משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
At our company, we empower people to be their best selves and do their best work. The Security Analyst role strengthens our ability to detect and respond to emerging mobile threats. With increasing mobile attacks and zero-day exploits, we need dedicated analysts to proactively protect our customers and expand detection coverage. As the analysts team has grown, this role now allows for broader coverage of emerging mobile threats and enables analysts to take on more diverse responsibilities. The expanded scope supports comprehensive threat research, detection development, and incident response, ensuring work is thorough, prioritized, and aligned with evolving security challenges.

What you can expect to do in this role:
Research new ways to detect malicious activity on using a wide variety of custom-built tooling.
Participate on research how to protect users from 0-day attacks.
Perform analysis of detections according to the assignment to determine accuracy and precisions and tune detections accordingly based on results.
Stay up to date on the latest malware trends and design detections accordingly.
Support sales and marketing by timely information about emerging threats and trends.
Analyze device logs and search for malicious signs.
Write and manage detection patterns and algorithms to detect malicious mobile threats in Android and iOS devices.
Perform other duties and special projects as assigned.
Requirements:
What we are looking for:
Minimum 1-2 years of relevant professional experience.
Experience in extracting and analyzing data from mobile devices.
An understanding of cyber security and intrusion detection.
Excellent programming/scripting skills (Python).
Mobile Malware Analysis expertise and strong interest in mobile security.
Great presentation skills and fluency in English.
Experience with detecting malware using Yara rules, an overall comprehensive understanding of incident response, a knowledge of using databases and writing queries (e.g. SQL, KQL) and ability to find and run a mobile exploits are a plus.
Customer value focus with the ability to quickly iterate based on emerging threats and customer feedback is a plus.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8495641
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/12/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
As a CyOps Analyst, you will be investigating security alerts from the platform in order to detect threats and conduct live incident response engagements, investigating and analyzing programs and software using analysis programs to identify threats and classify malware based on previous threats and commonalities, investigating and issuing threat intelligence and malware analysis report. The SOC works closely with the Research team to perform tests and uncover new attack vectors to enhance, develop, and configure threat hunting tools. Additional responsibilities include:
* Identifying unknown threats for our global clients through advanced threat hunting services to complement the standard Security Operations Center services.
* Performing analysis and forensics on security threats, malware and attacks in the wild, using industry standard platforms and tools.
About Us:
We are a leader in threat detection and response, designed to simplify security for organizations of all sizes. Our mission is to empower lean security teams and their partners with an AI-powered, unified platform that autonomously detects, protects, and responds to threats - backed by 247 security experts. With a Partner First mindset, we focus on helping customers and partners stay protected, operate confidently, and achieve their goals. Our vision is to give every organization true cybersecurity peace of mind, providing fast, accurate protection without the noise or complexity.
Requirements:
* 1+ year of technical experience within the network, IT, or Cyber security domains
* Ability to work through shifts at a 24/7 SOC service
* Strong understanding of network architecture and protocols (e.g. HTTP, DNS)
* Hands-on approach to problem solving
* Ability to understand and learn complex technological systems and identify critical areas
* Exceptional analytical skills, creative out of the box thinking, analytical mindset with research orientation
* Strong presentation and training skills
* Experience in operating security tools (e.g. FW, IDS, SIEM, Endpoint protection)
* Working as an analyst in a Cyber SOC - advantage
* Experience in exposing and exploiting vulnerabilities advantage
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8456907
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 22 שעות
Location: Tel Aviv-Yafo and Yokne`am
Job Type: Full Time
We are seeking a highly skilled and proactive Senior Cyber Security Threat Intelligence (CTI) Analyst to join the Networking product security team. In this critical role, you will function as a key defender of the technologies powering the worlds largest AI clusters. You will act as the eyes and ears of our product security organization, conducting investigative research into sophisticated adversaries and translating complex threat data into actionable intelligence. This is a hands-on role where your insights will directly influence our defensive posture and help eliminate threats before they manifest in the core of global AI infrastructure.

What You Will Be Doing:

You will serve as the intelligence core of our team dedicated to identifying, analyzing, and mitigating threats against our products and ecosystem:

Lead deep-dive OSINT and WEBINT research to identify emerging threats, conducting intelligence collection and analysis that leads to clear, actionable mitigation recommendations.
Leverage scripting (Python, Bash, etc.) and Generative AI tools to automate intelligence collection, triage, and analysis workflows.
Analyze Advanced Persistent Threats (APTs) and sophisticated adversaries, collaborating with multi-functional teams to detect, track, and eliminate potential risks to our networking portfolio.
Apply extensive insight into cyber operation phases to map adversary behavior, anticipate future movements, and harden our product development lifecycle with adoption of security improvements.
Drive threat hunting methodologies, proactively searching for indicators of compromise (IoCs) and hidden vulnerabilities within the products.
Translate complex technical findings into strategic intelligence reports for both technical collaborators and leadership, ensuring a clear and unified insight into the threat landscape.
Collaborate closely with incident response and engineering teams to ensure intelligence findings are seamlessly coordinated into other defensive tools and product security processes.
Requirements:
What We Need To See:
BSc or MSc in Computer Science, Computer Engineering, Cyber Security, or a related technical domain (or equivalent experience).
5+ years of proven experience in a dedicated Cyber Threat Intelligence (CTI) role within a large-scale or high-tech environment.
Technical proficiency in building automated intelligence pipelines through programming and the strategic use of Generative AI.
Expert-level knowledge of the CTI lifecycle, with a proven record of uncovering sophisticated cyber operations using diverse sources and techniques.
Strong technical background in analyzing advanced threats, capable of navigating through complex data to identify adversary infrastructure, intent, and tooling.
Deep understanding of the unique security concerns faced by global tech companies, including supply chain risks and intellectual property protection.
Outstanding analytical and interpersonal skills, with the ability to drive accountability and ensure intelligence leads to concrete security improvements.

Ways To Stand Out From The Crowd:
Direct experience with hardware and embedded devices technologies, specifically relating to networking or silicon security.
Professional background in Digital Forensics and Incident Response (DFIR), providing a comprehensive view of the threat actor journey.
Relevant industry certifications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8496501
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
The Sensor team is expanding! Were looking for a curious, motivated Cloud Security Detection Analyst to help strengthen our runtime security capabilities and protect our customers during their most critical moments.
Our sensor delivers deep runtime visibility across cloud environments, spanning processes, syscalls, network activity, operating systems, and containerized workloads. As a Detection Analyst, you will examine this data at scale, refine detections, surface suspicious behaviors, and collaborate with the research team to continuously improve our security outcomes.
What Youll Do
Examine runtime events and security findings collected by the Sensor to identify patterns, anomalies, and potential threats.
Tune detection logic to reduce false positives and improve accuracy.
Investigate alerts from real customer environments and propose improvements.
Work closely with the research team to refine existing detections and provide insight for new ones.
Partner closely with field teams and product managers managing requests, sharing findings, and keeping everyone aligned.
Produce short internal or external updates on relevant security trends or incidents.
Use Elasticsearch to explore detection data and visualize trends.
Contribute to detection automation and validation workflows (Python/Bash/Go/GitHub Actions).
Requirements:
BSc with expertise in cybersecurity, or equivalent cybersecurity/detection experience
Good understanding of OS internals (Linux/Windows), process and network behavior
Proven ability to conduct deep analysis, document findings, and propose solutions
Comfortable with some of the programming/scripting languages (Python, Bash, or similar)
Fast learner, self-starter, team player with a can-do attitude.
Excellent spoken and written English
Nice to have
Familiarity with security tools for runtime visibility or detection
Prior exposure to threat detection or security operations (SOC analysis)
Experience with Cloud-Native architectures (AWS/Azure/GCP) and Kubernetes
Basic malware analysis knowledge
Experience with ElasticSearch or similar big data analytics tools
Familiarity with AI tools and frameworks (e.g. MCP, AI-driven automations).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8465909
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/12/2025
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a Managed Cloud Detection and Response Analyst to join our newly established team. The team is responsible for monitoring customers cloud environments and workloads, triaging security alerts, and mitigating cyber incidents.
WHAT YOULL DO
Continuously monitor customers cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents.
Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively.
Work closely with customer teams to guide and assist with investigation and remediation of incidents.
Create and deliver incident reports that document findings and response actions taken for customers.
Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customers specific cloud environment.
Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team.
Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods.
Requirements:
2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments.
Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure).
Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights.
Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security.
Excellent communication skills verbal and written both in Hebrew and English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8455851
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/12/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
In this role, youll dive deep into real-world attacks, quickly analyze emerging threats, and develop accurate protections that are deployed to customers in real time. Youll collaborate closely with other analysts, security researchers, and field teams, while also helping shape and improve the workflows and automation that drive our team forward. This is a hands-on, impactful role for someone who loves uncovering threat patterns, solving complex problems, and contributing to a mission-driven security team

Key Responsibilities
Analyze new email-based threats and deliver real-time protection within email security products.

Investigate threats using email-security tools, customer reports, and additional threat-intelligence sources.

Identify ongoing phishing campaigns, trends, and potential detection gaps.

Respond to alerts and requests from internal field teams and customers, providing immediate mitigation for active attacks.

Develop and test tailored mitigations for specific attacks and deploy them to customers.

Write detailed research reports and attack briefs explaining phishing campaigns, attacker techniques, and findings.

Implement automation processes to enhance operational efficiency and detection accuracy.

Contribute ideas to improve team workflows, processes, and coverage.

Use AI and LLM-powered tools to analyze attacks and extract meaningful insights.

Design processes for analyzing phishing campaign data, trends, and related attacker methodologies
Requirements:
Fluent written English.

1-2 years of experience in cyber security, threat analysis, or attack analysis.

Ability to write clear, detailed research reports and attack briefs.

Strong self-learning capabilities with the motivation to explore new threats and technologies.

Proficiency in SQL for querying and analyzing complex datasets (must).

Experience with automation, scripting, or process optimization (advantage).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8472903
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
19/12/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Analyst/DevSecOps enginee r with 3–5 years of experience in security operations, compliance, and cloud security, with a strong emphasis on Amazon Web Services (AWS) and exposure to DevOps/ DevSecOps practices . In this role, you will contribute to SOC operations, security assessments, and compliance programs (SOC 2, ISO 27001) while partnering closely with engineering teams to secure and support AWS environments and services. The ideal candidate will have hands-on experience with AWS security tools, IAM, networking, automation, and monitoring, and will be confident in supporting compliance evidence collection and addressing customer/vendor security assessments. Key Responsibilities
* Monitor and respond to security alerts, incidents, and vulnerabilities.
* Manage and optimize AWS security tools, including GuardDuty, Security Hub, CloudTrail, and IAM.
* Partner with engineering teams to enforce AWS security best practices
* Integrate security checks into CI/CD pipelines (SAST, DAST, IaC, container scanning)
* Support compliance efforts by gathering SOC 2 and ISO 27001 evidence.
* Respond to customer and vendor security questionnaires.
* Maintain playbooks, runbooks, and documentation to strengthen security operations.
* Assist in DevOps related tasks as needed.
Requirements:
* 3–5 years of experience in security operations, cloud security, or DevOps roles
* Strong hands-on experience with AWS services and cloud security concepts.
* Familiarity with CI/CD pipelines and security tooling (e.g., Jenkins, GitLab CI).
* Understanding of IaC frameworks (Terraform, CloudFormation) and related security practices.
* Experience with SAST/DAST tools, container scanning, and vulnerability management in DevSecOps workflows.
* Nice to have: knowledge of compliance frameworks (SOC 2, ISO 27001, NIST, CIS Benchmarks).
* Nice to have - AWS Certified Security, AWS Solutions Architect Associate, or DevSecOps-related certifications. About the Company: Appdome's mission is to protect every mobile app worldwide and its users. We provide mobile brands with the only patented, centralized, data-driven Mobile Cyber Defense Automation platform. Our platform delivers rapid no-code, no-SDK mobile app security, anti-fraud, anti-malware, anti-cheat, anti-bot implementations, configuration as code ease, Threat-Events™ threat-aware UI/UX control, ThreatScope™ Mobile XDR, and Certified Secure™ DevSecOps Certification in one integrated system. With Appdome, mobile developers, cyber and fraud teams can accelerate delivery, guarantee compliance, and leverage automation to build, test, release, and monitor the full range of cyber, anti-fraud, and other defenses needed in mobile apps from within mobile DevOps and CI/CD pipelines. Leading financial, healthcare, m-commerce, consumer, and B2B brands use Appdome to upgrade mobile DevSecOps and protect Android & iOS apps, mobile customers, and businesses globally. Today, Appdome's customers use our platform to secure over 50,000+ mobile apps, with protection for over 2 billion mobile end users projected.
Appdome is an Equal Opportunity Employer. We are committed to diversity, equity, and inclusion in our workplace. We do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by law. All qualified applicants will be considered for employment without regard to these characteristics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8396759
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/12/2025
Location: Tel Aviv-Yafo
Job Type: Full Time
Unit 42s Managed Detection and Response (MDR) service is growing fast, and were building a customer-centric team that blends technical expertise with direct customer engagement. As a Customer Focus Analyst, youll act as the front line of communication between our MDR analysts and our customers, helping bridge the gap between incident response and customer understanding.
Youll not only support investigations and incident triage, but also help onboard customers, answer technical questions about reports, alerts, and the service, and manage ongoing communications to ensure clarity, alignment, and satisfaction.
This role is ideal for someone who is technical at their core, but enjoys customer interactions, driving clarity, and ensuring our partners feel confident and supported in their cybersecurity journey.
Key Responsibilities
Be part of a customer-focused sub-function of the Unit 42 MDR team, dedicated to proactive communication and technical guidance
Support onboarding activities for new customers
Monitor incoming communication from customers (e.g., via email, comments), triage and route issues as needed, and answer technical questions around reports, alerts, and recommendations
Collaborate with MDR analysts to ensure the customers technical questions about incidents or threats are fully addressed
Own the customer communication lifecycle during ongoing incidents ensure timely updates, clarity, and alignment on next steps
Help drive consistency and quality in how incidents and threat intelligence are communicated externally
Escalate and advocate for customer issues internally across Product, Engineering, and the broader Unit 42 team.
Requirements:
1+ years of experience in a customer-facing cybersecurity role such as professional services, customer success, or customer support must, Tier 1/2 SOC analyst experience
Hands-on experience with tools such as EDR, SIEM, SOAR, or XDR
Strong customer communication skills verbal and written with the ability to explain complex technical details clearly
Experience reviewing, drafting, or presenting incident reports and security findings
Familiarity with Cortex XDR or Cortex XSOAR
Experience onboarding new security services or clients.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8460292
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/12/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are seeking a skilled and proactive Security Operations Analyst to join our team. This role involves monitoring, analyzing, and responding to security threats and incidents across our customers Cloud & SaaS footprint. The ideal candidate will have a strong background in cybersecurity principles and eager to learn more about threat detection, and incident response.

What youll do:
Continuously monitor threat detections and deliver responsive services with thorough event analysis and judgement.
Monitor Cloud and SaaS cybersecurity trends, and threats to identify opportunities for improved detection coverage.
Propose improvements for processes, workflows, products and policies.
Support investigation efforts across a range of critical threats.
Exposure to Cloud and SaaS technologies (AWS, Azure, GCP, Okta, M365, Salesforce).
Requirements:
3+ years of experience working in a Security Operations Center (in-house or outsourced).
Familiarity with Python.
Ability to communicate clearly in both verbal and written communication methods.
Excellent analytical and problem-solving skills.
Comfortable working in a fast-paced and virtual environment.
Highly independent and self-driven.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8476344
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8488240
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/12/2025
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Architect to lead the design and implementation of advanced security solutions across our infrastructure, products, and cloud environments. In this role, you will work closely with engineering, DevOps, product, and SOC teams to ensure end-to-end protection, threat resilience, and security-by-design architecture.

Your Chain of Impact:

Design and implement scalable, secure architectures across cloud, application, and data environments
Lead security reviews, threat modeling, and risk assessments for new and existing systems.
Collaborate with R&D and DevOps to embed security best practices into development and deployment processes.
Define and maintain security standards, policies, and frameworks (Zero Trust, IAM, network controls, data protection, etc.)
Oversee integration of security controls, monitoring systems, and automated detection capabilities.
Partner with SOC teams to enhance detection, response, and incident management workflows.
Evaluate new security tools and technologies; lead POCs and drive strategic decisions.
Provide security guidance during architecture planning, code reviews, and product design.
Requirements:
5+ years of experience in security architecture, application security, or cloud security
Hands-on experience with cloud platforms (AWS/Azure/GCP) and modern infrastructure (Kubernetes, microservices)
Strong understanding of network security, identity & access management, encryption, and secure design principles
Proven experience working with SOC processes, including detection engineering, incident response, SIEM/SOAR, and security monitoring
Familiarity with frameworks such as NIST, ISO 27001, MITRE ATT&CK, CIS Benchmarks
Ability to translate complex security concepts into clear guidance for technical and non-technical stakeholders
Excellent problem-solving skills and a proactive, ownership-driven mindset
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8468033
סגור
שירות זה פתוח ללקוחות VIP בלבד