סקירה כללית
^^משרה זו נלקחה מ Career^^Sygnia is a top
• tier cyber technology and services company, providing high
• end consulting, managed detection and response, and incident response services for organizations worldwide. Sygnia works with leading global enterprises to proactively build cyber resilience and to respond to and defeat advanced cyber attacks. It is a trusted advisor to IT and security teams, senior management, and boards of top organizations worldwide, including Fortune 100 companies. Drawing on elite talent from top military technology units and the cyber industry, Sygnia has been described by Forbes as a “cyber security delta force.” The company applies technological supremacy, real
• world digital combat experience, data analytics, and a business
• driven mindset to help organizations excel in the age of cyber threats. Our Technology division is building a next
• generation cyber investigation and response platform, used daily by Sygnia’s Incident Response and MDR teams to handle real
• world cyber attacks at scale. The platform supports advanced investigation workflows, deep analytics, and rapid response during live incidents. We are accelerating the development of this platform and are looking for a Senior Product Manager to lead the ownership and evolution of investigation tooling and workflows used by Incident Response researchers and SOC analysts. As a Senior Product Manager, you will work closely with cross
• functional teams across R&D, Incident Response, MDR, and Security Operations. This is a highly hands
• on role, deeply embedded with security practitioners, focused on reducing investigation time, improving investigation quality, and scaling expert knowledge through automation and AI. Main Responsibilities Lead end
• to
• end ownership of investigation and response workflows used by Incident Response researchers and SOC analysts Drive the product lifecycle from problem definition and planning through execution, delivery, and continuous improvement Design and evolve tooling that supports: Alert triage and prioritization Evidence and artifact collection Pivoting across logs, telemetry, and multiple data sources Enrichment, correlation, and contextualization of indicators Timeline reconstruction and hypothesis validation Response and containment actions Work closely with engineering teams to ensure solutions meet usability, scalability, and operational requirements Collaborate daily with Incident Response teams during live investigations and post
• incident reviews Translate IR methodologies, playbooks, and analyst intuition into scalable and repeatable product capabilities Define, track, and own measurable product outcomes, including: Reduction in investigation time Improved analyst efficiency and reduced cognitive load Higher decision accuracy and confidence Adoption and usage of investigation tools by internal security teams AI Responsibilities AI is a core part of this role. You will actively design and build AI
• assisted investigation capabilities, including: LLM
• based investigation summaries and context generation Analyst copilots and guided investigation workflows Automation of repetitive and error
• prone investigation steps Natural language interaction with investigation data and artifacts This role requires hands
• on experience designing and building AI
• driven capabilities, not just managing AI features. Requirements Main Requirements: 5+ years of product management experience in cybersecurity Proven experience building AI
• powered tools or workflows, including hands
• on experimentation (personal projects included) Strong technical background with the ability to dive into queries, scripts, data flows, and investigation logic Deep understanding of security investigation workflows, artifacts, logs, and telemetry Experience working with SIEM, XDR, EDR, or Incident Response platforms Proven ability to translate complex technical or security processes into intuitive, usable products Experience building internal tools for security teams or practitioner
• facing platforms Strong intuition for analyst workflows, decision
• making under pressure, and investigation flow Background in scaling expert
• driven workflows into repeatable and scalable product capabilities Experience working closely with engineering and security practitioners in fast
• paced, high
• pressure environments Independent experimentation with LLMs, agents, notebooks, or automation frameworks Excellent communication skills in English, written and spoken Comfortable working with ambiguity, partial data, and real operational constraints Strong advantage if you have hands
• on experience as: Incident Response researcher SOC analyst Threat hunter Application Requirement Please include links to GitHub repositories, demos, or personal projects that demonstrate how you build products or use AI to solve real problems.
דרישות המשרה
Lead end
• to
• end ownership of investigation and response workflows used by Incident Response researchers and SOC analysts Drive the product lifecycle from problem definition and planning through execution, delivery, and continuous improvement Design and evolve tooling that supports: Alert triage and prioritization Evidence and artifact collection Pivoting across logs, telemetry, and multiple da