משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 9 שעות
חברה חסויה
Location: Tel Aviv-Yafo
we are looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.
Responsibilities:
Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers - an advantage.
Fluent English (written, spoken) - a must. Another language - an advantage.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616649
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
27/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response. You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.

If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.


Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8594253
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
5 ימים
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Operations Engineer to join our fast-growing security team and take ownership of our SIEM and SOAR automation efforts. This is a unique opportunity to work at the intersection of security operations, detection engineering, and automation in a modern SaaS and cloud-native environment.


What Will You Do?
Maintain and enhance detection engineering content across SIEM and automation systems
Develop new SOAR workflows, automated actions, and response playbooks
Build and improve SIEM rules, correlations, dashboards, and monitoring capabilities
Lead investigations and identify security issues through alert analysis and mitigation
Coordinate incident response activities and communicate clearly with relevant stakeholders
Provide consultative guidance on best practices in Cloud Security, SIEM, and automation operations
Collaborate closely with internal teams to understand monitoring needs and deliver new insights
Follow CISO guidance to continuously improve the organizations security posture
Design, document, and scale security automation capabilities
Review new product features, implement security standards, and share knowledge across the team
Requirements:
Strong communication skills and ability to work effectively in a fast-paced startup environment
Minimum of 4 years of experience as a Security Operations Engineer
Experience working in a SaaS and cloud-based environment
Hands-on experience with SOAR platforms or other security automation tools
Hands-on experience with SIEM platforms (Splunk is a bonus)
Strong understanding of the SIEM/SOAR alert lifecycle from event to response
Experience handling and managing security alerts and investigations
Familiarity with REST APIs and Regex
Strong knowledge of security technologies such as Cloud Security, EDR, Vulnerability Scanning, Secure Access, and MDM
Proven experience working across cloud providers (AWS, GCP, Azure)
Scripting experience with Python or Bash
A proactive, independent, and curious mindset with a desire to learn and grow
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8576159
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Analyst to join our MDR team. In this role, you will be part of our security function, focusing on proactive reviews and providing advanced guidance to customers. This is an opportunity to develop your expertise in cloud security while working closely with analysts, researchers, and engineers.
Responsibilities :
Assist in fine-tuning detection and response mechanisms.
Support proactive reviews of customer environments to identify risks, exposed attack surfaces, and recommend improvements.
Lead and conduct in-depth security investigations, documenting outcomes and developing playbooks to enhance future detection and response.
Collaborate with Security Analysts, Research, and Backend teams to enhance detection quality.
Contribute to the handling of complex or critical incidents escalated from Tier 1/2.
Participate in recurring customer meetings, helping translate security findings into clear, actionable recommendations.
Stay up to date with emerging threats, attack techniques, attack surfaces, and best practices in cloud security.
Contribute to the development and training of AI-driven detection models, leveraging machine learning to improve investigation accuracy and response efficiency.
Requirements:
1+ year of experience in cybersecurity, preferably in cloud or containerized environments.
Knowledge of detection engineering, incident response, or threat analysis.
Familiarity with Linux, networking fundamentals, and scripting (Python/Bash).
Exposure to cloud platforms (AWS/GCP/Azure) and container technologies (Docker/Kubernetes).
Strong communication and presentation skills, with the ability to engage directly with customers.
Ability to work under pressure and manage multiple tasks in a fast-paced environment.
Curiosity, problem-solving mindset, and willingness to learn and grow.
B.Sc. in Computer Science / Information Security - an advantage
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8600565
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
30/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Security Analyst
Security & Risk Management | Full Time | Job Id: 25168
Why Join Us?
As part of our mission to provide the best real-time email security for our customers, our team plays a critical role in uncovering, understanding, and mitigating email-based threats. We work at the front line of phishing and social-engineering attacks, ensuring customers stay protected from fast-moving and constantly evolving threats.
In this role, youll dive deep into real-world attacks, quickly analyze emerging threats, and develop accurate protections that are deployed to customers in real time. Youll collaborate closely with other analysts, security researchers, and field teams, while also helping shape and improve the workflows and automation that drive our team forward. This is a hands-on, impactful role for someone who loves uncovering threat patterns, solving complex problems, and contributing to a mission-driven security team.
Key Responsibilities
Analyze new email-based threats and deliver real-time protection within our email security products.
Investigate threats using our email-security tools, customer reports, and additional threat-intelligence sources.
Identify ongoing phishing campaigns, trends, and potential detection gaps.
Respond to alerts and requests from internal field teams and customers, providing immediate mitigation for active attacks.
Develop and test tailored mitigations for specific attacks and deploy them to customers.
Write detailed research reports and attack briefs explaining phishing campaigns, attacker techniques, and findings.
Implement automation processes to enhance operational efficiency and detection accuracy.
Contribute ideas to improve team workflows, processes, and coverage.
Use AI and LLM-powered tools to analyze attacks and extract meaningful insights.
Design processes for analyzing phishing campaign data, trends, and related attacker methodologies.
Requirements:
Fluent written English.
1-2 years of experience in cyber security, threat analysis, or attack analysis.
Ability to write clear, detailed research reports and attack briefs.
Strong self-learning capabilities with the motivation to explore new threats and technologies.
Proficiency in SQL for querying and analyzing complex datasets (must).
Experience with automation, scripting, or process optimization (advantage).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597029
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
our company is the world leader in accelerated computing, defining the future of ai and high-performance networking. we are seeking a highly skilled and proactive senior Cyber security threat intelligence (cti) analyst to join the networking product security team. in this critical role, you will function as a key defender of the technologies powering the worlds largest ai clusters. you will act as the eyes and ears of our product security organization, conducting investigative research into sophisticated adversaries and translating complex threat data into actionable intelligence. this is a hands-on role where your insights will directly influence our defensive posture and help eliminate threats before they manifest in the core of global ai infrastructure.
what you will be doing:
you will serve as the intelligence core of our team dedicated to identifying, analyzing, and mitigating threats against our products and ecosystem:
lead deep-dive osint and webint research to identify emerging threats, conducting intelligence collection and analysis that leads to clear, actionable mitigation recommendations.
leverage scripting ( Python, bash, etc.) and generative ai tools to automate intelligence collection, triage, and analysis workflows.
analyze advanced persistent threats (apts) and sophisticated adversaries, collaborating with multi-functional teams to detect, track, and eliminate potential risks to our networking portfolio.
apply extensive insight into cyber operation phases to map adversary behavior, anticipate future movements, and harden our product development lifecycle with adoption of security improvements.
drive threat hunting methodologies, proactively searching for indicators of compromise (iocs) and hidden vulnerabilities within the products.
translate complex technical findings into strategic intelligence reports for both technical collaborators and leadership, ensuring a clear and unified insight into the threat landscape.
collaborate closely with incident response and engineering teams to ensure intelligence findings are seamlessly coordinated into other defensive tools and product security processes.
Requirements:
what we need to see:
bsc or msc in Computer Science, computer engineering, Cyber security, or a related technical domain (or equivalent experience).
5+ years of proven experience in a dedicated cyber threat intelligence (cti) role within a large-scale or high-tech environment.
technical proficiency in building automated intelligence pipelines through programming and the strategic use of generative ai.
expert-level knowledge of the cti lifecycle, with a proven record of uncovering sophisticated cyber operations using diverse sources and techniques.
strong technical background in analyzing advanced threats, capable of navigating through complex data to identify adversary infrastructure, intent, and tooling.
deep understanding of the unique security concerns faced by global tech companies, including supply chain risks and intellectual property protection.
outstanding analytical and interpersonal skills, with the ability to drive accountability and ensure intelligence leads to concrete security improvements.
ways to stand out from the crowd:
direct experience with hardware and Embedded devices technologies, specifically relating to networking or silicon security.
professional background in Digital Forensics and incident response (dfir), providing a comprehensive view of the threat actor journey.
relevant industry certifications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8593799
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Senior Technical Product Engineer, you will play a key role in providing detailed technical information and strategic guidance to our partners, customers, and internal teams. You will serve as a subject matter expert on our Cloud SOC and Automation platforms, working across product teams to drive innovation and improvements. This role requires a self-starter who is eager to learn, experiment with new technologies, and address complex sales and technical challenges.
Key Responsibilities
Serve as a Subject Matter Expert (SME) for Cloud SOC, Automation (SOAR), and CNAPP, providing actionable feedback to Product Managers to influence the product roadmap.
Collaborate cross-functionally with Sales, Product Management, and customers to drive innovation and ensure secure, scalable adoption of cloud-native security solutions.
Lead complex projects that align with field-driven priorities, ensuring milestones and deliverables are tracked and met.
Design and deliver automation content, playbooks, and integrations that address real-world Security Operations Center (SOC) use cases and cloud security risks.
Support field teams (Sales, SEs) by building Proof of Concept (POC) plans, answering technical questions, and assisting with RFPs.
Proactively challenge the status quo by identifying and solving complex issues, establishing best practices for product improvements.
Advocate for best practices in securing modern application architectures using automation, contextual risk insights, and scalable cloud-native controls.
Requirements:
At least 2 years of experience with one or more major cloud infrastructure providers (e.g., AWS, Azure, GCP).
At least 2 years of experience with security orchestration, automation, and response (SOAR) technology.
Strong technical knowledge of cloud platforms (AWS, Azure, GCP) and modern application architectures.
Demonstrated understanding of cloud-native security (CNAPP) and security operations (SOC, SIEM, EDR) use cases.
Excellent written and verbal communication skills with strong presentation abilities and professional presence.
Preferred Qualifications
Experience with Cloud Security Posture Management (CSPM) tools (e.g., Prisma Cloud) to detect and remediate cloud risks.
Understanding of Cloud Infrastructure Entitlement Management (CIEM) principles and hands-on experience managing cloud entitlements.
Experience in building SOC workflows, incident response plans, or SIEM integrations.
Experience in cloud-native programming, scripting, automation, infrastructure-as-code, or modern CI/CD pipelines.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8587378
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
07/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Threat Intelligence Researcher who can analyze cyber threats and turn technical data into clear, useful insights. You will work closely with a team and clients, create reports, and build simple tools or scripts (mainly in Python) to improve how data is collected and analyzed.
This role requires strong problem-solving skills, good communication, teamwork, and taking responsibility for delivering results.
We are seeking an analytical and experienced Threat Intelligence Researcher to join our team. This is a technical role that necessitates bridging the gap between traditional intelligence analysis and software engineering principles.
You will be responsible for producing strategic and technical intelligence reports and developing automation and scripting solutions for the team.
Specifically, your focus will be on:
Intelligence Reporting: Conduct in-depth investigations and produce comprehensive reports based on customer requests.
Client Engagement: Participate in customer-facing meetings as required to present findings or gather requirements.
Tool Development: Design, implement, and maintain internal tools, scripts, and data scrapers (primarily utilizing Python) to streamline data collection and analysis.
Actionable Intelligence Production: Convert raw technical data into finished, actionable intelligence products, including detailed technical reports, the creation of YARA/Sigma rules, and executive-level briefings.
Requirements:
Technical Expertise: Possess a robust background in cybersecurity and threat intelligence research.
Programming Proficiency: Demonstrated proficiency in Python, Go, or C++, with a particular emphasis on developing automation or data processing pipelines.
Analytical Acumen: Proven ability to synthesize disparate data points to construct a cohesive and accurate intelligence picture.
Professional Communication: Exceptional technical writing skills and the capability to present complex findings to stakeholders with clarity and professional gravity.
Accountability: Ownership by holding self and others responsible for driving outcomes and meeting commitments that deliver value for the business and customers.
Adaptability & Automation Mindset: Comfortable navigating change and ambiguity, with a proactive approach to improving efficiency by automating manual tasks and streamlining team workflows.
Language Proficiency: Fluent written and verbal communication skills in English.
Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success.
Preferred Skills:
Demonstrated familiarity with the MITRE ATT&CK framework.
Active engagement within the security research community (e.g., participation in CTFs, publishing blog posts, or contributing to open-source projects).
Highly articulate, written, and verbal English communication.
Comprehensive understanding of the threat intelligence landscape, including Advanced Persistent Threats (APTs), Initial Access Brokers (IABs), and their Modus Operandi.
Familiarity with the Dark Web and the cybercrime forum ecosystem.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8602297
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
30/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time and Multilingual
We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers
Job Id: 25042
Key Responsibilities
Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
Investigating intelligence sources, threat actors, attack tools and techniques
Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
Joining meetings with prospects and clients to present deliverables.
Drive cooperation & feedback loops with other ERM teams.
Requirements:
Native French speaker
1-2 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
Inherent passion for Infosec and service excellence, understanding of cybersecurity
Investigative and analytical problem-solving skills
Knowledge of analytical tools, including excel
Fluent English
Infosec certifications an advantage
Customer facing background an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597313
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
6 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Exposure Analyst (Customer-Facing)
About XM Cyber: XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. We transform exposure management by showing our customers exactly how attackers might combine misconfigurations, vulnerabilities, and identity exposures across cloud and on-prem environments to compromise critical assets. With XM Cyber, our customers can see all the ways attackers might get in—and the best ways to stop them with a fraction of the effort. About You & The Role: Are you someone who loves connecting with people just as much as you love talking tech? We are looking for a highly empathetic, customer-focused Exposure Analyst to join our managed services team. In this role, you’ll be the friendly face and trusted advisor helping our premium customers get the absolute best out of the XM Cyber platform. You’ll dive deep into security postures, translate complex attack paths into simple, actionable steps, and build the kind of trust that makes IT and Security teams excited to work with you. Responsibilities: Be the Trusted Advisor: Own the primary technical relationship for a portfolio of enterprise and mid-market customers, establishing yourself as their go-to security partner representing XM Cyber in the customer’s organization. Daily Posture Reviews & Action: Conduct daily reviews and analyses of your customers' security postures using the XM Cyber platform. You'll turn complex findings into clear, risk-based insights and proactively open remediation tickets. Weekly Check-ins & Deep Dives: Lead engaging weekly calls with your customers, hosting targeted deep-dive sessions to guide them on configuration, best practices, and new features to ensure optimal ROI. Bridge the Gap: Drive remediation outcomes by pushing discussions directly with the customer’s IT, DevOps, and Cloud teams—not just their security teams—helping them prioritize efforts based on attack path analysis. Deliver the Big Picture: Proactively track progress and provide monthly reports to both technical and executive stakeholders. You’ll also co-host Executive Business Reviews (EBRs) alongside our Customer Success team. Champion the Customer: Act as the lead technical escalation point, partnering with our internal R&D, Product, and Support teams to make sure your customers' needs are always heard and resolved.
Requirements:
Requirements: Must have: 5+ years in a customer-facing tech role (e.g., Customer Success Manager, TAM, Security Consultant, or MSSP/SaaS Support), with a proven track record of managing large enterprise clients. Outstanding interpersonal skills: You easily break down complex tech issues. You are equally comfortable driving an IT team to take action as you are presenting to C-suite executives. Cyber orientation: Key understanding of:
* On-Prem/Active Directory, Cloud environments (AWS, GCP, Azure) and Kubernetes.
* Posture Management - KSPM, ADSPM, and CSPM.
* Identity Management - CIEM, IAM
* General ethical hacking and cybersecurity principles. Self-driven learning style: You are naturally curious, highly analytical, and comfortable in a dynamic, fast-paced environment where you are always eager to expand your skills. Communication: Native-level fluency in English (written and spoken) is a must.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8555185
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo and Haifa
Job Type: Full Time
be part of a team that pushes boundaries, developing custom silicon solutions that power the future of our direct-to-consumer products. you'll contribute to the innovation behind products loved by millions worldwide. your expertise will shape the next generation of hardware experiences, delivering unparalleled performance, efficiency, and integration.
the ml, systems, & cloud ai (msca) organization at our designs, implements, and manages the hardware, software, Machine Learning, and systems infrastructure for all our services (search, youtube, etc.) and our cloud. our end users are , cloud customers and the billions of people who use our services around the world. we prioritize security, efficiency, and reliability across everything we do - from developing our latest tpus to running a global network, while driving towards shaping the future of hyperscale computing. our global impact spans software and hardware, including our clouds vertex ai, the leading ai platform for bringing gemini models to enterprise customers.
responsibilities
utilize performance and power models from the architecture team, as well as lab measurements, to validate and tune performance against established goals.
design and build tests to verify that the SOC design meets those goals.
develop and implement advanced technologies for running benchmark representations on pre-silicon environments.
analyze complex problems, identify core design weaknesses, and drive the resolution of performance issues in both pre- and post-silicon environments.
develop performance measurement frameworks, including key performance indicators (kpis), to produce regular reports and dashboards that support stakeholder decision-making.
Requirements:
minimum qualifications:
bachelor's degree in Computer Science, computer engineering, or electrical engineering, or equivalent experience.
8 years of experience in SOC or central processing unit (cpu) performance and power modeling, analysis, and debugging.
experience with computer architecture, focusing in the areas like interconnects, traffic quality of service (qos), distributed caches, and i/o flows.
experience in programming languages such as C, C ++, or similar.
experience in identifying, troubleshooting, and solving performance problems.
preferred qualifications:
experience with hardware description languages like verilog or systemverilog.
experience in one or more functional areas, such as coherent fabrics (e.g., amba chi/axi), memory controllers (e.g., lpddr5, ddr5), or i/o controllers (e.g., pcie, cxl).
experience in productizing features that enhance the performance or power characteristics of a design.
experience in building fast, accurate SOC /cpu performance models in C ++.
experience in pre-silicon and post-silicon analysis and debugging.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8592868
סגור
שירות זה פתוח ללקוחות VIP בלבד