דרושים » אבטחת מידע וסייבר » Android Security Researcher

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Android Security Researcher
Position Overview:
As a talented researcher, you will be joining the industrys leading digital intelligence Security Research Labs group. In this position you will be taking part and leading new projects in little-explored vulnerability research territories, producing world-unique capabilities to extract evidence from phones and other embedded devices. Recent phones (from burner phones to the latest flagships) are increasingly challenging from a forensics perspective, and involve hardware-backed encryption (FDE/FBE), secure boot chains (Verified Boot/dm-verity), evolving hardened SELinux policies, as well as adventures in ARM TrustZone secure worlds.
Key Responsibilities:
You will join our digital intelligence Security Research Labs Group and be a part of a team of passionate researchers, dedicated to solving modern digital intelligence challenges, years ahead of others in the industry. Our world-class research results assist law enforcement by enabling lawful evidence extraction, and putting criminals behind bars, every day.
You are a security researcher who cares about the ethical use case for his/her work, and if the art of engineering and crafting a platform-wide native payload in a fragmented ecosystem of gaping variance is the kind of challenge you appreciate, you belong with us. We need your help to make the world a safer place.
Requirements:
Practical experience performing vulnerability research and exploitation, preferably in mobile or other modern environments, eg. Windows/Linux/iOS/MacOS
Practical reverse engineering experience, preferably in ARM / TrustZone / Hypervisors
Advantage: Cryptographic primitives and weaknesses
Advantage: Advanced fuzzing
Advantage: Offensive hardware research/board design
Advantage: Experience dealing with modern memory corruption mitigations, such as PAC and MTE.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547377
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking talented researchers to join our industry-leading Digital Intelligence Security Research Labs.
As a security researcher on our team, you will focus on identifying vulnerabilities within Apples ecosystem and developing innovative exploit strategies to gain access to iPhones and other devices, enabling the extraction of crucial evidence for law enforcements.
Key responsibilities:
Research on territories with little-explored vulnerability
Work on the production of world-unique capabilities to extract evidence from phones and other embedded devices.
iPhones and other iOS devices present tough challenges from a forensics perspective and involve hardware-backed encryption (SiDP), secure crypto coprocessor (SEP), and secured boot chain (SecureROM).
New iPhones present state-of-the-art exploit mitigations such as PAC, KTRR, and PPL.
Become a member of Labs Group, focusing on Security Research for mobile devices.
Execute your own (shell) code on top-notch technology mobile platforms hardened with challenging mitigations
Collaborate with a team of passionate researchers dedicated to solving modern digital intelligence challenges, years ahead of others in the industry.
Take part in world-class research results, assisting law enforcement by enabling lawful evidence extraction, and putting criminals behind bars every day.
Requirements:
Proven vulnerability research experience (preferably in iOS)
Experience with advanced exploitation techniques
ARM reverse engineering
Cryptographic primitives and weaknesses
Hardware research/board design - Advantage
You are a security researcher who cares about the ethical values of your work
You love the art of engineering and crafting a platform-wide native payload, in a fragmented ecosystem of gaping variance
You are passionate about technology and keen to use your skills to make the world a safer place.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547394
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a talented team leader to join the industrys leading digital intelligence Labs group. In this role, you will lead and participate in innovative projects to implement and productize groundbreaking, world-unique capabilities for extracting evidence from Android or iOS devices.
Modern Android and iOS platforms present increasing challenges from a forensics perspective, incorporating robust protection mechanisms such as File-Based Encryption, Secure Element, and mitigations like Pointer Authentication Codes.
A team of passionate researchers and developers dedicated to solving cutting-edge digital intelligence challenges, staying years ahead of others in the industry.
Our world-class R&D efforts assist law enforcement agencies by enabling lawful evidence extraction, helping to bring criminals to justice every day.
Key Responsibilities:
Oversee Vulnerability Research Projects: Lead and manage projects focused on discovering and exploiting vulnerabilities in mobile platforms.
Mentor and Guide Team Members: Provide mentorship and guidance to researchers, helping them navigate complex technological challenges.
Deliver Comprehensive Solutions: Develop complete solutions, moving beyond proof-of-concept demonstrations to fully implementable exploits.
Recruit and Develop Talent: Identify and recruit new researchers as needed, building a skilled and dynamic team to enhance the department's capabilities.
Requirements:
Over 3 years of experience leading security research projects and managing teams.
At least 6 years of experience in vulnerability research.
Full proficiency in English.
Excellent interpersonal skills.
Experience in mobile vulnerability research and exploitation is an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547418
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
The Team Our research team is at the core of our products and connected directly to the mission of preventing cyberattacks. We are constantly innovating - challenging the way we, and the industry, think about cybersecurity. Our researchers dont shy away from building products to solve problems no one has pursued before. We define the industry instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment. Job Summary If you are an innovator at heart and passionate about redefining how organizations secure modern environments end-to-end, we're looking for you. As a Manager of the Core Cloud Posture team, you will lead a new, high-impact team of security researchers. You'll innovate and build on top of our market-leading posture portfolio and be responsible for the "what's next." Your mission is to innovate on top of this foundation, build the intelligent "connective tissue" that provides unparalleled context, and architect the next-generation features that will keep us ahead of the market. Key Responsibilities Lead, and grow a team of talented security researchers focused on enhancing the cloud security posture of our customers Act as a technical mentor and force multiplier for junior security researchers. You will actively share your deep industry experience, guide their research methodologies, and foster a learning environment that accelerates their professional development from talented juniors into autonomous experts Champion the continuous evolution of our security logic. You will ensure our posture coverage keeps pace with the rapidly changing cloud landscape, systematically addressing gaps and refining our policies to address evolving threats Leverage our advanced cross-product engines to synthesize isolated findings into a cohesive, prioritized story of risk for the customer Stay ahead of the evolving cloud threat landscape, translating the latest research on cloud-native based attacks into resilient posture policies that effectively minimize the attack surface Foster collaboration across engineering, product management, and go-to-market teams to deliver impactful security solutions
Requirements:
Required Qualifications 5+ years in security research with a focus on Cloud Security Posture. You bring a proven track record of either protecting complex organizational clouds or authoring scalable posture policies for a security platform 2+ years in a leadership or management role, including mentoring researchers, managing roadmaps, and setting research strategy in a fast-paced environment Deep expertise in cloud-native architecture across major providers (AWS, Azure, GCP). You possess a strong grasp of how cloud environments are architected, focusing on core components like Compute, Storage, Networking, and Identity, and the unique security challenges they present Deep domain expertise, Comprehensive knowledge of the broader cloud-native security landscape (e.g. CSPM, DSPM, CIEM, AISPM). You deeply understand how these tools operate, their mechanics, and how they are applied to solve real-world security challenges Proficient in hands-on coding and scripting (e.g., Python, Go) for automation and building POC scanners Experience working with large-scale data pipelines and analytics (e.g., GCP BigQuery, Dataflow, Snowflake) to analyze vast amounts of cloud metadata Excellent communication skills, with the ability to articulate complex research findings (like data exposure paths) to both technical and business stakeholders Advantages Experience with AI/LLM Security. Familiarity with securing AI pipelines, understanding LLM vulnerabilities (e.g., prompt injection, data leakage), or experience with AISPM frameworks Infrastructure as Code (IaC) mastery.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522196
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
The company Cloud Content team is an integral part of the Content Product Group, tasked with the critical mission of safeguarding cloud environments through innovative detection and response capabilities. This specialized team comprises cloud security experts, researchers, and engineers in various time zones working in unison to ensure our customers cloud workloads are secure against the ever-changing threats in the security landscape.As a senior researcher on the team, you will play a pivotal role in conducting security research, and translating it to direct security value for the company and product.This role provides a unique opportunity to join a team with strategic importance to protecting our customers from emerging threats and novel attack methodologies in both cloud and Linux based environments. You will stay ahead of the curve with regards to the threat landscape and your research will directly impact the direction of the team and our product.You will also get to work with vast datasets, have a direct impact on the efficacy and evolution of our detections, and play a decisive role in the strategic direction of our product development. Your contributions will enable continuous improvement of our companys cloud detection capabilities ensuring that our customers can be secured with the most advanced security measures in place.
What Youll Do:
Initiate and conduct Cloud Research Initiatives: follow the threat landscape to identify trends in the realm of cloud infrastructure security, threat actors, novel attack approaches, and vulnerabilities in cloud-based and/or cloud-native environments and workloads.
Conduct cutting edge research in the areas of Linux security (low level and high level operating system research) and become an authoritative source of knowledge in the team.
Research threats and vulnerabilities in cloud provider infrastructure and containerized applications and workloads.
Develop advanced cloud security models: Create sophisticated models and frameworks for identifying and mitigating new types of cloud threats. Focus on predictive analytics and proactive threat hunting methodologies.
Collaborate with cross functional teams: Work closely with various teams, including engineering, product management, detection engineering, and threat intelligence to drive cloud detections in the company falcon platform.
Provide cloud security thought leadership: Share insights and best practices with the broader security community through publications, conference presentations, and technical blogs.
Requirements:
Proven expertise in security research, methodologies, technologies, and tools.
Minimum of 5 years in security research, preferably Cloud infrastructure and Linux.
Experience with cloud-native services, infrastructure, and environments.
Experience with threat research and misconfiguration identification.
Comprehensive knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Python, golang, and shell scripting experience.
Experience with large scale data analysis.
Comprehensive knowledge of Kubernetes, docker, podman, and similar containerization and orchestration technologies.
Familiarity with cloud automation and orchestration tools for optimizing security processes.
Experience in publishing security research papers and conference talks.
Experience in malware analysis and reverse engineering - experience with Linux malware and ELF reverse engineering is a plus.
Excellent conceptual thinking and communication skills, capable of conveying complex ideas effectively.
Technical knowledge of network, operating systems (mainly Linux) and data platform security.
Good problem solving, communication, and teamwork skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8498459
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
The company Cloud Content team is an integral part of the Content Product Group, tasked with the critical mission of safeguarding cloud environments through innovative detection and response capabilities. This specialized team comprises cloud security experts, researchers, and engineers in various time zones working in unison to ensure our customers cloud workloads are secure against the ever-changing threats in the security landscape.As a senior researcher on the team, you will play a pivotal role in conducting security research, and translating it to direct security value for the company and product.This role provides a unique opportunity to join a team with strategic importance to protecting our customers from emerging threats and novel attack methodologies in both cloud and Linux based environments. You will stay ahead of the curve with regards to the threat landscape and your research will directly impact the direction of the team and our product.You will also get to work with vast datasets, have a direct impact on the efficacy and evolution of our detections, and play a decisive role in the strategic direction of our product development. Your contributions will enable continuous improvement of our companys cloud detection capabilities ensuring that our customers can be secured with the most advanced security measures in place.
What Youll Do:
Initiate and conduct Cloud Research Initiatives: follow the threat landscape to identify trends in the realm of cloud infrastructure security, threat actors, novel attack approaches, and vulnerabilities in cloud-based and/or cloud-native environments and workloads.
Conduct cutting edge research in the areas of Linux security (low level and high level operating system research) and become an authoritative source of knowledge in the team.
Research threats and vulnerabilities in cloud provider infrastructure and containerized applications and workloads.
Develop advanced cloud security models: Create sophisticated models and frameworks for identifying and mitigating new types of cloud threats. Focus on predictive analytics and proactive threat hunting methodologies.
Collaborate with cross functional teams: Work closely with various teams, including engineering, product management, detection engineering, and threat intelligence to drive cloud detections in the company falcon platform.
Provide cloud security thought leadership: Share insights and best practices with the broader security community through publications, conference presentations, and technical blogs.
Requirements:
Proven expertise in security research, methodologies, technologies, and tools.
Minimum of 5 years in security research, preferably Cloud infrastructure and Linux.
Experience with cloud-native services, infrastructure, and environments.
Experience with threat research and misconfiguration identification.
Comprehensive knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Python, golang, and shell scripting experience.
Experience with large scale data analysis.
Comprehensive knowledge of Kubernetes, docker, podman, and similar containerization and orchestration technologies.
Familiarity with cloud automation and orchestration tools for optimizing security processes.
Experience in publishing security research papers and conference talks.
Experience in malware analysis and reverse engineering - experience with Linux malware and ELF reverse engineering is a plus.
Excellent conceptual thinking and communication skills, capable of conveying complex ideas effectively.
Technical knowledge of network, operating systems (mainly Linux) and data platform security.
Good problem solving, communication, and teamwork skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8498483
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are looking for a seasoned Principal Threat Researcher to join our Threat Hunting team. Based in Israel, this is a hybrid role, reporting to the Senior Manager, Threat Research, in the Avalor Engineering department. Avalor curates and contextualizes data from hundreds of security and business tools to help companies understand and address their riskiest problems. If you're passionate about data and helping companies improve their security posture, we'd love to have you join Avalor as we make the world a more secure place.
What youll do (Role Expectations):
Lead end-to-end research POCs by formulating hypotheses, designing methodologies, and translating findings into production-ready capabilities
Research and develop methodologies for identifying, assessing, and mitigating threats across diverse data sources
Partner with data scientists and ML engineers to shape model features and training data strategies derived from real-world signals
Provide actionable recommendations to improve data quality, policies, detections, and response strategies across security offerings
Present research findings to technical and non-technical stakeholders to influence roadmap decisions with evidence-based insights
Who You Are (Success Profile):
You thrive in ambiguity. You're comfortable building the path as you walk it. You thrive in a dynamic environment, seeing ambiguity not as a hindrance, but as the raw material to build something meaningful.
You act like an owner. Your passion for the mission fuels your bias for action. You operate with integrity because you genuinely care about the outcome. True ownership involves leveraging dynamic range: the ability to navigate seamlessly between high-level strategy and hands-on execution.
You are a problem-solver. You love running towards the challenges because you are laser-focused on finding the solution, knowing that solving the hard problems delivers the biggest impact.
You are a high-trust collaborator. You are ambitious for the team, not just yourself. You embrace our challenge culture by giving and receiving ongoing feedback-knowing that candor delivered with clarity and respect is the truest form of teamwork and the fastest way to earn trust.
You are a learner. You have a true growth mindset and are obsessed with your own development, actively seeking feedback to become a better partner and a stronger teammate. You love what you do and you do it with purpose.
Requirements:
What Were Looking for (Minimum Qualifications):
5+ years in security research, threat analysis, vulnerability research, or incident response with a strong understanding of cybersecurity principles
Proven experience running end-to-end research POCs from idea to customer impact
Extensive experience analyzing SQL, large datasets, and telemetry across multiple security domains
Proficient, hands-on coding skills in Python or similar for data analysis and prototyping
Experience with cloud environments and security tools such as SIEM, XDR, SASE, CSPM, and IAM
What Will Make You Stand Out (Preferred Qualifications):
Bachelors degree in Computer Science or a related field; Masters degree is a plus
Familiarity with data platforms and streaming/ETL technologies used in security analytics
Demonstrated impact driving innovation that informs or accelerates product development.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8515647
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a top-notch Threat Detection Researcher to join our team and spread our power. In this role, you will further develop the Runtime Sensor as part of our threat research team.
WHAT YOULL DO
Develop detections and tools to protect customers from cloud threats
Investigate attacks on cloud environments and malware targeting cloud workloads
Hunt and analyze real-world attacks and emerging cloud threats
Collaborate closely with the R&D team to transform research insights into product features
Work with customers in response to requests related to suspicious activity or potential incidents
Create best practices and security policies based on research findings
Deliver external-facing content (blog posts and talks at security conferences) based on security insights and novel research.
Requirements:
6+ years of experience in security or threat research in which you conducted deep research with actionable conclusions and impacts
Intimate knowledge of OS internals (Windows/Linux) and networking
Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)
Experience delivering security detections in customer-facing product(s)
The ability to learn independently, to be self-driven and goal-oriented
Excellent communication and teamwork skills
ADVANTAGE
Hands-on experience with malware analysis/reverse engineering/vulnerability research
Familiarity with notable threat actors and threat intelligence analysis
IR/red-team/threat-hunting experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8516054
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/01/2026
חברה חסויה
Location: Tel Aviv-Yafo and Netanya
Job Type: Full Time
our company Security is one of the main pillars of the company offering and long-term strategy. We are pushing the boundaries of security analysis of both binaries and code, shifting left and bringing new and exciting features to both developers and DevOps. We are looking for a Security Researcher to join the team. As a researcher, you will perform security research on open-source projects in both web and low-level technologies. You will define how to identify exploitable security issues in an automated manner and develop code for that purpose.
As a Security Researcher at our company you will
Research CVEs and 1-day vulnerabilities in various programming languages and ecosystems
Define how to automatically find exploitable vulnerabilities & develop code that identifies the instances where a vulnerability is exploitable
Perform security research on various open-source technologies, frameworks, and libraries
Write technical reports regarding all research subjects mentioned above.
Requirements:
At least 2 years of experience as a Security Researcher
Vulnerability research experience in any of the following languages: Python, Node.JS, Java, C
Experience with code exploitation (for example, Penetration testing in backend environments or web applications, or binary exploitation)
Programming experience in Python
Experience in writing technical reports
Experience in binary reverse engineering - an advantage
DevOps experience - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509714
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
03/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Job description Appdome is looking for a talented, passionate Offensive Researcher to join our innovative research team. If you’re eager to explore cutting-edge mobile security techniques and help safeguard the mobile app ecosystem, this is the role for you! As a key player in our security team, you'll design and execute sophisticated attack simulations on the Appdome platform. Your work will touch on diverse attack vectors, including file systems, networks, jailbreaks, memory injections, and more.
Requirements:
Requirements
* 1-3 years of experience in Offensive Security/Cyber.
* Extended knowledge in researching, simulating, and analyzing different application attack vectors.
* Advantage – Experience using a hacking framework or pen-testing tools such as Frida, Magisk, Multiproxy, and Cheat Engine.
* Ability to create analysis plans and execute them, as well as document and troubleshoot errors.
* Ability to understand the system from multiple perspectives, including high-level and low-level technical architecture.
* Experience in Mobile (iOS/Android) analysis environments and automation tools. Advantages
* Bachelor’s degree in a relevant field.
*  Software development and scripting experience.
Company Overview Appdome's mission is to safeguard mobile apps and their users globally. We offer the industry's only patented, centralized, data-driven Mobile Cyber Defense Automation platform, providing rapid no-code, no-SDK security and integrated defenses against fraud, malware, and bots, along with Threat-Events™ UI/UX controls, ThreatScope™ Mobile XDR, and Certified Secure™ DevSecOps Certification. With Appdome, mobile developers and cyber teams can expedite delivery, ensure compliance, and utilize automation for building, testing, and monitoring mobile app security within DevOps and CI/CD pipelines. Our platform is trusted by leading brands across financial, healthcare, m-commerce, consumer, and B2B sectors, securing over 50,000 apps and protecting over 3 billion end users worldwide. Equal Opportunity Employment Appdome is an Equal Opportunity Employer committed to diversity, equity, and inclusion. We evaluate all qualified applicants without discrimination based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or other protected characteristics.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8529956
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/01/2026
Location: Tel Aviv-Yafo and Netanya
Job Type: Full Time
We are looking for an experienced Vulnerability Researcher to lead our world-class vulnerability research team. As a Vulnerability Researcher Team Lead at our company, you will perform research and responsible disclosure on the latest open-source software, working with your team to find flaws in the most popular components today. The position requires proven experience in vulnerability research, both on web applications and native applications.
As a Vulnerability Researcher Team Lead at our company you will...
Research zero-day vulnerabilities in open-source projects and popular web applications
Manage a team of senior researchers, setting the teams research targets and methodologies
Manage the coordinated disclosure process for vulnerabilities identified by the team
Write & review technical blogposts for vulnerabilities identified by the team
Speak in the most important global security conferences about vulnerabilities identified by the team.
Requirements:
3+ years of vulnerability research experience in open-source projects
3+ years of vulnerability research experience in web applications
Experience in team management
Experience in writing technical vulnerability blogs
Advantage - Experience in binary reverse engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509724
סגור
שירות זה פתוח ללקוחות VIP בלבד