hero image

Welcome to LHH Israel Network

On this board you can review our network of companies that will assist you finding new job opportunities. This board automatically pulls the jobs from their career sites.
Found a suitable job? Send us the job link including your resume to: jobs@lhh.co.il and we will make sure it reaches the right person in the organization.
Please do not apply on this platform.

Before sending your resume, please check how well your CV matches the role requirements using the LHH AI CV Optimizer.

Senior Cyber Threat Intelligence Researcher (208435926)

Yael Group

Yael Group

Posted on Mar 11, 2026

Who We Are

Yael Group is a leading group of companies in the market, providing advanced technological solutions across a wide range of fields to organizations in all sectors of the economy.

Job Description:

  • Develop advanced investigation concepts across diverse cloud environments.
  • Conduct in-depth research on complex cyberattacks (Advanced Threats).
  • Identify Indicators of Compromise (IOCs).
  • The role combines operational research, attack chain implementation (Attack Path Analysis), and providing technological solutions to enhance national and organizational resilience against cyber threats in cloud environments.
  • Hybrid work model.

Key Responsibilities:

Investigation Strategy Development:

Develop methodologies for investigating and identifying threats across various cloud environments.

Intelligence & Technology Research:

Investigate advanced cyberattacks and analyze attack techniques and methodologies.

Field Team Support:

Provide investigation teams with technological insights and tools for real-time attack detection.

Research Reporting:

Produce research insights and professional reports to generate alerts for the Israeli market and specific organizations.

Detection Capability Development:

Implement technological solutions for monitoring, detection, and Incident Response in cloud environments.

Job Requirements:

  • 7+ years of experience conducting advanced cyber research. The role requires knowledge and hands-on use of various monitoring and research tools, including log analysis and investigation.

Deep Technical Expertise: Proven experience in at least two of the following areas:

  • Malware Analysis / Vulnerability Research
  • Digital Forensics / Reverse Engineering
  • Penetration Testing (PT) for complex systems
  • Development of research tools and Big Data analysis

Threat Research Background:

Experience extracting insights from intelligence data, researching networks and communication protocols, and monitoring system components.

  • Relevant academic education

Additional Skills:

  • Extensive knowledge of multiple operating systems and advanced communication protocols.
  • Proven ability to write high-quality technical documentation and research reports.
  • Strong system-level thinking and the ability to lead research processes end-to-end.