An Interview with Irina Nesterovsky, Chief Research office at KELA

In our next interview within our wonderful women in tech series, we are interviewing Irina Nesterovsky and discussing her journey within Cyber Security and her role at KELA as Chief Research Officer.

KELA is an industry-leading cyber security intelligence platform which gives you unrivalled visibility into cybercrime and threats against your organisation.

Interviewer: Could you give us a bit of information about your background and how you ended up in cybersecurity?

Irina: I have been with KELA for 7 years which is a long time! I grew up in the ranks from analyst to team leader to where I am today. The way I got here is not a traditional way, anywhere other than in Israel. In Israel, there is mandatory service in place, so my way into tech and cybersecurity began in the army in the 8200 units, this is where I got my intelligence training.

After doing a bachelor’s degree and a master’s degree in unrelated things I realized I wanted to work within KELA and the move to cybersecurity was organic to me. I learned everything on the go, as I was a replacement for someone on maternity, and that’s what led me to today, heading out Cybercrime Intelligence Centre (which is comprised of 99% women today)

Interviewer: Did you know what are within the Army you wanted to be a part of?

Irina: I personally didn’t. You get invited to different sorts of tests about your capabilities and based on that and other criteria you got posted. I would say most people today will know where they want to go.

Interviewer: So, you went straight into the army and into intelligence. What did that look like for you as a woman? And what are you learning each day?

Irina: It was interesting, as you must learn to discern the important from the not-so-important! You also learn lots of confidential things. It ends up as your day-to-day work, researching and writing for example. The army part kicks in with the uniform, having chores, and being unable to go home.

As soon as I was discharged, I went to study brain science at Tel Aviv University because it sounded interesting. It wasn’t intelligence, but I wanted to try something else. Eventually, however, intelligence sucked me right back in. Just kidding! That is where I felt I should be.

Interviewer: In the UK there isn’t really an emphasis on cybersecurity or intelligence or getting girls into tech. I feel it is really refreshing to talk to you and find out that most of your peers in the Army were women. Do you feel like the industry is more spoken about where you have been brought up?

Irina: Even though I spoke about most of my team being Women, there are still some roles that are very male-dominated such as software engineering. There is just not enough encouragement for girls within this sector.

Interviewer: Role models to look up to play a big part in what career children may go down. If you don’t see someone who looks like you in that job role you may not apply for it!

What do you think is exciting within cybersecurity?

Irina: It is an industry that is changing so much, but that is what makes it exciting. It is a wide industry with lots of options to explore. You can also take your experience with you into different sectors.

Our goal is to make things better and protect organizations. If someone is looking for a meaningful role, then this is it.

Interviewer: It is also not an industry that is going away, right? Do you know how we could get people to be more engaged?

Irina:

Thank you, Irina, for a wonderful interview! You can discover the full interview over on our website: Influential Women in Tech Special | Irina Nesterovsky from KEla

Jan 20 2026

Join Us in Supporting the Great Gloucestershire Mouse Hunt

Core to Cloud is proud to support the Great Gloucestershire Mouse Hunt, a county-wide campaign collecting essential computer peripherals to help improve access to...
Jan 14 2026

From Defence to Resilience: A Strategic Framework for Ransomware Preparedness

Ransomware has evolved into a highly organised and commercially driven threat, capable of bypassing traditional cyber security controls. As attacks become more...
Nov 11 2025

Core to Cloud Partners with The ITSA Digital Trust to Empower Digital Inclusion and Support Sustainable Technology

At Core to Cloud, we’ve always believed that technology should make a positive difference by protecting people, enabling innovation, and building a more inclusive...
Oct 27 2025

Human-led, AI-Enhanced MDR: Rethinking the Balance of People and Technology

By Phil Howe, CTO at Core to Cloud It’s getting colder and wetter outside, and to some the security landscape may feel more complex than ever. Threat actors are faster,...
Oct 22 2025

From Warning to Action: The NCSC Calls on UK Organisations to Build Resilience

In its 2025 Annual Review, the UK’s National Cyber Security Centre (NCSC) issued one of its clearest warnings to date: organisations must prepare for a day when their...
Jun 25 2025

Think You’re Ready for a Cyberattack? Prove It.

In the face of increasing cyber threats, most organisations have invested heavily in technology - firewalls, antivirus, endpoint protection, and cloud security. But...
Jun 13 2025

Secure & Strong Partners with Women in Tech & Cyber Hub (WITCH)

At Core to Cloud, we believe the future of cybersecurity is inclusive, empowering, and community-driven. That’s why we’re proud to announce a meaningful new partnership...
Jun 13 2025

Core to Cloud Expands Strategic Partnership with Vectra AI to Strengthen 24/7 SOC Capabilities

Cirencester, UK, 13 June 2025: Core to Cloud, a leading UK-based provider of cybersecurity services, is deepening its strategic partnership with Vectra AI, the...
May 19 2025

Supply Chain Cyberattacks: Lessons from a Retail Incident

In early May 2025, the UK retail sector experienced a wake-up call. A ransomware attack targeting a retailer’s IT infrastructure disrupted supply chains, impacted...
Mar 14 2025

Rev Up Your Security: Why Cybersecurity is a High-Speed Race, Not a Sunday Drive

Picture this: You’re on the starting grid. The engines roar. The stakes are high. In the relentless Grand Prix of cybersecurity, there’s no cruising—only speed,...

Trusted by CISOs and IT teams at over 150 organisations