משרות על המפה
 
בדיקת קורות חיים
אבחון און ליין
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
08/05/2024
חברה חסויה
Location: Herzliya
Job Type: Full Time and Hybrid work
As a Security Researcher, you will be:

Work with top-notch researchers using the latest technologies
Research low-level mechanisms, finding and exploiting vulnerabilities and circumventing modern mitigation techniques
Requirements:
Vulnerability research and exploit development experience
Strong analytical and problem-solving skills
Knowledge of programming languages: Assembly, C and Python
Experience with reverse engineering tool
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7715245
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
4 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time and Hybrid work
Required Cloud Security Researcher
Summary
Data has never been more valuable and vulnerable. As cybercriminals become more sophisticated and regulations become stricter, organizations struggle to answer one key question: Is my data safe?
we see the world of cybersecurity differently. Instead of chasing threats, we believe that the most practical approach is to protect data from the inside out. Weve building the industrys first fully autonomous data security platform to help our customers dramatically reduce risk with minimal human effort.
We move fast. Were an ultra-collaborative company with brilliant people who care deeply about the details. Together, were solving interesting and complex puzzles to keep the worlds data safe.
We work in a flexible, hybrid model, so you can choose the home-office balance that works best for you.
Responsibilities:
Research for new security issues/vulnerabilities in Cloud Environments & SaaS Applications
Write proof-of-concept, threat detections, and analytical algorithms
Analyze logs and behavior of user activities on Cloud Environments & SaaS Applications
Hunt threat actors & insider threats
Collaboration with R&D groups within the company to implement your latest research
Evaluate and recommend steps to harden customer's Cloud Environments & SaaS Applications
Optimizing existing algorithms to reduce false positives and increase the value of our products
Writing cyber security oriented blogs and publications
Follow and Evaluate new security threats, attack vectors, and technologies.
Requirements:
Cybersecurity professional with a minimum of 5 years experience as on-prem/cloud security researcher
Knowledge and experience researching IaaS platforms like AWS, Azure or GCP (advantage)
Experience with identifying and analyzing trends or patterns related to security incidents and abnormal behaviors
In-depth understanding of an organizations security, risks, and potential attack vectors in all the organizations perimeters
Understanding security issues, attack vectors, and related security trends
Strong knowledge of SQL language
2 years of Hands-on experience in programming and scripting (C++/Python)
Passion for conducting Value-to-customers-driven research
Must possess strong verbal & written communication skills in English
Problem-solving skills in an effective and creative way while maintaining a prominent level of flexibility
Experience with data analysis of large data sets.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7756388
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
פורסם ע"י המעסיק
7 ימים
Location: Herzliya
Job Type: Full Time
As a Cyber security Customer Success Manager, you will:

*  Recognize and research online attacks, analyzing attack patterns to fortify defense strategies.
*  Monitor alerts and detections, ensuring proactive measures against emerging threats.
* Work closely with prominent global security teams representing major organizations worldwide.
*  Generate insightful statistics and management data, contributing to sales and marketing endeavors.
*  Collaborate closely with clients to understand their unique security needs and provide tailored solutions.
* Drive initiatives to continually enhance threat detection methodologies and proactive security measures.
*  Act as a bridge between client expectations and internal strategies, ensuring seamless alignment and value delivery.
*  Proactively identify opportunities for innovation and improvement in security protocols, driving the evolution of our protective measures
Requirements:
*  Bachelor's degree in an Information Security-related field or equivalent experience.
* Profound knowledge of cybersecurity threats and a demonstrated ability to think creatively, offering out-of-the-box solutions.
*  Strong team player who supports others while independently managing tasks effectively within a collaborative environment.
* Prior experience in B2B environments is essential.
*  Advantageous: Previous involvement in SOC or incident response.
* Proficiency in English communication (written and verbal) at an advanced level.
*  Proficient in delivering compelling and effective online presentations, specifically within B2B client interactions.
* Demonstrated ability to conduct comprehensive online research across various subjects.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7079977
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
7 ימים
Location: Tel Aviv-Yafo and Herzliya
Job Type: Full Time and Hybrid work
Be a part of the team that is instrumental in constructing one of Microsoft's most exciting security solutions. In an era of increasingly sophisticated cyber-attacks, the Microsoft 365 Defender security suite has emerged as a vital tool for enterprises, enabling them to identify, scrutinize, counter advanced breaches and data intrusions within their networks and manage their security posture.

