technologies.
Working closely with experienced SOC analysts worldwide, you will play a key role in strengthening customers’ defenses and ensuring continuous security coverage.
This role is ideal for a motivated cybersecurity professional with hands-on SOC experience, familiarity with SIEM tools, and a strong desire to grow within the Microsoft Sentinel ecosystem. Full training on our platforms will be provided.
Working hours: Sunday–Thursday, 07:00–16:00 IL time (aligned with global follow-the-sun operations).
Work model: Hybrid (office + home).
Key Responsibilities
- Monitor and triage security alerts across SIEM/XDR platforms (primarily Microsoft Sentinel; Splunk experience also relevant).
- Investigate incidents to differentiate true security events from false positives.
- Escalate and communicate findings to global SOC teams and customers as required.
- Perform first- and second-level analysis on security events including network, endpoint, and cloud-related alerts.
- Document investigations and maintain accurate incident records in ticketing systems.
- Collaborate with team members across time zones to ensure continuous coverage and smooth handovers.
- Follow established SOC processes and contribute to improvements where applicable.
- 2–4 years of experience in a SOC / security monitoring role.
- Experience working with at least one SIEM platform (Microsoft Sentinel or Splunk preferred).
- Microsoft SC-series certification (SC-900, SC-200, SC-100, etc.) or other cybersecurity certifications.
- Understanding of security incidents, event types, and alert triage procedures.
- Familiarity with common security technologies (EDR, firewalls, logging systems).
- Fluent English communication skills.
- Basic knowledge of operating systems, networking, and security fundamentals.
- Experience working in a 24/7 SOC or managed security services environment.
- Exposure to incident response workflows.
- Basic scripting knowledge (PowerShell / Python / Bash) – an advantage, not required.
במקום לחפש לבד בין מאות מודעות – תנו ל-Jobify לנתח את קורות החיים שלכם ולהציג לכם רק הזדמנויות שבאמת שוות את הזמן שלכם מתוך מאגר המשרות הגדול בישראל.
השימוש חינם, ללא עלות וללא הגבלה.