דרושים » אבטחת מידע וסייבר » OSINT Researcher- 2551

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Merkaz
Infiltrate and monitor underground ecosystem.
Surface actionable intelligence from OSINT sources to identify threat actors, tools, leaks and cybercrime patterns.
Leverage open-source tools (and your own custom scripts) to automate recon and enrich intelligence.
Stay ahead of emerging cybercrime trend: phishing kits, malware-as-a-service, data dumps, scam networks.
Build detailed threat profiles and intelligence reports for internal teams.
Work closely with threat intel, DEIR, and red\blue teams.
Your finding will drive real-world action.
Requirements:
3+ years of experience of HO in OSINT, threat intelligence or cybercrime research.
Proven familiarity with OPSEC tight.
Experience using tools like Maltego, SpiderFoot, Reconng, Shoden and others.
Basic coding\scripting (Python, Bash, Regex, scraping frameworks, ect.) to automate and extract data.
Deep understanding of cybercrime TTPs.
Experience with virtual labs, sandboxing and darknet crawling infrastructure.
Prior experience in redteaming, malware analysis or fraud detection.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8611567
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
דרושים בקונסיסט מערכות בע"מ
Job Type: Full Time
Infiltrate and monitor underground ecosystem.
Surface actionable intelligence from OSINT sources to identify threat actors, tools, leaks and cybercrime patterns.
Leverage open-source tools (and your own custom scripts) to automate recon and enrich intelligence.
Stay ahead of emerging cybercrime trend: phishing kits, malware-as-a-service, data dumps, scam networks.
Build detailed threat profiles and intelligence reports for internal teams.
Work closely with threat intel, DEIR, and red/blue teams.
Your finding will drive real-world action.
Requirements:
3+ years of experience of HO in OSINT, threat intelligence or cybercrime research.
Proven familiarity with OPSEC tight.
Experience using tools like Maltego, SpiderFoot, Reconng, Shoden and others.
Basic coding/scripting ( Python, Bash, Regex, scraping frameworks, ect.) to automate and extract data.
Deep understanding of cybercrime TTPs.
Experience with virtual labs, sandboxing and darknet crawling infrastructure.
Prior experience in redteaming, malware analysis or fraud detection.
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8518215
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
30/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Cyber Threat Landscape Researcher
Israel: Tel Aviv/ Hybrid (Israel)
R&D | Full Time | Job Id: 25150
Why Join Us?
The Threat Intelligence group, a key member of the Research department, leads global threat research efforts, and improves threat coverage across the evolving cyber threat landscape.
The group focuses on understanding and tracking cybercriminal organizations, nation-state (APT) actors, hacktivist activity, active malware campaigns, and emerging adversary trends. The research produced by the team supports both strategic insight and the development of advanced security technologies.
This role is responsible for conducting in-depth cyber threat landscape research and owning the full intelligence research lifecycle-from intelligence collection through analysis and written output.
Key Responsibilities:
Research and analyze cyber threat actors.
Be the first to flag trends, new malware, threat actors and intelligence items that stand out in the crowd
Execute the full intelligence research lifecycle:
Monitoring and analyzing the digital underground - including the DarkNet, the DeepWeb, and other open and restricted sources
Gather & flag intelligence that stands out.
Assess, validate, and refine raw information into high-confidence insights
Produce clear, well-structured written research and threat assessments
Build, maintain, and continuously evaluate a diverse set of reliable intelligence sources
Identify long-term trends, relationships, and shifts in adversary behavior
Conduct deep intelligence collection operations and collect proprietary intelligence
Collaborate with other researchers and internal stakeholders to contextualize findings and improve threat coverage
Maintain high analytical and research standards, including sourcing, attribution, and methodological rigor
Requirements:
At least 3 years of experience in Cyber Threat Intelligence (CTI) or cyber threat research
Deep understanding of cyber threat landscape and cybercriminal and hacktivists ecosystems: actors and groups, motivations and goals, tools and capabilities, attacks and campaigns
Proven experience across the full threat intelligence research lifecycle (collection, validation, analysis, production, and dissemination)
Strong WEBINT research and virtual HUMINT operations skills, including source discovery, validation, and long-term source management.
Excellent analytical abilities, strong attention to detail, and critical thinking skills
Strong written communication skills, with the ability to present complex research clearly and accurately
Ability to work independently as well as collaboratively within a research team
Big Plus:
Knowledge of Russian, Spanish, Portuguese or Mandarin.
Familiarity with MITRE ATT&CK or similar frameworks
Experience publishing external threat research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597322
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Senior Threat Intelligence Researcher
The Dream Job
As a Senior Threat Intelligence Researcher, you will be responsible for tracking advanced adversaries and leveraging your deep technical expertise across attacker capabilities, infrastructure, and tactics. You will create and refine approaches to uncover and monitor active threat actors, as well as surface irregular and emerging behaviors in the broader threat landscape. The intelligence you generate will directly strengthen our understanding of threat actors and will inform proactive hunting, detection engineering, and defensive decision-making.
The Dream-Maker Responsibilities
Lead complex threat intelligence investigations through in-depth analysis of the global threat landscape, with a focus on advanced and state-linked actors.
Define and prioritize threat research focus areas (actors, campaigns, sectors, techniques) aligned with our customers and product roadmap.
Deliver actionable cyber threat intelligence and design and execute hunting campaigns using analytics, automation, and advanced AI capabilities.
Curate and maintain structured knowledge on actors, campaigns, infrastructure, and TTPs in our internal threat knowledge base.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
7+ years of experience in cyber security, with significant hands-on experience in threat intelligence research focused on APTs or state-linked actors.
Detailed understanding of existing APT groups historical activities, TTPs, motivations, and targeting patterns.
Strong investigative mindset, high level of intellectual curiosity, and comfort working with incomplete or ambiguous data.
Proficiency in infrastructure research, including WHOIS, passive DNS, SSL certificate analysis, BGP/ASN data, and platforms such as Censys and VirusTotal.
Strong written and verbal communication skills, with experience producing clear and concise threat intelligence reports or briefs.
Experience in software development and data analysis (e.g., Python, Jupyter, or similar) to support investigations and hypothesis testing.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8603747
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
27/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response. You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.

If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.


Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8594253
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are a global leader in ad security and quality solutions, trusted by top publishers, app developers, and ad platforms worldwide. Our mission is to maintain a safe and transparent digital advertising ecosystem, ensuring that users everywhere enjoy a clean and trustworthy online experience. We are expanding our Research Team and are looking for a Junior Malware Researcher with a strong technical mindset, excellent communication skills, and a passion for problem-solving. As a Malware Researcher, you will be responsible for hunting emerging malware and malvertising campaigns and developing effective detection methods to protect our global customers. You will work closely with the R&D and Product teams and be part of a friendly, professional team based in Tel Aviv, supporting customers worldwide.
Responsibilities:
* Detect, monitor, and hunt new malvertising and malware threats.
* Research new attack vectors, delivery methods, and evasion techniques.
* Develop and improve detection logic and signatures.
* Investigate malicious campaigns using internal tools, databases, logs, and external intelligence sources to uncover hidden patterns.
* Analyze web traffic, scripts, redirects, and network behavior to identify malicious activity.
* Collaborate with R&D and Product teams to translate research into production-grade protections.
* Contribute to internal documentation, research reports, and best practices to improve knowledge sharing and support processes.
Requirements:
0-1 years of relevant experience, or equivalent technical background (military, academic, or self-driven research).
* Strong understanding of web technologies, including HTML, JavaScript, browser behavior, and client-side execution.
* Solid foundation in security concepts, such as web threats, malware behavior, and attack chains.
* Familiarity with networking concepts (HTTP/HTTPS, DNS, redirects, basic TCP/IP).
* Hands-on experience with at least one programming or scripting language: JavaScript, TypeScript, or Python.
* Basic experience working with SQL and data analysis.
* Ability to investigate issues end-to-end, from technical root cause to customer impact.
* Strong analytical thinking and problem-solving skills.
* Fluent English (written and spoken).
* Independent, accountable, proactive, and comfortable taking ownership of tasks.
Advantages (Nice to Have):
* Experience or familiarity with the ad tech ecosystem (DSPs, SSPs, publishers, ad networks).
* Exposure to malware analysis, threat intelligence, or SOC workflows.
* Familiarity with AI tools or AI-assisted research workflows.
* Experience with monitoring, visualization, or log analysis tools (e.g., Kibana, Grafana).
* Basic experience with automation, scripting, or data parsing.
Why Join Us?
* Be part of a global leader in ad security and quality with a strong industry reputation.
* Join a collaborative, supportive team that values curiosity, ownership, and learning.
* Gain hands-on experience at the intersection of security, web technologies, and large-scale data.
* Work on meaningful challenges that protect millions of users worldwide.
* Clear opportunity for professional growth and development in cybersecurity research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8520772
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
07/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Threat Intelligence Researcher who can analyze cyber threats and turn technical data into clear, useful insights. You will work closely with a team and clients, create reports, and build simple tools or scripts (mainly in Python) to improve how data is collected and analyzed.
This role requires strong problem-solving skills, good communication, teamwork, and taking responsibility for delivering results.
We are seeking an analytical and experienced Threat Intelligence Researcher to join our team. This is a technical role that necessitates bridging the gap between traditional intelligence analysis and software engineering principles.
You will be responsible for producing strategic and technical intelligence reports and developing automation and scripting solutions for the team.
Specifically, your focus will be on:
Intelligence Reporting: Conduct in-depth investigations and produce comprehensive reports based on customer requests.
Client Engagement: Participate in customer-facing meetings as required to present findings or gather requirements.
Tool Development: Design, implement, and maintain internal tools, scripts, and data scrapers (primarily utilizing Python) to streamline data collection and analysis.
Actionable Intelligence Production: Convert raw technical data into finished, actionable intelligence products, including detailed technical reports, the creation of YARA/Sigma rules, and executive-level briefings.
Requirements:
Technical Expertise: Possess a robust background in cybersecurity and threat intelligence research.
Programming Proficiency: Demonstrated proficiency in Python, Go, or C++, with a particular emphasis on developing automation or data processing pipelines.
Analytical Acumen: Proven ability to synthesize disparate data points to construct a cohesive and accurate intelligence picture.
Professional Communication: Exceptional technical writing skills and the capability to present complex findings to stakeholders with clarity and professional gravity.
Accountability: Ownership by holding self and others responsible for driving outcomes and meeting commitments that deliver value for the business and customers.
Adaptability & Automation Mindset: Comfortable navigating change and ambiguity, with a proactive approach to improving efficiency by automating manual tasks and streamlining team workflows.
Language Proficiency: Fluent written and verbal communication skills in English.
Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success.
Preferred Skills:
Demonstrated familiarity with the MITRE ATT&CK framework.
Active engagement within the security research community (e.g., participation in CTFs, publishing blog posts, or contributing to open-source projects).
Highly articulate, written, and verbal English communication.
Comprehensive understanding of the threat intelligence landscape, including Advanced Persistent Threats (APTs), Initial Access Brokers (IABs), and their Modus Operandi.
Familiarity with the Dark Web and the cybercrime forum ecosystem.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8602297
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
we are seeking an experienced Researcher to join our team dedicated to Android malware research. This role presents an exciting opportunity to conduct comprehensive malware analysis, detect emerging threats, and contribute to our understanding of the Android threat landscape. The ideal candidate demonstrates a positive, proactive attitude and excels as a reliable team player with strong technical skills in Android malware analysis. Key Responsibilities:
* Conduct in-depth Android malware research and reverse engineering
* Detect and document emerging Android malware trends and attack vectors
* Analyze Android applications for malicious behavior
* Write detection rules and develop automation processes for Android malware identification
* Collaborate with team members and share knowledge across departments
* Perform static and dynamic analysis of Android malware samples
* Document findings and contribute to threat intelligence reports
About us:
we are a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact-whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, our company provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must-Have:
* At least 3 years of proven experience in one of the following:
* Research in Android /Windows/Mac/ Linux
* Low-level reverse engineering or development
* Proficiency in one or more programming languages: JAVA, Python, JavaScript, or C / C ++
* Experience with reverse engineering tools and decompilers (e.g. JADX, JEB, IDA Pro, Ghidra)
* Familiarity with instrumentation tools like Frida or debugging tools such as GDB/LLDB
* Understanding of networking fundamentals and protocols
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction Nice-to-Have:
* Experience with Android development
* Familiarity with Android frameworks, including Flutter, React Native, or Unity
* Understanding of Android application security
* Familiarity with the Android malware ecosystem and techniques
* Experience in building automated tools
* Experience with writing detailed reports in English
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8516812
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
we are seeking a highly motivated and talented XDR Research Engineer to join our XDR Research team. In this role, you will develop advanced detection logic to identify and analyze security threats across the company XDR platform. Leveraging the rich data available in the company Cloud data lake, you will conduct extensive research and threat-hunting activities to broaden our detection capabilities and proactively uncover previously unknown threats.
Your work will directly influence the evolution of our companys XDR capabilities and strengthen the security posture of thousands of global customers.
This is an exceptional opportunity for security professionals passionate about Network Security, Detection Engineering, Malware Analysis, and Threat Hunting who want to make a meaningful impact on a fast-growing cybersecurity environment.
Responsibilities
Develop advanced detection logic for the XDR platform to identify security threats.
Conduct research using our company Cloud data, competitive intelligence, and newly published threat reports to expand detection coverage.
Create hunting heuristics and methodologies to uncover unknown or emerging threats.
Continuously improve detection accuracy and enhance the platforms ability to identify threats in a dynamic security landscape.
Participate in cybersecurity breach investigations and security incident activities.
Contribute to technical blogs and PR materials, and participate in cybersecurity conferences.
Requirements:
Proven hands-on experience in the cybersecurity industry, specifically in XDR\SIEM platforms (2+ years)
Comprehensive understanding of the cybersecurity landscape, common threats, and attack scenarios, such as malware infections, command and control (C&C) communication, drive-by attacks, phishing, and network scans
Practical experience with security technologies, including firewalls (FW), intrusion prevention systems/intrusion detection systems (IPS/IDS), antivirus (AV), endpoint protection, and network forensics tools
Strong knowledge of networking architecture and protocols, including TCP/IP, DNS, SSL, SMB, HTTP, IP Routing, etc.
Analytical mindset, capable of formulating hypotheses and validating them through in-depth analysis and technical evidence
Good written and verbal communication skills in English.
Proficiency in at least one scripting language such as Python or Ruby
Ability to work effectively as a team player, demonstrating responsibility and strong organizational skills
Education
Advantage - BSc. in Computer Science, Information technology, Mathematics or similar.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598175
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a top-notch Threat Detection Researcher to join our team and spread the power. In this role, you will further develop the Runtime Sensor as part of our threat research team.
WHAT YOULL DO
Develop detections and tools to protect customers from cloud threats
Investigate attacks on cloud environments and malware targeting cloud workloads
Hunt and analyze real-world attacks and emerging cloud threats
Collaborate closely with the R&D team to transform research insights into product features
Work with customers in response to requests related to suspicious activity or potential incidents
Create best practices and security policies based on research findings
Deliver external-facing content (blog posts and talks at security conferences) based on security insights and novel research
Requirements:
6+ years of experience in security or threat research in which you conducted deep research with actionable conclusions and impacts
Intimate knowledge of OS internals (Windows/Linux) and networking
Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)
Experience delivering security detections in customer-facing product(s)
The ability to learn independently, to be self-driven and goal-oriented
Excellent communication and teamwork skills
ADVANTAGE
Hands-on experience with malware analysis/reverse engineering/vulnerability research
Familiarity with notable threat actors and threat intelligence analysis
IR/red-team/threat-hunting experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8574574
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Ramat Gan
Job Type: Full Time
Alice is seeking to hire an Intelligence Infrastructure Expert for a full time position. The role includes creation, management, and integration of the company’s unique infrastructure and tools across the different Web environments. The position includes infrastructure establishment and processes management alongside end to end delivery to the different teams within the organization. You will be responsible for the generation of insights, means, and methods provided from diverse intelligence streams enabling the organization’s teams to make the internet a safer place. Responsibilities:
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying distribution methods.
* Provide insights on intricate means and methods being used by threat actors to abuse the tech world’s most popular platforms while putting users at risk.
* Identify and address opportunities alongside potential problems in operational processes.
* Research, development and strategizing of new operational methods and logics. We are looking for an expert with a ‘Can Do!’ approach with the following desirable skills, qualities and experience:


About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Mandatory:
* Minimum 1 year experience in establishing and management of intelligence infrastructure
* Operational online security orientation: Demonstrate awareness of security risks in diverse operational environments and understand appropriate mitigation measures
* Experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* OSINT and online research experience
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Strong written and verbal communication skills
* Fluent English
Nice to have:
* Additional languages
* Curiosity and out of the box thinking
* Ability to work under pressure
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8576581
סגור
שירות זה פתוח ללקוחות VIP בלבד