דרושים » ניהול ביניים » Senior Cyber Security Specialist- 2449

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Merkaz
We are Looking for a Senior Cyber Security Specialist for an operational position at the core of key intelligence operations
The role involves unique and covert missions, combining independent work with teamwork
Join an award-winning unit renowned for its dynamic and flexible-thinking people
Tackle complex technological challenges, that lead to significant breakthroughs in homeland security matters
Engage in meaningful work with a team of optimistic and driven professionals.
We are seeking individuals who are determined to make a meaningful impact.
Requirements:
3 years of experience in one or more of the following:
Pen testing in complex networks or cloud platforms
Researching systems and frameworks to uncover vulnerabilities
Working in a red-team
Broad background in cyber - networks, operating system, vulnerabilities, exploitation, development of scripts\malware\cyber capabilities.
Advantages:
Experience in python/C++/C# development
Proficiency in Computer Networks topology
Service in one of the technological units in the IDF.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8611633
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 22 שעות
דרושים ביוניטסק
Job Type: Full Time and Hybrid work
About the Role
A leading consulting firm is seeking a Senior Cybersecurity Consultant to join its Defensive Cybersecurity team. In this role, you will work with strategic clients across multiple domains, helping them strengthen their cyber resilience and address complex security challenges.

Responsibilities:

Lead end-to-end cybersecurity consulting engagements, from scoping to executive presentations
Conduct cyber risk assessments and develop mitigation plans
Advise senior stakeholders (including CISOs) on cybersecurity posture and resilience
Build strategic roadmaps and work plans for improving security programs
Support implementation of solutions and ensure execution of recommendations
Collaborate cross-functionally to develop methodologies, solutions, and best practices
Requirements:
Requirements:
3-5 years of hands-on experience in cybersecurity across multiple domains (e.g., cloud, network, application)
Experience in consulting roles - advantage
Strong understanding of networking and cloud fundamentals
Ability to translate technical concepts into business language
Experience with risk assessment and management methodologies
Familiarity with frameworks such as NIST CSF or ISO 27005
Strong analytical and project management skills
Fluent in English and Hebrew (written and spoken)
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8613617
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Senior Windows Detection Engineer
What Are We Looking For?
Were looking for people who are relentlessly curious and committed to continuous learning. AI is reshaping every function across our business, and we enable every team member, regardless of role or level, to build fluency in AI tools and concepts. Those who thrive here actively seek out new solutions, experiment thoughtfully, and apply what they learn to drive better, faster, smarter outcomes.
As the Senior Windows Detection Engineer, you will research and detect the latest malware and exploits targeting the EPP platform. You will reverse-engineer samples to design and implement robust detection methods that prevent sophisticated attacks. Additionally, you will develop custom research tools and PoCs to enhance security across millions of endpoints.
Why us?
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do?
You will be responsible for detecting the newest malware and exploits based on our EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities, starting from reversing the samples, designing new methods to detect or prevent those, and implementing it in the product in the end. You will be developing and using internal research tools, PoCs and discovering new ways to detect/prevent exploitation attacks (EoP, drive-by attacks and more). At the end of the day, your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
Requirements:
Excellent understanding of the Windows Internals - understanding how core system components (Process and Threads, Virtual Memory and more) work behind the scenes.
3+ years of experience in malware analysis (statically and dynamically)
3+ years of experience with C++
Proven experience with reverse engineering of x86/x64/ARM binaries.
Experienced with analysis tools, such as: IDA, WinDBG, SysInternals etc.
Kernel development experience - advantage
Python experience - advantage
Advanced C++ - advantage
Understanding of existing AVs internals - advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8600775
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We're building something special in our Israel-based Offensive Security organization, and we're hiring multiple people across three key areas:
Penetration Testing
Red Team Product
Security Research
While these roles share a common foundation in offensive security tradecraft, each brings its own unique focus and impact.
