Your address will show here +12 34 56 78

COME TO WORK WITH US

We are always looking for inspiring people that would like to learn & work in a reliable cybersecurity company, at one of the growing industries in the world.

CYREBRO Monitoring Analyst

Job Description:
Being an active part of our SOC monitoring team.
Part of the daily tasks includes investigating security-related cyber incidents while using a wide variety of different security systems.
The investigations are mostly independent and require strong analytics and creative thinking while using a wide variety of intelligence sources alongside common security tools.
Writing investigation reports (tickets).
Direct interaction with clients / end users via email or phone.


Job Requirements:
  • Working knowledge of network switches, routers and firewalls
  • Experience of working in cyber-security-related roles, or IT roles
  • Close familiarity with information-security protocols / cyber-security concepts
  • Experience in working in a SOC / with a SIEM system – Advantage
  • Analytic thinking
  • Willing to work in shifts (24/7)
  • Fluent English (both written and verbal) – Must

QA Engineer

CyberHat is looking for a talented QA Engineer to join the R&D team in a mission of enabling our cyber security services to a large community of customers around the globe using a cutting edge stack of technologies from Cloud down to the Endpoint
Responsibilities:
  • Work as part of a scrum team.
  • Partake in the overall detailed design and planning activities focusing on quality assurance aspects.
  • Create functional and performance test plans.
  • Create test automation.
  • Provide manual test efforts where automation is not currently feasible.
  • Partake in trouble shooting problems within engineering and production tiers.

Skills and Qualifications:
  • BSc in Computer Sciences or equivalent.
  • 1-3 years of experience with product QA.
  • 1-3 years of experience with QA automation (Python, Java, scripting and alike).
  • Experience with working in Agile Scrum methodology.
  • Excellent documentation and communication skills.
  • Experience with AWS, Google Cloud or Azure - significant advantage.
  • Experience with VMs or Dockers - significant advantage.
  • Demonstrated familiarity and experience at the Operating System level (Linux, MacOS, Windows) - significant advantage.
  • Experience with data storage technologies - significant advantage.
  • Confidence in learning and adopting new technologies and platforms.

IR and Malware Analyst

CyberHat recruiting an experienced IR and Malware analyst for the Cyrebro (First smart SOC-
Job Description:
advanced information and cyber security analyst to investigate incidents and conduct threat hunting at any of the company's worldwide clients, while using the wide variety of techniques and cutting-edge tools for forensic investigations.
With emphasis on responding to escalations for the monitoring teams.
The role requires independence, initiative, creativity, and willing to respond at any time on call.
Responsibilities
  • Resolving tier 2 escalations
  • Conducting cyber investigations regarding suspicious files, phishing emails, logs, network traffic, file systems, etc.
  • Helping worldwide customers with incident handling and cybersecurity related issues
  • Conducting a full digital forensics investigation process regarding cyber incidents with emphasis on identifying the attack vectors, understanding the attack methods and their outcomes, scoping the incident, eradicating the threats that lead to the incidents, and writing incident lessons learned recommendations and reports
  • Creating and updating IR and Digital Forensics methodologies, procedures, flight guides, and workflows
  • Improving the DFIR lab, tools and scripts
  • Conducting threat hunting on the client's environment
Requirements
Proven experience with:
  • 2-3 years of experience in incident handling and digital forensics, basic malware analysis and sandboxing, volatile memory analysis - must
  • Deep understanding of operating systems artifacts (Windows, Linux, and Mac) and filesystems artifacts - must
  • Deep understanding of organizational architecture and security - must
  • Good knowledge regarding IOCs and IOCs standards - must
  • Good knowledge on most common network protocols - advantage
  • Experience with static malware analysis and reverse engineering - a great advantage
  • Experience with tools and scripts development in the DFIR field - advantage
  • Experience with cyber incident hunting - advantage
  • Experience with updating IR and Digital Forensics methodologies, procedures, flight guides and workflows
  • Fully fluent in English – must

Threat Hunter

CyberHat is looking for an experienced Threat Hunter, that will be part of our growing SOC group, and will Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure

Responsibilities:
  • Proactively drive hunting and analysis against the dataset available to look for indicators for Cyber Security breaches
  • Produce wider coverage for customers
  • Increase the Cyrebro (our first smart SOC) Rules Bank
  • Taking part in DFIR projects
  • Incorporate second review factor into incidents
  • Periodically check a limited number of TTPs in the "silent" clients
  • Check with all customer for a specific attack vector and issue a report

