רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

חוקר סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
כל מה שרציתם לדעת על מבחני המיון ולא העזתם לשאול
זומנתם למבחני מיון ואין לכם מושג לקראת מה אתם ה...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
The Threat Intelligence group, a key member of the company Research department, leads global threat research efforts, and improves threat coverage across the evolving cyber threat landscape.
The group focuses on understanding and tracking cybercriminal organizations, nation-state (APT) actors, hacktivist activity, active malware campaigns, and emerging adversary trends. The research produced by the team supports both strategic insight and the development of advanced security technologies.
This role is responsible for conducting in-depth cyber threat landscape research and owning the full intelligence research lifecycle-from intelligence collection through analysis and written output.
Key Responsibilities
Research and analyze cyber threat actors.
Be the first to flag trends, new malware, threat actors and intelligence items that stand out in the crowd
Execute the full intelligence research lifecycle:
Monitoring and analyzing the digital underground - including the DarkNet, the DeepWeb, and other open and restricted sources
Gather & flag intelligence that stands out.
Assess, validate, and refine raw information into high-confidence insights
Produce clear, well-structured written research and threat assessments
Build, maintain, and continuously evaluate a diverse set of reliable intelligence sources
Identify long-term trends, relationships, and shifts in adversary behavior
Conduct deep intelligence collection operations and collect proprietary intelligence
Collaborate with other researchers and internal stakeholders to contextualize findings and improve threat coverage
Maintain high analytical and research standards, including sourcing, attribution, and methodological rigor.
Requirements:
At least 3 years of experience in Cyber Threat Intelligence (CTI) or cyber threat research
Deep understanding of cyber threat landscape and cybercriminal and hacktivists ecosystems: actors and groups, motivations and goals, tools and capabilities, attacks and campaigns
Proven experience across the full threat intelligence research lifecycle (collection, validation, analysis, production, and dissemination)
Strong WEBINT research and virtual HUMINT operations skills, including source discovery, validation, and long-term source management.
Excellent analytical abilities, strong attention to detail, and critical thinking skills
Strong written communication skills, with the ability to present complex research clearly and accurately
Ability to work independently as well as collaboratively within a research team
Big Plus
Knowledge of Russian, Spanish, Portuguese or Mandarin.
Familiarity with MITRE ATT&CK or similar frameworks
Experience publishing external threat research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8650193
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
our company Research (CPR) is looking for a Threat Researcher to join its Threat Intelligence Analysis (TIA) team. The team is responsible of discovering, analyzing and tracking advanced threat actors and campaigns, with a strong focus on high-end cybercrime and state-sponsored activities. You will join a team of motivated, independent & highly technical individuals and contribute the effort to protect our company customers and empower the company brand.
Key Responsibilities
Identify, understand and monitor advanced campaigns using publicly available sources as well as internal telemetry.
Analyze malware and other hacking tools utilized by threat actors in active campaigns and intrusions.
Create technical research content for public and private intelligence reports.
Help build protections and detections based on deep understanding of advanced threat actors Tactics Techniques and Procedures (TTPs).
Collaborate with other security teams to assist threat intelligence and research tasks.
Requirements:
Your Knowledge & Skills
3+ years of experience as a threat researcher, incident responder, malware analyst, detection engineer or other relevant roles.
Practical experience in tracking state-sponsored or advanced financially motivated actors - including malware, infrastructure and TTPs.
Profound knowledge and understanding of malware and common attacking techniques.
Hands-on experience in automating and optimizing hunting and enrichment processes using code (preferably Python).
Familiarity with query languages and data exploration tools.
Ability to translate technical findings into actionable detection and prevention signatures.
Experience in writing technical blog posts and technical analysis reports.
Experience in public speaking and presentation of research in cyber security conferences .
Fluent English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8650182
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for proactive, analytical, talented people to join the Security Content team.
As a Research Engineer (Security Network & Apps), you will add content to our security and network products such as NGWF, CASB, DLP, and more.
Using agentic AI tools (Claude code, Cursor) and modern big data analysis frameworks (Redash, Athena), and network and web analysis tools to analyze network protocols and application traffic.
Joining us is an excellent opportunity for network security enthusiasts who are passionate about the future of Networking and Security.
Responsibilities:
Research and analyze network and application behavior as part of our security products (NGFW, CASB, DLP, and more).
Lead cross-team projects to deliver product development outcomes in partnership with Engineering and Product.
Focus on the customers impact and understand the business perspective.
Suggest and conduct new research vectors.
Work with AI tools and coding agents to automate your work and improve efficiency.
Utilize Catos Data Warehouse with big-data technologies to support your work.
Requirements:
5+ years of hands-on experience in the cyber/security/network industry.
Knowledge of networking architecture, OSI model, and protocols (TCP/IP, DNS, TLS, HTTP).
Experience with SQL or data analysis tools (Kibana, Elastic,etc).
Experience with at least one scripting language, such as Python.
Experience (Hands-on) with Wireshark and PCAP analysis or similar tools.
Used AI tools and coding agents for research, development, and validation- Big advantage.
Experience with signature development for IPS, Firewall, iOT protection, etc - Big advantage
Researcher mindset: define a thesis and validate it based on in-depth analysis and technical facts.
Team player, responsible, critical thinker, and well-organized.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8647695
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a high-energy, talented people to join the Security team. As a Security Engineer, you will take part in product content development and build logics and signatures to mitigate emerging security threats. Your work outcome will feed our Cloud security products such as the IPS and Suspicious Activity Monitoring with the latest protections. You will analyze protocols and investigate various attacks utilizing network analysis tools and modern data analysis frameworks. Joining us is an excellent opportunity for network security enthusiasts who are passionate about the future of Networking and Security.
Responsibilities:
Research and analyze new threats and develop product content such as IPS signatures and logic to provide the best protection for our customers.
Enhance product accuracy and its ability to detect new threats in the dynamically-changed security landscape.
Monitor your work using different monitoring tools and methods over the cloud.
Utilize our Data Warehouse with big-data technologies to support your work.
Requirements:
2-4 years of hands-on experience in the cyber-security industry.
Knowledge of networking architecture and protocols (TCP/IP, DNS, SSL, HTTP).
Understand the cyber-security landscape, and common attack scenarios: Malware C&C, Drive-by attacks, Phishing, Network scans, etc.
Experience (Hands-on) with Wireshark and PCAP analysis.
Experience with signature development for IPS and Firewall - Advantage
Experience with at least one scripting language such as Python or Ruby - Advantage
Analytic spirit: define a thesis and validate it based on in-depth analysis and technical facts.
Excellent English and communication skills.
Team player, responsible, and well-organized.
B.Sc.. in Computer Science, Information technology or Mathematics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8647686
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for an experienced Network & Security Researcher to join our team. Youll investigate how modern networks behave at scale-diving deep into protocols, traffic patterns, and path performance-to design data-driven improvements that enhance reliability, efficiency, and user experience across our global network. Youll develop analysis tooling, run large-scale measurements on top of our big-data platform, and share findings internally and externally.
Responsibilities:
Build tools & pipelines: Develop analysis tools, datasets, and reproducible pipelines to support research at scale.
Deep protocol analysis: Perform in-depth studies of protocol behavior (TCP congestion control, QUIC/HTTP/3, HTTP/2, DNS, DHCP) including edge cases, timeouts, retransmissions, handshake dynamics, and head-of-line effects.
Network measurement & modeling: Analyze latency, jitter, loss, throughput, and path selection. Build models and KPIs that explain and predict performance.
Experimentation: Design controlled experiments and A/B tests; reproduce findings in lab environments (emulation/simulation) and validate on real traffic.
Collaboration with engineering: Translate research into product improvements and platform capabilities; deliver clear specs and reference implementations.
Communication & thought leadership: Publish results (internal reports, blog posts, talks), create visualizations, and-when relevant-contribute to community.
Requirements:
Education: BSc + MSc in Computer Science
Networking expertise (must): Strong foundations in computer networking and Internet protocols: TCP/IP, QUIC/HTTP/3, HTTP/2, DNS, RDP, DHCP, routing (BGP/OSPF/IS-IS), MPLS, NAT, load balancing.
Data & coding (must): Proficiency in at least one programming language (e.g., Python, Go, or Java) and solid SQL skills; comfort working with large datasets and time-series analysis.
Big-data & analytics: Experience with big-data platforms and frameworks (e.g., Spark) and databases (NoSQL/relational such as Elasticsearch, MongoDB, MySQL, AWS Athena).
AI/ML for network analytics: Practical experience applying machine learning to packet/flow/time-series data-feature engineering, clustering/segmentation, anomaly detection, forecasting, and causal analysis-to model performance and inform routing/QoS optimizations; proficiency with Python data stack (pandas, NumPy, scikit-learn); familiarity with PyTorch or TensorFlow is a plus.
Tools: Hands-on experience with Wireshark, tcpdump/tshark, Scapy, iperf; ability to craft custom parsers and automate experiments.
Excellent English and communication skills
Team player, responsible, and well-organized.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8647559
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/05/2026
Location: Ramat Gan
Job Type: Full Time
Were looking for a highly skilled Application Security Researcher to join our Security Research group and help us push the boundaries of modern AppSec. This is a critical, hands-on role where youll work closely with engineers, researchers, and AI & data scientists to build the next generation of application security - including autonomous, agentic pentesting capabilities.
This is not a typical AppSec role. Youll be building, breaking, and redefining how offensive security works at scale.
What Youll Be Doing:
Design and build detection engines and decision-making logic for autonomous security systems
Develop new classes of automated attacks leveraging deep application and infrastructure context
Conduct advanced research on chaining vulnerabilities, logic flaws, and complex attack paths
Prototype, build, and ship security capabilities into production environments
Collaborate with Product, Engineering, and Data teams to shape next-gen security features
Analyze large-scale data to identify attack opportunities and improve detection accuracy
Actively contribute to research direction, ideation, and innovation within the team
Requirements:
4+ years of experience in Application Security, Penetration Testing, Red Teaming, or Secure Development
Strong knowledge of common vulnerabilities (OWASP Top 10, etc.) and remediation techniques
Experience with code-level analysis and modern development stacks
Strong programming skills and hands-on technical capabilities
Deep understanding of how systems break and how to exploit them
Ability to communicate complex technical concepts clearly
Team player who thrives in fast-paced, high-impact environments
Familiarity with DevSecOps practices or security automation tools
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8647310
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We're looking for an Application Security Researcher to join us. In this critical role, you will assist us in validating our services and environments according to the highest security standards. Also, You will work closely with our R&D and Product teams, and solve complex security problems.
Responsibilities:
Continuously checking and improving security measures to protect our systems.
Reviewing system architecture, design, and code to find and fix security weaknesses before they become a problem.
Helping developers follow secure coding practices and learn how to prevent security risks.
Staying updated on new security threats and best practices to keep our security standards high.
Contributing to our security research blog.
Requirements:
At least 3 years of experience in application security or vulnerability research.
Hands-on experience in penetration testing for web, mobile, infrastructure, and thick client applications.
Experience bypassing security tools like RBI, EDR, and DLP.
Programming skills, with a preference for Java, Go, or C.
Ability to find and fix security flaws in open-source libraries and third-party software.
Knowledge of supply chain attacks and how to prevent them.
Hands-on experience with AWS cloud attacks and mitigations (preferred).
Understanding of microservices architectures, Docker, and Kubernetes.
Strong problem-solving skills and the ability to work independently.
Good communication skills and a passion for sharing knowledge.
Understanding of network security and encryption protocols.
Additional Skills (Preferred):
Experience using SAST/DAST tools for static and dynamic code analysis.
Experience working in Agile teams and collaborating with different departments.
Security certifications like OSCP, CRTP, OSWE, or similar.
Ability to lead security projects and initiatives.
Adaptability to a fast-paced environment.
Knowledge of current security threats and how to defend against them.
Experience with writing security blogs, CVE research, or bug bounty programs is a plus.
BSc in Computer Science- an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8646380
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/05/2026
Location: Ramat Gan
Job Type: Full Time
We are seeking a highly motivated and technically proficient Senior Penetration Tester to join our security research division. This role is dedicated to performing advanced offensive security assessments and developing evaluation mechanisms. You need to be independent, attentive to details, organized, eager to learn new things, and eager to research and solve complex problems. What youll do:
* Lead and execute comprehensive, technically rigorous penetration tests targeting complex web applications, modern API architectures, and enterprise systems.
* Engage in sophisticated Red Team projects, development of elaborate automations, and evaluation strategies.
* Contribute substantively to the design, development, and maintenance of proprietary internal security tools and automation frameworks to enhance the efficiency of offensive operations.
 
About us:
We are a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact-whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, we provide end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
* Minimum of 5 years of proven, hands-on experience in application security analysis and Web penetration testing.
* Proficiency in developing and automating tasks using at least one language like Python andJavaScript.
* Strong experience with static and dynamic analysis of coding languages such as Python, JavaScript, JAVA.
* Deep, hands-on knowledge of the latest tactics, techniques, and procedures (TTPs) used in advanced penetration testing and network analysis.
* Ability to author comprehensive and technically rigorous reports detailing identified vulnerabilities and research outcomes.
Nice to have:
* OSWE, eWPTXv2, OWEE, OSWA or other high-level offensive certifications.
* Demonstrated online achievements, write-ups, or contributions on platforms such as HackTheBox, Pwn2Own, TryHackMe, Bug Bounty programs, or published security research.
* Experience in Agentic development.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8645047
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/05/2026
Location: Herzliya
Job Type: Full Time
PlaxidityX is looking for a brilliant Security Researcher to join our elite team. In this role, you will combine offensive research with product innovation. You will conduct in-depth research and penetration testing on Automotive ECUs , uncovering vulnerabilities at both the hardware and software levels. Additionally, you will act as the 'Red Team' for our vehicle protection systems , simulating sophisticated attacks to ensure our detection capabilities stay ahead of global threats.
?What You’ll Do: ECU & Low-Level Research: Conduct deep-dive security research into Automotive Electronic Control Units (ECUs). Automotive Offensive Research: Analyze automotive protocols and architectures to identify, develop, and implement end-to-end attack vectors. Red Teaming: Serve as the internal adversary for our vehicle protection products. You will execute attacks to validate detection efficacy and provide the offensive 'ground truth' needed to improve our security logic. Collaborate with Data Scientists: Work closely with our Data Science teams to fine-tune AI-based detection features, helping to translate complex exploit behaviors into actionable data features.

Advantages:
Data Science & AI: Experience working with data teams, understanding of feature engineering, or experience fine-tuning AI models based on security domain expertise. OS Internals: High level of expertise in Linux / QNX / Android internals (both user and kernel space). Product Security: Experience building or testing Intrusion Detection/Prevention Systems (IDS/IPS) or EDR/XDR platforms. Automotive Knowledge: Understanding of automotive-specific protocols (CAN, Automotive Ethernet, UDS, etc.) and the ability to implement functional attacks against them.
Requirements:
Offensive Mindset: Proven experience in exposing and exploiting vulnerabilities in complex systems. Embedded Expertise: Hands-on research experience with embedded/low-level systems. Network Communication Expertise: Deep understanding of the logic and vulnerabilities within network protocols and the ability to implement functional attacks against them. Security Fundamentals: Strong grasp of cybersecurity principles, including cryptography. Programming: Strong scripting and development skills in Python (for research/tooling) and C/C++ (for exploit development). Execution: A "get-things-done" attitude; self-driven and thrives in fast-paced, problem-solving environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8535362
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/05/2026
Location: Ramat Gan
Job Type: Full Time and Hybrid work
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response.
You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8643586
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Are you passionate about dissecting the intersection of Identity, SAAS, and Cloud infrastructure? We are looking for a visionary Security Researcher to join our team and redefine how organizations understand and mitigate risks across their SaaS and Cloud ecosystems. In this role, you will be investigating the fundamental ways services are utilized and how their configurations can be exploited by modern adversaries. You will bridge the gap between abstract SaaS & cloud architecture and real-world attack execution, transforming complex research into actionable guidance. If you thrive on deconstructing TTPs and building the blueprints for resilient service usage, this is your opportunity to lead the charge in a world-leading cybersecurity company.
Key Responsibilities
Lead ongoing investigations into the risks associated with SaaS, Identity and Cloud platforms, focusing on how these services are integrated within broader environments.
Analyze the functional 'how-to' of cloud services to identify inherent risks and develop robust strategies for secure implementation and usage.
Stay ahead of the curve by researching real-world attacker methodologies and translating these behaviors into practical mitigation strategies.
Design and execute high-fidelity attack simulations in lab settings to observe adversarial behavior firsthand, specifically focusing on identity-based and SaaS.
Create comprehensive research outcomes that guide customers on how to use services securely from the ground up.
Foster a culture of excellence within a diverse team of experts, sharing insights that influence the next generation of cloud and identity security products.
Requirements:
Required Qualifications
Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
Strong understanding of modern adversary TTPs and attack methodologies.
Experience with designing and executing simulated attack scenarios in lab environments.
Preferred Qualifications
Proven experience in security research, specifically focusing on SaaS, Identity Providers (IdP), or Cloud platforms.
