jobify_logo ร—
  • ืžึดืฉืืชึทืžึตืฉื
  • ื”ืชื—ื‘ืจื•ืช/ื”ืจืฉืžื”
  • ืขืžื•ื“ ื”ื‘ื™ืช
  • ืžื™ ืื ื—ื ื•
  • ืžืขืกื™ืงื™ื ืžื•ื‘ื™ืœื™ื
  • ืฆืจื• ืงืฉืจ
  • ืชื ืื™ ืฉื™ืžื•ืฉ
  • ืžื“ื™ื ื™ื•ืช ืคืจื˜ื™ื•ืช
  • ื”ืฆื”ืจืช ื ื’ื™ืฉื•ืช
ืงืจืŸ ืขื–ืจื™ืืœื™ ื˜ืงืกื˜ ื‘ืขื‘ืจื™ืช ืขื ืกืžืœ ืื™ื ืกื•ืฃ social_security the_israeli_employment_service work_office ื”ืžืงื•ื
jobify_logo
  • ืžื™ ืื ื—ื ื•
  • ืžืขืกื™ืงื™ื ืžื•ื‘ื™ืœื™ื
  • ืคืจืกื•ื ืžืฉืจื” ื—ื“ืฉ
  • ืฆืจื• ืงืฉืจ
ื“ื™ืœื•ื’ ืœืชื•ื›ืŸ

ืขื“ื™ื™ืŸ ืžื—ืคืฉื™ื ืขื‘ื•ื“ื” ื‘ืžื ื•ืขื™ ื—ื™ืคื•ืฉ? ื”ื’ื™ืข ื”ื–ืžืŸ ืœื”ืฉืชื“ืจื’!

ื‘ืžืงื•ื ืœืขื‘ื•ืจ ืœื‘ื“ ืขืœ ืืœืคื™ ืžื•ื“ืขื•ืช, Jobify ืžื ืชื—ืช ืืช ืงื•ืจื•ืช ื”ื—ื™ื™ื ืฉืœืš ื•ืžืฆื™ื’ื” ืœืš ืจืง ืžืฉืจื•ืช ืฉื‘ืืžืช ืžืชืื™ืžื•ืช ืœืš.

ืžืขืœ 80,000 ืžืฉืจื•ืช โ€ข 4,000 ื—ื“ืฉื•ืช ื‘ื™ื•ื
ื—ื™ื ื. ื‘ืœื™ ืคืจืกื•ืžื•ืช. ื‘ืœื™ ืื•ืชื™ื•ืช ืงื˜ื ื•ืช.

ื”ื’ืฉืช ืžื•ืขืžื“ื•ืช

๐Ÿ” SOC Analyst โ€“ Tier 2 | Enterprise Environment (5359)

INGIMA

ื”ื’ืฉืช ืžื•ืขืžื“ื•ืช

INGIMA INGIMA

  • ืชืœ ืื‘ื™ื‘ - ื™ืคื•
  • LinkedIn
LinkedIn

๐Ÿ” SOC Analyst โ€“ Tier 2 | Enterprise Environment (5359)

INGIMA

ื”ื’ืฉืช ืžื•ืขืžื“ื•ืช

INGIMA INGIMA

  • ืชืœ ืื‘ื™ื‘ - ื™ืคื•
  • coins_icon 15,000-20,000 โ‚ช (ื”ืขืจื›ื” ืžื‘ื•ืกืกืช AI)
    ื–ื•ื”ื™ ื”ืขืจื›ืช ื˜ื•ื•ื— ืฉื›ืจ ืžื‘ื•ืกืกืช AI ื•ืœื ืคืจืกื•ื ืฉืœ ื”ืžืขืกื™ืง
  • LinkedIn
LinkedIn


Job Description:

The role involves in-depth investigation of complex security alerts, hands-on Incident Response, development of advanced detection rules, and close collaboration with infrastructure and development teams to reduce the organizationโ€™s attack surface.

