Senior Threat Intelligence Analyst

Tel Aviv-Jaffa, Tel Aviv District, IL

Apply now Apply later

Description

Dream is a pioneering AI cybersecurity company delivering revolutionary defense through artificial intelligence. Our proprietary AI platform creates a unified security system safeguarding assets against existing and emerging generative cyber threats. Dream's advanced AI automates discovery, calculates risks, performs real-time threat detection, and plans an automated response. With a core focus on the ""unknowns,"" our AI transforms data into clear threat narratives and actionable defense strategies. 

Dream's AI cybersecurity platform represents a paradigm shift in cyber defense, employing a novel, multi-layered approach across all organizational networks in real-time. At the core of our solution is Dream's proprietary Cyber Language Model, a groundbreaking innovation that provides real-time, contextualized intelligence for comprehensive, actionable insights into any cyber-related query or threat scenario. 

Dream is seeking a Senior Threat Intelligence Analyst to strengthen our cybersecurity threat intelligence capabilities. The ideal candidate will analyze complex datasets, identify and assess cyber threats, and develop actionable intelligence to mitigate risks from advanced persistent threats (APTs) and cybercriminal groups. 

Responsibilities

  • Analyze and interpret data from diverse internal and external sources to identify malicious activities and emerging threats. 
  • Develop and maintain intelligence reports, threat actor profiles, and assessments of attack vectors and TTPs. 
  • Enhance and maintain intelligence tools, processes, and platforms. 
  • Collaborate with external threat intelligence communities to stay ahead of evolving threats. 
  • Automate threat hunting and intelligence gathering through high-level programming and ETL pipelines. 

Requirements

None

Skills

  • 5+ years of experience in Cybersecurity Threats Intelligence domain.  
  • Proficiency in analyzing complex datasets and identifying threat patterns. 
  • In-depth knowledge of APT tactics, attack vectors, and cybersecurity frameworks (e.g., MITRE ATT&CK, NIST). 
  • Experience with sophisticated campaigns, including nation-state or cybercrime-driven operations. 
  • Functional understanding of vulnerabilities, exploits, and CVEs with the ability to write automation/detection scripts. 
  • Fluency in at least one programming language (Python, Go, Ruby, etc.). 
  • Strong communication skills for both technical and non-technical audiences. 
  • Ability to thrive in a fast-paced, collaborative environment. 

Preferred Qualifications 

  • Expertise in hunting threat actors, analyzing campaigns, malware, and C2 servers. 
  • Experience with advanced attack scenarios like DDoS, credential leaks, and network intrusions. 
  • Background in designing and consuming data from ETL pipelines for intelligence collection. 
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: APT Artificial Intelligence Automation Cyber crime Cyber defense DDoS Exploits Malware MITRE ATT&CK NIST Python Ruby Threat detection Threat intelligence TTPs Vulnerabilities

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.