Breaking / KELA Launches AI-Driven Digital Cyber Analysts, Industry's First Agentic AI for Threat Intelligence

Learn More
Careers Inner

Careers

Join KELA
& Shape the Future of
Cyber Threat Intelligence

Technical Collection Analyst

Product
Tel Aviv-Jaffa, Tel Aviv District, Israel (Hybrid)
Description

KELA is a cyber threat intelligence company that helps organizations prevent cybercrime by delivering actionable intelligence. Our technology provides deep visibility into the cyber threat landscape, enabling proactive defense against real-world attacks. At KELA, you’ll work with cutting-edge tools, good people, and data that makes a difference. Join us to be part of a mission-driven team that’s shaping the future of cybersecurity.

We are seeking a detail-oriented Collection Operations Analyst to join our dynamic team. The ideal candidate will be responsible for analyzing collection processes, identifying trends, and implementing strategies to enhance operational efficiency. This role requires a strong analytical mindset, exceptional problem-solving skills, and the ability to collaborate with cross-functional teams to drive performance improvements. The Collection Operations Analyst will play a crucial role in ensuring the accuracy of data and reporting, providing valuable insights to optimize our collections strategy.


What you will do:

  • Operate and maintain internal cyber threat intelligence collection systems.
  • Hands-on working with databases (Elasticsearch, SQL, MongoDB).
  • Analyze and process data to support intelligence production.
  • Collaborate with engineering teams to enhance collection methodologies.
  • Develop an in-depth understanding of the cyber threat landscape.
  • Work with web applications and browser protocols to improve data collection techniques.
Requirements


  • Proven experience with databases and data management systems (MongoDB, Elasticsearch, SQL, etc.).
  • Experience manipulating data with scripting languages (ex. Python) – Advantage.
  • Strong understanding of Cyber Threat Intelligence (CTI) principles and methodologies – Advantage
  • Familiarity with web applications and browser protocols.
  • Ability to work cross-functionally between intelligence, engineering, and product teams.
  • Strong analytical and problem-solving skills.
Apply Now