דרושים » אבטחת מידע וסייבר » One of the best Cyber security companies is looking for a Security Researcher!

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 18 שעות
דרושים בקבוצת נישה
Job Type: Full Time and Hybrid work
Located in Tel Aviv, hybrid
Temp position for 12 months!

We are looking for an Email Security Research Analyst to join our team. This position reports to the Manager of Email Security Research and is an excellent opportunity for a talented individual to contribute to a fast-growing company in a truly international environment.

Your Impact:
?Perform data labeling to support the development and evaluation of AI-driven prompts for advanced analysis of emerging email threats.
?Maintain, and enhance research infrastructure, including automation, tooling, and data pipelines to accelerate hunting and detection development.
?Investigate and resolve customer issues related to email-borne threats and detection gaps
?Conduct proactive threat hunting to identify and analyze in-the-wild campaigns.
Requirements:
?Bachelors degree in progress or completed in Computer Science, an engineering discipline, Cybersecurity, or a related field or 1+ years of relevant experience in security research, data analysis, or threat detection.
?Hands-on experience with SQL, Python, and security research tooling.
?Familiarity with BigQuery or other SQL-based querying languages.
?Previous experience in security research, analysis, SOC, or penetration testing roles (advantage).
?Experience identifying, investigating, and responding to complex attacks (advantage).
?Strong attention to detail with a proactive, can-do attitude (must).
?Ability to thrive in a dynamic, fast-paced environment and manage multiple priorities.
?Proven ability to collaborate with high-performing teams, both internal and outsourced.
This position is open to all candidates.
 
Hide
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8380632
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/10/2025
חברה חסויה
Location: Ramat Gan
Job Type: Full Time and Hybrid work
As a Red Team Specialist focused on Generative AI Models, you will play a critical role in enhancing the security and integrity of our cutting-edge AI technologies. Your primary responsibility will be to conduct analysis and testing of our generative AI systems, including but not limited to language models, image generation models, and any related infrastructure. The goal is to identify vulnerabilities, assess risks, and provide actionable insights to fortify our AI models and guardrails against potential threats. Key Responsibilities:
* Simulated Cyber Attacks: Conduct sophisticated and comprehensive simulated attacks on generative AI models and their operating environments to uncover vulnerabilities.
* Vulnerability Assessment: Evaluate the security posture of AI models and infrastructure, identifying weaknesses and potential threats.
* Risk Analysis: Perform thorough risk analysis to determine the impact of identified vulnerabilities and prioritize mitigation efforts.
* Mitigation Strategies: Collaborate with development and security teams to develop effective strategies to mitigate identified risks and enhance model resilience.
* Research and Innovation: Stay abreast of the latest trends and developments in AI security, ethical hacking, and cyber threats. Apply innovative testing methodologies to ensure cutting-edge security practices.
* Documentation and Reporting: Maintain detailed documentation of all red team activities, findings, and recommendations. Prepare and present reports to senior management and relevant stakeholders.
About:
We are the leading provider of security and safety solutions for online experiences, safeguarding more than 3 billion users, top foundation models, and the worlds largest enterprises and tech platforms every day. As a trusted ally to major technology firms and Fortune 500 brands that build user-generated and GenAI products, we empower security, AI, and policy teams with low-latency Real-Time Guardrails and a continuous Red Teaming program that pressure-tests systems with adversarial prompts and emerging threat techniques. Powered by deep threat intelligence, unmatched harmful-content detection, and coverage of 117+ languages, we enable organizations to deliver engaging and trustworthy experiences at global scale while operating safely and responsibly across all threat landscapes.
Hybrid:
Yes
Requirements:
Must-Have
* Proven record of AI vulnerabilities analysis
* Strong understanding of AI technologies and their underlying architectures, especially generative models and frameworks.
* At Least 5 years of experience in offensive Cyber security, particularly in Cloud and API security.
* Familiarity with agentic frameworks and agentic development experience
* Proficiency in Python.
* Excellent analytical, problem-solving, and communication skills.
* Ability to work in a fast-paced, ever-changing environment. Nice-to-Have:
* Bachelors or Masters degree in Computer Science, Information Security, or a related field.
* Proving record of building production quality pipelines and automations
* Experience with Machine Learning development frameworks and environments.
* Advanced Certifications in offensive cybersecurity (e.g. OSWE, OSCE3, SEC542, SEC522) are highly desirable.
* Certifications/background in DevOps /ML fields are highly desirable
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375232
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a top-notch Threat Detection Researcher to join our team and spread the power of our company. In this role, you will further develop the company Runtime Sensor as part of our threat research team.
WHAT YOULL DO
Develop detections and tools to protect customers from cloud threats
Investigate attacks on cloud environments and malware targeting cloud workloads
Hunt and analyze real-world attacks and emerging cloud threats
Collaborate closely with the R&D team to transform research insights into product features
Work with customers in response to requests related to suspicious activity or potential incidents
Create best practices and security policies based on research findings
Deliver external-facing content (blog posts and talks at security conferences) based on security insights and novel research.
Requirements:
6+ years of experience in security or threat research in which you conducted deep research with actionable conclusions and impacts
Intimate knowledge of OS internals (Windows/Linux) and networking
Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)
Experience delivering security detections in customer-facing product(s)
The ability to learn independently, to be self-driven and goal-oriented
Excellent communication and teamwork skills
ADVANTAGE
Hands-on experience with malware analysis/reverse engineering/vulnerability research
Familiarity with notable threat actors and threat intelligence analysis
IR/red-team/threat-hunting experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8394321
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
We're looking for a Threat Detection Researcher to join the Threat Research team and spread the power of our company. In this role, you will further develop the Cloud-native Threat Detection domain.
WHAT YOULL DO
Design behavioral baselines for complex cloud environments using diverse signals, and develop high-fidelity detections based on those baselines.
Expand our company's detection engine with novel and high-impact telemetry sources, pushing the boundaries of what can be detected in modern cloud environments.
Conduct deep technical research into complex cloud services to uncover novel attack vectors.
Investigate real-world attacks across cloud environments, identity providers (IDPs), and infrastructure-as-a-service (IaaS) platforms.
Hunt and analyze emerging threats and active campaigns targeting cloud ecosystems.
Requirements:
6+ years of hands-on experience in security or threat research, with a proven track record of driving investigations to actionable, real-world impact.
Strong self-motivation and ability to independently drive complex research projects from concept to delivery.
Clear and effective communicator with excellent collaboration skills, comfortable working across teams and disciplines.
ADVANTAGE
Experience conducting data-driven research and working with large-scale telemetry.
Familiarity with cloud infrastructure (AWS, GCP, Azure), Kubernetes, and modern cloud-native architectures.
Background in incident response, red teaming, or threat hunting.
Hands-on experience building and shipping security detections as part of a product.
Proficiency in Python, Go, and query languages (e.g., KQL, SQL).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8394322
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
5 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a top-notch Senior Security Researcher, to resolve the toughest issue in cybersecurity: utilizing terabytes of data for detecting attacks, incident investigation and prioritizing threats.

Responsibilities
Threat Analysis and Research: Dive deep into terabytes of data to identify new attack vectors, emerging threats, and vulnerabilities across various attack surfaces. Stay up-to-date with the latest cybersecurity trends and contribute to the development of cutting-edge threat detection methodologies.
Incident Investigation: Utilize your technical prowess to investigate complex security incidents, analyzing data from diverse sources to uncover the root causes and methods of attack. Collaborate with incident response teams to develop effective strategies for containment and mitigation.
False Positive Reduction: Leverage your expertise in data analysis and correlation to fine-tune detection rules and algorithms, minimizing false positives and enhancing the accuracy of our platform's threat alerts.
Thought Leadership and Community Engagement: Drive thought leadership initiatives by creating technical blog posts, delivering webinars, and speaking at conferences to share insights, educate the community, and enhance the company's reputation in the cybersecurity landscape.
Be at the forefront of the our mission and work closely with our customers regarding cyber security investigations and incidents detected in their environments
Requirements:
A background of at least 7 years in:
Blue Teaming / Threat Hunting
Incident Response
Red Teaming / Penetration Testing - Advantage
Malware analysis experience - Advantage
Solid understanding of various enterprise technologies, such as:
OS internals, EDR
Active Directory, Office 365
Cloud technologies such as AWS, Microsoft Azure and GCP
Network protocols and security products
Identity & SSO products such as Okta, Auth0 and OneLogin
Kubernetes
Experience with Python, SQL or similar data analysis capabilities
Experience around working with customers - Advantage
Experience around writing blog posts, research papers, and public speaking - Advantage
Experience with mentoring and training of security researchers - Advantage
Proficient in English (both written and spoken)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8389797
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/10/2025
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
What We Are Looking For As a Red Team Specialist focused on GenAI models, you will play a critical role in safeguarding the security and integrity of commercial cutting-edge AI technologies. Your primary responsibility will be to analyze and test commercial GenAI systems including, but not limited to, language models, image generation models, and related infrastructure. The objective is to identify vulnerabilities, assess risks, and deliver actionable insights that strengthen AI models and guardrails against potential threats. Key Responsibilities
* Execute sophisticated and comprehensive attacks on generative foundational models and agentic frameworks.
* Assess the security posture of AI models and infrastructure, identifying weaknesses and potential threats.
* Collaborate with security teams to design and implement effective risk mitigation strategies that enhance model resilience.
* Apply innovative testing methodologies to ensure state-of-the-art security practices.
* Document all red team activities, findings, and recommendations with precision and clarity.

About ActiveFence:
ActiveFence is the leading provider of security and safety solutions for online experiences, safeguarding more than 3 billion users, top foundation models, and the world’s largest enterprises and tech platforms every day. As a trusted ally to major technology firms and Fortune 500 brands that build user-generated and GenAI products, ActiveFence empowers security, AI, and policy teams with low-latency Real-Time Guardrails and a continuous Red Teaming program that pressure-tests systems with adversarial prompts and emerging threat techniques. Powered by deep threat intelligence, unmatched harmful-content detection, and coverage of 117+ languages, ActiveFence enables organizations to deliver engaging and trustworthy experiences at global scale while operating safely and responsibly across all threat landscapes.

Hybrid:
Yes
Requirements:
Must-Have
* Proven track record in AI vulnerability analysis.
* Strong understanding of AI technologies and underlying architectures, especially generative models and frameworks.
* Minimum of 5 years of experience in offensive cybersecurity, with a focus on cloud and API security.
* Familiarity with agentic frameworks and hands-on experience in agentic development.
* Proficiency in Python.
* Exceptional analytical, problem-solving, and communication skills.
* Ability to thrive in a fast-paced, dynamic environment. Nice-to-Have
* Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field.
* Demonstrated experience building production-quality pipelines and automations.
* Hands-on experience with machine learning development frameworks and environments.
* Advanced certifications in offensive cybersecurity (e.g., OSWE, OSCE3, SEC542, SEC522).
* Certifications or background in DevOps/ML domains.
* Webint / OSINT experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375262
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 13 שעות
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
The secret to our success lies in our connectivity, while operating with a high degree of flexibility. Work-life balance remains our priority while feeling connected is important to maintain our strong culture, achieve our goals, and thrive.

This role is offered as a hybrid in the Tel Aviv office in Israel. We are only able to accept applications for those based in Israel and have sponsorship to live and work in Israel.

What you'll do:
At our company, we empower people to be their best selves and do their best work. The Security Analyst role strengthens our ability to detect and respond to emerging mobile threats. With increasing mobile attacks and zero-day exploits, we need dedicated analysts to proactively protect our customers and expand detection coverage. As the analysts team has grown, this role now allows for broader coverage of emerging mobile threats and enables analysts to take on more diverse responsibilities. The expanded scope supports comprehensive threat research, detection development, and incident response, ensuring work is thorough, prioritized, and aligned with evolving security challenges.
What you can expect to do in this role:
Research new ways to detect malicious activity on using a wide variety of custom-built tooling.
Participate on research how to protect users from 0-day attacks.
Perform analysis of detections according to the assignment to determine accuracy and precisions and tune detections accordingly based on results.
Stay up to date on the latest malware trends and design detections accordingly.
Support sales and marketing by timely information about emerging threats and trends.
Analyze device logs and search for malicious signs.
Write and manage detection patterns and algorithms to detect malicious mobile threats in Android and iOS devices.
Perform other duties and special projects as assigned.
Requirements:
What we are looking for:
Minimum 1-2 years of relevant professional experience.
Experience in extracting and analyzing data from mobile devices.
An understanding of cyber security and intrusion detection.
Excellent programming/scripting skills (Python).
Mobile Malware Analysis expertise and strong interest in mobile security.
Great presentation skills and fluency in English.
Experience with detecting malware using Yara rules, an overall comprehensive understanding of incident response, a knowledge of using databases and writing queries (e.g. SQL, KQL) and bility to find and run a mobile exploits are a plus.
Customer value focus with the ability to quickly iterate based on emerging threats and customer feedback is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8396002
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Were hiring our first Product Security Researcher (SOC & Incident Response) to join our newly formed Security Research function- a critical role for someone passionate about advancing real-world SOC operations with deep cybersecurity expertise.
We are building a world-class Security Research team that will power our advanced product with deep, actionable cybersecurity expertise. This team will serve as the Subject Matter Experts (SMEs) behind our triage and Incident Response platform, defining logic, contributing threat intelligence, building use-case coverage, and continuously optimizing detection and investigation workflows.
Youll collaborate closely with Product, Engineering, and Customer Success to ensure our Auto-Triage engine reflects the latest adversarial techniques and real-world SOC operations.
Responsibilities
Serve as a domain expert in SOC workflows, alert triage, and incident response.
Design and maintain triage logic, playbook blueprints, AI Agents and more for responding to security events.
Develop and maintain alert enrichment, correlation, and classification rules across multiple data sources (EDR, SIEM, Identity, etc.).
Collaborate with product teams to define use cases, threat coverage, and analyst workflows.
Analyze real-world alerts, telemetry, and incident data to enhance product accuracy, reduce false positives and improve incident handling.
Evaluate and curate threat intelligence feeds and sources to support automated decision-making.
Conduct post-incident reviews to extract lessons and update triage logic accordingly.
Stay current with emerging threats, attacker TTPs, MITRE ATT&CK, and other frameworks.
Assist with quality assurance, testing, and validation of triage logic before deployment.
Requirements:
6+ years of experience in SOC operations, incident response, or threat detection.
Hands-on experience triaging alerts, conducting investigations, and working with tools like SIEM, EDR, SOAR, and XDR.
Strong understanding of logs, telemetry, and data formats (Syslog, JSON, Zeek, Windows Event Logs, etc.).
Experience defining detection or triage logic in Python, YAML, or other rule-based formats is a plus.
Familiarity with cloud security signals (AWS, Azure, GCP) and SaaS application logs is a bonus.
Preferred Skills
Prior experience building security content for SOAR/SIEM platforms.
Exposure to AI/ML use in security triage (optional but valued).
Passion for building scalable, repeatable, and impactful security solutions.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8391931
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/10/2025
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
We are looking for a highly skilled and motivated Tech Lead to serve as the focal point for its Android Malware Research and Review efforts. This role is centered on driving technical excellence in research, setting standards for methodology, and serving as the go-to expert for complex malware investigations. The Tech Lead will guide peers through technical reviews, ensure high-quality and accurate research outputs, and contribute hands-on expertise in dissecting and understanding sophisticated Android malware threats. This role emphasizes thought leadership, technical depth, and the ability to elevate the overall quality of the teams research.
About us:
We are the leading provider of security and safety solutions for online experiences, safeguarding more than 3 billion users, top foundation models, and the worlds largest enterprises and tech platforms every day. As a trusted ally to major technology firms and Fortune 500 brands that build user-generated and GenAI products, we empower security, AI, and policy teams with low-latency Real-Time Guardrails and a continuous Red Teaming program that pressure-tests systems with adversarial prompts and emerging threat techniques. Powered by deep threat intelligence, unmatched harmful-content detection, and coverage of 117+ languages, we enable organizations to deliver engaging and trustworthy experiences at global scale while operating safely and responsibly across all threat landscapes.
Hybrid:
No
Requirements:
Must-Have:
* 2 years of proven experience in malware research / reverse engineering.
* Experience with static analysis using tools such as IDA Pro / Ghidra / Binary Ninja.
* Experience with dynamic analysis tools such as gdb / lldb / WinDbg.
* Experience with runtime instrumentation tools such as Frida.
* Proficiency in one of the following programming languages: C / C ++.
* Experience with Assembly languages such as X86 / AArch64.
* Experience with Linux systems.
* Ability to provide technical leadership and peer guidance, including reviewing work, training researchers, and elevating team expertise.
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
Nice-to-Have:
*  Computer Science degree.
* Experience in Android research.
* Proficiency in JAVA / Python / JavaScript.
* Experience with decompilers such as JADX or JEB.
* Familiarity with instrumentation frameworks like Frida or Xposed.
* Experience with HTTP debugging and network analysis tools (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375255
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Analyst to join the Corporate security team and spread the power of our company. In this role, you will help deliver a secure-by-design experience for our company employeesenabling productivity while safeguarding our company and customers. The ideal candidate will have hands-on experience in areas such as endpoint security, identity and access management, detection and response, vulnerability management, and SaaS application security.
WHAT YOULL DO
Security alert triage, resolution and escalation
Develop and improve existing standard operating procedures, response actions, policies, and guidelines
Review SaaS security configurations and collaborate with IT to implement improvements
Conduct access reviews and remediate issues as needed
Maintain and manage security systems including antivirus/anti-malware, DLP, network protection, and endpoint detection & response tools
Stay up to date on the latest security threats, treantinds, and best practices.
Requirements:
2+ years of experience in security operations or a related field
Strong analytical and problem-solving skills
Excellent communication skills, with the ability to convey technical concepts to both technical and non-technical stakeholders
Experience using SIEM platforms or data warehouse tools to analyze log data for security events
Experience in remote-first, SaaS first-organizations
Advantage
Bachelors degree in Computer Science or a related field, or equivalent practical experience
Experience working in organizations that build and operate SaaS products
Proficiency in Python or other scripting languages .
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8394328
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/10/2025
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
We are hiring Intermediate Malware Researchers to analyze and review malware applications. Candidates should have a background in cybersecurity and software development. The role includes training in malware analysis and detection and provides exposure to various malware threats and techniques. Researchers will combine technical and intelligence findings to reach accurate verdicts and assist in the bulk removal of malicious applications. The position requires adaptability and proactive identification of emerging malware trends. We are seeking candidates who are willing to learn, can perform effectively under pressure, and maintain high professional standards.
About:
We are the leading provider of security and safety solutions for online experiences, safeguarding more than 3 billion users, top foundation models, and the worlds largest enterprises and tech platforms every day. As a trusted ally to major technology firms and Fortune 500 brands that build user-generated and GenAI products, ActiveFence empowers security, AI, and policy teams with low-latency Real-Time Guardrails and a continuous Red Teaming program that pressure-tests systems with adversarial prompts and emerging threat techniques. Powered by deep threat intelligence, unmatched harmful-content detection, and coverage of 117+ languages, we enable organizations to deliver engaging and trustworthy experiences at global scale while operating safely and responsibly across all threat landscapes.
Hybrid:
No
Requirements:
Must-Have:
2 years of proven experience in the industry in one of the following: malware research, reverse engineering, penetration testing, or software development Strong understanding of JAVA object-oriented programming
* Ability to trace execution flow through code analysis
* Comprehensive knowledge of cybersecurity, networking, and programming fundamentals
* Proficient English communication skills (reading and writing)
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
Nice-to-Have:
*  Computer Science degree
* Proficiency in multiple programming languages (e.g., JavaScript, C / C ++)
* Experience with disassemblers such as IDA Pro or Ghidra
* Experience with decompilers such as JADX or JEB
* Familiarity with instrumentation frameworks like Frida or Xposed
* Experience with HTTP debugging and network analysis tools (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark)
* Knowledge of common malware threats and techniques.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375238
סגור
שירות זה פתוח ללקוחות VIP בלבד