רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

מומחה בדיקת חדירות

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
אבחון און ליין
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל המידע למציאת עבודה
כל מה שרציתם לדעת על מבחני המיון ולא העזתם לשאול
זומנתם למבחני מיון ואין לכם מושג לקראת מה אתם ה...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

משרות בלוח החם
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 8 שעות
קווליטסט
דרושים בקווליטסט
Location: Petah Tikva and Haifa
Job Type: Full Time and Hybrid work
Qualitest is growing and we are looking for our next Cyber analyst to join our growing team in Petah Tikva/Haifa

Responsibilities

* Work with a small group of experts who investigate brand-new technologies, both on OS internals and network protocols
* Take part in the design and creation of new efficient and secure solutions following high security standards.
* Our working environment is fun, creative, dynamic, and very challenging, both in product and technology areas.
Requirements:
* Bachelor's Degree or higher in computer engineer, Computer Science, or Electrical Engineer or similar technical STEM degree
* 5+years of security experience with performing pen testing, Security Risk assessment, fuzzing, security scans and vulnerability assessment.
* 5+ years of experience with security analysis of applications, services, hardware, SOC, broad design, schematics, etc
* Perform secure code reviews, design and architectural issues.
* High level English and ability to work in a dynamic environment
* Comprehend state-of-the-art security principles, theories, and attacks, with lots of hands-on expectations
* Exploit research or development (published exploits and write-ups on exploiting new classes of issues, new techniques, tools are greatly appreciated)
* Knowledge of Scripting languages such as Python /Bash/ C
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
7686427
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
1 ימים
CyWayz Recruitment & Outsourcing
דרושים בCyWayz Recruitment & Outsourcing
Location: More than one
Job Type: Full Time and Hybrid work
A leading cybersecurity startup, specializing in incident response is looking for an experienced Incident Response Analyst with an Attacker Mindset.
In this position you will join a team of professionals with exceptional attack and defense expertise and combat experience, learning and developing from engaging national cyber-attacks to remediation of high-profile incidents.
Responsibilities
Investigate and respond to cybersecurity incidents
Conduct threat hunting activities using various tools and techniques
Prepare detailed incident reports and briefings for clients and internal stakeholders
Collaborate with cross-functional teams to enhance security measures and protocols
Train junior staff and contribute to knowledge sharing within the team
This is a full time, remote position.
Requirements:
Bachelor's degree in Cybersecurity, Computer Science, or related field - Advantage
3-5 years of hands-on experience in incident response - Must
Strong knowledge of DFIR tools and methodologies
Familiarity with SIEM solutions such as Splunk or Qradar.
Excellent communication and documentation skills
Familiarity with EDR solutions such as TrendMicro, or Crowdstrike.
Certifications like GCIH, GCFA, or similar are an Advantage
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
7751129
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
TechTalent
דרושים בTechTalent
סוג משרה: משרה מלאה
לחברת הייטק איכותית בתחום ה- Cyber security שגייסה 75 מיליון דולר
דרוש/ה בודק/ת ידני/ת מנוסה.
במסגרת התפקיד: בדיקות ידניות כולל בדיקות Client/Server, עבודה
שכוללת שימוש ב-Active Directory, עבודה מרובה מול בסיסי נתונים
וכן עבודה בצוות.
דרישות:
תואר ראשון יהווה יתרון בלבד
לפחות 3-4 שנות ניסיון בתור בודק/ת ידני/ת - חובה
ניסיון מחברות Cyber - חובה
רקע ב-Active Directory - חובה
ניסיון מול בסיסי נתונים עם יתרון ל-SQL
אנגלית טובה מאוד המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
7676135
סגור
שירות זה פתוח ללקוחות VIP בלבד
לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
4 ימים
Location: Merkaz
We are looking for an ambitious, experienced, and multi skilled Senior Cybersecurity Researcher to join our unique team.
As a member of our team, you will have a deep understanding of both computer science and information security. You will understand advanced concepts like exploit development and stealthy operations. You will conduct Offensive Security Testing, consisting of highly secured solutions using Windows and Linux.
This role will provide YOU the opportunity to lead key activities to progress YOUR career. The responsibilities include the following:
Perform testing and vulnerability assessments on system and networks, focusing on network security and identifying potential weaknesses and vulnerabilities
Research and integrate the latest tools, tactics, techniques, procedures, and developments in vulnerabilities research, exploitation, privilege escalation, defense evasion, lateral movement, and means of achieving objectives into new or existing capabilities
