דרושים » תוכנה » Senior Vulnerability Researcher

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 4 שעות
חברה חסויה
Location: Herzliya
Job Type: Full Time
As a vulnerability researcher, your main focus will be on vulnerability discovery and exploitation of most prominent OS`s in the market, and on various challenging platforms.
Requirements:
Requirements:

4+ years of relevant industry experience as a vulnerability researcher or equivalent.

Experience with writing code in assembly or c and Python.

Experience with a dis-assembler for vulnerability research (IDA Pro or GHIDRA).

Experience with complicated exploitation methods.

Deep understanding of OS internals (Mac, Windows, Android etc.).

Good understanding of common security mitigations.

Highly motivated and creative individual.

Advantages:

Graduate of an elite technological unit in the IDF
Bachelor's degree in computer science or software engineering
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8566430
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 4 שעות
Location: Herzliya
Job Type: Full Time
We seek an embedded security researcher to join us in developing cutting-edge cybersecurity projects.

Responsibilities:

As an Embedded security researcher, you will be dealing with:

Embedded systems reverse engineering.
Kernel drivers research and development.
Real-time Embedded End-to-End Low-Level software developments on various unique embedded platforms and environments.
Requirements:
Requirements:
Deep understanding of embedded systems internals and OS.
5+ years of experience in real-time embedded systems development, writing code in Rust / C / C++ / Assembly.
Experience in reverse-engineering using disassemblers (IDA or GHIDRA).
Deep knowledge of network communication protocols and topologies.
Highly motivated and very creative individual.

Advantages:
Experience in vulnerability research.
Graduate of an elite technological unit in the IDF.
Bachelor's degree in computer science or engineering.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8566424
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 5 שעות
Location: Herzliya
Job Type: Full Time
We are looking for an embedded security researcher to join us in researching and developing cutting-edge cyber security projects.

Responsibilities:

As an Embedded security researcher, you will be dealing with:

Embedded systems Reverse engineering.

Real-time Embedded End-to-End Low Level software developments on various unique embedded platforms and environments.
Requirements:
Deep understanding of embedded systems internals and operating systems.

5+ years of experience in real-time embedded systems development, writing code in C/C++ and Assembly.

Experience with embedded systems communication protocols, peripherals and debugging.

Experience in reverse-engineering using dis-assemblers (IDA Pro or GHIDRA).

Good knowledge of network communication protocols and topologies.

Experience in Python scripting.

Highly motivated and very creative individual.

Experience in vulnerability research - advantage.

Graduate of an elite technological unit in the IDF - advantage.

Bachelor's degree in computer science or engineering - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8566409
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 5 שעות
Location: Herzliya
Job Type: Full Time
We are looking for a Windows engineer to join us in developing cutting-edge cybersecurity projects.

As a Windows engineer, you will be dealing with:
Developing user-mode applications and complex Windows Drivers.
Designing and developing components for the company's flagship security product.
Low-Level R&D.
End to End product development.
Requirements:
Requirements:
Deep understanding of Windows systems internals and OS Windows eco-system.
5+ years of experience in high-end operating systems development, writing code in C / C++.
3+ years of experience in Python development.
Good knowledge of network protocols and network topologies.
Highly motivated and very creative individual.
Fast learner, and independent worker.

Advantages:
Graduate of an elite technological unit in the IDF or its equivalents.
Bachelor's degree in computer science or engineering.
Experience in reverse-engineering using dis-assemblers (IDA Pro or GHIDRA).
Understanding and experience with the Linux OS.
Experience in vulnerability research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8566413
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 5 שעות
Location: Herzliya
Job Type: Full Time
We are looking for a senior embedded software engineer to join us in researching and developing cutting-edge cyber security projects.

Responsibilities:

As an Embedded researcher and developer, you will be dealing with:

Real-time Embedded End-to-End Low-Level software development on various unique embedded platforms and environments.

Researching complex Embedded systems.
Requirements:
5+ years of experience in real-time embedded systems development, writing code in C/C++ and Assembly.

Deep understanding of embedded systems internals and operating systems.

Experience with embedded systems communication protocols, peripherals and debugging.

Good knowledge of network communication protocols and topologies.

Experience in Python scripting.

Highly motivated and very creative individual.

Bachelor's degree in computer science or engineering.

Experience in reverse-engineering using disassemblers - advantage.

Experience in vulnerability research - advantage.

Experience in the telecommunications industry - advantage.

Graduate of an elite technological unit in the IDF - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8566410
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time
As a Security Researcher, you will:
Be a part of the OPSEC department which is in charge of research, design, development and enforcement of advanced OPSEC solutions
Be in charge of the operational security research of a cyber intelligence product
Conduct advanced analysis of operating system internals, including binary and architectural evaluation, security testing and exploit mitigation research
Define product requirements, alert mechanisms and working procedures.
Requirements:
Strong knowledge of operating system internals
At least 2 years of experience in one or more of the following areas: malware research, mobile forensics or vulnerability research
At least 2 years of experience with advance static and dynamic analysis tools (e.g., IDA Pro, Ghidra, Radare2, Binary Ninja, Hopper or similar tools)
At least 2 years of experience with ARM64 assembly and low-level debugging (e.g., LLDB, GDB)
Software development skills in at least one programming language: Objective-C, swift, C/C++
B.Sc. in a technological field or a relevant IDF background
Ability to work independently and as a part of a team
It would be great if you also have:
Familiarity with mobile security testing methodologies and security hardening techniques
Experience with network analysis tools, such as Wireshark, Fiddler and Burp.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565067
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time
Want to make an instant impact?
Be a part of the top cyber research teams in the industry and make the world a better place!
As a Vulnerability Researcher, you will be:
Work with top-notch researchers using the latest technologies
Research low-level mechanisms, finding vulnerabilities and circumventing modern mitigation techniques
Our perks:
A competitive compensation package
Hybrid and flexible
Multiple career advancement opportunities
Incredible benefits.
Requirements:
Vulnerability research and exploit development experience
Strong analytical and problem-solving skills
Knowledge of programming languages: Assembly, C and Python
Experience with reverse engineering tool
It would be great if you also have:
B.Sc. in Computer Science or equivalent
Relevant military experience
Knowledge of mobile devices internals/Linux kernel/Win internals.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565048
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
08/02/2026
חברה חסויה
Location: Herzliya
Job Type: Full Time
we are looking for a brilliant Security Researcher to join our elite team. In this role, you will combine offensive research with product innovation. You will conduct in-depth research and penetration testing on Automotive ECUs, uncovering vulnerabilities at both the hardware and software levels. Additionally, you will act as the "Red Team" for our vehicle protection systems, simulating sophisticated attacks to ensure our detection capabilities stay ahead of global threats.
What Youll Do: ECU & Low-Level Research: Conduct deep-dive security research into Automotive Electronic Control Units (ECUs). Automotive Offensive Research: Analyze automotive protocols and architectures to identify, develop, and implement end-to-end attack vectors. Red Teaming: Serve as the internal adversary for our vehicle protection products. You will execute attacks to validate detection efficacy and provide the offensive "ground truth" needed to improve our security logic. Collaborate with data Scientists: Work closely with our data Science teams to fine-tune AI-based detection features, helping to translate complex exploit behaviors into actionable data features.
Advantages:
data Science & AI: Experience working with data teams, understanding of feature engineering, or experience fine-tuning AI models based on security domain expertise. OS Internals: High level of expertise in Linux / QNX / Android internals (both user and Kernel space). Product Security: Experience building or testing Intrusion Detection/Prevention Systems (IDS/IPS) or EDR/XDR platforms. Automotive Knowledge: Understanding of automotive-specific protocols (CAN, Automotive Ethernet, UDS, etc.) and the ability to implement functional attacks against them.
Requirements:
Offensive Mindset: Proven experience in exposing and exploiting vulnerabilities in complex systems. Embedded Expertise: Hands-on research experience with Embedded /low-level systems. Network Communication Expertise: Deep understanding of the logic and vulnerabilities within network protocols and the ability to implement functional attacks against them. Security Fundamentals: Strong grasp of cybersecurity principles, including cryptography. Programming: Strong scripting and development skills in Python (for research/tooling) and C / C ++ (for exploit development). Execution: A "get-things-done" attitude; self-driven and thrives in fast-paced, problem-solving environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8535362
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
21/01/2026
חברה חסויה
Location: Herzliya
Job Type: Full Time
As cyber threats continue to grow in sophistication, frequency, and impact, we are looking for a passionate and highly skilled security researcher to join our Israeli research team within our company Defender.
In this role, you will work at the forefront of automated attack disruption, developing capabilities that detect and respond to advanced threats in real time, regardless of the attack workflow or stage in the kill chain. You will examine diverse and complex signals across on-premises, hybrid, and cloud environments, hunting for emerging adversary techniques, uncovering novel patterns of malicious behavior, and transforming research findings into practical, scalable protection. Your work will span from the earliest ideation stages to production-ready, customer-facing capabilities: researching and modeling attack techniques, identifying the necessary telemetry, designing robust detection logic, and ensuring that our automated disruption mechanisms can respond effectively in real-world conditions. This is an opportunity to have a direct impact on the security of organizations worldwide by building autonomous defense systems that stay ahead of evolving threats and protect customers at scale. You will collaborate closely with engineers, threat analysts, and product teams, bringing creativity and rigor to the challenge of stopping some of the most advanced attacks in the industry before they can cause harm. Our team values diversity and strives to hire individuals with varied experiences and perspectives. We understand that no candidate possesses every desired skill and experience, but together, we form a strong, effective team.
Responsibilities
Provide cybersecurity expertise as needed during security escalations and incidents to help protect our company and our customers
Proactively hunt across diverse signal sources - including on-premises, hybrid, and cloud environments
Stay current with the latest cyberattack trends and design robust, sophisticated detection logic across the full attacker kill-chain.
Build and implement innovative automated disruption capabilities that autonomously detect and mitigate attacks in real time.
Collaborate with engineering and product teams to design security sensors, validate protection ideas, and measure effectiveness using data-driven approaches.
Contribute to the broader security community by authoring technical blogs, sharing research findings, and presenting at leading security conferences.
Requirements:
You have at least 4+ years of hands-on experience in cybersecurity research or threat analysis, preferably in cloud, endpoint, or identity-based threat scenarios.
Familiarity with cloud environments (e.g., Azure, AWS) and an understanding of security challenges in hybrid or multi-cloud infrastructures.
Solid understanding of modern attacker techniques, including the MITRE ATT&CK framework and kill-chain methodologies.
Experience in threat hunting or security investigations across diverse signal sources (on-prem, hybrid, and cloud).
Coding proficiency in at least one of the following: C, C++, Python, or Rust.
Preferred Qualifications
B.S or higher degree in Computer Science, Engineering, or a related field (preferred).
Strong analytical and problem-solving skills, with the ability to operate in ambiguous and evolving threat environments.
Good communication and collaboration skills, with experience working as part of a team.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8511649
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time
As a Low Level Developer, you will:
Play a central role in advancing the features and infrastructures of one of our security products
Lead features, end to end, from concept and design to production
Collaborate closely with multiple teams to analyze, develop and implement new workflows and features
Troubleshoot and debug complex flows
Find and implement creative solutions to technical challenges.
Requirements:
At least 3 years of experience in low-level development in C/C++/Objective-C
Experience with designing complex system
Knowledge of the internals of a major OS: Linux/iOS/Android/Windows
Experience with static and dynamic analysis tools
Ability to work in a dynamic environment
It would be great if you also have:
Relevant military experience
B.Sc. in Computer Science or equivalent experience
Experience in software architecture.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565077
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
03/02/2026
Location: Herzliya
Job Type: Full Time and Hybrid work
we are looking for a Junior Cyber Security Specialist with a deep interest and basic knowledge of both information security and computer science.we ate a cybersecurity firm specializing in advanced adversary simulation and offensive security testing. We deliver Red Team assessments for Fortune 500 companies, simulating sophisticated, real-world attacks across external, internal, cloud and Active Directory environments. Our services span both stealth-based Red Team operations and risk-focused assessments, covering a wide range of attack surfaces including on-premise and cloud environments.
Responsibilities:
Participate in Red Team and Risk assessments under the guidance of senior team members
Assist in documenting findings, writing technical reports, and contributing to final deliverables for clients
Learn and simulate attacker tactics, techniques, and procedures (TTPs)
Support Risk Assessments, where the objective is to identify vulnerabilities, especially in Active Directory, without the requirement for stealth. These engagements provide deep insight into systemic weaknesses and offer high exposure to internal infrastructure.
Contribute to external assessments, such as, perimeter testing, and reconnaissance
Participate in internal, hands-on training program, which covers red team TTPs, tool usage, internal methodologies, and real-world scenarios
Requirements:
Strong interest in offensive security and Red Team methodologies
Foundational understanding of Active Directory architecture, domain trust, Kerberos, GPOs, and domain privilege structures
Familiarity with network protocols such as SMB, LDAP, DNS, and HTTP
Knowledge of common attack techniques such as enumeration, privilege escalation, exploitation, credential dumping and C2 operations
Ability to write or assist in technical documentation and reporting in English
Comfortable working in a collaborative environment and eager to learn from experienced team members
Experience with security tools such as - Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools
Comfortable with basic scripting and using CLI tools
Advantages:
Personal projects, CTF participation, or lab-based experience in offensive security
Exposure to cloud environments (Azure, AWS, GCP)
Programming/scripting experience in Python, PowerShell, C++, C#, etc
Hands-on experience with C2 frameworks (e.g., Cobalt Strike, Mythic, Sliver)
High level of spoken and written English, including the ability to clearly explain technical topics to both technical and non-technical audiences
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8530230
סגור
שירות זה פתוח ללקוחות VIP בלבד