Since October 7, Israel has been engaged in a new kind of war—one fought on the ground, in the skies, and across digital networks. In this multidimensional battlefield, data analysts have become mission-critical players, working behind the scenes to protect infrastructure, expose cyber threats, and outmaneuver adversaries like Iran and its proxies.
These aren’t theoretical roles. They’re real jobs filled by professionals—many of whom started in non-technical careers and pivoted into data. Whether in government agencies, startups, or global tech companies, these analysts are using SQL queries, dashboards, and behavioral models to keep Israel safe.
If you’re making Aliyah or considering a career shift, these are the roles where you can make a difference.
1. Cyber Threat Intelligence Analyst
What they do:
Cyber Threat Intelligence (CTI) analysts collect and interpret data about malicious activity coming from Iran and affiliated groups like Hezbollah and the IRGC-affiliated hacker group “Charming Kitten”. Their job is to find patterns in malware signatures, IP addresses, phishing campaigns, and dark web chatter to predict and prevent attacks.
Real-world example:
In April 2024, Israeli CTI teams helped neutralize an attempted attack on key government systems, traced to an Iranian campaign known as “Pink Sandstorm” (Microsoft Threat Intelligence Report).
Tools used:
SQL, Python, Threat Intelligence Platforms (TIPs), OSINT tools, MISP
Why it matters:
These analysts are the early warning system. Their reports shape national policy and military readiness.
2. SOC Data Analyst (Security Operations Center)
What they do:
SOC analysts work inside 24/7 cybersecurity command centers, scanning activity logs for anomalies like repeated login attempts, unauthorized file access, or abnormal network behavior. They’re the real-time defenders who triage alerts and escalate incidents for investigation.
Real-world example:
During the initial days after October 7, SOC teams were instrumental in maintaining continuity for hospitals and utilities targeted by cyber attacks, including ransomware attempts on water infrastructure (Haaretz Report).
Tools used:
SIEM platforms like Splunk or Microsoft Sentinel, Power BI, packet sniffers, incident response dashboards
Why it matters:
SOC analysts are often the first to spot a breach and prevent it from escalating.
3. OSINT Data Analyst (Open Source Intelligence)
What they do:
OSINT analysts scan publicly available platforms—social media, Telegram groups, online forums, and deep web channels—for indicators of planned cyber or physical attacks. They also track propaganda, public sentiment, and efforts to destabilize Israeli society from within.
Real-world example:
Multiple Israeli OSINT teams identified coordinated misinformation campaigns in Arabic and Persian designed to incite panic during missile sirens. Their findings led to targeted takedowns and public awareness alerts (Cyberwell Threat Monitoring).
Tools used:
Web scraping tools, sentiment analysis software, natural language processing (NLP), Excel, Tableau
Why it matters:
This role bridges cyber defense with psychological warfare, exposing enemy narratives before they go viral.
4. Logistics & Operations Data Analyst
What they do:
These analysts support operational continuity during war—tracking everything from troop supplies to medical equipment. They help optimize how and where resources are distributed, particularly in conflict zones and civilian emergency centers.
Real-world example:
In the weeks following October 7, IDF logistics teams partnered with private sector analysts to map supply chains and optimize drone delivery routes for field hospitals in the south (Israeli Innovation Authority).
Tools used:
Excel, Power BI, Google BigQuery, GIS software
Why it matters:
When seconds count, efficient logistics can save lives. These analysts bring order to chaos.
5. Misinformation & Influence Analyst
What they do:
This emerging role focuses on identifying viral misinformation targeting Israeli citizens and global allies. These analysts track the spread of emotionally charged content, fake news, and deepfakes aimed at eroding morale or damaging Israel’s image abroad.
Real-world example:
After October 7, analysts exposed fake casualty videos and AI-generated speeches shared on Twitter and TikTok to distort facts on the ground (FakeReporter, an Israeli watchdog group, regularly publishes these findings).
Tools used:
CrowdTangle, social listening tools, custom-built dashboards, influencer mapping tools
Why it matters:
Public perception is part of the war effort. These analysts help preserve the truth.
Civilians on the Front Line
Since October 7, Israel’s war effort has extended far beyond the military. Data analysts—many working from offices, coworking spaces, or secure underground hubs—are protecting digital borders and shaping real-world strategy.
And they’re not all lifelong techies. Many come from diverse backgrounds and pivoted into analytics through programs like Arbel, where we train students in the real tools, real context, and real roles of Israeli cybersecurity.
You don’t need a uniform to serve. In the age of cyber warfare, a keyboard can be a frontline weapon.