We are looking for a highly skilled Splunk Developer to join our SIEM team. In this role, you will be responsible for end-to-end data onboarding, connecting log sources, and creating advanced content, including dashboards developed with React. We are seeking a candidate with high technical capabilities, "out-of-the-box" thinking, and extensive experience with the Splunk platform.
Key Responsibilities:
Requirements:
Advantages:
Frontend development experience with React.
#Splunk #SIEM #CyberSecurity #Python #SplunkDeveloper #SecurityOperations #TechJobs
Are you a Salesforce expert with a passion for designing complex architectures and leading technicalexcellence? We are looking for a Senior Salesforce TechnicalArchitect to join our team and spearhead large-scale technologicalsolutions.
Asa key technical leader, you will design, develop, and implementhigh-performance, scalable, and secure solutions while mentoring developers andcollaborating with cross-functional teams.
WhatYou’ll Do:
· Architect& Lead: Design and lead complextechnical architectures on the Salesforce platform, focusing on performance andscalability.
· Hands-OnDevelopment: Build custom solutionsusing LWC, Apex, Visualforce, and Salesforce APIs.
· Integrations: Design and execute integrations with external systems(ERP, CRM, etc.) using REST/SOAP and Middleware.
· DevOpsExcellence: Implement CI/CD processesusing Azure DevOps and Git.
· StrategicAdvisory: Analyze business requirementsand translate them into detailed technical design documents (TDD).
· Mentorship: Guide and mentor developers to ensure high standards ofcode quality and Best Practices.
Requirements:
· Experience: At least 5years of Salesforce experience, with at least 1-2years as a Technical Architect.
· TechnicalMastery: Deep knowledge of Sales,Service, Experience (Community), and Marketing Clouds.
· ArchitectureGuru: Proven experience in DataModeling, Permissions, Flows, and complex system design (Must).
· Certifications:
o Salesforce Certified TechnicalArchitect (CTA) – Mandatory.
o Application Architect / IntegrationArchitect / PDII – Significant Advantage.
· DevOps& Security: Deep understanding ofCI/CD, security protocols, and system planning.
· Communication: Fluent in Hebrew and English (Written & Verbal) –Mandatory.
· Education: B.Sc. in Computer Science or Software Engineering –Significant Advantage.
"לידיעתך, לא חלה עליך חובה חוקית למסור את המידע או להעלות קובץ קורות חיים, ומסירתם תלויה ברצונך החופשי ובהסכמתך. עם זאת, המידע והמסמכים נדרשים לנו לצורך בחינת מועמדותך למשרות המפורסמות באתר, התאמתך למשרות פוטנציאליות עתידיות ויצירת קשר בנושאים הקשורים לתהליך הגיוס. המידע שיימסר על ידך יישמר במאגר המידע של החברה וישמש למטרות אלו. הנך מאשר/ת כי ידוע לך שהגשת מועמדות למשרה ספציפית מהווה הסכמה להעברת המידע וקורות החיים שלך למעסיק המפרסם (צד ג'), וכי המידע עשוי להישמר ולעובד במערכות טכנולוגיות המשמשות את החברה לניהול תהליכי השמה."
דרישות התפקיד
תואר ראשון מערכות מידע /הנדסת תעשייה וניהול או דומה - חובה
We are looking for atop-tier Cyber Security Analyst & IR Expert (Tier 3) to leadthe professional response within our defense team. In this role, you willspearhead complex investigations, perform deep-dive forensics, and continuouslyevolve the detection and response capabilities of a leading financialinstitution.
Thisposition requires high technical proficiency, "out-of-the-box"thinking, and a profound understanding of both offensive and defensive securitylandscapes.
Note: The position is open toboth men and women alike.
KeyResponsibilities
· IncidentResponse (IR): Lead end-to-end (E2E)investigations of complex cyber incidents, performing deep-dive technicalanalysis.
· ThreatHunting: Conduct proactive threathunting based on Cyber Intelligence and hypothetical attack scenarios acrosson-prem and cloud environments.
· DetectionEngineering: Design and build advancedSIEM rules, write YARA/Sigma rules, and optimize alert logic to reduce noiseand increase precision.
· PurpleTeaming: Collaborate closely with RedTeam/PT units to analyze penetration tests and validate security vulnerabilities.
· Mentoring: Act as a technical focal point, providing guidance andmentorship to Tier 1 and Tier 2 analysts.
Requirements
· Experience: At least 3+ years of hands-on experience as a CyberInvestigator / SOC Analyst (Tier 2/3) – Mandatory.
· OSMastery: Deep understanding of Windows& Linux operating systems at the Kernel/Internals level – Mandatory.
· TechStack: Proven experience with SIEM, XDR,and SOAR systems, including writing complex queries, building dashboards, anddeveloping detection rules – Mandatory.
· DigitalForensics: Hands-on experience inforensic investigations using tools such as Volatility, EnCase, FTK, orequivalent open-source tools – Mandatory.
· Scripting: Proficiency in Python, PowerShell, or Bash forautomation and investigation purposes – Mandatory.
· Networking: Deep understanding of network protocols andinfrastructure.
· Languages: High-level English (both technical writing and reading).
We are looking for a developer to join a team responsible for managing, operating, and monitoring the platform.
This is a hands-on role that includes direct work with customers, designing new services, installing and managing various third-party software (Kafka, MQ, Dockers), and ensuring continuous and stable system operation.
The administrator will also take part in developing the next generation of AI-driven system observability.
Role Responsibilities:
● Customer Support:
● System Operations:
● Integration Infrastructure Management, Operation, and Maintenance:
● Extensive scripting development in bash, PowerShell, PHP, and Python
Requirements: