משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 5 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for a Security Researcher.
As a Security Researcher, you will:
Be a part of the OPSEC department which is in charge of research, design, development and enforcement of advanced OPSEC solutions
Be in charge of the operational security research of a cyber intelligence product
Conduct advanced analysis of operating system internals, including binary and architectural evaluation, security testing and exploit mitigation research
Define product requirements, alert mechanisms and working procedures
Requirements:
Strong knowledge of operating system internals
At least 2 years of experience in one or more of the following areas: malware research, mobile forensics or vulnerability research
At least 2 years of experience with advance static and dynamic analysis tools (e.g., IDA Pro, Ghidra, Radare2, Binary Ninja, Hopper or similar tools)
At least 2 years of experience with ARM64 assembly and low-level debugging (e.g., LLDB, GDB)
Software development skills in at least one programming language: Objective-C, swift, C/C++
B.Sc. in a technological field or a relevant IDF background
Ability to work independently and as a part of a team
It would be great if you also have:
Familiarity with mobile security testing methodologies and security hardening techniques
Experience with network analysis tools, such as Wireshark, Fiddler and Burp
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8326091
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 8 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
For a leading team, we are looking for a Vulnerability Researcher to research and develop cutting-edge cyber projects.
We are facing extremely complex technological challenges and need talents to help us overcome them.
Do what you love
As a Vulnerability Researcher, you will be conducting top-notch security research on one of the most prominent operating systems in the market.
In this role you will be:
Playing a major role as part of our vulnerability research group
Research operating systems internals, kernel, application codebases, vulnerabilities, and exploits.
Design and implement the full chain solution while integrating with state-of-the-art security solutions of different domains.
Requirements:
2+ years of relevant industry experience as a Vulnerability Researcher or equivalent
Experience with writing code in assembly and C or Python.
Experience with a dis-assembler for Vulnerability Research (IDA Pro or GHIDRA)
Familiarity with common exploitation methods
Good understanding of OS internals (Mac, Windows, Android etc)
Familiarity with common security mitigations
Highly motivated and creative individual
Advantages:
Graduate of an elite technological unit in the IDF
Bachelor's degree in computer science or software engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8325435
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
04/08/2025
Location: Herzliya
Job Type: Full Time
Required Principal Security Researcher - MDA Research
Come and be part of a dynamic team focused on securing cutting-edge AI and cloud technologies in a rapidly evolving threat landscape. We are leading new initiatives and research projects across AI Security, Identity Protection, and SaaS Defense, and this role offers a unique opportunity to help define the rules of the game. AI is transforming the way we interact with computers and machines and defining new cybersecurity problems and opportunities - we are looking for a Principal Researcher who can help us stay ahead of the curve.
In this role, youll research and build defenses across AI systems, agentic protocols, Identity platforms, and SaaS applications. One day you might analyze a new class of AI prompt injection attacks or Agents abuse, the next youll be hunting through data or creating novel protection mechanisms for them. Youll work closely with product teams to turn research prototypes into real security features.
Join our threat protection research team and be part of a team who contributes to our most advanced and innovative security solutions. Our mission is to help everyone to counter cyber threats by strengthening their security capabilities across their entire environment, including Identities, Agentic AI systems, Cloud and Applications.
Our mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond
Responsibilities
Research and develop detection methods for new and advanced attack techniques -from exploits to implants. Build end-to-end PoCs, from offensive testing to scalable detection, across all our cloud and identity platforms.
Stay up to date on the latest attack trends and build strong detections across the kill chaincovering agentic AI & LLM threats, cloud and identity-based attacks.
Collaborate with multiple product and engineering teams to design the next iteration of security products, implement detection ideas and validate their effectiveness using a data-driven approach.
Collaborate with data science teams to drive ML based protections, understand, and identify detection gaps, capabilities, assumptions, and improvements.
Provide cybersecurity expertise as needed during security escalations and incidents to help protect us and our customers.
Requirements:
10+ years of computer security industry experience with knowledge of adversary tradecraft, security operations, incident response, threat hunting, and of emerging threats and techniques for attacks against modern cloud environments. 
4+ years of experience researching, prototyping, and driving engineering requirements for threat protection systems.
BSc. or M.Sc. in Computer Science, Software Engineering, or relevant practical experience (e.g. service in elite technology unit in IDF).
Code fluency in either C#, Python or Rust.
A drive to tackle hard problems with level of ambiguity.
Strong knowledge of the security threat landscape, with experience in the modern attacker kill chain and MITRE ATT&CKespecially in cloud, application, identity, and AI-related threat scenarios.
Team player open to ideas and enjoys working with others to achieve shared goals.
Experience leading a project from start to finishincluding idea, design, coding, testing, and ongoing maintenance.
Familiarity with cloud environments, and hybrid cloud enterprise services.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8288333
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
5 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time and Hybrid work
we are looking for a Cyber Security Expert with hands-on experience in offensive security, possessing strong technical capabilities, in-depth knowledge of adversary simulation, and a passion for Red Team operations.
Responsibilities:
Participate in Red Team assessments that simulate real-world threats and remain undetected by the client's defensive team. These stealth operations simulate advanced adversaries and require careful planning, execution, and OPSEC
Lead or co-lead portions of internal and external offensive assessments, including perimeter exploitation and post-exploitation in Active Directory
Perform Purple Team engagements to help clients improve their monitoring and detection capabilities while sharpening your own offensive skills
Document attack paths, risk analysis, technical findings and remediation guidance in detailed reports tailored to both technical and executive audiences.
Collaborate with the team to develop and maintain internal tooling, scripts, and documentation for offensive operations
Continuously research and test new techniques, tools, and attack paths to further enhance Red Team capabilities
Requirements:
2+ years of hands-on experience in offensive security, red teaming, or penetration testing
Hands-on experience with C2 frameworks (e.g., Cobalt Strike, Mythic, Sliver)
Strong understanding of Active Directory, domain escalation paths, Kerberos, trust relationships, GPO abuse, credential access, etc.
Proficiency in various offensive techniques such as Relay Attacks, Coercion, Kerberos Attacks, Privilege Escalation, etc.
Familiarity with network protocols (e.g., SMB, DNS, LDAP, HTTP) and system internals (Windows and Linux)
Strong understanding of OPSEC considerations during covert operations
Ability to present and produce clear and actionable technical reports and documentation in English
Experience working in client-facing roles or as part of structured engagements
Proficient in one or more scripting/programming languages: Python, PowerShell, C#, or C++
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8320510
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/08/2025
Location: Herzliya
Job Type: Full Time
Data has never been more valuable and vulnerable. As cybercriminals become more sophisticated and regulations more strict, organizations struggle to answer one key question: Is my data safe?"
At our company, we see the world of cybersecurity differently. Instead of chasing threats, we believe the most practical approach is protecting data from the inside out. Weve built the industrys first fully autonomous Data Security Platform to help our customers dramatically reduce risk with minimal human effort.
At our company, we move fast. Were an ultra-collaborative company with brilliant people who care deeply about the details. Together, were solving interesting and complex puzzles to keep the worlds data safe.
We work in a flexible, hybrid model, so you can choose the home-office balance that works best for you.
Responsibilities
Team Leadership
Lead and mentor a team of top notch cloud security researchers.
Foster a culture of innovation, collaboration, and excellence within the team.
Provide technical guidance and support to team members.
Research and Development
Conduct advanced research in cloud security, focusing on emerging threats, vulnerabilities, and mitigation strategies.
Analyze logs and behavior of user activities on Cloud Environments & SaaS Applications
Hunt threat actors & insider threats
Optimizing existing algorithms to reduce false positives and increase the value of our products
Lead the publications of cyber security oriented blogs and articles
Drive the development of new security technologies and methodologies for cloud environments.
Stay updated with industry trends and advancements in cloud security.
Collaboration:
Collaborate with product management, engineering, and other stakeholders to implement your team latest research
Work closely with development teams to integrate security features into our product
Communicate research findings and recommendations effectively
Security Strategy:
Contribute to the development and implementation of cloud security strategies and policies
Assess and mitigate risks associated with cloud deployments and operations.
Ensure compliance with industry standards and regulations related to cloud security.
Requirements:
Cybersecurity professional with 5+ years experience as on-prem/cloud security researcher
Proven experience in leading technical teams and driving research projects with 2+ years management experience.
Knowledge and experience researching IaaS platforms like AWS, Azure or GCP (advantage)
Knowledge and experience researching SaaS and IDP platforms (advantage)
Experience with identifying and analyzing trends or patterns related to security incidents and abnormal behaviors
In-depth understanding of an organizations security, risks, and potential attack vectors in all the organizations perimeters
Understanding security issues, attack vectors, and related security trends
Strong knowledge of SQL language
3+ years of Hands-on experience in programming and scripting (C++/Python)
Passion for conducting Value-to-customers-driven research
Must possess strong verbal & written communication skills in English
Problem-solving skills in an effective and creative way while maintaining a prominent level of flexibility
Experience with data analysis of large data sets.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8307010
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 6 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
Want to make an instant impact?
Be a part of the top cyber research teams in the industry and make the world a better place!
As a Vulnerability Researcher, you will be:
Work with top-notch researchers using the latest technologies
Research low-level mechanisms, finding vulnerabilities and circumventing modern mitigation techniques
Requirements:
Vulnerability research and exploit development experience
Strong analytical and problem-solving skills
Knowledge of programming languages: Assembly, C and Python
Experience with reverse engineering tool
It would be great if you also have:
B.Sc. in Computer Science or equivalent
Relevant military experience
Knowledge of mobile devices internals/Linux kernel/Win internals
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8325910
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
04/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
We're looking for a passionate security researcher ready to make a real-world impact by protecting global enterprises from devastating cyberattacks. As part of our Israeli research team, you'll hunt through diverse signals across on-premises, hybrid and cloud environments, uncovering advanced threats, research emerging attack techniques, design next-generation protection systems, and develop detection logic that ensures no compromise goes unnoticed. This is your chance to stay steps ahead of advanced adversaries while building autonomous defense capabilities that protect organizations worldwide.
Our team values diversity and strives to hire individuals with varied experiences and perspectives. We understand that no candidate possesses every desired skill and experience, but together, we form a strong, effective team.
Our mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
Responsibilities
Investigate and analyze advanced attack techniques, ransomware operations, and extortion tactics to develop a deep understanding of adversary tradecraft and TTPs (Tactics, Techniques, and Procedures).
Proactively hunt through diverse signal sources across on-premises, hybrid, and cloud environments to uncover sophisticated threats before they cause damage.
Design and implement innovative detection algorithms and automated disruption capabilities that can autonomously identify and neutralize threats across the entire kill-chain.
Drive forward-thinking approaches to cybersecurity challenges, continuously exploring new methodologies to enhance our autonomous protection capabilities.
Work closely with security research, engineering, and product teams to share insights, collaborate on complex investigations, and develop comprehensive protection strategies.
Author technical blogs and present in security conferences that establish thought leadership of Defender in the security community.
Requirements:
Bachelor's Degree in Statistics, Mathematics, Computer Science or related field, or equivalent experience.
At least 5 years of hands-on experience in security research, with practical expertise in cloud security and hybrid environments.
Knowledge of the cybersecurity threat landscape, and modern attacker kill-chains, as mapped in frameworks like MITRE ATT&CK.
Experience in analyzing large-scale security telemetry to detect and investigate malicious attack patterns.
Proficiency in at least one programming language, such as C#, Python, with ability to develop production-ready detection logic.
Excellent verbal and written communication skills, with the ability to present complex research findings to technical and cross-functional stakeholders.

Preferred Qualifications 
Experience in offensive or adversary simulation research, particularly in hybrid or cloud-native environments. 
Demonstrated contributions to the security community through public research, presentations, blogs, or open-source projects. 
Applied knowledge of Windows internals, or relevant operating system security concepts. 
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8288311
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 6 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for a Low-Level Team Leader.
As a Low-Level Team Leader, you will:
Lead features end-to-end starting at the design phase, through development and integration with other R&D groups
Join a dynamic team and be able to adjust to the fast pace of how things are done
Learn new working methods, OS internals, etc.
Requirements:
2+ years of managerial experience as a team leader and/or tech lead
Experienced in working across multiple interfaces, coordinating effectively between teams and stakeholders to ensure seamless execution
Dev. experience in the cyber security domain (offensive and/or defensive)
At least 3 years experience in C/C++/Objective C
Knowledge of the internals of a major OS: Linux/Windows
Sc. in Computer Science or relevant IDF background (8200s or MAMRAMs programming courses)
It would be great if you also have:
Experience in software design and architecture
Experience in Reverse engineering
Experience in network protocols
Experience in Embedded/RT systems
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8326021
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 8 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
For a leading team, we are looking for a Security Researcher to research and develop cutting-edge cyber projects.
We face highly complex technological challenges and need talents to help us overcome them.
Do what you love
As a vulnerability researcher, your main focus will be on vulnerability discovery and exploitation of most prominent OS`s in the market, and on various challenging platforms.
Requirements:
4+ years of relevant industry experience as a vulnerability researcher or equivalent.
Experience with writing code in assembly or c and Python.
Experience with a dis-assembler for vulnerability research (IDA Pro or GHIDRA).
Experience with complicated exploitation methods.
Deep understanding of OS internals (Mac, Windows, Android etc.).
Good understanding of common security mitigations.
Highly motivated and creative individual.
Advantages:
Graduate of an elite technological unit in the IDF
Bachelor's degree in computer science or software engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8325430
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
Join our research and development team as a Digital Forensics and Incident Response Researcher within the company's MDDR Research team. In this role, you will play a crucial part in cyber defense, specifically focusing on conducting research on big data and Investigation algorithms. Your primary responsibilities will revolve around research and development of forensic investigations on big data, demanding a high level of proficiency in coding, particularly in Python.
As a key contributor, you will closely collaborate with our global DFIR, and engineering teams, actively participating in product development and reinforcing our global team operations. This role requires substantial experience in digital forensics and incident response, making your expertise essential in delivering advanced research capabilities.
If you are passionate about cybersecurity and have an extensive background in DFIR and development experience, this is the perfect opportunity for you to make an impact and advance your career. Join us on the front lines of cyber defense and help protect our customers from the ever-evolving threat landscape.
Responsibilities
Conduct research on big data and develop complex Investigation algorithms.
Collaborate closely with our engineering teams to enhance functionality of our security platform to better support your research.
Evaluate the success and accuracy of your research, identifying areas for improvement in the process.
Study and analyze threats discovered by our global DFIR team, contributing to a comprehensive understanding of emerging cyber threats.
Requirements:
3+ years of experience working in DFIR/Research roles.
High-level of proficiency in coding, particularly in Python (PySpark).
Demonstrate knowledge of Windows and Linux forensic techniques, tools, and concepts.
Strong knowledge of network architecture fundamentals (Proxies, NAT, firewalls, IDPS, DMZ, etc.) as well as common network protocols and applications (TCP/UDP, DNS, HTTP/S, etc.)
Strong technical foundation of standard Information Technology concepts and services, including active directory environment.
Experience working with multiple enterprise security solutions (e.g., SIEMs, Firewalls, IDPS, AV/EDRs, IAM, DLP, etc.)
Proven success contributing to a team-oriented environment.
Strong critical thinking, deductive reasoning, problem-solving, and prioritization skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8307005
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 9 שעות
Location: Herzliya
Job Type: Full Time
We are looking for an embedded security researcher to join us in researching and developing cutting-edge cyber security projects.
Responsibilities
As an Embedded security researcher, you will be dealing with:
Embedded systems Reverse engineering.
Real-time Embedded End-to-End Low Level software developments on various unique embedded platforms and environments.
Requirements:
Deep understanding of embedded systems internals and operating systems.
5+ years of experience in real-time embedded systems development, writing code in C/C++ and Assembly.
Experience with embedded systems communication protocols, peripherals and debugging.
Experience in reverse-engineering using dis-assemblers (IDA Pro or GHIDRA).
Good knowledge of network communication protocols and topologies.
Experience in Python scripting.
Highly motivated and very creative individual.
Experience in vulnerability research - advantage.
Graduate of an elite technological unit in the IDF - advantage.
Bachelor's degree in computer science or engineering - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8325410
סגור
שירות זה פתוח ללקוחות VIP בלבד