Key Responsibilities:

  • Investigate security incidents and provide escalation support for Tier 1 SOC analysts
  • Perform advanced investigations of complex security alerts, security breaches, and suspected malicious activity (Malware, Phishing, Unauthorized Access)
  • Conduct proactive threat hunting across the organization, focusing on low-signature attacks and behavioral anomalies using advanced statistical analysis, long-term event correlation, and MITRE ATT&CKโ€“based detection techniques
  • Perform basic endpoint forensics and network traffic analysis to identify attack vectors and assess the impact scope
  • Analyze and tune SIEM/XDR detection rules to reduce false positives and improve overall system effectiveness
  • Identify gaps in SOC workflows and initiate improvement projects
  • Mentor and provide professional guidance to Tier 1 analysts

Mandatory Requirements:

  • 2โ€“3 years of experience as a SOC Analyst (prior Tier 1 experience or background in systems/networking is an advantage)
  • Proven experience in investigation, analysis, and response to cybersecurity incidents
  • Hands-on experience working in multi-cloud environments (AWS / Azure)
  • Practical experience with security technologies such as Firewalls, IPS, WAF, XDR/EDR, and SIEM platforms
  • Strong understanding of network protocols (TCP/IP, DNS, HTTP/S) and network traffic analysis
  • Ability to perform basic static and dynamic analysis of suspicious files
  • Strong technical reporting skills in Hebrew and English

Advantages:

  • Scripting skills in Python or PowerShell for investigation and automation workflows
  • Hands-on experience with Microsoft Sentinel, Splunk, or Palo Alto Cortex
  • Ability to write complex queries using KQL and/or SPL



ื‘ืžืงื•ื ืœืขื‘ื•ืจ ืœื‘ื“ ืขืœ ืืœืคื™ ืžื•ื“ืขื•ืช, Jobify ืžื ืชื—ืช ืืช ืงื•ืจื•ืช ื”ื—ื™ื™ื ืฉืœืš ื•ืžืฆื™ื’ื” ืœืš ืจืง ืžืฉืจื•ืช ืฉื‘ืืžืช ืžืชืื™ืžื•ืช ืœืš.

ืžืขืœ 80,000 ืžืฉืจื•ืช โ€ข 4,000 ื—ื“ืฉื•ืช ื‘ื™ื•ื
ื—ื™ื ื. ื‘ืœื™ ืคืจืกื•ืžื•ืช. ื‘ืœื™ ืื•ืชื™ื•ืช ืงื˜ื ื•ืช.

ื”ื’ืฉืช ืžื•ืขืžื“ื•ืช

ืฉืืœื•ืช ื•ืชืฉื•ื‘ื•ืช ืขื‘ื•ืจ ืžืฉืจืช ๐Ÿ” SOC Analyst โ€“ Tier 2 | Enterprise Environment (5359)

ื”ืชืคืงื™ื“ ื›ื•ืœืœ ื—ืงื™ืจื” ืžืขืžื™ืงื” ืฉืœ ื”ืชืจืื•ืช ืื‘ื˜ื—ื” ืžื•ืจื›ื‘ื•ืช, ืชื’ื•ื‘ื” ืœืื™ืจื•ืขื™ื (Incident Response), ืคื™ืชื•ื— ื›ืœืœื™ ื–ื™ื”ื•ื™ ืžืชืงื“ืžื™ื, ื•ืฉื™ืชื•ืฃ ืคืขื•ืœื” ื”ื“ื•ืง ืขื ืฆื•ื•ืชื™ ืชืฉืชื™ืช ื•ืคื™ืชื•ื— ืœืฆืžืฆื•ื ืฉื˜ื— ื”ืชืงื™ืคื” ืฉืœ ื”ืืจื’ื•ืŸ. ื›ืžื• ื›ืŸ, ืื ืœื™ืกื˜ SOC โ€“ Tier 2 ื™ื‘ืฆืข ืฆื™ื“ ืื™ื•ืžื™ื ื™ื–ื•ื, ื ื™ืชื•ื— ืชืขื‘ื•ืจืช ืจืฉืช ื•ืคื•ืจื ื–ื™ืงื” ื‘ืกื™ืกื™ืช ืฉืœ ื ืงื•ื“ื•ืช ืงืฆื”, ื•ื™ืกืคืง ื—ื ื™ื›ื” ื•ื”ื›ื•ื•ื ื” ืžืงืฆื•ืขื™ืช ืœืื ืœื™ืกื˜ื™ื ื‘ื“ืจื’ Tier 1.

