רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

מומחה אבטחת מידע / סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
שרת
שכר
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
כל מה שרציתם לדעת על מבחני המיון ולא העזתם לשאול
זומנתם למבחני מיון ואין לכם מושג לקראת מה אתם ה...
קרא עוד >
הטבות ובונוסים בעבודה בחברות הייטק
מכון כושר צמוד, חדר אוכל משובח, חדר משחקי וידאו...
קרא עוד >
טעויות נפוצות בניהול קריירה
הדרך לחיים של חוויות והזדמנויות עוברת דרך תכנון...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an Adversarial Builder to lead the defense of our Global Application Landscape-securing everything from our core SDLC and Software Supply Chain to our enterprise-wide AI adoption.
In this hands-on role, you will:
Engineer, Dont just triage: Move beyond manual reviews to build code-driven detection logic and custom AI agents that automate vulnerability hunting, triaging and remediation.
Security by design: Partner with R&D teams (including Infra and DevOps) to define the application-level technical guardrails for internal and external-facing products.
Scout the Frontier: Act as an early adopter of state-of-the-art systems, evaluating and integrating cutting-edge tech from frontier security startups in AI and Cloud Runtime security.
This role demands a practitioner who thinks like an attacker, possesses a developers urge to automate, and has the broad landscape understanding to connect dots across complex, modern domains.
What Youll Do:
Promote Enterprise-Grade Security Initiatives: Engineer and scale the security strategy for entire product ecosystem, spanning both internal infrastructure and external-facing products. You will ensure code security at scale by hardening the SDLC, securing the Software Supply Chain perimeter, and designing the technical guardrails for AI adoption at both the enterprise and product levels.
AI Solutions Builder: scale our security program using AI-driven tools. You will develop and fine-tune autonomous agents to handle complex code analysis, vulnerability hunting, and automated remediation.
Drive Early Adoption of Frontier Tech: Act as a scout and evaluator for the worlds most innovative security startups. Youll partner with cutting-edge vendors in emerging fields like AI Security and Cloud Runtime Security, ensuring remains an early adopter of state-of-the-art defensive systems.
Scale Through Engineering: Move beyond manual reviews. Youll manage and extend AppSec tools to eliminate false positives and build custom logic that reflects our unique codebase.
Collaborative Engineering: Work alongside our in-house DevOps team to rapidly deploy custom security tools at an enterprise grade.
Requirements:
5-7 Years of AppSec Experience-Must!
Broad Security Horizon: A deep understanding of the modern security landscape, including Identity (OIDC, OAuth, IAM), Supply Chain security, and Cloud-native architectures-Must
Technical Versatility: Strong code review skills and proficiency in at least one major language (Python, TypeScript, etc.). You should be comfortable navigating complex microservices and CI/CD pipelines (GitHub Actions, ArgoCD)-Must
Adversarial Intuition: You have a hacker heart-experience in pentesting or security research helps you anticipate risks before they manifest.
Strategic Communication: You can translate complex security concepts into a roadmap that engineers and stakeholders actually want to follow.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614267
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a Senior Information Security Engineer.
As a Senior Information Security Engineer, youll be on the front lines of protecting the systems, users, and data at scale. This role is about turning strategy, architecture, and intent into enforced controls, effective detections, and resilient operations. Youll work hands-on with the tools, signals, and incidents that define our real security posture.
If you believe security should be practical, measurable, and embedded into daily operations-and not just documented-we want you on the team.
What the Role Looks Like in Practice
You will be the technical anchor of our internal security posture:
Architectural Ownership: Deploy, manage, and tune enterprise-grade security stacks (EDR, DLP, IAM, CASB, MDM) with a focus on deep integration and automation.
The AI Frontier: Lead the charge on AI Security. You will implement and secure AI-driven workflows, ensuring LLM use is governed and protected against emerging threats such as data leakage and prompt injection.
Proactive Defense: Build and maintain high-fidelity detections and guardrails that align with real-world attack techniques.
Cross-Functional Synergy: Partner as a peer with Engineering, IT, and DevOps to ensure security controls are frictionless, automated, and effective.
Requirements:
7+ Years of Senior Experience: Extensive hands-on experience in InfoSec Engineering or SecOps within high-growth, cloud-native environments.
AI Security Mastery (Required): You are ahead of the curve. You have practical experience securing AI adoption and leveraging AI-driven platforms to scale defensive capabilities.
Deep Technical Stack: Expert-level knowledge of endpoint security (macOS/Linux), SaaS ecosystems, and Identity (Okta/OIDC).
The Developer Mindset: Advanced scripting skills (Python is a must) to automate away manual toil and build custom security integrations.
Professional & Interpersonal Excellence:
Strategic Communication: The ability to articulate complex technical risks as actionable business intelligence for diverse stakeholders, ensuring alignment between security objectives and business goals.
