משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 7 שעות
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced SOC Manager to lead our Security Operations Center (SOC), with full responsibility for detection, response, and operational excellence. This role combines hands-on technical leadership with people management, process ownership, and alignment to business risk.
The SOC Manager will be accountable for the effectiveness, maturity, and scalability of security operations across the organization.
What you will do?
Oversee day-to-day SOC operations, ensuring timely threat detection, incident response, and threat mitigation. Own day-to-day SOC operations, ensuring effective threat detection, incident response, and containment across all environments.
Develop and implement SOC policies, processes, and playbooks to improve security effectiveness.
Continuously evaluate and enhance SIEM configurations, alerting mechanisms, and automation. Continuously optimize SIEM content, alert quality, detection coverage, and automation capabilities.
Team Management & Training- Recruit, mentor, and manage a team of SOC analysts and incident responders.
Lead incident investigation, containment, and remediation efforts, coordinating with internal teams and external partners.
Align security operations with MITRE ATT&CK, NIST, and other cybersecurity frameworks.
Produce clear, executive-level incident reporting and risk summaries for security leadership and stakeholders.
Stay updated on emerging threats, attack techniques, and security technologies to drive continuous improvements.
Requirements:
5+ years of experience in SOC leadership, cybersecurity operations, or incident response.
Strong hands-on experience with SIEM platforms (Splunk preferred) and threat detection methodologies.
Deep expertise in incident response, threat hunting, and forensic analysis.
Knowledge of cloud security (AWS, Azure, GCP) and network defense strategies.
Proficiency in scripting (Python, PowerShell, or Bash) for security automation.
Familiarity with MITRE ATT&CK, NIST, CIS, and other security frameworks.
Excellent communication and leadership skills with a track record of team development and cross-functional collaboration.
Preferred Qualifications:
Security certifications such as CISSP, GCIH, GCFA, OSCP, or SIEM-specific certifications.
Experience leading SOC optimization projects and implementing SOAR solutions.
Background in offensive security (Red Team/Purple Team) is a plus.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8567103
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are seeking a Detection & Response Manager to lead and mature our security operations and adversary defense capabilities.
This role owns SOC operations, incident response, red teaming, and security automation (SIEM & SOAR) across cloud, data center, and enterprise environments.
The ideal candidate combines operational excellence, threat-adversary thinking, and automation-first execution.
Key Responsibilities
Security Operations Center (SOC) Leadership
Own day-to-day SOC operations across cloud, data center, and corporate environments
Define detection strategy aligned to our company threat models and crown jewels
Ensure high-quality alerting, triage, escalation, and reporting
Continuously reduce false positives and alert fatigue
Incident Response & Crisis Management
Lead end-to-end incident response for high-severity security incidents
Own incident command during crises (technical, executive, and regulatory coordination)
Ensure post-incident reviews lead to real control improvements
Maintain and regularly test incident response playbooks
Red Team & Adversarial Testing
Manage red team and purple team activities (internal and external)
Translate real-world adversary TTPs into detection and response improvements
Ensure findings from red team exercises are remediated and verified
Partner with product, cloud, and physical security teams on attack simulations
SOC Automation (SIEM & SOAR)
Own SIEM and SOAR strategy, architecture, and roadmap
Drive automation of detection, enrichment, response, and reporting
Integrate identity, cloud, CI/CD, and physical security telemetry
Measure SOC effectiveness using MTTD, MTTR, and coverage metrics
Threat Intelligence & Continuous Improvement
Operationalize threat intelligence into detections and playbooks
Track emerging threats relevant to cloud, AI, and infrastructure providers
Continuously improve detection coverage against prioritized attack paths
What Success Looks Like (12 Months)
Measurable reduction in MTTD and MTTR for high-severity incidents
Majority of high-risk incidents detected internally, not externally
Red team findings consistently detected and contained
SOC automation meaningfully reduces manual effort
Clear, trusted security reporting to CISO and leadership.
Requirements:
7+ years in security operations, incident response, or threat detection
Proven experience leading a SOC or incident response function
Strong experience with SIEM and SOAR platforms
Deep understanding of:
Cloud security
Identity-based attacks and detection
Endpoint, network, and application telemetry
Experience running or managing red team / purple team activities
Calm, decisive leadership under pressure
Preferred Qualifications
Experience in cloud service providers, hyperscale, or infrastructure companies
Familiarity with GPU / HPC environments or large-scale data centers
Experience with DORA, SOC 2, ISO 27001 incident requirements
Background in threat hunting or offensive security
Key Skills & Attributes
Adversary-minded: thinks like an attacker, not a tool operator
Automation-first mindset
Strong communicator during crises
Data-driven decision making
High ownership, low ego.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547823
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
03/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Senior SecOps Engineer to enhance our security operations and ensure robust protection against sophisticated threats. This role is crucial for maintaining our Security Operations as a high-performing and resilient hub that can quickly adapt to emerging security challenges in the fintech industry. You will take the lead in refining our SOC capabilities by monitoring network traffic, automating processes, analyzing security incidents, managing security tools, and providing expertise to SOC analysts, without having direct management responsibilities.

The Senior SOC Engineer collaborates with cross-functional teams to build defenses, respond to incidents, and design strategies for robust cybersecurity posture.

What you will be doing:
Drive SOC workflow automation using SOAR, and oversee the full lifecycle management (deployment, tuning, operation) of core security tools like EDR aiming to increase automation coverage and consistency.
Lead Cloud Security Monitoring, including managing AWS security logs via SIEM and working with the CSPM team for proactive cloud defense.
Perform continuous Security Monitoring and Threat Detection, building custom queries and dashboards to enhance visibility across platforms.
Develop and execute Proactive Threat Hunting procedures to identify potential risks.
Enhance and coordinate the Incident Response process, working with cross-functional teams through containment, eradication, and post-incident analysis.
Collaborate with third-party vendors for managed security services and specialized tools.
Requirements:
What youll need?
Experience: 5+ years in SecOps/IR with hands-on threat detection and mitigation, specifically in cloud-centric, production-scale environments.
Technical Skills: Strong capability in Cloud-focused threat detection, incident response, and analysis of complex attack patterns. Skilled in writing SIEM queries/alerts with an outcome-orientation (e.g., measurable improvements in MTTD or alert fidelity).
Scripting & Automation: Knowledge of Python, SQL, or Bash for SOC automation, with practical experience building SOAR playbooks, data enrichment scripts, and Detection-as-Code solutions.
AI & LLM Security: Understanding of the AI threat landscape (including adversarial ML and OWASP Top 10 for LLMs) and exposure to securing GenAI pipelines.
Investigations: Extensive experience with end-to-end security investigations, deep knowledge of security network protocols, and familiarity with the OWASP Top 10 vulnerabilities.
Security Tools: Hands-on experience managing, configuring, and investigating security events across EDR, Firewall, SIEM, and SOAR platforms.
Core Skills: Strong problem-solving, analytical, and organizational skills. Comfort leading initiatives without direct authority, a security-first approach, and the ability to mentor SOC analysts.

Itd be cool if you also: [NOT A MUST]
Familiar with industry frameworks (ISO 27001, PCI-DSS, SOC2, NIST, etc.) and regulatory requirements.
Have one or more certifications: CRTP, OSCP, OWSP, OSDA, GCIH, GIAC, CSA, CompTIA CySA+, or other relevant certifications.
Experience with building agents and utilizing LLM\AI in day2day work
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8530123
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Engineer to join our security operations team with a strong focus on detection and response.
This is a unique opportunity to leverage your threat detection and response experience and build some of the foundational systems and services to keep our infrastructure free from malicious actors and threats. You will partner closely with all engineering teams, IT administrators, and compliance analysts to ensure that we maintain sufficient visibility into our environments and develop effective programs and practices to ensure that our environments are always secure. Tooling and automation will be key to success as we scale our environments to meet customer demand.
What You Will Do:
Collaborate with different teams for building and setting up pipelines needed to gather relevant security telemetry.
Build and maintain an effective and scalable security monitoring infrastructure solution.
Develop detection strategies to identify anomalous activity and ensure that our critical infrastructure and services operate in a safe environment.
Triage alerts and drive security incidents to closure while reducing their potential impact to Semperis.
Build processes and workflows to triage security alerts and respond to real incidents.
Research new threat attack vectors and ensure that our detection and response capability is in line with the current threat landscape.
Proactively improve the quality of our detection rules and strive to eliminate classes of issues by working directly with engineering teams.
Contribute to strategy, risk management, and prioritization for all efforts around detection and response.
Collaborate with the compliance team to maintain and audit security controls and processes, ensure compliance with relevant security frameworks and certifications.
Pragmatic implementing business-focused controls to safeguard the companys multi-cloud entities.
Requirements:
5+ years of relevant industry experience.
Strong domain knowledge in security incident detection and response, with a proven ability to operate, optimize, and enhance the effectiveness of the Security Operations Center (SOC).
Demonstrated experience with effective incident response and containment practices, preferably in a cloud-first environment.
Hands-on experience in instrumenting and deploying telemetry solutions.
Experience with operating open-source and/or commercial solutions for logging and security event management, including SIEM and SOAR platforms such as Splunk, Microsoft Sentinel, SolarWinds, Trellix, and similar tools.
Experience in managing and fine tunning CNAPP platforms such as WIZ, Orca, Defender, Singularity or other similar solutions.
Ability to script or code fluently in an interpreted language like Python, PowerShell or Javascript.
Proficiency in automation using tools such as Logic Apps, Azure Functions, AWS Lambda, and Runbooks.
Strong experience in analyzing IAM configurations and entities behavior across multi-cloud and multi-account environments, detecting potential breaches, identifying security gaps, and responding to threats in real time.
Decision-maker with the ability to operate with freedom and autonomy.
Experience working with distributed teams and other cross-functional stakeholders.
Ability to manage competing priorities and workload.
Experience or strong familiarity with DevOps practices and Agile methodologies is a plus.
Experience with cloud deployments in AWS, GCP, or Azure is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8553433
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565016
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
02/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Lead to join our team and play a key role in securing and scaling our production environments. This is a hands-on position with direct impact on system reliability, security posture, and operational excellence across the organization.

Responsibilities:

Own day-to-day security operations in a fast-moving, cloud-native environment

Lead end-to-end incident detection, investigation, and response

Own and operate core security tooling (SIEM, CSPM, CNAPP, SSDLC, EDR)

Work closely with R&D, DevOps, and IT to bake security into development and operations

Build and maintain incident response runbooks and security playbooks

Own security compliance and GRC efforts, including SOC 2
Requirements:
5+ years of experience in SecOps, Security Engineering, or DevSecOps roles
Hands-on experience with cloud environments (AWS preferred)
Strong background in Kubernetes, Microservices and CI/CD pipelines
Experience with SIEM, CSPM, EDR, and vulnerability scanning tools
Solid understanding of threat models, attack vectors, and incident response
Ability to work independently with strong ownership and problem-solving skills
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8528646
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required IR Engineer
Were looking for a hands-on incident response expert thats passionate about investigating real threats, building scalable detections, and improving automation across modern cloud-native environments. This is a high-impact role within our security group, ideal for someone who thrives on both investigation and building long-term solutions. In your day-to-day, youll:
Investigate complex security incidents in cloud (AWS/GCP), containerized (Kubernetes), and endpoint environments
Design and maintain detection rules and anomaly-based logic to identify emerging threats in production systems
Automate forensic evidence collection and response actions across diverse platforms and services
Collaborate with SOC analysts, Security Architects, and Engineering teams to improve detection coverage and data visibility
Lead incident retrospectives and document technical findings, response steps, and process improvements
Develop and maintain investigation playbooks, chain-of-custody protocols, and sprint-based IR deliverables
Participate in on-call rotations and contribute to incident readiness exercises and escalation protocols.
Requirements:
4+ years of hands-on experience in incident response or security operations
Proficiency in Python for scripting, automation, and tool development
Strong knowledge of cloud platforms (AWS and/or GCP) and container technologies (Kubernetes)
Experience with detection engineering, threat hunting, and automated response tooling
Familiarity with scripting or automation tools for investigation and remediation
Excellent written and verbal communication skills in English
Ability to work effectively with global teams across time zones.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565054
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
02/02/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We seek a dedicated and proactive Senior SecOps Engineer to join our InfoSec team and take ownership of all security-related tasks across the organization. In this role, you will be key in aligning security goals with infrastructure, R&D and IT requirements. You will be responsible for integrating security into our CI/CD pipelines, managing cloud infrastructure security, ensuring compliance with security standards, and protecting our infrastructure from vulnerabilities.

A day in the life and how youll make an impact:

Implement and manage security tools such as static code analysis, cloud posture monitoring, and penetration testing tools.
Embed security into the DevOps lifecycle, including CI/CD pipelines, IaC (Infrastructure as Code), and software development workflows.
Design and enforce security policies for cloud architecture, ensuring secure configurations and monitoring.
Lead incident response activities, vulnerability management, and forensic investigations to mitigate threats.
Drive compliance efforts (ISO 27001, SOC 2, GDPR, etc.) and audit readiness for the organization.
Work closely with stakeholders (CISO, COO, System Architects, DevOps, IT, Finance, HR, etc) to identify requirements and prioritize security needs.
Continuously monitor systems and infrastructure for vulnerabilities, intrusions, and misconfiguration.
Perform or manage penetration testing initiatives to identify security weaknesses.
Requirements:
5+ years of experience in sec-ops positions with relevant certifications
Demonstrable experience working in IT, Networking, Infrastructure, DevOps environments
Deep understanding of cloud platforms (AWS, GCP) and their security best practices(CSPM, ASPM, DSPM).
Strong knowledge of cloud networking(VPC), firewalls, IAM roles, and encryption.
Familiarity with ISO 27001, SOC 2, GDPR, and other security and regulatory frameworks, as part of GRC.
Experience performing or overseeing penetration testing processes.
Experience working with Forensic & Threat Detection Tools such as AWS GuardDuty, Azure Sentinel, Splunk, Qradar, Arcsight, and other SIEM systems
Experience working with multiple EDR and XDR Tools (CS, SentinelOne, MS Defender, etc)
Excellent verbal and written communication skills, capable of explaining technical security concepts to non-technical stakeholders.
Ability to think critically and act decisively under pressure.
Integration and project lead experience
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8528046
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly skilled and experienced Head of Application Security to join our dynamic team. This role is pivotal in driving the security of our software development lifecycle and ensuring the robustness of our applications against potential threats. The ideal candidate will have a strong background in secure software development practices, including SSDLC implementation, and a deep understanding of security risks & tools. This position reports directly to an R&D VP.
Key Responsibilities
Lead the application security team, providing strategic direction and mentorship.
Develop and implement a comprehensive Secure Software Development Lifecycle (SSDLC) framework.
Oversee the integration of security practices into all phases of the software development lifecycle, including CI/CD guardrails.
Conduct risk assessments and threat modeling to identify and mitigate potential security vulnerabilities.
Collaborate with development teams to ensure secure coding practices and adherence to security standards, while maintaining developer productivity.
Implement and manage security automation tools and processes to enhance the efficiency of security operations.
Stay up-to-date on the latest security trends, vulnerabilities, and technologies to continuously improve our security posture.
Provide expert guidance on security architecture and design for new and existing applications.
Lead incident response efforts related to application security breaches and vulnerabilities.
Foster a culture of security awareness and continuous improvement within the organization.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field.
Minimum of 7 years of experience in application security, with at least 3 years in a leadership role.
Proven experience in implementing and managing SSDLC frameworks.
In-depth knowledge of security frameworks and methodologies.
Strong understanding of threat modeling methodologies, secure coding practices and common vulnerabilities (e.g., OWASP Top Ten).
Proficiency in programming languages such as Java, Python, C#, or similar.
Experience in implementing security tools and technologies such as ASPM, SAST, DAST in complex and high-scale environment.
Excellent communication and leadership skills, with the ability and passion to drive change across the organization.
Relevant certifications such as CISSP, CISM, or CSSLP are desirable.
Proven experience in a similar role at another leading software development company.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8540450
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Security Incident Response Group Lead - (250000G4)
What will you do?
A global provider of cybersecurity protection solutions for networks and applications. We are looking to enhance our Cloud Services, the fastest growing business, in key markets.
Security operation leadership - Oversee the daily operation by leading projects & processes, tracking tasks & progress, and mentoring of a global Incident Response (IR) group that is specialized in detection & mitigation of various network threats, such as Denial-of-service attacks, application server-side & client-side threats, botnets, and more.
Incident response leadership - Oversee & coordinate RT security incidents globally by maintaining & developing solid IR processes & playbooks, crisis management & de-escalation techniques, lead escalation calls, and identify & improve gaps in technical & operational procedures among the global security group.
Global IR team leadership - Lead and mentor a multidisciplinary cloud security group consists of security IR analysts & security experts, fostering a collaborative and high-performance culture, oversee the global recruitment & training process of new employees, and develop & maintain high performance teams with deep technical knowledge, customer orientation, and operational attitude.
Customer engagement - Ensure customer's SLA & satisfaction, build and maintain strong relationship with customers & stakeholders, and maintain regular communication through meetings, reports, and updates to ensure stakeholders are informed about security initiatives, incident responses, and risk posture.
Strategic planning - Develop & execute roadmaps, strategies, and frameworks aligned with organizational goals.
Requirements:
What you need:
At least 8 years of experience in the domain of cybersecurity operations & investigations, especially in network security & incident response.
A proven & solid experience in leading & overseeing a global group from the technical & operational points of view.
A proven & solid experience in recruiting & training new employees.
Strong & deep knowledge & experience in networking, especially network protocols of various OSI layers - application layer protocols, transport and network layer protocols.
Strong & deep knowledge & experience in the domain of network security threats such as DDoS/DoS, API security, OWASP T10, etc.
Strong & deep knowledge & experience with security controls and tools such as FW, SIEM, IDS/IPS, and vulnerability scanners.
Solid experience in customer service & customer engagement during incidents and crisis.
Proven problem-solving capabilities under pressure.
Strong leadership skills.
Good communication skills and customer experience.
Fluent English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565198
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
6 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
seeking a senior, hands-on CISO & Head of IT to act as "one-man-show" authority for IT operations and information security. This role owns IT and Information Security e2e for core business functions:
setting direction, making structural and vendor decisions, and defining what "good" looks like, while also answering questions in real time, exercising sound judgment, and taking ownership when issues arise.
This is a highly visible leadership role focused on judgment, ownership, and practical execution.

Key Responsibilities

Information Security & Risk

Build and maintain a pragmatic information security and IT risk management program aligned with business priorities.
Lead security risk assessments and drive remediation in partnership with engineering, IT, and business teams.
Define and maintain security policies, standards, and secure-by-design practices in collaboration with our Product House organization.
Promote security awareness and accountability across the company, including ownership of employee security training programs.
IT Ownership

Own internal IT environment, including identity and access management (e.g., Okta), Google Workspace, endpoints, and core SaaS tools.
Ensure smooth employee onboarding and offboarding.
Act as a point of escalation for IT issues and access problems, including hands-on work.
Manage external IT service providers and helpdesk vendors, including SLAs and escalation.
Security Operations

Own the overall effectiveness of security monitoring, detection, and response.
Design and maintain preventive controls, processes, and readiness measures to reduce the likelihood and impact of data security incidents.
Ensure vulnerabilities, findings, and incidents are identified, prioritized, and addressed.
Lead preparation for security incidents, including incident response planning, tabletop exercises, and coordination with Legal, Product House, and external partners.
Stay current on emerging threats and translate them into practical, risk-based improvements for the business.
Audits, Customers & Vendors

Lead security audits and certifications (e.g., SOC 2, ISO 27001) and serve as the primary contact for auditors.
Personally own customer security questionnaires and security discussions.
Partner closely with Legal on privacy, regulatory, and contractual security matters.
Oversee the IT and security budget and manage relevant vendors and advisors.
Requirements:
8+ years of experience across IT operations and information security, preferably in a SaaS or cloud environment.
Hands-on experience with enterprise IT systems (e.g., Google Workspace, Okta) and security governance frameworks (SOC 2, ISO 27001).
Experience supporting audits, certifications, and customer security requirements.
Ability to manage vendors and drive outcomes through others.
Strong communication skills and sound judgment in balancing risk, speed, and practicality.
Security certifications (e.g., CISSP, CISM) are a plus, not a requirement.
Full professional proficiency in English is required.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8561537
סגור
שירות זה פתוח ללקוחות VIP בלבד