ืœืชืคืงื™ื“ ื ื“ืจืฉื•ืช ืฉื ืชื™ื™ื ืขื“ ืฉืœื•ืฉ ืฉื ื•ืช ื ื™ืกื™ื•ืŸ ื›ืื ืœื™ืกื˜ SOC, ื ื™ืกื™ื•ืŸ ืžื•ื›ื— ื‘ื—ืงื™ืจื”, ื ื™ืชื•ื— ื•ืชื’ื•ื‘ื” ืœืื™ืจื•ืขื™ ืกื™ื™ื‘ืจ, ื•ื ื™ืกื™ื•ืŸ ืžืขืฉื™ ื‘ืกื‘ื™ื‘ื•ืช ืžืจื•ื‘ื•ืช ืขื ื ื™ื (AWS / Azure). ื›ืžื• ื›ืŸ, ื ื“ืจืฉ ื ื™ืกื™ื•ืŸ ืขื ื˜ื›ื ื•ืœื•ื’ื™ื•ืช ืื‘ื˜ื—ื” ื›ื’ื•ืŸ Firewalls, IPS, WAF, XDR/EDR ื•ืคืœื˜ืคื•ืจืžื•ืช SIEM, ื”ื‘ื ื” ื—ื–ืงื” ืฉืœ ืคืจื•ื˜ื•ืงื•ืœื™ ืจืฉืช ื•ื™ื›ื•ืœืช ืœื‘ืฆืข ื ื™ืชื•ื— ืกื˜ื˜ื™ ื•ื“ื™ื ืžื™ ื‘ืกื™ืกื™ ืฉืœ ืงื‘ืฆื™ื ื—ืฉื•ื“ื™ื. ื™ืชืจื•ืŸ ื™ื™ื ืชืŸ ืœื‘ืขืœื™ ื›ื™ืฉื•ืจื™ ืกืงืจื™ืคื˜ื™ื ื’ ื‘-Python ืื• PowerShell ื•ื ื™ืกื™ื•ืŸ ืขื Microsoft Sentinel, Splunk ืื• Palo Alto Cortex.

ืื ืœื™ืกื˜ SOC โ€“ Tier 2 ืชื•ืจื ืœืฉื™ืคื•ืจ ืื‘ื˜ื—ืช ื”ืžื™ื“ืข ืขืœ ื™ื“ื™ ื‘ื™ืฆื•ืข ื—ืงื™ืจื•ืช ืžืชืงื“ืžื•ืช ืฉืœ ื”ืชืจืื•ืช ืื‘ื˜ื—ื”, ื–ื™ื”ื•ื™ ื•ื˜ื™ืคื•ืœ ื‘ืคืขื™ืœื•ืช ื–ื“ื•ื ื™ืช, ื•ื‘ื™ืฆื•ืข ืฆื™ื“ ืื™ื•ืžื™ื ื™ื–ื•ื ืœืื™ืชื•ืจ ื”ืชืงืคื•ืช ื‘ืขืœื•ืช ื—ืชื™ืžื” ื ืžื•ื›ื”. ื‘ื ื•ืกืฃ, ื”ื•ื ืžื ืชื— ื•ืžื›ื•ื•ื ืŸ ื›ืœืœื™ ื–ื™ื”ื•ื™ ื‘-SIEM/XDR ื›ื“ื™ ืœื”ืคื—ื™ืช ื”ืชืจืื•ืช ืฉื•ื•ื ื•ืœืฉืคืจ ืืช ื™ืขื™ืœื•ืช ื”ืžืขืจื›ืช, ืžื–ื”ื” ืคืขืจื™ื ื‘ืชื”ืœื™ื›ื™ ืขื‘ื•ื“ื” ืฉืœ ื”-SOC ื•ื™ื•ื–ื ืคืจื•ื™ืงื˜ื™ ืฉื™ืคื•ืจ, ื•ื‘ื›ืš ืžืฆืžืฆื ืืช ืฉื˜ื— ื”ืชืงื™ืคื” ื”ื›ื•ืœืœ ืฉืœ ื”ืืจื’ื•ืŸ.