Develop detailed testing plans and use-cases to ensure coverage of scope and reducation of attack surface
Requirements:
Bachelor's degree in Cybersecurity, Computer Science, or a related field
Minimum of 6 years of experience working in Cybersecurity with 3 years minimum as a Penetration Tester or a Threat Hunting role
Strong Knowledge of network protocols, operation system, databases, web application, and cloud technologies
Solid understanding of common vulnerabilities and exploitation techniques
Knowledge of secure coding practices, encryption protocols, and authentication mechanisms
Strong analytical and problem-solving skills with the ability to think creatively and strategically
Relevant certification (e.g., CEH, CHFI, OSCP, OSCE) are highly desirable
Experience with Programming Languages (C, C++, C#, Java, ASM, Python)
Attention to details, accuracy and reliability
Team player
Out-of-the-box thinking and a "Can-Do" approach
Independent learner and highly responsible
Strong communication skills in Hebrew & English- writing and reading
Location: Center
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7752698
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
03/06/2024
Location: Haifa
Job Type: Full Time
Israel //  Caesarea  cyber offensive Developer
As CybergymIEC keeps growing, we are looking for an experienced cyber offensive Developer to join the team at our Israel HQ.
The CybergymIEC's Red team is a group of offensive cybersecurity experts, Researchers, and developers working collaboratively.
We are seeking a talented and motivated Developer to join our Red Team and play a key role in developing engaging and realistic Red Team emulation for our training. You will be responsible for creating custom tools, scripts, and automation to enhance the learning experience for cybersecurity professionals of all levels.
Main tasks and responsibilities will include:
Design, develop, and maintain custom tools and scripts to simulate real-world red team engagements, including vulnerability exploitation, social engineering tactics, and post-exploitation maneuvers.
Research emerging threats and hacking techniques to ensure training scenarios reflect the latest attacker methodologies.
Integrate open-source and commercial security tools commonly used by red teams into our training simulations.
Collaborate with security instructors and subject matter experts (SMEs) to understand training objectives and translate them into effective technical solutions.
Develop user-friendly interfaces and documentation for the developed tools to ensure smooth integration into training programs.
Participate in the testing and refinement of training emulation to ensure they are realistic, challenging, and meet learning objectives.
Stay up to date on the latest security vulnerabilities, exploits, and defensive techniques (MITRE ATT&CK framework).
Requirements:
Minimum 3 years of experience in software development with a focus on security or a related field.
Proven experience in scripting languages commonly used in red teaming ( Python, Bash, PowerShell).
Strong understanding of networking concepts and protocols (TCP/IP, DNS, etc.).
Experience with vulnerability scanning tools and penetration testing methodologies.
Familiarity with offensive security frameworks and tools (Metasploit, Empire, etc.) is a plus.
Experience developing educational or training materials (a plus).
Excellent problem-solving and critical thinking skills.
Ability to work independently and as part of a team.
Strong communication and written documentation skills.
Experience with ICS/SCADA and reverse engineering - Advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7745160
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
02/06/2024
Location: Rehovot
Job Type: Full Time
Security Compliance Consultantץ
Full Time.
Remote.
About the Company:
We were established by a team of security experts with interdisciplinary knowledge and vast experience in the field of information security. We provide numerous services in the field of information security, application security, penetration testing services, cyber services, APTs, threat modeling, secure architectures & design, and multi-regulation enterprise environments. 
Among our core services are the following:
Audit & regulations PCI DSS, ISO 27001, ISO27701, HIPAA, WLA, GDPR, SOC2.
Risk assessments custom risk assessments for sectorial regulators (Banking oversight & Insurance oversight).
Information security services such as black/ grey/ white box penetration testing, risk surveys based on various security frameworks, gap analysis.
Ongoing consulting services.
Training global training and awareness projects & in-depth training for developers/ QA team and other focused groups.
About the Role: 
We are looking for an Information Security Consultant for our evolving Israel company. This is open to Junior Consultants too. A leading consulting and information security company that has been operating for 14 years. Helping companies meet various information security standards, among others: ISO 27K, SOC2, HIPPA, GDPR, etc. We also certified companies to the PCI DSS standard.
 