Requirements:
  • 2-3 years of experience hands-on cybersecurity job (cyber threat hunting- Advantage), basic malware analysis and sandboxing
  • Experience of current threats, vulnerabilities, and attack trends
  • Querying Languages expertise (SQL, SPL)
  • Creating roles and configuring Cybersecurity systems
  • Scripts development and API utilization with Cybersecurity orientation
  • Good knowledge in IOCs TTPs and IOCs TTPs standards
  • Fully fluent in English
  • Experience with updating IR and Digital Forensics methodologies, procedures, flight guides and workflows - advantage

Director of product management

CyberHat, a leading Cyber-Security company is looking for a Self-driven and dynamic technical director of product management to lead the product division.
CyberHat is providing professional cybersecurity solutions that enable practical and active defenses, by allowing our clients to make real time decisions on security and response via a customer face dashboard.
The Director will be responsible for leading the realization of the business strategy through our SaaS product. In this key role You will be responsible to lead the product team & own product strategy, and will Collaborate with leadership to define the business strategy of the company, through the product Roadmap.

What we're looking for:
  1. 10+ years of experience with demonstrable accomplishments in strategic product management
  2. Experience working with SaaS solutions or Cloud Environments
  3. Strong technical background with understanding in Agile software development and Scrum methodology
  4. Strong understanding of all aspects of the product development lifecycle, including product strategy development, requirements definition, UX design, engineering and QA.
  5. Familiarity with cyber security products and cloud delivery methodologies- Advantage

Product owner

CyberHat is looking for a self-driven, passionate, high technical oriented Product Owner (PO). In this role you will be responsible for organize, prioritize, assess work and filling the gap between the operational requirements and the implementation of these requirements in CyberHat's SaaS environments.

Responsibilities:
  • Enable CyberHat R&D department to plan future releases and sprints
  • Own Product backlog: Develop user stories, define acceptance criteria, ongoing groom and prioritize the backlog.
  • Develop user stories and define acceptance criteria
  • Plan releases and sprints
  • Follow the progress of work and address production issues during active sprints
  • Analyze preferences and requests of end-users

Requirement:
  • 1-2 years of Technical Experience with knowledge of software development- Must
  • High Technical orientation, with emphasis on endpoints, OS data collection & analysis, cyber-attack & detection methods- Advantage
  • Ability to quickly shift mindset and adjust to changes
  • Excellent Communication skills
  • Experience working with SaaS solutions or Cloud Environments- Advantage
  • Experience working with JIRA- Advantage
  • Familiarity with agile- Advantage
  • BSc in Computer Science, Engineering or similar field- Big advantage

Full stack Engineer

CyberHat is looking for a talented Full Stack Engineer to join the R&D team in a mission of enabling our cyber security services to a large community of customers around the globe using a cutting edge stack of technologies from Cloud down to the Endpoint

Responsibilities:
  • Work as part of a scrum team.
  • Partake in the overall detailed design and planning activities.
  • Implement code.
  • Implement unit and API tests.
  • Partake in troubleshooting problems within engineering and production tiers.

Skills and Qualifications:
  • BSc in Computer Sciences or equivalent.
  • 2-3 years as a Backend/Full-Stack Engineer
  • Experience with working in Agile Scrum methodology.
  • Experience with Python and OOP.
  • Experience with GO, Java, JS - significant advantage.
  • Experience with Frontend (ReactJS) - a significant advantage.
  • Experience with high-performance, multi-process/thread and event-driven programming - a significant advantage.
  • Experience with cloud computation, microservices, and big data systems - a significant advantage.
  • Experience with C++ - nice to have.
  • Confidence in learning new languages and platforms.

SIEM Integrator

The ''Labs” is CYREBRO's professional services team which specializes in new and existing detection and response solutions. The team's responsibilities include the architecture, deployment, content development, and end-user support, more of our managed SIEM solution on a global scale.
the team works with the most challenging, current and relevant technologies in the cybersecurity field today.

What will your day look like?
  • Managing and configuring various SIEM solutions
  • Integrating and standardizing new log sources and systems
  • Developing and updating detection logics
  • Ongoing maintenance of SIEM features (apps, etc.)
  • Research and identify rule sets
  • Developing and adjusting SIEM plugins

What do you need to bring with you?
  • Proven experience with SIEM monitoring, rules creation and tuning - must
  • Familiarity with SIEM Log sources integration, parsing and deployment of SIEM components - big advantage
  • Experience with various security solutions (AV, EDR, FW, IDS, IPS, web proxy, etc.) - must
  • Familiarity with network, protocols and organizational architecture - must
  • Experience with the creation of technical guides, procedures, reports -Big advantage
  • Familiarity with attack vectors, Cyber Kill Chains - Big advantage
  • 1+ year of Automation programing - Python / JAVA / C / bash / etc.
  • Relevant courses and certifications such as: SANS certificates, CEH, OSCP, CFI, IDF certificates (cyber defender)
  • High motivation to success

Top