Collaborative Influence: A track record of fostering strong partnerships with R&D and DevOps. You are a facilitator of Secure-by-Design principles, focused on engineering solutions rather than creating administrative bottlenecks.
Crisis Management & Decisiveness: The capacity to maintain operational composure during high-stakes incidents, applying rigorous prioritization and risk-based analysis to drive remediation.
Pragmatic Professionalism: A disciplined approach to balancing theoretical security ideals with the functional requirements of a high-velocity, global financial infrastructure.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614261
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a passionate and experienced Governance, Risk, and Compliance (GRC) operations specialist to contribute to our companys efforts in making the most security and trusted provider of digital asset management solutions.
This role is critical in driving our day-to-day GRC programs, ensuring they are well maintained, run according to schedule, and align with our business needs.
As the GRC operations specialist, you will oversee the successful implementation and progress of GRC programs, practices, and projects, while collaborating with multiple cross-functional teams within the security department and outside of it.
What You Will Do:
Own, manage, and continuously improve the companys Third Party Risk Management (TPRM) program, making sure it is both aligned with expected security standards and best practices, and meets business requirements and SLAs.
Own, manage, and continuously improve the companys security awareness program, making sure its scope, content, cadence and overall performance are always aligned with the latest and most relevant expectations, while also well received and relevant to the business.
Manage ongoing operations within the GRC team including project management and tracking, financial planning and reporting, annual and periodic planning, and more.
Drive ongoing GRC efficiency through innovation, automation, data-driven decision making research and exploration.
Support and contribute to ongoing GRC operations such as internal and external audits, risk assessments, certification processes, policy management, business continuity program and more.
Requirements:
Minimum of 3+ years of experience in cybersecurity or GRC.
Proven experience in cyber or IT or third party risk management.
Proven experience in the security awareness domain, including development and implementation of security training programs and their testing (phishing, vishing, social engineering etc.).
Strong understanding of industry best practices, regulations, frameworks, standards and certifications such as SOC 2, ISO, NIST, CIS, DORA, GDPR, etc.
Visionary and innovation-driven, capable of implementing security and compliance programs in complex, fast-paced organizations.
Exceptional communication, collaboration, and interpersonal skills, with the ability to engage both technical and non-technical audiences.
Strong analytical, problem-solving skills and attention to detail, with the ability to manage multiple projects simultaneously and meet tight deadlines.
Preferred Qualifications:
Experience working with GRC software and utilities such as compliance management, policy management, risk management, vendor management, awareness, training and phishing simulation platforms, etc
Background in the financial/digital assets sector.
Good technological understanding and familiarity with product development practices.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614258
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced Incident Response leader to own and lead the companys response to large-scale, high-impact cyber incidents. This role is responsible not only for technical response, but for cross-company crisis coordination, executive decision support, and ensuring fast, controlled mitigation across engineering, product, legal, communications, and leadership teams.
This is a leadership role for someone who has personally led complex incidents under pressure - including situations involving material business risk, customer impact, regulatory exposure, and executive visibility.
Key Responsibilities:
Incident Leadership & Crisis Management
Serve as the Incident Commander for high-severity cyber incidents, including breaches, supply-chain attacks, insider threats, and platform-wide security events.
Lead company-wide incident response efforts, coordinating technical, operational, legal, communications, and executive stakeholders.
Stand up and orchestrate crisis management teams during major incidents, ensuring clear ownership, decision-making, and execution under pressure.
Drive rapid containment, eradication, and recovery while balancing business continuity, customer impact, and regulatory obligations.
Act as the primary point of contact to executive leadership during incidents, providing clear, concise, timely, and actionable updates.
Cross-Department Coordination
Orchestrate response activities across Security, Infrastructure / Cloud Operations, Product & Application Security
Ensure alignment between technical response actions and business, legal, and regulatory considerations.
Manage external parties when needed
Preparedness & Operational Excellence
Own and continuously improve the incident response framework, including severity definitions, escalation paths, and decision authority.
Design and run executive-level incident simulations and tabletop exercises, including cross-functional and leadership participation.
Ensure high-quality post-incident reviews that result in measurable improvements to controls, detection, and response readiness.
Define and track incident response metrics (MTTD, MTTR, blast radius, decision latency).
Track and follow-up on lessons learned and enhancements to ensure implementation and continuous improvement.
דרישות:
10+ years in cybersecurity, with significant incident response management experience.
Proven experience leading large-scale, cross-company cyber incidents, including incidents involving:
Multiple engineering and operational teams
Executive leadership and board-level visibility
Demonstrated experience acting as Incident Commander or equivalent role during major security events for at least 15 incidents in the past 5 years.
Strong understanding of:
Cloud and SaaS architectures
Identity, access control, and infrastructure security
Detection and response technologies (SIEM, EDR, cloud-native tools)
Offensive background
Ability to translate technical facts into business impact and risk-based decisions.
Critical Skills & Attributes
Crisis leadership: Calm, decisive, and structured under extreme pressure.
Authority without ego: Able to lead across departments without formal reporting lines.
Executive communication: Clear, concise, and credible with senior leadership.
Systems thinker: Understands how technical, human, and process failures compound during incidents.
Bias for action: Moves quickly while maintaining discipline and documentation.
Analytical thinking: Attention to details and ability to connect multiple dots into a concise and accurate picture.
Previous experience at Mandiant, Sygnia, CrowdStrike, Unit 42, or similar elite IR teams
Experience in crypto, fintech, custody, payments, or highly regulated environments
Hands-on background in forensics, threat hunting, or security engineering
Nice to Have
Experience in crypto, fintech, cloud infrastructure, or highly regulated environments
Experience supporting regulatory notifications המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614256
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a senior, hands-on Security Operations Lead to build, mature, and operate detection, response, and corporate security capabilities. You will own the engineering, workflows, and processes that keep secure day-to-day, while continuously improving visibility, automation, and operational resilience across both corporate and production environments. This role requires a technical operator who can architect scalable detection and response pipelines, manage endpoint and identity security controls, streamline GTM security enablement, and collaborate across the company to reduce risk. You will balance strategic direction with hands-on execution-ensuring threats are identified quickly, incidents are handled effectively, and the organizations operational security posture remains strong as grows.
Responsibilities:
Own and mature Detection & Response program, including alerting, triage workflows, incident playbooks, and end-to-end response processes.
Build and maintain detection logic, integrations, and automation across logging, SIEM, EDR, cloud telemetry, and internal monitoring systems.
Lead incident investigations, coordinate response across engineering and business teams, and ensure clear communication and post-incident reviews.
Manage Corporate Security Program, including identity and access management, endpoint posture management, corporate data security controls, and DLP practices.
Oversee privileged access workflows and JIT access for corporate and production systems in alignment with least-privilege principles.
Partner with engineering teams to ensure production environments maintain strong security baselines, logging, and monitoring coverage.
Collaborate with GTM/Sales teams to support Security Enablement, including third-party security questionnaires, customer assurance needs, and auditor inquiries.
Build automation-first operational processes that reduce manual overhead and provide consistent, repeatable security outcomes.
Develop and refine detection and response runbooks, escalation paths, and cross-team coordination models.
Maintain and improve incident and operational metrics, dashboards, and KPIs to measure operational efficiency and threat coverage.
Drive the intake and prioritization of security operations requests through Jira and internal workflows.
Work closely with Product Security, Cloud/DevOps, and GRC to ensure shared visibility and aligned operational practices.
Identify operational security gaps, propose improvements, and lead implementation efforts across tooling, processes, and controls.
Promote a culture of proactive detection, fast response, and shared responsibility for organizational security.
Requirements:
Five (5) + years of experience in Engineering / Security Engineering
We build solutions when faced with a capability gap
Youre very comfortable with Kubernetes, Helm, and Terraform
Youre very comfortable with Python, Typescript, or Go
Two (2) + years of experience in Incident Response role
Youve led at least 2 high risk production security incidents
Youve handled the investigation of hundreds of client endpoint security alerts
Bonus points for significant experience in macOS
Youve developed or improved threat detection and signal triage programs
Two (2) + years of experience managing enterprise wide security projects
You have a strong opinion on what a project plan doc should look like
Youve owned and delivered the migration of a high impact security tool (EDR, SIEM, ZTNA, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8613629
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an Information Security Coordinator to join the team responsible for ensuring the organizations compliance with the most stringent information security and privacy standards.



