רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

חוקר סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
5 טיפים לכתיבת מכתב מקדים מנצח
נכון, לא כל המגייסים מקדישים זמן לקריאת מכתב מק...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were seeking a Senior Security Researcher to drive end-to-end research initiatives that strengthen our companys detection capabilities. In this role, youll investigate emerging attack surfaces, craft and implement innovative detection logic, and test your findings in real-world environments. Its a hands-on position ideal for someone eager to transform research insights into effective, production-grade security defenses.
Responsibilities
Research AI Agent and LLM-related risks, such as prompt injection and jailbreaking and implement sophisticated detection strategies.
Conduct research on cloud, web, and API security to uncover new threats and attack vectors.
Develop, refine, and design world-class detection logic and rules to enhance our company's runtime protection.
Perform threat-hunting activities across large data sources to identify emerging attack patterns
Drive full-cycle research: from hypothesis and experimentation to production validation.
Collaborate with engineering and product teams to deliver actionable insights.
Requirements:
4+ years in security research, including cloud, web, or API security.
Experience in detection engineering and building or working with detection-driven security products.
Strong coding and data analytics skills in scripting and programming languages such as Python, JavaScript and bash, and proficiency with SQL-like queries.
Solid grasp of security principles, cloud security, and runtime defense.
Curiosity, creativity, and a self-driven approach to research.
Experience tinkering with LLMs and AI security - a strong plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8510054
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
For a leading team, we are looking for a Security Researcher to research and develop cutting-edge cyber projects.
We face highly complex technological challenges and need talents to help us overcome them.
Do what you love
As a vulnerability researcher, your main focus will be on vulnerability discovery and exploitation of most prominent OS`s in the market, and on various challenging platforms.
Requirements:
4+ years of relevant industry experience as a vulnerability researcher or equivalent.
Experience with writing code in assembly or c and Python.
Experience with a dis-assembler for vulnerability research (IDA Pro or GHIDRA).
Experience with complicated exploitation methods.
Deep understanding of OS internals (Mac, Windows, Android etc.).
Good understanding of common security mitigations.
Highly motivated and creative individual.
Advantages:
Graduate of an elite technological unit in the IDF
Bachelor's degree in computer science or software engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509780
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
We seek an embedded security researcher to join us in developing cutting-edge cybersecurity projects.
Responsibilities
As an Embedded security researcher, you will be dealing with:
Embedded systems reverse engineering.
Kernel drivers research and development.
Real-time Embedded End-to-End Low-Level software developments on various unique embedded platforms and environments.
Requirements:
Deep understanding of embedded systems internals and OS.
5+ years of experience in real-time embedded systems development, writing code in Rust / C / C++ / Assembly.
Experience in reverse-engineering using disassemblers (IDA or GHIDRA).
Deep knowledge of network communication protocols and topologies.
Highly motivated and very creative individual.
Advantages
Experience in vulnerability research.
Graduate of an elite technological unit in the IDF.
Bachelor's degree in computer science or engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509775
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
A young, innovative, fast-growing company engaged in cyber research and security solutions. We are unlike any other company you have ever worked for. We do what no one else does, and we have great fun doing it.
We are looking for an embedded security researcher to join us in researching and developing cutting-edge cyber security projects.
Responsibilities
As an Embedded security researcher, you will be dealing with:
Embedded systems Reverse engineering.
Real-time Embedded End-to-End Low Level software developments on various unique embedded platforms and environments.
Requirements:
Deep understanding of embedded systems internals and operating systems.
5+ years of experience in real-time embedded systems development, writing code in C/C++ and Assembly.
Experience with embedded systems communication protocols, peripherals and debugging.
Experience in reverse-engineering using dis-assemblers (IDA Pro or GHIDRA).
Good knowledge of network communication protocols and topologies.
Experience in Python scripting.
Highly motivated and very creative individual.
Experience in vulnerability research - advantage.
Graduate of an elite technological unit in the IDF - advantage.
Bachelor's degree in computer science or engineering - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509754
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/01/2026
Location: Tel Aviv-Yafo and Netanya
Job Type: Full Time
We are looking for an experienced Vulnerability Researcher to lead our world-class vulnerability research team. As a Vulnerability Researcher Team Lead at our company, you will perform research and responsible disclosure on the latest open-source software, working with your team to find flaws in the most popular components today. The position requires proven experience in vulnerability research, both on web applications and native applications.
As a Vulnerability Researcher Team Lead at our company you will...
Research zero-day vulnerabilities in open-source projects and popular web applications
Manage a team of senior researchers, setting the teams research targets and methodologies
Manage the coordinated disclosure process for vulnerabilities identified by the team
Write & review technical blogposts for vulnerabilities identified by the team
Speak in the most important global security conferences about vulnerabilities identified by the team.
Requirements:
3+ years of vulnerability research experience in open-source projects
3+ years of vulnerability research experience in web applications
Experience in team management
Experience in writing technical vulnerability blogs
Advantage - Experience in binary reverse engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509724
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/01/2026
Location: Tel Aviv-Yafo and Netanya
Job Type: Full Time
our company Security is one of the main pillars of the company offering and long-term strategy. We are pushing the boundaries of security analysis of both binaries and code, shifting left and bringing new and exciting features to both developers and DevOps. We are looking for a Security Researcher to join the team. As a researcher, you will perform security research on open-source projects in both web and low-level technologies. You will define how to identify exploitable security issues in an automated manner and develop code for that purpose.
As a Security Researcher at our company you will
Research CVEs and 1-day vulnerabilities in various programming languages and ecosystems
Define how to automatically find exploitable vulnerabilities & develop code that identifies the instances where a vulnerability is exploitable
Perform security research on various open-source technologies, frameworks, and libraries
Write technical reports regarding all research subjects mentioned above.
Requirements:
At least 2 years of experience as a Security Researcher
Vulnerability research experience in any of the following languages: Python, Node.JS, Java, C
Experience with code exploitation (for example, Penetration testing in backend environments or web applications, or binary exploitation)
Programming experience in Python
Experience in writing technical reports
Experience in binary reverse engineering - an advantage
DevOps experience - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509714
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/01/2026
Location: Ramat Gan
Job Type: Full Time
Alice is seeking an experienced Malware Research Director to build and manage multiple teams dedicated to malware research. This role presents an exciting opportunity to establish a new operation from the ground up, creating processes, optimizing and setting up cross-team collaboration while serving as the primary client interface. The position is primarily leadership, client-facing, creating solutions and requiring exceptional team-building and operational setup skills. The ideal candidate demonstrates high technical skills, proven experience in building teams from scratch, establishing new operations, and strong client relationship management capabilities. Key Responsibilities:
* Establish operational processes, workflows, and quality standards for the new teams
* Coordinate with other departments to integrate the new operation into the existing infrastructure
* Serve as primary client interface, managing relationships and ensuring client satisfaction
* Present research findings and malicious evidence to clients and stakeholders
* Advise on technical aspects for malware research challenges and automated solutions
* Create training programs and onboarding processes for new team members
* Develop performance metrics and evaluation frameworks for team effectiveness
* Lead client meetings, requirement discussions, and project planning sessions
* Collaborate with sales and business development teams on client engagements

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.



Hybrid:
No
Requirements:
Must-Have:
* Management experience - managing at least 10 employees for a minimum of 2 years, with extensive experience in recruiting and building teams
* Strong client-facing experience with excellent presentation and communication skills
* At least 3 years of proven experience in one of the following: malware research, reverse engineering, penetration testing, embedded software development
* Understanding of malware research principles and the cybersecurity landscape
* Experience managing client relationships and delivering technical solutions to business stakeholders
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
* Excellent spoken and written English.
Nice-to-Have:
* Android malware research / reverse engineering hands on experience from the last 3 years
* Experience in leading multiple teams comprising of a few dozen employees
* Experience in leading cybersecurity researchers or other research operations
* Experience establishing new departments or research operations within organizations
* Background in technical sales or business development in cybersecurity
* Experience presenting to C-level executives and technical stakeholders
* Experience with decompilers, debuggers, and disassemblers (e.g., JADX, JEB, LLDB, GDB, x86dbg, Ghidra, IDA Pro)
* Familiarity with instrumentation frameworks like Frida or Xposed
* Proficiency with HTTP debuggers, MITM tools, and network analyzers (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark, Little Snitch, mitmproxy)
* Understanding of network communications and protocols
* Familiarity with multiple programming languages (Java, C/C++, JavaScript, Python)
* Familiarity with multiplatform development frameworks such as Unity, Flutter and React Native
* Under
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375228
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/01/2026
Location: Ramat Gan
Job Type: Full Time and Hybrid work
As a GenAI Security Researcher, you’ll dive deep into the challenges of AI safety, conducting redteaming operations to identify vulnerabilities in generative AI systems and their infrastructure. You will conduct redteaming operations for finding and addressing risks to ensure AI models are robust, secure, and future-proof. As a Security Researcher, you will:
* Conduct sophisticated black-box redteaming operations to uncover vulnerabilities in generative AI models and infrastructure.
* Design new techniques to bypass the latest AI security mechanisms.
* Evaluate and strengthen the security of AI systems, identifying weaknesses and collaborating to implement improvements.
* Work with cross-functional teams to automate security testing processes and establish best practices.
* Stay ahead of emerging trends in AI security, ethical hacking, and cyber threats to ensure we’re at the cutting edge.

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.



Hybrid:
Yes
Requirements:
Must Have
* 3+ years in offensive cybersecurity, especially focused on web applications and API security OR Advanced Ph.D. Candidates with a proven record of research in AI/Cybersecurity
* Strong programming and scripting skills (e.g., Python, JavaScript) relevant to AI security.
* In-depth understanding of AI technologies, particularly generative models like GPT, DALL-E, etc.
* Solid knowledge of AI vulnerabilities and mitigation strategies.
* Excellent problem-solving, analytical, and communication skills. Preferred Skills That Set You Apart:
* Certifications in offensive cybersecurity (e.g., OSWA, OSWE, OSCE3, SEC542, SEC522) OR Master's degree and above in Computer Science with a focus on Data Science or AI.
* Experience in end-to-end product development, including infrastructure and system design.
* Proficiency in cloud development.
* Familiarity with AI security frameworks, compliance standards, and ethical guidelines.
* Ability to thrive in a fast-paced, rapidly evolving environment.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375232
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/01/2026
Location: Ramat Gan
Job Type: Full Time
What We Are Looking For As a Red Team Specialist focused on GenAI models, you will play a critical role in safeguarding the security and integrity of commercial cutting-edge AI technologies. Your primary responsibility will be to analyze and test commercial GenAI systems including, but not limited to, language models, image generation models, and related infrastructure. The objective is to identify vulnerabilities, assess risks, and deliver actionable insights that strengthen AI models and guardrails against potential threats. Key Responsibilities
* Execute sophisticated and comprehensive attacks on generative foundational models and agentic frameworks.
* Assess the security posture of AI models and infrastructure, identifying weaknesses and potential threats.
* Collaborate with security teams to design and implement effective risk mitigation strategies that enhance model resilience.
* Apply innovative testing methodologies to ensure state-of-the-art security practices.
* Document all red team activities, findings, and recommendations with precision and clarity.

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.

Hybrid:
Yes
Requirements:
Must-Have
* Strong understanding of AI architecture, frameworks and agentic applications.
* Hands on experience in AI vulnerability research.
* Minimum of 3 years of experience in offensive cybersecurity, with a focus on penetration testing.
* Exceptional analytical, problem-solving, and communication skills.
* Ability to thrive in a fast-paced, dynamic environment. Nice-to-Have
* Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field.
* Advanced certifications in offensive cybersecurity (e.g., OSWE, OSCE3, SEC542, SEC522).
* Proficiency in Python.
* Webint / OSINT experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375262
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
18/01/2026
Location: Bnei Brak
Job Type: Full Time and Hybrid work
We are looking for a Cyber Hunter and Technical Leader to build a next-generation Insider Risk program. You will lead a team of analysts and engineers, utilizing AI-driven behavioral analytics and cutting-edge Data Security Posture Management tools to detect anomalies in behavior .
As the Team Lead for Insider Risk & Data Defense, you will hold one of the most critical mandates in the organization: safeguarding our proprietary data, financial assets and trust aware culture.
What Youll Do:
Lead the "Internal Hunter" strategy: define the roadmap for the Insider Risk function, manage day-to-day operations, and mentor a team of high-performing analysts and engineers.
Architect and operate advanced protection suites: serve as the technical owner for DLP (Microsoft Purview), Insider Risk and DSPM solutions to visualize data flow and block unauthorized movement.
Build AI-driven risk models: leverage Machine Learning (ML) to establish user behavior baselines and detect subtle deviations indicative of account compromise, data exfiltration, or sabotage.
Oversee high-stakes investigations: manage the full incident lifecycle from initial alert and digital forensics to Root Cause Analysis (RCA) and executive reporting.
Drive automated response (SOAR): develop playbooks that trigger "containment" actions (e.g., revoking access, isolating endpoints) when high-confidence malicious activity is detected.
Optimize signal-to-noise ratio: relentlessly tune SIEM and UEBA logic to ensure the team is hunting real threats.
Harden lifecycle security: collaborate with IT and HR on "Joiner, Mover, Leaver" processes to ensure access is strictly governed at every stage of the employee journey.
Enable deep visibility: ensure telemetry coverage across all critical systems-from employees to privileged IT staff-to eliminate blind spots.
Requirements:
5-6+ years of experience in cybersecurity, investigations, or risk analytics
2+ years in a leadership role (Team Lead or acting lead), with a passion for mentoring and developing talent
Knowledge of insider threat frameworks (CERT, NIST, ISO) and behavioral monitoring concepts
Experience working with internal stakeholders (HR, Legal, Compliance, IT, Security Operations)
Understanding of access governance, user activity telemetry, and internal policy enforcement
Strong communication skills - able to translate technical findings into clear business risk
Strategic mindset with strong attention to detail and operational execution
Investigative Mindset - You know how to connect the dots between digital logs
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8506395
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
18/01/2026
Location: Herzliya
Job Type: Full Time
As a Detection & Researcher Team Lead, you will:
Lead detection, investigation and mitigation of cybersecurity incidents, including deep network traffic and data analysis
Develop and maintain scripts for data parsing, packet analysis and correlation across multiple data sources
Leverage open-source tools and frameworks to support threat attribution and research
Build and maintain integrations with APIs, threat-intel feeds and big-data platforms to enhance visibility and detection capabilities
Document research findings, detection methods and analysis techniques for technical and non-technical stakeholders.
Requirements:
2+ years of managerial experience as a team leader and/or tech lead
At least 2 years of experience in incident response, SOC operations, or a related cybersecurity role
Strong knowledge of networking fundamentals and the MITRE ATTACK framework
Experienced in working across multiple interfaces, coordinating effectively between teams and stakeholders to ensure seamless execution
Programing/scripting experience in one or more languages, e.g., Python, Go, Ruby, Bash, PowerShell or Java
Experience with Big Data analysis platforms and security monitoring tools for log analysis and investigation
Practical experience with OSINT (Open-Source Intelligence) tools and methodologies for threat hunting, attribution or intelligence gathering
It would be great if you also have:
Experience responding to incidents in large-scale or complex environments
Hands-on experience with cloud-based infrastructure
Prior work in operational security or a related discipline.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8505423
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced, visionary Cyber Research Team Lead to guide and grow a multidisciplinary cyber research team. You will lead a group of domain experts - from network engineers and identity specialists, to red-teamers, protocol researchers, penetration testers, data analysts and cloud/virtualization experts - working collaboratively to build our next-gen AI-based posture management platform. As team lead, you will both manage the team and shape the research agenda: coordinating cross-domain investigations, defining priorities, mentoring researchers, and ensuring that research output feeds directly into scalable, intelligent workflows and product capabilities.
If youre passionate about cyber research, enjoy nurturing technical talent, and thrive on building complex, multi-domain security products - this is your chance to build and lead a research team that defines how AI defends modern enterprise infrastructure.
:Responsibilities
Lead, mentor, and coordinate a diverse, multi-domain cyber research team.
Define and drive the teams research agenda, establishing multi-domain security research priorities aligned with company goals and product roadmap.
Translate research findings into actionable AI-based deliverables - such as automated workflows and agentic flows integrated into the AI-based posture management product.
Coordinate and work in multidisciplinary squads to build customer facing product, ensuring real-world relevance and impact.
Maintain research excellence and innovation culture - encourage internal knowledge-sharing, code/tool reuse, and continuous learning.
Recruit, grow, and manage talent -identify skill gaps, hire new researchers, mentor researchers, and foster a collaborative, high-performance team environment.
Stay current with emerging cyber threats, infrastructure trends (cloud, virtualization, identity systems), adversarial techniques and AI-driven security trends - and evolve research strategies accordingly.
Requirements:
7+ years of hands-on cybersecurity research, including leadership of multidisciplinary teams.
Strong technical depth in multiple security domains, such as (but not limited to):
-Network security: protocols, traffic analysis, lateral movement.
-Identity/IAM: AD, Azure AD/Entra, Kerberos, OAuth/OIDC, SAML, privilege escalation.
-Cloud & virtualization: AWS/Azure/GCP, Kubernetes, container and hypervisor security.
-Offensive research: exploit development, red teaming, protocol reverse engineering.
Ability to review and guide complex research, validate PoCs, and challenge technical assumptions.
Proven experience translating research into product-ready deliverables.
Strong understanding of attacker TTPs in the context of complex large-scale enterprise networks.
Excellent leadership and communication skills - able to mentor experts, drive priorities, and coordinate cross-functional work with engineering and product.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8504174
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/01/2026
Location: Herzliya
Job Type: Full Time
As a Security Researcher, you will:
Be a part of the OPSEC department which is in charge of research, design, development and enforcement of advanced OPSEC solutions
Be in charge of the operational security research of a cyber intelligence product
Conduct advanced analysis of operating system internals, including binary and architectural evaluation, security testing and exploit mitigation research
Define product requirements, alert mechanisms and working procedures.
Requirements:
Strong knowledge of operating system internals
At least 2 years of experience in one or more of the following areas: malware research, mobile forensics or vulnerability research
At least 2 years of experience with advance static and dynamic analysis tools (e.g., IDA Pro, Ghidra, Radare2, Binary Ninja, Hopper or similar tools)
At least 2 years of experience with ARM64 assembly and low-level debugging (e.g., LLDB, GDB)
Software development skills in at least one programming language: Objective-C, swift, C/C++
B.Sc. in a technological field or a relevant IDF background
Ability to work independently and as a part of a team
It would be great if you also have:
Familiarity with mobile security testing methodologies and security hardening techniques
Experience with network analysis tools, such as Wireshark, Fiddler and Burp.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8503962
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/01/2026
Location: Herzliya
Job Type: Full Time
e a part of the top cyber research teams in the industry and make the world a better place!
As a Vulnerability Researcher, you will be:
Work with top-notch researchers using the latest technologies
Research low-level mechanisms, finding vulnerabilities and circumventing modern mitigation techniques.
Requirements:
Vulnerability research and exploit development experience
Strong analytical and problem-solving skills
Knowledge of programming languages: Assembly, C and Python
Experience with reverse engineering tool
It would be great if you also have:
B.Sc. in Computer Science or equivalent
Relevant military experience
Knowledge of mobile devices internals/Linux kernel/Win internals.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8503939
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are on an expedition to find you, someone who is passionate about turning research into reliable, production-grade capabilities. Youll play a major role in building and shaping our next-gen CTI platform across attribution, pivoting, infrastructure prediction, EASM, and the STIX/OpenCTI knowledge base.
:Responsibilities
Execute the CTI research roadmap across attribution, infra prediction, EASM, and the STIX knowledge base.
Design and implement graph-pivoting, attribution heuristics, and temporal/link models (sequence/survival/Hawkes-style).
Build high-signal EASM detectors: passive discovery and safe active probing per ROE; capture reproducible evidence.
Normalize, enrich, and deduplicate intel into STIX 2.1 aligned to our ontology; maintain/enhance TAXII/OpenCTI/MISP connectors.
Ship detectors/models and enrichment services with AI/Platform teams; contribute tests, docs, and runbooks.
Curate datasets, define ground truth, and evaluate KPIs (coverage, lead-time, precision/recall, FPR); iterate to improve signal-to-noise.
Produce watchlists, concise briefs, and early-warning hypotheses for stakeholders and priority investigations.
Uphold governance, ethics, provenance, and data-quality standards.
Requirements:
4-7+ years in CTI/EASM/offensive research or adversary-infra analysis.
DNS, BGP/ASNs, TLS/PKI & CT logs, hosting/CDN/cloud patterns, domain lifecycle, phishing ecosystems.
Communities/embeddings/clustering; temporal/link modeling and practical evaluation.
Passive discovery and safe active probing; evidence discipline and noise reduction.
STIX 2.1, ATT&CK, TAXII; advantage for OpenCTI/MISP; ontology alignment and validation.
Python (pandas, notebooks, scikit-learn, networkx/igraph); Neo4j/Elasticsearch; Kafka/SQS/Redis; Docker/Kubernetes.
Prompting/tool-use for extraction/normalization; agentic patterns with guardrails and sanity checks.
Analytical writing; collaborative, version-controlled workflow (Git); documentation rigor.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8503766
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו