SOC Analyst
Tel Aviv-Yafo, Tel Aviv District, IL
Description
NoneAbout us
Hi. We are esh. A banking technology group with a goal to take the world of finance and march it to the 21st century by offering a technology banking solution that incorporates the efficiency of an automated, cloud-based banking operating system platform, enabling to dramatically reduce costs, time constraints and create a better financial environment between the bank and its customers.
In a reality where economic transactions are performed automatically and machine learning keeps developing and challenging traditional models, a new banking platform creates an alternative to outdated core systems used in banks today, and enables for the first time, a complete end to end platform under one modular system. We are creating not only a revolutionary technological change, but also a change in perception for all of us.
Job Description
We are looking for an analyst eager to help shape and build our SOC, contributing to a dynamic and evolving security environment. This includes driving efforts to automate alert handling and streamline response processes. If you’re passionate about cybersecurity, automation, and creative problem-solving, we want to hear from you!
Responsibilities
- Investigate and respond to security alerts, ensuring timely resolution of incidents.
- Identify false positives and collaborate on SIEM/EDR tuning to improve detection accuracy.
- Develop and implement automation workflows to streamline alert investigations and response.
- Apply out-of-the-box thinking to tackle complex security challenges and enhance SOC capabilities.
- Handle phishing incidents, including analysis, containment, and mitigation efforts.
- Collaborate closely with IT and DevOps teams to address security issues and implement best practices.
- Contribute to the growth and development of a dynamic SOC team.
- Participate in on-call rotations for incident response outside regular working hours.
Requirements
- 3+ years of experience in a SOC team or similar security role.
- Hands-on experience with SIEM technologies such as Splunk, Coralogix.
- Hands-on experience in threat hunting and incident response in cloud environments (AWS) and SaaS products (OKTA, Google Workspaces, GitHub, etc.).
Skills & knowledge
- Strong knowledge of security technologies such as XDR, CSPM, WAF, etc.
- Strong understanding of cybersecurity principles, including threat detection, incident response, and phishing.
- Familiarity with common cloud and SaaS attack vectors and misconfigurations.
- Excellent communication skills – fluent in English (both spoken and written), with a positive attitude and a strong team spirit.
Direct manager
NoneInterfaces
NoneChallenges
NoneAdvantage
- Experience working with security automation tools (e.g., Torq, Cortex XSOAR, Splunk SOAR) is an advantage.
Think you have the passion and inner fire for it? Bring it on and challenge us!
esh is proud to be an equal opportunity workplace. We are committed to equal employment opportunities regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, marital state, disability or gender identity.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation AWS Banking Cloud CSPM DevOps EDR Finance GitHub Incident response Machine Learning Okta SaaS SIEM SOAR SOC Splunk Threat detection XDR XSOAR
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.