Responsibilities:

Manage and maintain security and privacy standards (ISO 27001, ISO 27701, ISO 22301, SOC2).
Lead risk assessments, gap analysis, and audit preparation.
Coordinate penetration tests and periodic security reviews.
Manage audit findings and respond to customer security questionnaires.
Own the Security Awareness program.
Monitor compliance with relevant regulations and work with external vendors.
Support Business Continuity (BCP/DRP) activities.
Requirements:
At least 2 years of experience in a similar role.
DPO certification - a significant advantage.
Familiarity with standards and regulations.
Excellent written and verbal communication skills.
High ability to analyze and present information.
Experience in building, implementing, and maintaining SOA - a significant advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8611388
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
15/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
A Software company, developing a Cloud Security Platform, is looking for a Senior Cloud Security Software Engineer to join her team.

In this role, youll design and build backend components and security features for a scalable cloud security platform, working closely with product, frontend, and infrastructure teams.



What youll do:

Research and adopt new technologies.
Design and implement cloud security features.
Build MVPs for new product capabilities.
Write clean, efficient Go code.
Design data models and database schemas.
Write unit, component, and integration tests.
Debug and troubleshoot production issues.
Participate in code reviews and contribute to team standards.
Collaborate with frontend and platform teams on end-to-end integrations.
Assist with documentation and occasionally represent the product through blogs or talks.
Requirements:
5+ years of software development experience.
Strong proficiency in Go or Python.
Hands-on experience designing data processing systems.
Experience with SQL and NoSQL databases.
Familiarity with testing frameworks and writing test cases.
Collaborative mindset and strong communication skills.
Knowledge of Kubernetes, cloud platforms, or security products (advantage).
BSc in Computer Science or equivalent practical experience (advantage).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8611317
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are looking for a Junior Cyber Security Specialist with a deep interest and basic knowledge of both information security and computer science. We are a cybersecurity firm specializing in advanced adversary simulation and offensive security testing. We deliver Red Team assessments for Fortune 500 companies, simulating sophisticated, real-world attacks across external, internal, cloud and Active Directory environments. Our services span both stealth-based Red Team operations and risk-focused assessments, covering a wide range of attack surfaces including on-premise and cloud environments.

Responsibilities:
Participate in Red Team and Risk assessments under the guidance of senior team members.
Assist in documenting findings, writing technical reports, and contributing to final deliverables for clients.
Learn and simulate attacker tactics, techniques, and procedures (TTPs).
Support Risk Assessments, where the objective is to identify vulnerabilities, especially in Active Directory, without the requirement for stealth. These engagements provide deep insight into systemic weaknesses and offer high exposure to internal infrastructure.
Contribute to external assessments, such as, perimeter testing, and reconnaissance.
Participate in our internal, hands-on training program, which covers red team TTPs, tool usage, internal methodologies, and real-world scenarios.
Requirements:
Requirements:
Strong interest in offensive security and Red Team methodologies.
Foundational understanding of Active Directory architecture, domain trust, Kerberos, GPOs, and domain privilege structures.
Familiarity with network protocols such as SMB, LDAP, DNS, and HTTP.
Knowledge of common attack techniques such as enumeration, privilege escalation, exploitation, credential dumping and C2 operations.
Ability to write or assist in technical documentation and reporting in English.
Comfortable working in a collaborative environment and eager to learn from experienced team members.
Experience with security tools such as - Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools.
Comfortable with basic scripting and using CLI tools.

Advantages:
Personal projects, CTF participation, or lab-based experience in offensive security.
Exposure to cloud environments (Azure, AWS, GCP).
Programming/scripting experience in Python, PowerShell, C++, C#, etc.
Hands-on experience with C2 frameworks (e.g., Cobalt Strike, Mythic, Sliver).
High level of spoken and written English, including the ability to clearly explain technical topics to both technical and non-technical audiences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8610264
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a highly skilled Senior Product Manager to join our Product team and lead the Exposure Assessment domain of the platform.

As the Product Manager leading the Exposure Assessment domain, you will work closely with a highly skilled team of engineers, data stakeholders, and security researchers. Together, you will ensure customers can continuously understand, manage, and reduce exposure across their external attack surface.

This role is ideal for experienced Product Managers with experience working on cybersecurity products, who love to collaborate and communicate with external and internal stakeholders, deeply understand the problems they are solving, and make decisions using customer insights and data.

Responsibilities
Own the Exposure Analysis domain end-to-end, including strategy, roadmap, product flows, and execution.
Lead product discovery and problem definition, using methods such as user interviews, stakeholder interviews, competitive research, workflow mapping, and iterative validation.
Define domain success metrics (KPIs), track progress, and make data-informed decisions to drive measurable outcomes.
Work closely with Engineering, Design, Data, and Security Research to define initiatives, prioritize deliverables, and solve day-to-day product challenges.
Build and maintain strong relationships with customers to understand their security programs and workflows, identify pain points and opportunities, validate direction, and support successful adoption of new capabilities.
Translate product direction into clear, actionable requirements, and communicate them effectively to Engineering, Research, Design, and other stakeholders to enable high-quality execution.
Partner with Sales, Marketing, and Customer Success to align on priorities, support key opportunities, communicate upcoming deliveries, and drive go-to-market activities including enablement and launches.
Requirements:
5+ years of experience in Product Management, owning product areas or major capabilities from discovery through launch and iteration.
Experience working in a cybersecurity company, with strong familiarity in security products and customer use cases, and a solid understanding of the cybersecurity competitive landscape - preferably in EAP / CTEM, AEV, EASM, CAASM, VM, and ASCA.
Strong product discovery experience, including conducting user interviews and other qualitative and quantitative methods to validate problems, prioritize opportunities, and guide roadmap decisions.
Excellent communication skills in English (written and verbal), with the ability to write clear product documentation, align stakeholders, and present effectively to customers and internal teams.
Strong cross-functional leadership across Engineering, Research, Design, Sales, and Customer Success, with a demonstrated ability to drive alignment and execution.
Strong technical skills, and deep understanding of the underlying technology, including hands-on experience working with data and analysing data.
Experience collaborating with Sales and Marketing teams on feature launches, including sales enablement, packaging, and go-to-market planning. (Bonus)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608743
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Security Researcher, you will play a crucial role in researching, building, and enhancing our cutting-edge technology to address the evolving cybersecurity challenges faced by the world's largest enterprises.

Responsibilities
Research, develop, and implement new offensive security capabilities that push the boundaries of the EASM category, including exploit development and PoC creation across web applications, AI/LLM assets, network infrastructure, cloud environments, and supply chain dependencies.
Drive innovation by conceptualizing, implementing, and adopting AI-driven initiatives and offensive security expertise to enhance IONIX's detection, validation, and automation capabilities at scale.
Conduct in-depth research to continuously expand platform coverage.
Develop exploitability tests to uncover critical, real-world findings across enterprise attack surfaces - directly demonstrating the power of the IONIX platform.
Collaborate with global enterprises as design partners to understand their security needs and design solutions accordingly.
Take ownership of key research projects, addressing security and scalability challenges from concept through to delivery.
Requirements:
8+ years of hands-on experience in security research, offensive security, or software development.
Practical experience conducting offensive security assessments, including web application exploitation, network-based attacks, and adversarial attack simulation.
Strong development skills (Python - advantage): capable of writing production-quality, scalable code.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608740
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are seeking a highly disciplined, technically elite Digital Assets Custody Operator to serve as the guardian of multi-asset portfolio.
This is not a typical operations role. You will operate at the very heart of our security architecture, blending precise technical execution with a high-level security mindset. You will be responsible for executing complex cryptographic procedures in secure environments while simultaneously designing the future of our security architecture.
If you are passionate about the deepest intricacies of institutional custody, comfortable with Linux command lines and AI, and ready to proactively defend against emerging threats, we want you.
Requirements:
Technical & Domain Expertise
Cryptography Knowledge: You understand the difference between MPC and Multi-Sig technology.
DeFi & Staking Mastery: You know the risks of Staking and can clearly explain concepts like "Impermanent Loss" or "Slashing".
You are comfortable working in a Linux environment, using command-line interfaces (CLI), and handling basic networking.
Wallet Experience: You have hands-on experience with Ledger/Trezor, understand "seed phrases," know how gas fees work, and can distinguish between token standards (e.g., ERC20 vs. TRC20).
Problem Solver: You are curious, you ask questions when things don't look right, and you are capable of troubleshooting complex hardware and software issues.
Nice to Have:
Experience with GK8, Fireblocks, or Utila.
Background in IT, SOC, NOC, or military technology units.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608605
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Were looking for a Senior Web Security Researcher to be part of a team of highly skilled professionals that include security researchers, data researchers, data scientists and software engineers who continuously hunt for threats, evaluate and develop new detection techniques, and share intel and attribution for cybercrime activity with the goal of protecting our customers while keeping the internet human.
What you'll do:
Play a lot with the web-browsers, trying to find differences in behavior between them.
Research and develop signal collection on both mobile and desktop, which enables detection and improve our protection
Find ways to detect automation, for example, tools like Selenium, Playwright or Puppeteer.
Understand customer specific requirements, deliver with impact and exceed customer expectations.
Discover adversary tactics, techniques, and procedures leveraged by bots.
Create and validate data insights to enhance detection excellence.
Share security research topics through blogs, research talks, knowledge base and external engagements including conference presentations, detailing your discoveries for internal and external sharing.
Find bad stuff on the internet, see if you can figure out how it is done, document it.
Red team, experiment, and develop new tactics for various kinds of fraud and to bypass our detection, no need to wait for an attack to be discovered and used by adversaries first.
Stay abreast of cyber security trends and events related to our mission.
Contribute high impact work that substantially benefits team level metrics and OKRs.
Develop techniques, tools and scripts to simplify yours and others work.
Requirements:
Who you are:
B.sc in computer science or equivalent experience (technological unit alumni etc.)
Expertise in web architecture and protocols (DOM, Javascript, HTTP/HTTPS, IPv4/v6 etc.)
Understanding of the cybersecurity threat landscape.
3 years+ of proven Cyber Security Research experience.
Good English (Reading and Writing).
Proven experience in scripting languages (Python and JavaScript).
Decent experience in data analysis and relevant languages (SQL, Python).
Motivated, independent, and passionate about finding the bad guys.
Ability to motivate and lead those around you by your own contribution, professionalism, and teamwork.
Who you are - Nice to have:
Hands-on experience with data analysis of large and complex data sets (data manipulation, statistical analysis, Conclusions, etc.) - Great advantage.
Experience with threats created by bots / Creating automated web-related tools.
Reversing capabilities.
Experience with publishing technical blogs/speaking at conferences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608147
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
In this role, you'll be a trusted point of contact for physical site security, ensuring daily operations run smoothly and securely. You'll execute established security plans, respond to incidents, and coordinate with onsite vendor guarding teams to ensure standards are met. You'll work collaboratively with business groups and local leaders to support their physical security needs.

Additional responsibilities include but are not limited to:
- Execute and maintain site-specific security procedures and operational plans
- Manage the onsite vendor guarding deployment on a day-to-day basis, ensuring alignment with Apple's standards and requirements
- Serve as the physical security point of contact for business groups across the Herzliya campus
- Respond to and coordinate security incidents, escalating appropriately
- Support the planning and execution of secure events and assignments on site
- Maintain strong working relationships with other supporting functions, EHS, andPlaces teams
- Manage field security requests for short-term and non-recurring assignments
- Support project activities, including attending meetings and communicating updates.
Requirements:
Must hold a valid security certificate Menahel Bitachon (מנהל ביטחון) as issued by the Israel Police Licensing Bureau or equivalent.
Experience in a corporate security role within a complex, matrixed organisation.
Strong written and oral communication skills in both Hebrew and English.
Ability to react quickly and effectively in a time-critical environment.
Strong attention to detail with the ability to take initiative and follow through.
Ability to work collaboratively and cross-functionally.
On-call responsibilities as required.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8607782
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are seeking a highly skilled and experienced Attack Team Leader to lead a specialized attack team focused on developing offensive, production-ready attack capabilities. This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations.
You will be hands-on in both leadership and development, guiding technical direction, mentoring engineers, and contributing code to offensive attack components.
The Impact You Will Have
Lead the design, development, and deployment of production-grade offensive capabilities targeting application and OS CVEs exploits
Develop attack components for Windows/Linux including OS-level evasion mechanisms
Implement Python bindings to connect native low-level components with Python-based research tools and automation
Research and develop bypass techniques for modern security controls
Collaborate with the Research Team and other R&D stakeholders to implement and refine offensive concepts
Provide technical mentorship and drive engineering best practices within the team
Harness AI coding agents to streamline the above processes
Requirements:
What Sets You Apart
Leadership
Proven experience as a Team Lead or Technical Lead in an offensive security or R&D environment
Strong ability to lead complex engineering efforts and mentor a highly technical team
Experience owning full R&D project lifecycles from concept through production
Technical Expertise
5+ years of hands-on experience in development of offensive attack components
3+ years of Python experience, especially for integrating with native modules and supporting research workflows
Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling
Familiarity with EDR evasion, API hooking, and direct system call manipulation
Personal Attributes
Passionate about offensive security and deep technical research
Passionate about AI coding agents
Self-motivated and capable of operating independently in high-trust environments
Creative and methodical in problem solving, with a strong attention to detail
Even BETTER if you have
Deep knowledge of Windows/Linux APIs, security controls, and undocumented behaviors relevant to offensive security
Experience with MITRE ATT&CK and implementing or simulating ATT&CK techniques
Background in red teaming, adversary emulation, or APT simulation
Prior contributions to offensive tooling or internal R&D platforms
Understanding of modern threat actor TTPs and practical application in research environments
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8605553
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Cyber Research Architect to join our cutting-edge Research Group. This is a full-time hybrid role where you will play a key part in shaping how our products evolve from a cyber perspective, operating as an innovation hub within the company.

You will have the freedom to explore new domains, identify gaps in our products, and pioneer techniques that will directly shape our product architecture and capabilities. From researching emerging technologies to discovering vulnerabilities and developing advanced attacks, you will push the boundaries of whats possible in automated offensive security.

Roles and Responsibilities:

Lead offensive research and vulnerability discovery across diverse and emerging technologies, identifying novel attack surfaces and spearheading new research domains.
Pioneer research into AI/ML systems and LLM-based applications, uncovering adversarial tactics and developing unique attack vectors.
Directly shape product architecture by converting research insights into scalable, high-fidelity offensive capabilities and sophisticated attack modules.
Architect and build advanced tools and frameworks that automate and scale security research operations across the organization.
Identify and emulate the most sophisticated real-world cyber attacks to continuously evolve the company's automated security validation engine.
Requirements:
6+ years of hands-on experience in security research, with at least 3 years focused on vulnerability research, Red Teaming, or offensive cyber operations.
Proven track record of breaking complex systems across diverse environments (cloud, hybrid, on-prem, web applications, and container/VM escape).
Deep hands-on expertise in AI/ML security, including model architectures, adversarial ML tactics, and attacking LLM-based applications.
Advanced proficiency in multiple programming languages (e.g., Python, C/C++, Go) and a strong grasp of Windows/Linux internals and reverse engineering.
Demonstrated ability to innovate by developing original tools, frameworks, or techniques that enhance and automate security research.
Thorough understanding of the modern threat landscape, attacker kill chains, and the MITRE ATT&CK framework.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8604223
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו
ישנן -70 משרות במרכז אשר לא צויינה בעבורן עיר הצג אותן >