ืขืืืื ืืืคืฉืื ืขืืืื ืืื ืืขื ืืืคืืฉ? ืืืืข ืืืื ืืืฉืชืืจื!
ืืืงืื ืืืคืฉ ืืื ืืื ืืืืช ืืืืขืืช โ ืชื ื ื-Jobify ืื ืชื ืืช ืงืืจืืช ืืืืื ืฉืืื ืืืืฆืื ืืื ืจืง ืืืืื ืืืืช ืฉืืืืช ืฉืืืช ืืช ืืืื ืฉืืื ืืชืื ืืืืจ ืืืฉืจืืช ืืืืื ืืืฉืจืื.
ืืฉืืืืฉ ืืื ื, ืืื ืขืืืช ืืืื ืืืืื.
Job Description:
The role involves in-depth investigation of complex security alerts, hands-on Incident Response, development of advanced detection rules, and close collaboration with infrastructure and development teams to reduce the organizationโs attack surface.
Key Responsibilities:
- Investigate security incidents and provide escalation support for Tier 1 SOC analysts
- Perform advanced investigations of complex security alerts, security breaches, and suspected malicious activity (Malware, Phishing, Unauthorized Access)
- Conduct proactive threat hunting across the organization, focusing on low-signature attacks and behavioral anomalies using advanced statistical analysis, long-term event correlation, and MITRE ATT&CKโbased detection techniques
- Perform basic endpoint forensics and network traffic analysis to identify attack vectors and assess the impact scope
- Analyze and tune SIEM/XDR detection rules to reduce false positives and improve overall system effectiveness
- Identify gaps in SOC workflows and initiate improvement projects
- Mentor and provide professional guidance to Tier 1 analysts
Mandatory Requirements:
- 2โ3 years of experience as a SOC Analyst (prior Tier 1 experience or background in systems/networking is an advantage)
- Proven experience in investigation, analysis, and response to cybersecurity incidents
- Hands-on experience working in multi-cloud environments (AWS / Azure)
- Practical experience with security technologies such as Firewalls, IPS, WAF, XDR/EDR, and SIEM platforms
- Strong understanding of network protocols (TCP/IP, DNS, HTTP/S) and network traffic analysis
- Ability to perform basic static and dynamic analysis of suspicious files
- Strong technical reporting skills in Hebrew and English
Advantages:
- Scripting skills in Python or PowerShell for investigation and automation workflows
- Hands-on experience with Microsoft Sentinel, Splunk, or Palo Alto Cortex
- Ability to write complex queries using KQL and/or SPL
ืืืงืื ืืืคืฉ ืืื ืืื ืืืืช ืืืืขืืช โ ืชื ื ื-Jobify ืื ืชื ืืช ืงืืจืืช ืืืืื ืฉืืื ืืืืฆืื ืืื ืจืง ืืืืื ืืืืช ืฉืืืืช ืฉืืืช ืืช ืืืื ืฉืืื ืืชืื ืืืืจ ืืืฉืจืืช ืืืืื ืืืฉืจืื.
ืืฉืืืืฉ ืืื ื, ืืื ืขืืืช ืืืื ืืืืื.
ืฉืืืืช ืืชืฉืืืืช ืขืืืจ ืืฉืจืช ๐ SOC Analyst โ Tier 2 | Enterprise Environment (5359)
ืืชืคืงืื ืืืื ืืงืืจื ืืขืืืงื ืฉื ืืชืจืืืช ืืืืื ืืืจืืืืช, ืชืืืื ืืืืจืืขืื (Incident Response), ืคืืชืื ืืืื ืืืืื ืืชืงืืืื, ืืฉืืชืืฃ ืคืขืืื ืืืืง ืขื ืฆืืืชื ืชืฉืชืืช ืืคืืชืื ืืฆืืฆืื ืฉืื ืืชืงืืคื ืฉื ืืืจืืื. ืืื ืื, ืื ืืืกื SOC โ Tier 2 ืืืฆืข ืฆืื ืืืืืื ืืืื, ื ืืชืื ืชืขืืืจืช ืจืฉืช ืืคืืจื ืืืงื ืืกืืกืืช ืฉื ื ืงืืืืช ืงืฆื, ืืืกืคืง ืื ืืื ืืืืืื ื ืืงืฆืืขืืช ืืื ืืืกืืื ืืืจื Tier 1.
ืืฉืจืืช ื ืืกืคืืช ืืืืืฆืืช ืขืืืจื
-
ืืจืืฉ/ื ืื ืืืกื/ืืช SOC โ Tier 1
-
ืืจืืฉืืื
ืฉ.ื ืฉืืืจื ืืืืืื
-
-
SOC Analyst Tier 2 ืืืจืืื ืืฆืื
-
ืชื ืืืื - ืืคื
Ingima
-
-
ืื ืืืกื/ืืช ืกืืืืจ
-
ืืื
ื.ื.ื ืืืฉืืื ืืข"ื
-
-
ืื ืืืกื /ืืช SOC ืขืืืจ ืืจืืื ืจืคืืื ืืืืืจ ืืืจืื
-
ืชื ืืืื - ืืคื
SQLink
-
-
ืื ืืืกื/ืืช ืกืืืืจ ืขืืืจ ืืจืืื ืคืื ื ืกื ืืืืืจ ืืืจืื
-
ืจืืืืืช
SQLink
-
-
ืงืื SOC ืืื ืืชืืืื ืจืฆืข
-
ืืฉืงืืื
ืฆืื ืืืื ื ืืืฉืจืื
-