Main Job Responsibilities:
Work remotely with US-based clientele.
Lead ISO 27001, SOC 2, and PCI DSS projects.
Lead and perform risk assessments and various information security assessments.
 
We maintain a happy and professional working environment where everyone is valued. Becoming one of us is a decision you will not regret making. 
Interested? Email your Resume to our HR & Recruitment Manager.
We look forward to hearing from you!
Requirements:
Requirements:
Professional writing skills. Must be someone knowledgeable in drafting various documents.
Good English communication skills both written and oral
Must be a good team player.
Nice to have:
Any related certifications like QSA, CISSP, CISM, ISO AUDITOR, ISO IMPLEMENTOR, etc.
Preferably someone who has the following:
Project management background.
Auditing experience:
1-2+ years of system experience in Linux and Windows servers (in Domain environment).
Experience and knowledge in cloud-based technologies GCP, AWS, Azure.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7742954
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
28/05/2024
Location: Tel Aviv-Yafo
We are looking for talented hackers to join our unique Adversarial Tactics Department. As a Red Team Expert ,you will work with clients to build their resiliency, i.e their capability to prevent and to sustain attacks. You will also be involved in IR engagements with companies that were attacked by adversaries, learn new TTPs and apply those in Red and Purple team engagements.
Your responsibility as a Cyber consultant is to bring the attackers perspective to engagements. You will help design, create and execute Adversary Simulation exercises, and perform attacks against client services, platforms and infrastructure. This will include, among other things, identifying vulnerabilities through simulated external and internal attacks, validating and enhancing an organizations ability to respond and recover from targeted attacks and persistent adversaries.
Requirements:
Minimum of 3 years of experience as a Pen tester/Red teamer.
Previous consulting experience is beneficial.
Deep understanding and extensive experience in penetration testing methodologies and tools.
Deep technical understanding of a broad technology set and the ability to learn new information at a rapid pace.
Desire to learn new technologies and break them apart is a must.
Deep familiarity with Active Directory attacks and defenses.
Background in application security - advantage.
Fluent English (Written, Spoken) and proven presentation skills - must.
Scripting and tools development (Python, PowerShell, Bash etc.).
Developing tools in C/C++, C#, Python, Java, PowerShell.
Developing, extending, or modifying exploits, shellcode or exploit tools.
Experience in reverse engineering malware advantage.
Fluent English (written and spoken).
Willingness to travel abroad.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7738967
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
20/05/2024
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a researcher to help us harness the power of our trillions of security signals to rapidly diagnose and alert the latest attacker behaviors, drive critical context-rich signals, construct new tools and automations to support customers, identify threats, and detect advanced attacker techniques.
Responsibilities:
Research innovative network attack vectors and lateral movement techniques in diverse environments & technologies, including Windows, cloud, virtualization frameworks, OT and more.
Study security mechanisms, implementation details and internals of various identity & access management technologies, identify potential security flaws of products and protocols
Perform comprehensive risk assessments of customers infrastructure to identify security issues and lateral movement paths
Develop new red-team techniques, tools and frameworks to discover and simulate attack scenarios
Demonstrate POCs based on your ideas and knowledge and lead the implementation process
Work closely with other internal engineering and AI teams to integrate new capabilities into our platform and guide cross-product architectural decisions
Act as a security subject matter expert for multidisciplinary teams
Requirements:
5+ years of experience in the cybersecurity landscape including penetration-testing or red teaming, including extensive experience in pentest methodologies and tools (Burp Suite, cobalt, metasploit, Kali linux..)
Deep understanding of security attacks and kill-chain, malwares, vulnerabilities and mitigations
Thorough knowledge of networking technologies and OS internals
Hands-on experience with penetration testing tools and methodologies
In-depth familiarity of the cyber-security attackers mindset
Coding and scripting skills
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7727805
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
13/05/2024
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Software Research Engineer to join our Operational Technology Content team.
In this role, you will take part in protecting our customers' OT environments from a wide range of cyber threats.
Your contributions will be directly impactful, not only ensuring our customers' success but also making a significant difference in the evolving landscape of OT security.
Your Opportunity:
Research OT/IoT threats, malware and exploitation tools
Develop effective threat detection rules and enhance our product's capabilities for better threat detection
Research newly published vulnerabilities and security advisories in order to develop new detection plugins for our OT Security product
Research, develop and improve methods of detection for currently unsupported OT/IoT devices
Requirements:
What you'll need:
In depth understanding of threat detection and exploitation techniques especially for OT/IoT devices
Strong experience with network analysis and threat detection software such as Suricata
Knowledge in protocol analysis
Knowledge in security assessment such as pentest, bug bounty or CTF
Robust programming skills
Ability to self-educate and keep up to date with current security trends and exploitation methods
Strong attention to detail and able to frequently shift priorities as needed
Good written and verbal communication skills
And ideally:
B.S. degree in Computer Science or a related field
2+ years of development experience
Experience in systems administration and open source tools
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7720130
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
12/05/2024
Location: Herzliya
Job Type: Full Time