Our Israeli research team is looking for a security researcher who can help our customers, of all sizes, improve their security and protect them from cyber threats.

We value diversity and welcome candidates with different experiences and perspectives. If you are a team player who loves creating products for and with customers, come join us and be part of building a better world.

Responsibilities:
Performing attacker tradecraft research and threat landscape investigation across on-prem & cloud-based attacks spanning identities and applications.
Threat hunting to discover real-world advanced attacks and designing and implementing automated detection and disruption actions based on alerts and signals.
Contributing to active engagement with the security ecosystem through papers, presentations, and blogs.
Providing subject matter expertise to customers based on industry attack trends and product capabilities. 
Requirements:
Required qualifications:
Recent graduate of B.Sc. or M.Sc. in Computer Science/Software Engineering, or relevant practical experience (e.g. service in elite technology unit in IDF).
1+ year(s) experience in software development lifecycle, large-scale computing, modeling, cyber security, and/or anomaly detection
Proficiency in developing in C# / Python, or any other programming language.

Preferred qualifications:
Offensive security research experience.
Vulnerability analysis and deep understanding of their workarounds and mitigations.
Experience in big data analysis, and data-driven research.
Previous experience with Azure, AWS, GCP and/or Kubernetes and container security.
Excellent cross-group and interpersonal skills.
Team player, able to drive and facilitate projects across disciplines
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7754888
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
4 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time and Hybrid work
We are in search of a skilled and motivated Security Researcher to join our team.
As a Security Researcher, your primary focus will be on creating and researching anomaly and behavioral based threat models, dissecting attack techniques, and leading proactive threat hunting endeavors across a spectrum of domains, including cloud infrastructures (with a specialized emphasis on Office 365 and Azure), network security, proxies, firewalls, DNS, Active Directory, Azure Active Directory, and SharePoint, and product security.
Your role will require a profound comprehension of security concepts and a forward-thinking approach to identifying and writing detections for potential risks.
Requirements:
Technical proficiencies:
Profound knowledge with 365 apps, Active Directory, Kerberos, AAD, Firewalls, Proxies, SharePoint, DNS.
Strong background in Python (work with dataframes - pyspark /Pandas is an advantage) and PowerShell.
Query language background (for example, Kusto Query Language/SQL).
Experience as an Incident Responder, Threat Hunter, Red Teaming, Security Research.
Experience in investigating complex customer incidents (and be ready to talk about it).
Skills:
Strong communications skills
Can do approach
Great team player
Being able to collab with different teams and multitask.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7756532
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
4 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for an Application Security Architect to join the Product Security team and be responsible for the overall security of our products and services. The successful candidate will be responsible for contributing to our Cloud/On-prem strategic security program.
The candidate will be reporting to the Director of Product Security.
Responsibilities
Work to obtain the right mandate to ensure new products or services are launched with the appropriate security controls
Provide security standards, requirements, and guidelines for securing the products.
Take a part in the development lifecycle and integration of security features into all phases of software design and development
Assist with reviewing architecture and design for new products, features, and services.
Identify and facilitate remediation of application and cloud security exposures and vulnerabilities, including code reviews.
Conduct cloud security strategy, readiness, and discovery assessments; be familiar with cloud security frameworks, compliance requirements, and security operations
Research new application security tools and technologies and evaluate options that enhance security capabilities
Work closely with different interfaces in the company, mainly R&D and Product, to enhance application security on all layers.
Requirements:
5+ years of experience in Application Security / Cloud Security within R&D
Experience in Cloud technologies and SaaS environments
Thorough understanding of cyber security frameworks, such as NIST CSF, CIS CSC
Deep knowledge in web & application security, familiar with OWASP frameworks, solutions, and initiatives
knowledge And experience in Cloud Native Application (K8s, AWS , Azure)
Great verbal and written communication skills
Coordinate, participate, and deliver risk assessments and threat modeling for given\new designs and architectures
Technical experience in network security technologies or security operations with a proven ability to engage and drive product and engineering priorities
Work with the business to identify, capture, escalate, and close security vulnerabilities found in our products
Advantages
CISSP, CISM, CCSP, OSCP is an advantage
knowledge in security solutions such as Web application firewalls, DB Firewalls, Vulnerability scanners, and RASP/DAST/SAST solutions
knowledge of CI tools/methodologies
Technical background as a SW developer, malware reverser, or penetration testing.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7756342
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
12/05/2024
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for a Senior Red Team with a deep understanding of both information security and computer science. The right person will have to learn advanced concepts such as application manipulation, exploit development, and stealthy operations.
This is not a press the button type of job! This career is technical and challenging with opportunities to work in some of the most exciting areas of security on extremely technical and challenging work.
A typical job could be breaking into a segmented secure zone at a Fortune 500 organization, reverse engineering an application and both developing and exploiting the most recent vulnerabilities, all without being detected.
Responsibilities:
Global organization red-team assessments and security posture
Co-ordinate and execute systems and network level advanced red team exercises for different environments
Design and develop scripts, frameworks and tools required for facilitating and executing complex undetected attacks
Configure and troubleshoot security infrastructure devices
Develop technical solutions and new security capabilities to help mitigate security vulnerabilities and automate repeatable tasks
Write or assist with comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Requirements:
7+ years of experience leading penetration testing, application testing, and red team engagements
Experience with security tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools
Experience with scripting languages such as python, ruby, POSIX shell, as well as familiarity with programming languages such as: C/C++/ObjC/C#, Java, PHP, or .NET
Detailed technical knowledge in multi-security domains (Web, Network, OS, DB, IoT, Cloud, SCADA- advantage)
Knowledge in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
Expertise in performing advanced exploitation and post-exploitation attacks as part of ethical hacking exercises including writing proof-of-concept exploits and creating custom payloads and modules for common ethical hacking frameworks and tools
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7718819
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
7 ימים
חברה חסויה
Job Type: More than one
Responsibilities
Perform financial motivated attacker tradecraft research and threat landscape investigation across cloud-based attacks spanning permissions, identities, applications, and data.
Partner with engineers and data scientists in a geographically distributed team to deliver innovative new product capabilities.
Threat hunting to discover real world advanced attacks together with designing and implementing automated detection and hunting analytics combining alerts and signals across our Defender security products.
Contribute to active engagement with the security ecosystem through papers, presentations, and blogs.
Provide subject matter expertise to customers based on industry attack trends and product capabilities.
Requirements:
You have at least 5+ years of experience in cyber security with a background in the modern attacker kill-chain, MITRE ATT&CK, and emerging enterprise threats including attacks against SaaS Apps (Sharepoint, Exchange, Entra ID), Oauth Apps, Enterprise Apps.
You have BS or equivalent experience in computer science, engineering, or information technology.
You have understand and deep knowledge of few commonly used attack tools and frameworks used by Redteam Proficient in at least one programming language such as Python, C#, or C++.
You have excellent cross-group and interpersonal skills, with the ability to articulate the business need for product improvements and a desire to engage directly with customers. Experience working with and manipulating large data sets (i.e. billions of events per day).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7754919
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
4 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time and Hybrid work
Required Security Specialist- Red Team
We work in a flexible, hybrid model, so you can choose the home-office balance that works best for you.
As a Specialist in the SecOps and Forensics department, you will lead real-world adversary simulations for our customers and prospects with the goal of helping them gain visibility into their security posture and measure the overall maturity of their cyber programs.
You will have the opportunity to research new attack vectors, develop unique payloads, and create real-world attack scenarios while putting emphasis on evasion and operation security. Additionally, your expertise will be applied by helping guide clients towards best practices while maturing their utilization of their current cyber security stack.
The ideal candidate is a passionate individual with a minimum of 3 years experience working in offensive security. They will be creative and driven to find unique solutions to difficult challenges while maintaining smooth delivery on simultaneous adversary simulation engagements. They will have a desire to improve our status quo, becoming an active contributor in maturing our team.
Responsibilities:
Independently lead and execute adversary simulations in customer networks
Conduct thorough research to create effective adversary attack strategies applicable to customer settings
Design new attack simulations that evade security controls, ensuring sustained access while remaining undetected
Analyze our metadata streams and raw data from other security products for adversary research purposes
Collaborate with customers to ensure that products play a central role in their Security Operations and Incident Response methodologies.
Requirements:
3+ years of experience in red teaming, penetration testing, or related fields Experience using Cobalt Strike or similar C2 frameworks
Proficiency in programming languages such as C#, Python, and PowerShell Strong technical foundation of standard Information Technology concepts and services
Customer-facing orientation and excellent communication skills (both written and oral)
Proven ability to contribute effectively within a team-oriented environment
Proven ability to work creatively and analytically on complex problems
Demonstrated leadership skills in a professional setting (military or civilian).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7756538
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
7 ימים
Location: Tel Aviv-Yafo and Herzliya
Job Type: Part Time and Hybrid work
As a defensive security researcher, you will:
Perform attacker tradecraft research and threat landscape investigation across on-prem & cloud-based attacks spanning identities and applications.
Threat hunt to discover real-world advanced attacks and design and implement automated detection and disruption actions based on alerts and signals.
Contribute to active engagement with the security ecosystem through papers, presentations, and blogs.
Design and develop new detection logics to protect customers from attacks.

***Our interns work part time, all year round***
Requirements:
Required Qualifications:
Currently pursuing bachelor's, master's, or PhD degree in engineering, computer science or related field.
Must have at least 3 full semesters remaining until graduation, graduation date of January 2026 or after.
Experience in Cyber security.

Preferred Qualifications:
Experience in Network Security research.
Experience with cyber threat intelligence.
Hands-on experience in software development.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7754890
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
12/05/2024
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for a Security Architect to join our architecture team within the Critical Cyber Operations Group.
As a Security Architect you will review our clients current organizations infrastructure, whether it is on-prem or cloud-based, identify security vulnerabilities and offer a viable plan to rectify them.
Responsibilities:
Perform architecture reviews on designed or deployed environments, identifying security flaws and recommending mitigations plans
Escort, evaluate and improve our clients security posture by elevating their infrastructure resilience and implement best-practice organizational procedures
Escort mitigation plans and design practical implementations for security issues e.g., firewall policies review, segmentation & segregation recommendations, Microsoft AD-tier Model implementation etc.
Research and advocate for new security solutions and technologies
Requirements:
At least three years of hands-on experience with securing large organizational networks, including security controls, OS hardening, network devices security, etc
Significant experience in at least five subjects from the following list:
Vast knowledge and expertise in cyber-security IT systems and cloud infrastructure
Deep understanding of Microsoft IT on-prem and cloud infrastructure, e.g., Azure-Ad, Office365, AD, GPO, protocols
Practical experience with cloud environments AWS, Azure, GCP A significant advantage
Kubernetes deployment and hardening hands-on experience.
ZTNA design & deployment experience.
Knowledge of security controls, e.g., AV, EDR/XDR, DLP, Device control, etc.
Practical experience with Firewall management from different vendors
Practical experience in consulting services and risk assessment
Practical experience with security configuration and maturity assessment
Experience with implementing security monitoring procedures & systems (SOC, SIEM, SOAR)
Practical experience with SCADA protocols & ICS system security - an advantage
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7718824
סגור
שירות זה פתוח ללקוחות VIP בלבד