דרושים » אבטחת מידע וסייבר » Infrastructure Red Team Specialist (Maternity Leave Rep)

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 4 שעות
Location: Ramat Gan
Job Type: Full Time and Temporary
We are looking for a Red Team specialist for our Infrastructure Red Team department for a maternity leave replacement. This role includes researching, assessing and challenging digital identity verification and access mechanisms across a variety of platforms and solutions. The position includes creative red team projects and infrastructure management alongside end-to-end delivery to key clients. You will be responsible for the generation of insights, means, methods and signals provided from diverse intelligence streams alongside red team exercises meant to assist with identifying key vulnerabilities, high risk abuses, and mitigation solutions and planning. Key responsibilities:
* Red Team operations - strategic planning and execution of red team exercises
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying abuse methods
* Research and development of new operational bypass methods
* Provide insights on intricate means and methods being used by threat actors to abuse the worlds most popular tech platforms while putting users at risk
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Content creation and management.
Requirements:
* Hands on experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* Knowledge in OSINT investigation techniques and red teaming
* Online and infrastructure security orientation
* Fluent English - Strong written and verbal communication skills
* Curiosity and out of the box thinking
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Ability to work under pressure Nice to have
* Additional languages
*  Python proficiency
* Experience in threat modeling and adversary emulation specifically focused on digital identity attacks
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8571820
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
3 ימים
Location: Ramat Gan
Job Type: Full Time
Alice is seeking an experienced Malware Research Director to build and manage multiple teams dedicated to malware research. This role presents an exciting opportunity to establish a new operation from the ground up, creating processes, optimizing and setting up cross-team collaboration while serving as the primary client interface. The position is primarily leadership, client-facing, creating solutions and requiring exceptional team-building and operational setup skills. The ideal candidate demonstrates high technical skills, proven experience in building teams from scratch, establishing new operations, and strong client relationship management capabilities. Key Responsibilities:
* Establish operational processes, workflows, and quality standards for the new teams
* Coordinate with other departments to integrate the new operation into the existing infrastructure
* Serve as primary client interface, managing relationships and ensuring client satisfaction
* Present research findings and malicious evidence to clients and stakeholders
* Advise on technical aspects for malware research challenges and automated solutions
* Create training programs and onboarding processes for new team members
* Develop performance metrics and evaluation frameworks for team effectiveness
* Lead client meetings, requirement discussions, and project planning sessions
* Collaborate with sales and business development teams on client engagements

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.



Hybrid:
No
Requirements:
Must-Have:
* Management experience - managing at least 10 employees for a minimum of 2 years, with extensive experience in recruiting and building teams
* Strong client-facing experience with excellent presentation and communication skills
* At least 3 years of proven experience in one of the following: malware research, reverse engineering, penetration testing, embedded software development
* Understanding of malware research principles and the cybersecurity landscape
* Experience managing client relationships and delivering technical solutions to business stakeholders
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
* Excellent spoken and written English.
Nice-to-Have:
* Android malware research / reverse engineering hands on experience from the last 3 years
* Experience in leading multiple teams comprising of a few dozen employees
* Experience in leading cybersecurity researchers or other research operations
* Experience establishing new departments or research operations within organizations
* Background in technical sales or business development in cybersecurity
* Experience presenting to C-level executives and technical stakeholders
* Experience with decompilers, debuggers, and disassemblers (e.g., JADX, JEB, LLDB, GDB, x86dbg, Ghidra, IDA Pro)
* Familiarity with instrumentation frameworks like Frida or Xposed
* Proficiency with HTTP debuggers, MITM tools, and network analyzers (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark, Little Snitch, mitmproxy)
* Understanding of network communications and protocols
* Familiarity with multiple programming languages (Java, C/C++, JavaScript, Python)
* Familiarity with multiplatform development frameworks such as Unity, Flutter and React Native
* Under
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375228
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
As a Mobile Threat Analyst at Alice, you will use your internet-fluency, online resourcefulness, broad areas of interest, technical skills, AI-driven methodologies, and hacker-like thinking to solve puzzles and lawfully access difficult-to-come-by open-source data from the deep web.
Responsibilities include:
*  data mining and advanced analysis - conducting high-level Open Source Intelligence
* Collaboration with technical teams
* Analyzing malicious activities online, getting to their sources & distribution methods
* Analyzing large, complex datasets using statistical, scripting, and AI-based techniques.
* Researching new online platforms to discover methods for automating data collection.
* Monitoring third-party websites, forums, messaging app channels, dark web communities, and emerging platforms to uncover malicious activities.
* Translating analytical findings into actionable recommendations for detection systems and enforcement strategies.
* Generate intelligence reports often regarding highly technical concepts and TTPs.
Requirements:
Play-to-win attitude ; Curiosity and proactive approach to learning and developing technical skills as well as out-of-the-box and creative thinking
* Experience writing technical intelligence reports and presenting complex findings in clear, accessible English for non-technical stakeholders Fluent in written English, with the ability to communicate clearly and professionally -a must Strong communication skills, with the ability to collaborate effectively across diverse teams Comfortable with basic coding principles, including the ability to read and understand code (preferably in JAVA, JavaScript and PythongreenTxtBg!)
* Extensive intelligence analysis experience (3+ years) - advantage
* Understanding of the mobile threat ecosystem / threat intelligence analysis background (1-2 years) - advantage
* Ability to leverage AI-assisted coding to develop scripts and lightweight internal tools, with a strong motivation to further develop technical and programming skills - advantage
* Proficiency in additional languages - advantage
* Technically oriented - Big advantage!
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8568079
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
3 ימים
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
Alice is seeking a driven, detail-focused professional to become a vital part of our team as a Generative AI Analyst. In this role, you'll dive into the cutting-edge of technology, meticulously analyzing various content infringements to secure the new wave of Generative AI tools. Your duties will include collaborating with experts in diverse fields such as Hate Speech, Misinformation, Intellectual Property and Copyright, Child Safety, among others. Your tasks will involve writing adversarial; prompts to identify weaknesses in various AI models, including Large Language Models (LLMs), Text-to-Image, Text-to-Video, and beyond. You'll also oversee data management to guarantee the highest quality of outputs. Responsibilities
* Developing adversarial and risky prompt strategies across several areas of abuse to expose potential vulnerabilities in models.
* Managing projects end-to-end, from initial planning and oversight through quality assurance to final delivery.
* Handling extensive datasets across multiple languages and areas of abuse, ensuring precision and meticulous attention to detail.
* Ongoing investigation into new tactics for circumventing foundational models' safety measures.
* Working alongside diverse teams, engineering, product, policy, to tackle new challenges and craft forward-thinking strategies and resolutions.
* Promoting a culture of knowledge exchange and continual learning within the team.


About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must have:
* Background in AI Safety and/or Responsible AI and/or AI Ethics
* Familiarity with recent Generative AI models and agents is essential, though direct technical experience is not a prerequisite.
* Command of English at a near-native level.
* Attention to detail, organizational capabilities, and the capacity to juggle numerous tasks concurrently. Additional Wants:
* Experience with various model types (Text-to-Text, Text-to-Image) is desirable.
* Prior experience with OSINT (Open Source Intelligence) will be considered an asset.
* A self-starter attitude, with the energy to excel in a fast-moving and variable environment.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8508180
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/02/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
We are seeking a highly motivated and technically proficient Security Researcher to join our security research division. This role is dedicated to performing advanced offensive security assessments against the biggest companies in the world You need to be independent, attentive to details, organized, eager to learn new things, and like to research and solve problems What you’ll do:
* Engage in sophisticated Red Team projects, including the identification of undisclosed API endpoints and development of novel bypass techniques for established security controls
* Lead and execute comprehensive, technically rigorous security research targeting complex web and mobile applications, including reverse engineering and proprietary protocols investigation

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must have:
* Minimum of 3 years of proven, hands-on experience in application security analysis and Web penetration testing
* Strong experience with reverse engineering and dynamic analysis of Android and iOS applications, including hands-on experience with techniques like detours, hooking, and runtime code manipulation
* Proficiency in developing and automating tasks using at least one language like Python, JavaScript, or GoLang.
* Deep, hands-on knowledge of the latest tactics, techniques, and procedures (TTPs) used in advanced penetration testing and network analysis.
* Ability to author comprehensive and technically rigorous reports detailing identified vulnerabilities and research outcomes. Nice to have:
* OSCP, OSWE, eWPTXv2, CRTP, or other high-level offensive certifications.
* Hands-on experience with industry-standard reversing tools like JADX, Ghidra, or IDA Pro.
* Demonstrated online achievements, write-ups, or contributions on platforms such as HackTheBox, Pwn2Own, TryHackMe, Bug Bounty programs, or published security research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8536694
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/02/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
We are looking for a Security Engineer to join our team and take full ownership of security tooling and infrastructure. This is a hands-on role with broad responsibility across operational security, platform evaluation, and security-by-design practices.

Youll be responsible for maintaining, improving, and supporting all security tools and platforms; leading evaluations of new technologies; managing internal security review processes; and contributing to infrastructure and product design decisions.

This role demands strong technical expertise and the ability to balance strategic thinking with tactical execution in a fast-moving environment.

Location: Ramat Gan, Israel (hybrid model)

What will you do?

Own and maintain the companys security tooling stack, including endpoint protection, DLP, identity systems, email security, and cloud posture tools.
Monitor cloud and SaaS environments, handle security alerts and misconfigurations, and support day-to-day security operations.
Participate in incident response, including triage, documentation, and post-incident reviews.
Lead security evaluations of new platforms and tools, from technical assessment through internal review and approval.
Drive end-to-end implementation of security solutions, from PoC to production rollout.
Collaborate with IT, Engineering, and DevOps to embed security into system design, identify monitoring gaps, and improve detection capabilities.
Requirements:
3-4 years of experience in security engineering, security operations, or cloud security roles.
Strong experience managing security tools across data, cloud, and identity domains.
Solid knowledge of cloud platforms (GCP/AWS) with experience securing cloud-native workloads.
Ability to lead technical evaluations and risk assessments of tools or platforms.
Understanding of access management, data loss prevention, and identity security models.
Strong written and verbal communication skills in English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8563558
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
7 ימים
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
we are looking for an experienced and proactive Senior IT Systems Engineer to join our growing IT team.
This role will be pivotal in managing our modern, cloud-first infrastructure with a focus on Azure, AWS, Office 365, Intune, and enterprise security platforms. The ideal candidate is a senior-level engineer who thrives on automation, scalability, and supporting a dynamic, hybrid workforce.
Key Responsibilities:
Design, manage, and secure systems across Azure, AWS, Office 365, and Docker-based environments.
Oversee device management policies and compliance via Microsoft Intune across Windows, macOS, and mobile platforms.
Lead onboarding and offboarding workflows, integrating automation and security best practices.
Develop self-service solutions and automated workflows for IT operations using tools like PowerShell, Python, Azure CLI, AWS CLI, and code/no-code platforms (e.g., Workato, Torq).
Administer Entra ID (Azure AD), including conditional access, MFA, and role-based access control (RBAC).
Enforce endpoint and cloud security using CrowdStrike, firewalls, and Cato Networks, and conduct routine audits.
Troubleshoot and manage complex network environments, VPNs, and cloud-based firewalls.
Provide advanced technical support and guidance to internal IT and service desk teams.
Maintain comprehensive documentation and mentor junior staff.
Requirements:
5+ years in IT with at least 3 years in a senior or lead infrastructure role.
Deep expertise in Azure and AWS infrastructure services.
Strong hands-on experience with PowerShell, Python, Bash, Azure CLI, AWS CLI.
Proficient in Microsoft Intune, Entra ID (Azure AD), and managing device compliance policies.
Advanced skills across Windows, macOS, Linux, and Docker platforms.
Understanding of endpoint protection, encryption, network segmentation, and compliance requirements.
Solid networking fundamentals (TCP/IP, DNS, DHCP, routing, VPN).
Proven experience with automation platforms (Workato, Torq, or similar) and modern ITSM tools.
Preferred Qualifications:
Experience with Cato Networks, CrowdStrike Falcon, MDM, IDP Systems or similar cloud security platforms.
Exposure to CI/CD, infrastructure-as-code, or DevOps tooling is a plus.
Microsoft/AWS certifications (e.g., AZ-104, AWS SysOps, Security+) are highly desirable.
Experience supporting hybrid or distributed teams.
Soft Skills & Mindset:
Strategic thinker with strong execution skills.
Team player who thrives in cross-functional collaboration.
Strong ownership mindset and a commitment to continuous improvement.
Excellent written and verbal communication skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565148
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time and Hybrid work
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response. You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541605
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
We are seeking a dynamic and experienced Security Data Analyst to spearhead our cybersecurity initiatives and drive innovation within our team. In this pivotal role, you will lead the development of new security features, conduct in-depth data analysis and validation, conduct network research, develop new security concepts, and enhance our threat detection and response capabilities.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics techniques to investigate security-related data, extract actionable insights, and enhance threat intelligence.
Perform data analysis to uncover anomalies and detect malicious behavior within the organization's network, aiming to automate these findings into a detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Research various network behaviors and patterns.
Requirements:
2 Years of experience with analyzing data and extracting insights from it.
Experience in SQL and relational Databases.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong research abilities in networking and security, and proficiency in extracting insights from security logs.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541635
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
We are seeking a dynamic and experienced Security Data Analyst to spearhead our cybersecurity initiatives and drive innovation within our team. In this pivotal role, you will lead the development of new security features, conduct in-depth data analysis and validation, conduct network research, develop new security concepts, and enhance our threat detection and response capabilities.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics techniques to investigate security-related data, extract actionable insights, and enhance threat intelligence.
Perform data analysis to uncover anomalies and detect malicious behavior within the organization's network, aiming to automate these findings into a detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Research various network behaviors and patterns.
Requirements:
2 Years of experience with analyzing data and extracting insights from it.
Experience in SQL and relational Databases.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong research abilities in networking and security, and proficiency in extracting insights from security logs.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541660
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
7 ימים
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
Were looking for an exceptional Lead Security Researcher to join our world-class Security Research organization. This is a hands-on technical leadership role for a senior researcher who wants to drive research direction, depth, and real-world impact.
This role sits at the intersection of deep offensive research and strategic defensive thinking - influencing how modern cloud-native attacks are detected, understood, and stopped at scale.
What Youll Do:
Provide technical leadership and mentorship to security researchers, setting a high bar for research quality, depth, and execution.
Research and analyze advanced attack techniques targeting Linux-based cloud-native environments (containers, Kubernetes, serverless).
Reverse engineer Linux malware to uncover behavior patterns, execution flows, and persistence mechanisms.
Study real-world threat actor techniques and translate insights into actionable detection, prevention, and hardening strategies.
Design and prototype advanced detection and observability mechanisms, including kernel- and runtime-level approaches (e.g., eBPF).
Turn cutting-edge research into scalable security capabilities that protect large-scale production systems.
Collaborate closely with engineering and product teams to ensure research outcomes are practical, impactful, and production-ready.
Influence Aquas long-term security strategy through research-driven insights.
Requirements:
5+ years of hands-on security research experience, with a strong focus on Linux-based systems.
Deep, practical knowledge of Linux internals - processes, syscalls, memory, networking, and filesystems.
Strong experience in Linux malware analysis and reverse engineering.
Proficiency in C and Python for low-level research, tooling, and prototyping.
Proven ability to analyze attacker behavior and design corresponding detection or mitigation strategies.
Strong familiarity with cloud-native technologies, including containers, Kubernetes, and container runtimes.
Excellent communication skills, with the ability to clearly explain complex technical findings and influence stakeholders.
B.Sc. in Computer Science or equivalent experience (military, academic, or advanced technical background preferred).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565160
סגור
שירות זה פתוח ללקוחות VIP בלבד