Lev Rosenvasser
L3 Security Analyst at CyberProof- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
English -
-
Russian -
-
Hebrew -
Topline Score
Bio
Tomer Shakarov
It was a real pleasure working with Lev! A team member you can trust and always happy to help. Lev is a true professional!
Tomer Shakarov
It was a real pleasure working with Lev! A team member you can trust and always happy to help. Lev is a true professional!
Tomer Shakarov
It was a real pleasure working with Lev! A team member you can trust and always happy to help. Lev is a true professional!
Tomer Shakarov
It was a real pleasure working with Lev! A team member you can trust and always happy to help. Lev is a true professional!
Credentials
-
The Complete Splunk Enterprise Certified Admin Course
UdemyJul, 2023- Nov, 2024 -
HDE -Hacking Defined Experts
See-Security: Cyber & Information Security College -
Secure development methodology.
John Bryce, IDF's school of computer professions
Experience
-
CyberProof
-
United States
-
Computer and Network Security
-
200 - 300 Employee
-
L3 Security Analyst
-
Jul 2023 - Present
-
-
-
Anaplan
-
United States
-
Software Development
-
700 & Above Employee
-
Senior Security Analyst
-
Aug 2021 - Jul 2023
Provided expertise and leadership in maintaining and enhancing an organization’s security posture. Analyzed complex security incidents and developed strategies to mitigate risks. Cross-functional teams collaboration to implement security measures and evaluate security technologies. Played a crucial role in threat intelligence gathering, incident response, and security awareness training. Key achievement: Fully responsible for overseeing and executing the seamless transition from one Security Orchestration, Automation, and Response (SOAR) platform to another. Show less
-
-
-
BlueVoyant
-
United States
-
Computer and Network Security
-
400 - 500 Employee
-
Implementation Engineer
-
Mar 2020 - Aug 2021
Responsible for implementing, and maintaining security solutions for clients.Assessing security requirements, configuring and integrating security systems, conducting risk assessments, and addressing vulnerabilities.
-
-
Senior SOC Analyst
-
Feb 2018 - Mar 2020
Led a team of top-tier SOC analysts, overseeing escalations and complex investigations for major clients.Played a proactive role in brand protection through thorough threat hunting.Significant Achievement:Developed strategies to optimize resource allocation, such as automating the closure of incoming incidents using security orchestration playbooks.
-
-
-
-
cyber security
-
Sep 2014 - Jan 2018
managed cross units security events and commercial intelligence analysis. Headed pro-active operations: Develop and implement proactive strategies, such as security controls, incident response plans, and security awareness programs, to strengthen military overall cyber resilience. By staying ahead of potential threats. Minimizing risks, protecting critical assets, and maintaining a secure digital environment. managed cross units security events and commercial intelligence analysis. Headed pro-active operations: Develop and implement proactive strategies, such as security controls, incident response plans, and security awareness programs, to strengthen military overall cyber resilience. By staying ahead of potential threats. Minimizing risks, protecting critical assets, and maintaining a secure digital environment.
-
-
Education
-
Autodidact
-
see security
hacking defined experts, pen testing, hacking, information security -
john bryce israel
Network forensics, Computer Systems Analysis -
john bryce israel
Secure develoment, Secure development -
IDF's school of computer professions(Mamram/Basmah)
Computer programming and Network administration, Programming languages, (computing) data communication, Protocols. -
Weizmann Institute of Science
Final Project, Computer Programming, Specific Applications -
Hadera high school
computer science and physics -
The Open University of Israel
Bachelor of Business Administration - BBA, Computer Science