History of public-facing research, such as conference presentations or blog posts.
Experience with reverse engineering and vulnerability analysis.
Proficiency in one or more programming languages like Python or Go.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639339
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
The Cortex Threat Intelligence team is responsible for maintaining an up-to-date overview of the ever-changing threat landscape and its effects on the Cortex product suite. This includes the collection, analysis, and dissemination of technical threat intelligence from multiple internal and external sources. As part of this role, you will identify detection opportunities, automate threat intelligence processes, and develop tools and methodologies to increase team productivity. our companys Cortex XDR is a market-leading platform with an almost unparalleled telemetry data lake. Our team is deeply data-driven; it is the ideal environment for analysts who are enthusiastic about data mining, tracking threat actors, and deconstructing complex cyberattacks.
Key Responsibilities
Monitor the global threat landscape using diverse sources to proactively identify potential coverage gaps and improve Cortex XDRs defensive posture.
Perform in-depth research into cyberattack techniques to provide actionable insights and suggestions for improving product capabilities.
Leverage our companys telemetry datasets to identify emerging attack patterns and hunt for novel threats.
Design and propose robust detection logic across multiple operating systems (Windows, macOS, Linux).
Partner with cross-functional teams within our company to communicate findings and co-develop security enhancements.
Transform technical intelligence into high-impact deliverables, including customer-facing reports, research articles for the company blog, or presentations at international security conferences.
Requirements:
Required Qualifications
4+ years of experience in at least one of the following fields: Threat Intelligence, Threat Hunting, Malware Analysis, Security Research, SOC (Level 3), or Incident Response.
Deep understanding of the cyber threat landscape, including advanced malware and threat actor techniques. A strong command of the MITRE ATT&CK framework is a must.
Strong proficiency in Python, specifically for automating data collection via APIs and performing data analysis.
Proven experience using BigQuery or SQL-based languages to query massive datasets and identify anomalies.
Strong understanding of OS internals (e.g., processes, registry, memory, file system events) and OS event logs.
Hands-on experience simulating attacks or performing static and dynamic malware analysis in a controlled lab environment.
Analytical Mindset: Ability to analyze large amounts of technical data, extract crucial details, and draw meaningful conclusions.
Independence: Ability to work independently, lead projects to fruition, and collaborate across the company with other departments.
High proficiency in English, both verbal and written.
Preferred Qualifications
Experience in OSINT or intelligence analysis (e.g., military intelligence).
Experience with EDR/XDR platforms, YARA, or Sigma rules.
Strong presentation and public speaking skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639332
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Join a team redefining cloud security operations across Cloud Detection & Response (CDR) and Cloud Security Posture Management (CSPM). Our team operates at the intersection of security, engineering, and large-scale cloud operations. We build products that help organizations detect threats faster, respond with confidence, continuously reduce risk, and secure modern cloud environments at scale. This is an opportunity to help shape the future of autonomous cloud defense by building technology that turns security signals into meaningful action.
Key Responsibilities
Help build the next generation of the Autonomous Cloud SOC by transforming detections, posture findings, and emerging threats into intelligent investigation and response workflows.
Design and build automated playbooks that investigate security signals, gather evidence, assess blast radius, validate risk, and guide or execute response actions.
Work across cloud control planes, identity systems, Kubernetes environments, network telemetry, and posture data to turn signals into high-confidence outcomes.
Leverage existing detections, continuously improve investigation logic, and ensure response workflows remain effective as cloud environments and attacker techniques evolve.
Requirements:
Required Qualifications
4+ years in security engineering, cloud operations, incident response, threat hunting, DevSecOps, or related security disciplines.
2+ years of hands-on experience securing or operating environments within Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Infrastructure (GCI/GCP).
Strong experience with Kubernetes, containers, and modern cloud-native architectures.
Deep understanding of cloud networking concepts, including VPC Flow Logs, Transit Gateways, service meshes, and traffic patterns (East-West vs. North-South).
Strong comprehension of identity systems (IAM) and how policies interact with network controls to establish secure boundaries.
Experience with CI/CD pipelines and modern software delivery practices.
Proven experience with incident triage, investigations, containment, remediation, or formal operational response processes.
Experience with posture management, governance controls, or applying security best practices such as CIS Benchmarks and recognized cloud architecture frameworks.
Strong scripting or programming proficiency in languages such as Python, Go, or Bash.