We are looking for a Senior Red Team with a deep understanding of both information security and computer science. The right person will have to learn advanced concepts such as application manipulation, exploit development, and stealthy operations.
This is not a press the button type of job! This career is technical and challenging with opportunities to work in some of the most exciting areas of security on extremely technical and challenging work.
A typical job could be breaking into a segmented secure zone at a Fortune 500 organization, reverse engineering an application and both developing and exploiting the most recent vulnerabilities, all without being detected.
Responsibilities:
Global organization red-team assessments and security posture
Co-ordinate and execute systems and network level advanced red team exercises for different environments
Design and develop scripts, frameworks and tools required for facilitating and executing complex undetected attacks
Configure and troubleshoot security infrastructure devices
Develop technical solutions and new security capabilities to help mitigate security vulnerabilities and automate repeatable tasks
Write or assist with comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Requirements:
7+ years of experience leading penetration testing, application testing, and red team engagements
Experience with security tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools
Experience with scripting languages such as python, ruby, POSIX shell, as well as familiarity with programming languages such as: C/C++/ObjC/C#, Java, PHP, or .NET
Detailed technical knowledge in multi-security domains (Web, Network, OS, DB, IoT, Cloud, SCADA- advantage)
Knowledge in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
Expertise in performing advanced exploitation and post-exploitation attacks as part of ethical hacking exercises including writing proof-of-concept exploits and creating custom payloads and modules for common ethical hacking frameworks and tools
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7718819
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
08/05/2024
Location: Petah Tikva
Job Type: Full Time
Required Senior Vulnerability Researcher
What will you do:
The vulnerability researcher will explore different security aspects of new technologies and suggest novel ways to break and protect these technologies.
Vulnerability research of many interesting technologies and popular products. Everything could be an option, from Internal OS components to cloud SaaS services, from DevOps tools to Linux Containers, etc.
Focusing on finding identity-related vulnerabilities and new attack vectors on any kind of digital identity: human, application, and machine identities.
Development of exploitation and mitigation POCs and tools.
Working together with R&D and PM to shape our future features & products.
Initiate and help driving innovation around your research area.
Writing blog posts and presenting new research work at security conferences such as Blackhat, DEFCON, RSA.
Requirements:
What you need to succeed:
5+ years of experience in security research
Proven research skills: Vulnerability hunting, Red Teaming, Advanced PT, Reverse Engineering, etc.
Proven expertise in one or more of the fields: application security, Kernel security, cloud security, DevOps technologies, identity security components (MFA, OAuth, etc.), network protocols or web applications.
Ability to write blog posts, open-source tools, and present research work on conference stages.
Be part of a top research team, be able to collaborate, share insights, get and give tips.
How will you significantly stand out from the crowd
Previously published CVEs or blog posts and articles covering own research work.
Development experience.
Previous experience with presenting technical related material.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7715828
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
06/05/2024
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a highly motivated, fast learning researcher to focus on vulnerability research & exploitation in embedded environments.
In this roll you will acquire a deep understanding of proprietary and unique technologies.
A special opportunity to deep dive into embedded devices internals and the full understanding of functionality and design of IOT. You will also develop and utilize the knowledge acquired into the product and the production environment and provide end-to-end solutions in your domain.
Requirements:
3+ years of relevant industry experience as a vulnerability researcher or equivalent.
Extensive experience with a disassembler (IDA Pro or GHIDRA) and source-less debugging and OS internals.
Experience with complicated exploitation methods.
Experience in writing code in assembly, C, and Python.
Good understanding of common security mitigations.
Good understanding of network protocols and concepts.
Understanding of cryptography concepts.
Highly motivated and creative individual.
ADVANTAGES
Experience with RF communication schemes such as WiFi, Bluetooth, GPS
Experience with developing/researching in Android / iOS environments.
Understanding of OS internals
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7711432
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
נאספה מאתר אינטרנט
02/05/2024
Location: Rehovot
Job Type: Full Time
required
Junior Penetration Tester 
Entry Level
Full Time
Rehovot, Israel
we are now hiring a Penetration Tester. 
Tasks & Responsibilities:
* Performing penetration tests on several layers: web app, infra.
* After gaining some experience, scope will grow to include mobile apps & desktop apps.
* After gaining some experience communicating directly with clients as needed per the project scope.
* Performing penetration tests under white/grey/black box settings.
* Self-learning technologies in preparation for projects.
* Writing reports in formal, high-level English skills.
* Working with common protocols such as HTTP, DNS, FTP, etc.
Requirements:
This person must have the following characteristics:
* Self-driven
* Open-minded
* Thinks outside the box
* Great Time-Management skills
* Can start working with us immediately
 
Main Qualifications - Please do not apply if you do not have the following:
* Excellent English Communication skills both written and oral
        Fluent or Native in Hebrew
* Ability to respond and communicate with the team in real time as needed
 
Knowledge or Certificate of the following is a plus:
 
* Crypto & Blockchain PT
* Desktop Application PT
Certificates
* CPT
* GPen
* OSCP
* Pentest+
* CREST
 
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
7707885
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו