Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

ORCA Security SOC Analyst 
Israel, Tel-Aviv District, Tel-Aviv 
230757504

02.05.2025

Highlights

  • High-growth: Over the past six years, we’ve consistently achieved milestones that take other companies a decade or more. During this time, we’ve significantly grown our employee base, expanded our customer reach, and rapidly advanced our product capabilities.
  • Disruptive innovation: Our founders saw that traditional security didn’t work for the cloud—so they set out to carve a new path. We’re relentless pioneers who invented agentless technology and continue to be the most comprehensive and innovative cloud security company.
  • Well-capitalized: With a valuation of $1.8 billion, Orca is a cybersecurity unicorn dominating the cloud security space. We’re backed by an impressive team of investors such as Capital G, ICONIQ, GGV, and SVCI, a syndicate of CISOs who invest their own money after conducting their due diligence.
  • Respectful and transparent culture: Our executives pride themselves on being accessible to everyone and believe in sharing knowledge with the employees. Each employee has a place in shaping the future of our industry.


The SOC Analyst is responsible for monitoring, analyzing, and responding to security threats and incidents to ensure the protection of the organization’s IT and Security infrastructure. This role serves as the first line of defense against cyber threats.

Key Responsibilities:

  • Monitor security alerts and logs using Orca Platform, SIEM, EDR, OSINT and other security tools to identify potential threats or unusual activities
  • Triage and investigate alerts, determining their relevance and urgency, and escalate incidents as needed
  • Respond to security incidents by investigating, containing, and mitigating threats
  • Analyze and interpret security data to identify vulnerabilities and anticipate emerging threats
  • Review and analyze logs from various sources (network, endpoint, application) to detect anomalies and breaches
  • Operate and manage security tools and technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), and vulnerability scanners
  • Document incidents, actions taken, and resolutions; prepare detailed reports for management and compliance purposes
  • Participate in Security meetings and working groups to improve processes and share knowledge
  • Assist with the development and implementation of basic SSDLC processes
  • Stay current with the latest security threats, vulnerabilities, and industry best practices

Required Skills & Qualifications:

  • 2-3 years in a cybersecurity role, preferably in a SOC environment
  • Experience with AWS, Azure, or GCP – Required.
  • CompTIA Security+, CEH, , or similar certifications are preferred
  • Proficiency with SIEM tools, security monitoring, network/system administration, basic scripting
  • Strong analytical and problem-solving abilities to analyze and address complex security issues
  • Good English