We're looking for deep expertise in at least one of these areas, with the ability to grow across others. We have multiple openings and are looking for talent at various levels. As we get to know you through the interview process, we'll work together to identify the best fit matching your expertise and interests with the specific role and level (Senior, Lead, or Principal) that makes the most sense for both you and the team.
Role Overview
We are seeking a highly skilled offensive security professional to join our elite team. This role is ideal for someone who thrives on breaking systems, finding creative attack paths, and using their findings to drive meaningful security improvements across Salesforce's products and infrastructure.
You will work alongside some of the best minds in security, operating with significant autonomy and impact. Whether you specialize in deep application level penetration testing, red teaming, security research or vulnerability discovery, we want to hear from you-you don't need to be an expert in all three domains. What unites these roles is a relentless attacker mindset, a drive to find and demonstrate real-world impact, and the ability to translate offensive findings into lasting security improvements.
Responsibilities
Conduct advanced penetration testing, red team operations, or security research targeting Salesforce's cloud infrastructure, applications, and services
Discover, exploit, and document security vulnerabilities using creative and methodical approaches
Develop custom tools, exploits, and attack techniques to simulate real-world adversaries
Collaborate with product teams to remediate vulnerabilities and improve secure design practices
Contribute to the maturity of our offensive security program through automation, tooling, and process improvements
Mentor and share knowledge with team members, fostering a culture of continuous learning
Present findings and security insights to technical and executive audiences
Stay ahead of emerging threats, attack techniques, and offensive security tradecraft
Requirements:
Required Qualifications
5+ years of hands-on experience in offensive security (Senior), 7+ years (Lead), or 10+ years (Principal).
Deep, demonstrable expertise in at least one of the following domains: penetration testing, red teaming, application security research, or vulnerability discovery, with strong foundational knowledge and willingness to learn across other offensive security disciplines.
Proven ability to identify and exploit complex vulnerabilities in web applications, APIs, cloud environments, or infrastructure.
Strong programming/scripting skills (e.g., Python, Go, Bash, PowerShell) for tooling and automation.
Deep understanding of attack frameworks (MITRE ATT&CK), common vulnerability classes (OWASP, CWE), and exploitation techniques.
Excellent written and verbal communication skills, with the ability to clearly document technical findings.
Self-motivated, intellectually curious, and comfortable working independently or as part of a team.
Preferred Qualifications
Experience in cloud security (AWS, GCP, Azure) and containerized environments (Kubernetes, Docker).
Background in offensive security research, including CVE discoveries or contributions to security tools.
Familiarity with CI/CD pipeline security, supply chain attacks, or infrastructure-as-code security.
Experience with social engineering, physical security testing, or adversary simulation.
Active participation in the security community (bug bounties, CTFs, conferences, open-source contributions).
Relevant certifications (OSCP, OSCE, OSWE, GXPN, or equivalent).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8586015
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are seeking a highly skilled and experienced Attack Team Leader to lead a specialized attack team focused on developing offensive, production-ready attack capabilities. This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations.
You will be hands-on in both leadership and development, guiding technical direction, mentoring engineers, and contributing code to offensive attack components.
The Impact You Will Have
Lead the design, development, and deployment of production-grade offensive capabilities targeting application and OS CVEs exploits
Develop attack components for Windows/Linux including OS-level evasion mechanisms
Implement Python bindings to connect native low-level components with Python-based research tools and automation
Research and develop bypass techniques for modern security controls
Collaborate with the Research Team and other R&D stakeholders to implement and refine offensive concepts
Provide technical mentorship and drive engineering best practices within the team
Harness AI coding agents to streamline the above processes
Requirements:
What Sets You Apart
Leadership
Proven experience as a Team Lead or Technical Lead in an offensive security or R&D environment
Strong ability to lead complex engineering efforts and mentor a highly technical team
Experience owning full R&D project lifecycles from concept through production
Technical Expertise
5+ years of hands-on experience in development of offensive attack components
3+ years of Python experience, especially for integrating with native modules and supporting research workflows
Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling
Familiarity with EDR evasion, API hooking, and direct system call manipulation
Personal Attributes
Passionate about offensive security and deep technical research
Passionate about AI coding agents
Self-motivated and capable of operating independently in high-trust environments
Creative and methodical in problem solving, with a strong attention to detail
Even BETTER if you have
Deep knowledge of Windows/Linux APIs, security controls, and undocumented behaviors relevant to offensive security
Experience with MITRE ATT&CK and implementing or simulating ATT&CK techniques
Background in red teaming, adversary emulation, or APT simulation
Prior contributions to offensive tooling or internal R&D platforms
Understanding of modern threat actor TTPs and practical application in research environments
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8605553
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior/Principal Linux Security Researcher for our Tel Aviv R&D center to advance our Cortex-XDR Agent for the Linux platform, which provides runtime protection to servers and cloud workloads. In this role, you will be a key member of a team responsible for researching, developing, and improving our Anti-Exploit and Anti-Malware capabilities. Your work will involve deep exploration of OS internals, exploits, malware, delving into cloud security, and finding ways to mitigate new attack vectors.
Key Responsibilities
Research, develop, and improve state-of-the-art endpoint security solutions focused on comprehensive prevention. This includes broad defense against attack classes like malware and exploits, spanning from low-level mitigations to application-level security
Research Linux OS internals, kernel, application codebases, vulnerabilities, malware and exploits
Respond to security events coming from customers, in the context of malware and exploitation prevention.
Requirements:
In-depth knowledge of some operating system internals is a must - Knowledge of Linux is an advantage
Development experience in C/C++/Rust is a must, 3 years at least
Experience in security research - 3 years at least
Experience in reverse engineering - both static and dynamic, is a must (x86/64 architectures), 3 years at least
Development knowledge in some scripting languages is a must - Experience with Python is an advantage
Ability to work independently and as a part of a team
Strong attention to detail
Ability to take initiative
Preferred Qualifications
Exploitation experience is an advantage (either application-level security or memory corruption)
Familiarity with Kubernetes, containers, and cloud workload security.
Experience leading endpoint security projects across organizational boundaries and teams
Academic experience
Published security research, conference presentations, or CVEs.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8587385
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Ramat Gan
Job Type: Full Time and Temporary
We are looking for a Red Team specialist for our Infrastructure Red Team department for a maternity leave replacement. This role includes researching, assessing and challenging digital identity verification and access mechanisms across a variety of platforms and solutions. The position includes creative red team projects and infrastructure management alongside end-to-end delivery to key clients. You will be responsible for the generation of insights, means, methods and signals provided from diverse intelligence streams alongside red team exercises meant to assist with identifying key vulnerabilities, high risk abuses, and mitigation solutions and planning. Key responsibilities:
* Red Team operations - strategic planning and execution of red team exercises
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying abuse methods
* Research and development of new operational bypass methods
* Provide insights on intricate means and methods being used by threat actors to abuse the worlds most popular tech platforms while putting users at risk
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Content creation and management.
Requirements:
* Hands on experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* Knowledge in OSINT investigation techniques and red teaming
* Online and infrastructure security orientation
* Fluent English - Strong written and verbal communication skills
* Curiosity and out of the box thinking
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Ability to work under pressure Nice to have
* Additional languages
*  Python proficiency
* Experience in threat modeling and adversary emulation specifically focused on digital identity attacks
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8571820
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
30/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are seeking a highly skilled and experienced Head of Application Security to join our dynamic team.
Job Id: 24652
This role is pivotal in driving the security of our software development lifecycle and ensuring the robustness of our applications against potential threats. The ideal candidate will have a strong background in secure software development practices, including SSDLC implementation, and a deep understanding of security risks & tools. This position reports directly to an R&D VP.
Key Responsibilities
Lead the application security team, providing strategic direction and mentorship.
Develop and implement a comprehensive Secure Software Development Lifecycle (SSDLC) framework.
Oversee the integration of security practices into all phases of the software development lifecycle, including CI/CD guardrails.
Conduct risk assessments and threat modeling to identify and mitigate potential security vulnerabilities.
Collaborate with development teams to ensure secure coding practices and adherence to security standards, while maintaining developer productivity.
Implement and manage security automation tools and processes to enhance the efficiency of security operations.
Stay up-to-date on the latest security trends, vulnerabilities, and technologies to continuously improve our security posture.
Provide expert guidance on security architecture and design for new and existing applications.
Lead incident response efforts related to application security breaches and vulnerabilities.
Foster a culture of security awareness and continuous improvement within the organization.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field.
Minimum of 7 years of experience in application security, with at least 3 years in a leadership role.
Proven experience in implementing and managing SSDLC frameworks.
In-depth knowledge of security frameworks and methodologies.
Strong understanding of threat modeling methodologies, secure coding practices and common vulnerabilities (e.g., OWASP Top Ten).
Proficiency in programming languages such as Java, Python, C#, or similar.
Experience in implementing security tools and technologies such as ASPM, SAST, DAST in complex and high-scale environment.
Excellent communication and leadership skills, with the ability and passion to drive change across the organization.
Relevant certifications such as CISSP, CISM, or CSSLP are desirable.
Proven experience in a similar role at another leading software development company.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597491
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/04/2026
חברה חסויה
Location: Petah Tikva
Job Type: Full Time
Required Senior Cloud Security Architect
Position Overview:
As a Cloud Security Architect, you will be responsible for defining and strengthening the security posture of our products and cloud environments. You will lead threat modeling, risk assessments, and the design of secure architectures, while guiding teams in implementing effective security controls and secure development practices. Working closely with developers, engineers, and management, you will ensure security is embedded throughout the product lifecycle and clearly communicate complex concepts across the organization. This role requires strong technical expertise, strategic thinking, and a proactive approach to emerging threats.
Key Responsibilities:
Conduct Threat Modeling and Security Risk Assessment to identify weaknesses in existing security measures and develop strategies to address them.
Design Security Architecture that withstand attacks and ensure the confidentiality, integrity, and availability of the product. This involves establishing secure configurations, access controls, authentication mechanisms, and encryption methodologies.
Implementing Security Controls guiding the integration of secure coding practices, establishing secure development lifecycles, and ensuring adherence to established security standards.
Collaborate with stakeholders including developers, engineers, and management teams. Communicate complex security concepts in a clear and concise manner, ensuring that all parties understand the importance of incorporating security measures into the product development process.
Stay updated with emerging threats and remain vigilant, continuously monitoring emerging threats and vulnerabilities.
Requirements:
Technical:
Bachelors degree in computer science, information security, or a related field.
Knowledge of programming languages, cryptography, network security, and system architecture.
At least 10 years of experience as security engineer, security researcher or security developer
At least 3 years of experience as cloud architect or cloud security architect in AWS
Proficiency in secure software development practices, SDL-C, threat modeling and risk assessment methodologies
Familiarity with security compliance frameworks such as ISO 27001 and NIST
Non-Technical:
Ability to handle prioritize and execute multiple tasks simultaneously.
Ability to work collaboratively with management across multiple departments.
Fluent in English - the ability to lead meetings and present
Team player.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8600556
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for Principal Cloud Security Researcher with a strong security background to join our innovative Research team.
The Role
We're looking for a Principal Cloud Security Researcher to serve as a senior technical leader within our Research team. This is a high-impact individual contributor role -- you won't manage people, but you'll shape the direction of our entire research function, mentor researchers, and act as a force multiplier across the organization.
You'll be the person who takes a vague threat signal and turns it into a detection strategy, a published finding, or a product capability. You'll operate as a trusted deputy to the research team lead, owning the most complex and ambiguous research challenges while raising the technical bar for the team.
What You'll Do
Drive Groundbreaking Research
Own and drive our most critical research initiatives end-to-end - from initial threat hypothesis through detection logic, product integration, and external publication.
Set the technical direction for cloud threat research across AWS, Azure, and GCP, identifying emerging attack surfaces and novel techniques before they become mainstream threats.
Investigate real-world cloud and SaaS security incidents, dissecting attacker tradecraft and extracting insights that evolve our detection capabilities.
Pioneer new forensic investigation techniques and detection methodologies for cloud-native and SaaS environments - pushing the state of the art, not just following it.
Be a Voice in the Community
Represent our company as a thought leader through high-quality research publications, conference presentations (BlackHat, DEF CON, RSA, fwd:cloudsec, and similar venues), and open-source contributions.
Build and maintain our reputation as a research-driven company that advances the field - not just a vendor with a blog.
Engage with the broader security research community, fostering relationships and collaborative knowledge-sharing.
Shape the Product
Bridge research and product - translate threat findings into actionable product requirements, working closely with engineering and product teams to ensure our CDR platform stays ahead of evolving threats.
Design and develop advanced detection algorithms that directly feed into our platform, closing the gap between research insight and customer protection.
Elevate the Team
Act as the team's go-to technical authority. When researchers hit a wall on complex cloud attack chains, IAM edge cases, or detection gaps - you're who they turn to.
Mentor and grow other researchers through research reviews, pair investigations, code reviews, and by setting quality standards and methodology best practices.
Influence technical decisions org-wide - contributing to architecture, tooling, and strategic research priorities.
Step in as the research team lead's deputy when needed - driving prioritization, representing research cross-functionally, and ensuring continuity.
Requirements:
Who You Are
8+ years in security research, threat research, or closely related fields (offensive security, detection engineering, incident response, cloud security engineering). Fewer years are fine if your depth and track record are exceptional.
Deep multi-cloud expertise - strong hands-on experience across at least two of the major cloud providers (AWS, Azure, GCP), with working knowledge of the third. You understand the IAM models, logging pipelines, APIs, and attack surfaces that matter in each.
A track record of original research - you've published meaningful technical findings through blog posts, conference talks, open-source tools, or vulnerability discoveries that moved the needle. We want someone who doesn't just consume research - you produce it.
Strong adversarial mindset and critical thinking - you think like an attacker targeting cloud infrastructure, SaaS platforms, identity systems, and Kubernetes. You can model threat scenarios, map out attack paths, and poke holes in defenses.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606762
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Ramat Gan
Job Type: Full Time
Alice is seeking to hire an Intelligence Infrastructure Expert for a full time position. The role includes creation, management, and integration of the company’s unique infrastructure and tools across the different Web environments. The position includes infrastructure establishment and processes management alongside end to end delivery to the different teams within the organization. You will be responsible for the generation of insights, means, and methods provided from diverse intelligence streams enabling the organization’s teams to make the internet a safer place. Responsibilities:
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying distribution methods.
* Provide insights on intricate means and methods being used by threat actors to abuse the tech world’s most popular platforms while putting users at risk.
* Identify and address opportunities alongside potential problems in operational processes.
* Research, development and strategizing of new operational methods and logics. We are looking for an expert with a ‘Can Do!’ approach with the following desirable skills, qualities and experience:


About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Mandatory:
* Minimum 1 year experience in establishing and management of intelligence infrastructure
* Operational online security orientation: Demonstrate awareness of security risks in diverse operational environments and understand appropriate mitigation measures
* Experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* OSINT and online research experience
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Strong written and verbal communication skills
* Fluent English
Nice to have:
* Additional languages
* Curiosity and out of the box thinking
* Ability to work under pressure
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8576581
סגור
שירות זה פתוח ללקוחות VIP בלבד