Excellent communication skills, demonstrating the ability to clearly explain complex findings and facilitate alignment across cross-functional teams.
Preferred Qualifications
Experience working with large-scale data pipelines and analytics platforms such as BigQuery or Dataflow.
Familiarity with threat frameworks such as MITRE ATT&CK.
Recognized expertise or advanced certifications in cloud security, detection and response, or posture management across Amazon Web Services, Microsoft Azure, or Google Cloud.
Experience operating highly available, large-scale cloud environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639165
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Researcher to join our Windows EDR behavioral detection team. You will create statistics-based classification algorithms to detect new malware, process behavior anomalies, and attackers in enterprise networks using data from multiple Windows endpoints. This involves analyzing attack patterns, finding statistical anomalies, and validating detections against real attacks and APTs on customer data.
Key Responsibilities
Research new methods to detect various attack techniques by utilizing enormous amounts and varied types of data.
Use and develop statistical algorithms and techniques to create and improve our analytics detection capabilities.
Take an active role in our collection modules by improving existing ones and investigating new ones to improve detection quality.
Simulate attacks in the lab and conduct a deep analysis of the behavior.
Be part of a diverse research group, improving our research processes to create a better product.
Stay up to date with APTs, attacker methodologies, and TTPs.
Requirements:
Required Qualifications
In-depth knowledge of the inner-workings of operating systems (Especially Windows).
Intimate knowledge and understanding of attack methods and techniques over endpoints and enterprise networks.
Vast experience and interest in malware research or development.
Python software development experience.
Comfortable conducting research and gathering insights by querying large databases.
Ability to drive and own projects.
Independent and team player, critical thinker.
Preferred Qualifications
Experience in machine learning or data analysis.
Reverse engineering knowledge and experience.
Advanced knowledge of Microsoft AD infrastructure.
Exploitation knowledge and experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639144
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/05/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Are you an innovative security researcher with a deep understanding of the cyber threat landscape and a passion for protecting modern environments? Do you want to tackle the challenge of securing enterprise networks against evolving threats?
We are seeking a highly skilled professional to focus on the critical, fast-paced domain of Virtualization Security. As a foundational member of a newly formed and growing team, you will explore the 'blue ocean' of threat detection, pioneering next-generation capabilities within the worlds largest cybersecurity enterprise. This is a unique opportunity to apply your expertise and influence the future of threat prevention-helping us build cutting-edge security solutions from the ground up.
Key Responsibilities
Conduct deep research into virtualization technologies, and targeted attacks to fortify our attack prevention mechanisms.
Stay current with the latest attacker methodologies, APT campaigns, and Tactics, Techniques, and Procedures (TTPs) targeting virtualization systems.
Analyze emerging threats and malware to identify new techniques and formulate effective detection and prevention strategies.
Leverage AI and big data methodologies to investigate and analyze extensive datasets across our customer base.
Design cutting-edge protection components and develop sophisticated detection rules to enhance the effectiveness of our security solutions.
Drive the research and development of novel protection concepts, seeing them through to production-grade quality, and serve as a subject matter expert in the field.
Play a pivotal role in shaping the future of our security product offerings.
Collaborate closely with Engineering, Product Management, and other research teams to seamlessly translate research findings and insights into new production features.
Requirements:
Required Qualifications
5+ years of experience in cybersecurity research, with a proven track record of impactful projects.
B.Sc. or M.Sc. in Computer Science, Software Engineering, Computer Engineering, or equivalent military experience required
Hands-on experience in real-world threat hunting, incident response, or detection engineering.
Solid knowledge of the cyber threat landscape, modern malware techniques, and APTs.
Proficiency in programming languages such as Python, Go, Java, or other relevant languages.
Strong understanding of OS internals (Windows, Linux, and macOS, for example).
Excellent problem-solving skills and a passion for cybersecurity innovation.
Ability to work independently, take initiative, and collaborate effectively in a team environment.
Preferred Qualifications
Experience with virtualization platforms or understanding of virtualization-related attacks (e.g., focused on ESXi/vCenter).
Proven background in security solution development, particularly within the EDR/XDR space.
Proficiency in reverse engineering, including practical experience with disassembly and debugging tools.
Demonstrated experience utilizing advanced techniques like statistics, machine learning, or complex data analysis for security-related applications.
Experience with vulnerability research or development within the Linux environment.
Experience with research or development focused on Linux internals.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639135
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו