דרושים » אבטחת מידע וסייבר » Security Detection Engineer

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are seeking a talented, tech savvy Detection Engineer to join our Cyber Security team and elevate detection and response capabilities across cutting-edge systems.

Responsibilities

Lead initiatives to enhance our capabilities for effectively detecting and responding to security incidents.
Design, develop, refine detection rules, alerts, and dashboards across security platforms to identify malicious or suspicious behavior.
Deploy, manage, and maintain the infrastructure components of various detection platformsincluding indexers, search heads, forwarders, and clustersto ensure high availability, optimal performance, and scalability
Parse and analyze logs from endpoints, servers, network devices, cloud services, EDR/XDR, and more.
Automate detection pipelines and content deployment using Detection-as-Code methodologies and CI/CD frameworks.
Tune and optimize detection logic to minimize false positives and enhance alert fidelity.
Collaborate with different teams to continuously improve detection coverage.
Integrate with SOAR tools and workflows, developing playbooks that enhance speed and consistency of incident response.
Perform proactive threat hunting, alert triage, and incident investigations, leveraging threat intelligence and different cybersecurity frameworks.
Requirements:
Minimum 4 years in detection engineering, or equivalent roles.
SIEM proficiency: Hands-on experience with Splunk or Azure Sentinel is mandatory; working with both is highly desirable.
Familiarity with Detection as Code frameworks and CI/CD best practices.
Hybrid environment: Experience operating across Linux/Windows on-premises and cloud infrastructure.
Security fundamentals: Strong grasp of networking, operating systems, EDR/XDR, IDS/IPS, proxies, firewalls, and endpoint behaviour.
Analytical mindset: Able to distinguish between false positives and true alerts and continuously refine detections.
Collaboration & communication: Work effectively across teams to implement robust detection strategies.
Self‑driven: DIY approachadept at researching, building, and deploying solutions end‑to‑end.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8368233
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 15 שעות
דרושים בריקרוטיקס בע"מ
Job Type: Full Time and Hybrid work
As a Security Researcher, your primary focus will be on the inner workings of IOS and Android operating systems. Youll dive into codebases, analyze security mechanisms, and identify potential vulnerabilities.
In addition, youll work collaboratively with the team to develop protective strategies and contribute to ongoing innovations in mobile app security.
This role requires a keen analytical mind, a passion for research, and a drive for continuous improvement in the mobile security domain. Join us in shaping secure solutions for the future of mobile apps.
Requirements:
At least 2 years of experience in reverse engineering of large system /OS, preferably with IDA
At least 2 years of experience in C / C ++ programming
OS Internals/Low Level/ Kernel experience
Eager to take on challenging tasks
Curious and quick to learn on your own
Team player with good interpersonal skills
Advantages:
Experience in vulnerability research
Familiarity with assembly and ARM instruction set
Mobile apps development experience
Low-Level experience in IOS or Android
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8369944
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
1 ימים
דרושים בדיאלוג
סוג משרה: משרה מלאה
לחברה גלובלית מובילה בתחום המודיעין הדיגיטלי דרוש/ה Cloud Security Engineer.
החברה עוסקת בפיתוח פתרונות חדשניים לעיבוד מידע, אבטחה וניתוח נתונים בסקלות גבוהות. צוותי הפיתוח עובדים עם טכנולוגיות ענן מתקדמות, סביבות מולטי-קלאוד ו-Kubernetes. הזדמנות להשפיע על מוצרים בעלי השפעה ממשית בעולם האמיתי.
משרדי החברה במרכז הארץ, עבודה היברידית.
דרישות:
ניסיון של לפחות 3 שנים באבטחת ענן או תשתיות.
ניסיון מעשי מעמיק עם AWS ו-Azure (ניסיון עם GCP יתרון).
היכרות עם Kubernetes ו-workloads מבוססי קונטיינרים.
הבנה מעמיקה של מערכות Linux וארכיטקטורות רשת ענניות.
ניסיון בשילוב פתרונות אבטחה ב CI/CD pipelines (למשל Azure DevOps ).
ידע בכלים של Infrastructure-as-Code, ניתוח סטטי/דינמי וניהול חולשות.
יכולת מוכחת לעבודה משותפת עם צוותי DevOps, שירותים מקצועיים, IT ומחקר ופיתוח (R D). המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8340835
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for a talented, tech-savvy individual to join our Cyber Security team and help us tackle the toughest security challenges in cutting-edge ecosystem.

In this role, you will be a subject matter expert and play a major part in our efforts to build and maintain security infrastructure, design secure architectures, enforce security best practices, and automate security processes.

The Cyber Security team is composed of strong and experienced security engineers, responsible for defining the security strategy and managing all of infrastructure.

Responsibilities:

Define, implement, and maintain security policies, standards, and methodologies; ensure they evolve with new threats and technologies.
Design, deploy, and operate detection, prevention, and response technologies across a scaled, diverse, and complex environment (hybrid infrastructure: public cloud + on-premises).
Build and operate secure infrastructure: hands-on ownership of security configurations and system hardening.
Conduct security assessments, secure-design reviews and architecture assurance reviews to identify and mitigate possible security risks.
Automate security processes: configuration deployments, infrastructure management, detection, response, compliance checks, patching, configuration drift, etc.
Design, develop, and implement secure software development and deployment pipelines, incorporating best practices, automation, and CI/CD methodologies.
Stay ahead of emerging cyber threats and technologies: research, evaluate, pilot, and integrate where relevant.
Participate in creating incident response playbooks, coordinate incidents investigations, root cause analysis, and lessons learned.
Requirements:
6+ years of experience in security engineering, or equivalent.
Strong hands-on experience with security tools, services, deployment automation, and configuration management.
Demonstrated expertise in cloud security, including low-level design of secure cloud architectures (e.g., VPCs, network segmentation, endpoints, encryption).
Solid understanding of operating systems (Linux, Windows, macOS) and networking fundamentals (TCP/IP, DNS, VLANs, routing, etc.).
Well-versed in identity & access management: Conditional Access, Zero Trust, RBAC, identity lifecycle, access reviews, compliance, and governance.
Hands-on experience with infrastructure as code.
Experience securing microservices, containerized environments and serverless.
Strong knowledge of modern Secure Software Development Lifecycle (SSDLC) practices: threat modeling, secure design, code reviews, API security, SAST/DAST/SCA.
Programming/scripting skills to build automation, tools, and playbooks.
Self-motivated and autodidactic, with the ability to deliver solutions end-to-end as part of a do it yourself approach.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8368231
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 18 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
Our Security team is looking for a hands-on Cloud Security Specialist with a strong focus on Identity & Access Management (IAM) to help drive our security posture across cloud environments. In this role, youll be the go-to expert for IAM governance and cloud identity controls across AWS and GCP- enabling secure access at scale, while working closely with security, DevOps, and engineering teams to solve complex security problems.
The ideal candidate is highly motivated, demonstrates a can do' attitude and needs to have a combination of technical and communication skills, as well as the ability to handle a mix of multiple tasks including projects and technical work.
What you'll do:
Build and maintain secure role, permissions, and account structures aligned with least privilege and zero trust principles.
Manage and govern human and non-human (machine) access to sensitive SaaS applications (e.g., Okta, Git, etc.).
Monitor and improve cloud identity hygiene: users, roles, service accounts, federated access, and third-party integrations.
Automate detection and remediation of IAM misconfigurations and over-privileged identities.
Collaborate with DevOps and engineering to embed IAM best practices into infrastructure pipelines and app deployments.
Support incident response and investigations related to IAM abuse, access misuse, or privilege escalations.
Contribute to detection rules, playbooks, and cloud-specific DFIR processes.
Provide guidance during access reviews, role audits, and trust relationship validation.
Lead the design and enforcement of IAM controls across AWS and GCP.
Requirements:
4+ years of experience in security, with at least 23 years focused on cloud IAM, especially in AWS (IAM roles, policies, STS, Organizations, Identity Center, SCPs).
Experience managing IAM in GCP (service accounts, workload identity federation, custom roles).
Solid knowledge of IAM principles: least privilege, zero trust, RBAC/ABAC, identity lifecycle, and access governance.
Familiarity with DFIR in cloud environments: log analysis, alert triage, evidence collection, and investigations.
Hands-on experience with infrastructure-as-code (e.g., Terraform, CloudFormation).
Proficient in scripting (e.g., Python, Bash) for automation and IAM enforcement.
Proven experience collaborating with engineers, SREs, and IT to solve complex identity and access issues.
Excellent English communication skills verbal and written.
Self-starter with strong problem-solving skills and attention to detail.
Bonus Points:
Familiarity with Wiz or similar CSPM/CIEM platforms.
Certified AWS Security Specialty.
Experience in handling or supporting IAM-related incidents (escalations, investigations, remediation).
Experience with cloud-native detection tools (AWS GuardDuty, CloudTrail, GCP SCC, etc.).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8369794
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
29/09/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
CodeValue is looking for a skilled and experienced Security Architect to join our team and take a leading role in designing, implementing, and governing the security posture of our cloud and enterprise environments. This individual will work closely with cross-functional teams to ensure security is embedded across systems, applications, and workflows, aligning with industry best practices and compliance requirements.
Requirements:
Mandatory Qualifications
* At least 3 years of experience as a Security Engineer.
* Understanding of the Shared Responsibility Model
* In-depth knowledge of securing at least one cloud platform: AWS / Azure / GCP
* Understanding of Landing Zone and Well-Architected Best Practices
* Expertise in IAM (Identity and Access Management) network security (VPC, SG, FW).
* Experience in writing cloud policies (e.g., SCP Monitoring and logging (CloudTrail, GuardDuty, Security Hub).
* Strong understanding of general information security: security principles, encryption, risk management, incident response
* Scripting languages: Python / Bash / PowerShell
* Experience in configuring WAF Infrastructure as Code (IaC): Terraform / CloudFormation Preferred Qualifications:
* Experience in Kubernetes and container security Data security (encryption, KMS ), securing cloud services (e.g., EC2, Lambda, Containers
* Relevant certifications: AWS Certified Security – Specialty, Azure Security Engineer, CCSP (strong advantage).
* Familiarity with DevSecOps and code security tools (SAST/DAST)
* Experience with CSPM tools (e.g., Wiz, Orca Security, Prisma Cloud).
* Familiarity with SIEM tools (Splunk, Sentinel) and investigation capabilities.
* Experience securing Microsoft 365 services and Google Workspace
* Understanding of regulations and standards (GDPR, ISO 27001). Personal Skills Hands-on approach. Strong interpersonal communication skills and teamwork capabilities. High-level English proficiency.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8235613
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
We are looking for an embedded security researcher to join us in researching and developing cutting-edge cyber security projects.
Responsibilities
As an Embedded security researcher, you will be dealing with:
Embedded systems Reverse engineering.
Real-time Embedded End-to-End Low Level software developments on various unique embedded platforms and environments.
Requirements:
Deep understanding of embedded systems internals and operating systems.
5+ years of experience in real-time embedded systems development, writing code in C/C++ and Assembly.
Experience with embedded systems communication protocols, peripherals and debugging.
Experience in reverse-engineering using dis-assemblers (IDA Pro or GHIDRA).
Good knowledge of network communication protocols and topologies.
Experience in Python scripting.
Highly motivated and very creative individual.
Experience in vulnerability research - advantage.
Graduate of an elite technological unit in the IDF - advantage.
Bachelor's degree in computer science or engineering - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8369428
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Herzliya
Job Type: Full Time
For a leading team, we are looking for a Vulnerability Researcher to research and develop cutting-edge cyber projects.
We are facing extremely complex technological challenges and need talents to help us overcome them.
Do what you love
As a Vulnerability Researcher, you will be conducting top-notch security research on one of the most prominent operating systems in the market.
In this role you will be:
Playing a major role as part of our vulnerability research group
Research operating systems internals, kernel, application codebases, vulnerabilities, and exploits.
Design and implement the full chain solution while integrating with state-of-the-art security solutions of different domains.
Requirements:
2+ years of relevant industry experience as a Vulnerability Researcher or equivalent
Experience with writing code in assembly and C or Python.
Experience with a dis-assembler for Vulnerability Research (IDA Pro or GHIDRA)
Familiarity with common exploitation methods
Good understanding of OS internals (Mac, Windows, Android etc)
Familiarity with common security mitigations
Highly motivated and creative individual
Advantages:
Graduate of an elite technological unit in the IDF
Bachelor's degree in computer science or software engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8369434
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
Do you want to shape the future of API security?
Would working with cutting-edge security products excite you?
Join the company API Security team!
our company, through our dynamic team from the Noname and Neosec acquisitions, is changing how web APIs are protected and monitored. We're looking for an experienced product manager to join our product development and GTM efforts, working across the entire spectrum of API Security product execution.
Achieve high-impact milestones contributing to our success
Help shape our industry-leading API security product!
As a Senior Product Manager, you will be responsible for:
Shipping product strategy and roadmap and aligning it with stakeholders, the company vision, and market trends.
Working directly with customers and the field to understand problems, personas, and gather feedback
Collaborating with engineering to define and deliver new features
Working with the product marketing team to develop effective business and market communications that emphasize product value.
Requirements:
To be successful in this role you will:
Have 4+ years of product management experience in web-app or API cybersecurity.
Have an in-depth understanding of how the web and web APIs work.
Possess Possesses excellent communication and presentation skills in English and in Hebrew.
Have an analytical mindset and phenomenal problem-solving skills.
Demonstrate confidence in communication skills and be willing to participate in presentation information to various stakeholders.
Possess a creative thinker with a sharp eye for detail and design.
Know how to cut through the noise and prioritize quickly and correctly.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8360913
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
We seek an embedded security researcher to join us in developing cutting-edge cybersecurity projects.
Responsibilities:
As an Embedded security researcher, you will be dealing with:
Embedded systems reverse engineering.
Kernel drivers research and development.
Real-time Embedded End-to-End Low-Level software developments on various unique embedded platforms and environments.
Requirements:
Deep understanding of embedded systems internals and OS.
5+ years of experience in real-time embedded systems development, writing code in Rust / C / C++ / Assembly.
Experience in reverse-engineering using disassemblers (IDA or GHIDRA).
Deep knowledge of network communication protocols and topologies.
Highly motivated and very creative individual.
Advantages:
Experience in vulnerability research.
Graduate of an elite technological unit in the IDF.
Bachelor's degree in computer science or engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8369432
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Herzliya
Job Type: Full Time
For a leading team, we are looking for a Security Researcher to research and develop cutting-edge cyber projects.
We face highly complex technological challenges and need talents to help us overcome them.
Do what you love
As a vulnerability researcher, your main focus will be on vulnerability discovery and exploitation of most prominent OS`s in the market, and on various challenging platforms.
Requirements:
4+ years of relevant industry experience as a vulnerability researcher or equivalent.
Experience with writing code in assembly or c and Python.
Experience with a dis-assembler for vulnerability research (IDA Pro or GHIDRA).
Experience with complicated exploitation methods.
Deep understanding of OS internals (Mac, Windows, Android etc.).
Good understanding of common security mitigations.
Highly motivated and creative individual.
Advantages:
Graduate of an elite technological unit in the IDF
Bachelor's degree in computer science or software engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8369433
סגור
שירות זה פתוח ללקוחות VIP בלבד