Senior Threat Intelligence Analyst
Tel Aviv-Jaffa, Tel Aviv District, IL
Description
Dream is a pioneering AI cybersecurity company delivering revolutionary defense through artificial intelligence. Our proprietary AI platform creates a unified security system safeguarding assets against existing and emerging generative cyber threats. Dream's advanced AI automates discovery, calculates risks, performs real-time threat detection, and plans an automated response. With a core focus on the ""unknowns,"" our AI transforms data into clear threat narratives and actionable defense strategies.
Dream's AI cybersecurity platform represents a paradigm shift in cyber defense, employing a novel, multi-layered approach across all organizational networks in real-time. At the core of our solution is Dream's proprietary Cyber Language Model, a groundbreaking innovation that provides real-time, contextualized intelligence for comprehensive, actionable insights into any cyber-related query or threat scenario.
Dream is seeking a Senior Threat Intelligence Analyst to strengthen our cybersecurity threat intelligence capabilities. The ideal candidate will analyze complex datasets, identify and assess cyber threats, and develop actionable intelligence to mitigate risks from advanced persistent threats (APTs) and cybercriminal groups.
Responsibilities
- Analyze and interpret data from diverse internal and external sources to identify malicious activities and emerging threats.
- Develop and maintain intelligence reports, threat actor profiles, and assessments of attack vectors and TTPs.
- Enhance and maintain intelligence tools, processes, and platforms.
- Collaborate with external threat intelligence communities to stay ahead of evolving threats.
- Automate threat hunting and intelligence gathering through high-level programming and ETL pipelines.
Requirements
NoneSkills
- 5+ years of experience in Cybersecurity Threats Intelligence domain.
- Proficiency in analyzing complex datasets and identifying threat patterns.
- In-depth knowledge of APT tactics, attack vectors, and cybersecurity frameworks (e.g., MITRE ATT&CK, NIST).
- Experience with sophisticated campaigns, including nation-state or cybercrime-driven operations.
- Functional understanding of vulnerabilities, exploits, and CVEs with the ability to write automation/detection scripts.
- Fluency in at least one programming language (Python, Go, Ruby, etc.).
- Strong communication skills for both technical and non-technical audiences.
- Ability to thrive in a fast-paced, collaborative environment.
Preferred Qualifications
- Expertise in hunting threat actors, analyzing campaigns, malware, and C2 servers.
- Experience with advanced attack scenarios like DDoS, credential leaks, and network intrusions.
- Background in designing and consuming data from ETL pipelines for intelligence collection.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APT Artificial Intelligence Automation Cyber crime Cyber defense DDoS Exploits Malware MITRE ATT&CK NIST Python Ruby Threat detection Threat intelligence TTPs Vulnerabilities
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.