ืžืฉืจื•ืช ื ื•ืกืคื•ืช ืžื•ืžืœืฆื•ืช ืขื‘ื•ืจืš
  • ืจืฉื™ืžืช ืžืฉืืœื•ืช

    ืื ืœื™ืกื˜.ื™ืช SOC Tier 2

    • map_icon ืจืืฉ ื”ืขื™ืŸ
    Mertens โ€“ Malam Team

    Mertens โ€“ Malam Team

  • ืจืฉื™ืžืช ืžืฉืืœื•ืช

    SOC Analyst Tier 2 ืœืืจื’ื•ืŸ ื™ืฆื™ื‘

    • map_icon ืชืœ ืื‘ื™ื‘ - ื™ืคื•
    Ingima

    Ingima

  • ืจืฉื™ืžืช ืžืฉืืœื•ืช

    ืื ืœื™ืกื˜.ื™ืช SOC TIER -2

    • map_icon ื”ืจืฆืœื™ื”
    ืกื˜ืจื˜ื™ืงื”

    ืกื˜ืจื˜ื™ืงื”

  • ืจืฉื™ืžืช ืžืฉืืœื•ืช

    ืœืืจื’ื•ืŸ ืžื•ื‘ื™ืœ ื‘ืชื—ื•ืžื• ื“ืจื•ืฉ /ื” ืื ืœื™ืกื˜ /ื™ืช SOC Tier 2!

    • map_icon ืคืชื— ืชืงื•ื•ื”
    ื“ื˜ื” ืงื™ื•ื‘ ื‘ืข''ืž

    ื“ื˜ื” ืงื™ื•ื‘ ื‘ืข''ืž

  • ืจืฉื™ืžืช ืžืฉืืœื•ืช

    SOC Analyst Tier 2 (1005527)

    • map_icon ืคืชื— ืชืงื•ื•ื”
    Elad Software Systems

    Elad Software Systems

  • ืจืฉื™ืžืช ืžืฉืืœื•ืช

    SOC Analyst Tier 2

    • map_icon ืชืœ ืื‘ื™ื‘ - ื™ืคื•
    Top-IT Solutions Ltd

    Top-IT Solutions Ltd

ื ื™ืชืŸ ืœืฆืคื•ืช ื‘ืžืฉืจื•ืช ืฉืกื™ืžื ืช ื‘ื›ืœ ืฉืœื‘ ืชื—ืช ื”ืชืคืจื™ื˜ ื”ืจืืฉื™ ื‘ืงื˜ื’ื•ืจื™ื™ืช 'ืžืฉืจื•ืช ืฉืื”ื‘ืชื™'

ื”ืžืงื•ื ืงืจืŸ ืขื–ืจื™ืืœื™ ื˜ืงืกื˜ ื‘ืขื‘ืจื™ืช ืขื ืกืžืœ ืื™ื ืกื•ืฃ
  • ืžื™ ืื ื—ื ื•
  • ืžืขืกื™ืงื™ื ืžื•ื‘ื™ืœื™ื
  • ืฆืจื• ืงืฉืจ
  • ืชื ืื™ ืฉื™ืžื•ืฉ
  • ืžื“ื™ื ื™ื•ืช ืคืจื˜ื™ื•ืช
  • ื”ืฆื”ืจืช ื ื’ื™ืฉื•ืช

2026 โ’ธ ื’'ื•ื‘ื™ืคื™ื™ - ื›ืœ ื”ื–ื›ื•ื™ื•ืช ืฉืžื•ืจื•ืช

ืงืจืŸ ืขื–ืจื™ืืœื™ ื˜ืงืกื˜ ื‘ืขื‘ืจื™ืช ืขื ืกืžืœ ืื™ื ืกื•ืฃ social_security the_israeli_employment_service israel_innovation_authority work_office ื”ืžืงื•ื
ื”ืžืขืจื›ืช ื‘ื•ื ื” ืืช ื”ืคืจื•ืคื™ืœ ื”ืชืขืกื•ืงืชื™ ืฉืœืš

ืขื•ื“ ืจื’ืข...

ื”ืžืขืจื›ืช ื–ื™ื”ืชื” ืฉืฉื™ื ื™ืช ืืช ื”ื ืชื•ื ื™ื ื‘ืื–ื•ืจ ื”ืื™ืฉื™ ื•ืžืขื“ื›ื ืช ืืช ื”ื”ืžืœืฆื•ืช ืขืœ ืชืคืงื™ื“ื™ื ื•ืžืฉืจื•ืช ื‘ื”ืชืื.

ืžืฆื˜ืขืจื™ื, ืœื ื”ืฆืœื—ื ื• ืœื ืชื— ื‘ื”ืฆืœื—ื” ืืช ื”ื ืชื•ื ื™ื ืฉื”ื–ื ืช.
ืืชื ืžื•ื–ืžื ื™ื ืœื ืกื•ืช ืœื”ื–ื™ืŸ ืฉื•ื‘ ืื• ืœื”ืขืœื•ืช ืงื•ื‘ืฅ ืงื•ืจื•ืช ื—ื™ื™ื ื‘ืžื™ื“ื” ื•ื™ืฉ ืœื›ื.
ื‘ื”ืฆืœื—ื”

ื”ื’ืขืช ืœื”ื’ื‘ืœื” ื”ื™ื•ืžื™ืช ืฉืœ ืฉืœื•ืฉื” ืขื“ื›ื•ื ื™ื ื‘ืคืจื•ืคื™ืœ ื”ืื™ืฉื™ ื‘ื™ื•ื

loader

ื”ื‘ืงืฉื” ืฉืœืš ื ืฉืœื—ื” ื‘ื”ืฆืœื—ื”!

ื™ืฉ ื‘ืืคืฉืจื•ืชืš ืœืฉืœื•ื— ื‘ืงืฉื” ืœืงื‘ืœืช ื™ื™ืขื•ืฅ ืื™ืฉื™ ืœืœื ืขืœื•ืช ืžื™ื•ืขืฆืช ืงืจื™ื™ืจื”.

ื‘ืืคืฉืจื•ืชืš ืœืฉืœื•ื— ื‘ืงืฉื” ืœืงื‘ืœืช ื™ื™ืขื•ืฅ ืื™ืฉื™ ืœืœื ืขืœื•ืช

  • ื‘ืขื™ื” ื˜ื›ื ื™ืช

  • ืกื™ื•ืข ื‘ื›ืชื™ื‘ืช ืงื•ืจื•ืช ื—ื™ื™ื ืื• ื‘ื”ื›ื ื” ืœืจืื™ื•ืŸ ืขื‘ื•ื“ื”

  • ื”ืชืืžื” ืฉืœ ืžืฉืจื•ืช

  • ืื—ืจ:

ืคื ื™ื™ืชืš ื ืฉืœื—ื” ื‘ื”ืฆืœื—ื”. ื ืฆื™ื’ ืžื˜ืขื ืืจื’ื•ืŸ ื ื›ื™ ืฆื”ืœ ื™ื™ืฆื•ืจ ืื™ืชืš ืงืฉืจ ื‘ื”ืงื“ื