משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
הטבות ובונוסים בעבודה בחברות הייטק
מכון כושר צמוד, חדר אוכל משובח, חדר משחקי וידאו...
קרא עוד >
טעויות נפוצות בניהול קריירה
הדרך לחיים של חוויות והזדמנויות עוברת דרך תכנון...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for an Engineering Manager to lead the Compliance team, within our Risk Infra group. The Risk Infra group builds the foundational systems that enable all of fraud and compliance defenses.

What youll do
Lead and mentor a squad of backend engineers to deliver high-quality code, fostering a culture of technical excellence, rapid iteration, and end-to-end ownership. You will design low-latency, high-concurrency systems for sub-second risk assessments and automated decision-making, supporting hyper-growth without compromising regulatory needs or user experience.

Partner closely with Compliance analysts and governance experts to translate complex regulatory insights and global policies into resilient, fault-tolerant distributed logic. You will be responsible for balancing the immediate need for risk mitigation with long-term architectural scalability and stability.
Requirements:
5+ years of professional experience as a backend oriented software engineer.
3+ years experience managing a team of engineers.
A deep understanding of production systems and the architecture of distributed systems.
Comfortable working in a fast-paced, dynamic environment and adapting quickly to changing priorities.
A reliable peer, with a strong sense of ownership, a can-do attitude and excellent collaboration and communication skills.
A bar raiser, passionate for mentoring and personal growth processes.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8495750
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
At our company, we empower people to be their best selves and do their best work. The Security Analyst role strengthens our ability to detect and respond to emerging mobile threats. With increasing mobile attacks and zero-day exploits, we need dedicated analysts to proactively protect our customers and expand detection coverage. As the analysts team has grown, this role now allows for broader coverage of emerging mobile threats and enables analysts to take on more diverse responsibilities. The expanded scope supports comprehensive threat research, detection development, and incident response, ensuring work is thorough, prioritized, and aligned with evolving security challenges.

What you can expect to do in this role:
Research new ways to detect malicious activity on using a wide variety of custom-built tooling.
Participate on research how to protect users from 0-day attacks.
Perform analysis of detections according to the assignment to determine accuracy and precisions and tune detections accordingly based on results.
Stay up to date on the latest malware trends and design detections accordingly.
Support sales and marketing by timely information about emerging threats and trends.
Analyze device logs and search for malicious signs.
Write and manage detection patterns and algorithms to detect malicious mobile threats in Android and iOS devices.
Perform other duties and special projects as assigned.
Requirements:
What we are looking for:
Minimum 1-2 years of relevant professional experience.
Experience in extracting and analyzing data from mobile devices.
An understanding of cyber security and intrusion detection.
Excellent programming/scripting skills (Python).
Mobile Malware Analysis expertise and strong interest in mobile security.
Great presentation skills and fluency in English.
Experience with detecting malware using Yara rules, an overall comprehensive understanding of incident response, a knowledge of using databases and writing queries (e.g. SQL, KQL) and ability to find and run a mobile exploits are a plus.
Customer value focus with the ability to quickly iterate based on emerging threats and customer feedback is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8495641
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
08/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Security Operations Engineer to join our Security team, reporting to the CIO. This is a hands-on role where you will design and operate security infrastructure, lead cloud security initiatives, and rethink our security architecture. You'll build AI-powered solutions to automate security triage and response, while partnering cross-functionally with DevOps, IT, and Engineering teams to drive security outcomes across the organization.
What you will do :
Design, implement, and operate security monitoring capabilities using a SIEM platform to detect, analyze, and respond to threats in real time. Deploy and manage EDR, DLP, CSPM, and other security controls across the environment.
Build and maintain cloud security architectures, ensuring strong IAM, network segmentation, encryption, and a zero-trust approach across all cloud deployments.
Continuously evaluate and evolve the security architecture and defense in depth strategy. Integrate tools and systems across the stack to enable unified telemetry, seamless data flow, and automated response actions.
Develop AI powered agentic solutions and operational automations using n8n. Use Infrastructure as Code to automate deployment, configuration management, and ongoing lifecycle operations for security infrastructure.
Create and tune detection rules, build log ingestion pipelines, and conduct proactive threat hunting. Lead monitoring, investigation, and remediation efforts using structured DFIR methodologies.
Embed security into CI/CD pipelines and broader DevSecOps workflows. Partner with DevOps, IT, and Engineering teams to integrate security into day to day operations and technical decision making.
Implement and maintain controls aligned with HIPAA, HITRUST, and SOC 2 requirements. Perform security assessments for vendors, SaaS platforms, and internal applications.
Requirements:
5+ years of hands-on experience in security operations, incident response, or security engineering.
Strong background with SIEM platforms for monitoring, threat detection, and alert tuning.
Proven experience deploying and managing core security technologies, including EDR, DLP, and vulnerability management solutions.
Solid cloud security expertise across AWS, Azure, and GCP, with a strong understanding of cloud-native controls and architectures.
Scripting/automation proficiency (Python, Bash, PowerShell) for security automation
Hands-on experience with workflow automation platforms such as n8n or similar
Strong understanding of security architecture principles, defense in depth, and modern attacker techniques.
Familiarity with DevSecOps practices and integrating security into modern SDLC pipelines.
Highly independent: You take ownership of security challenges and you thrive in ambiguity; you carefully research and recommend solutions and drive execution autonomously
A great communicator: You're a people person, and you thrive in a fast-paced team environment with high-performance standards
Capable of working under pressure and delivering quickly
Flexible: You can see the big picture while staying detail-oriented; you can zoom in and out with ease
Driven: You bring a strong desire and drive to tackle complex security problems
What is Nice to Have:
Experience building AI/ML-powered security solutions or SOAR platforms
Background in detection engineering and high-fidelity alert creation
Container/Kubernetes security expertise
Security certifications (CISSP, GIAC, cloud security certifications)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8493353
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced SOC Manager to lead our Security Operations Center (SOC), with full responsibility for detection, response, and operational excellence. This role combines hands-on technical leadership with people management, process ownership, and alignment to business risk.
The SOC Manager will be accountable for the effectiveness, maturity, and scalability of security operations across the organization.
What you will do?
Oversee day-to-day SOC operations, ensuring timely threat detection, incident response, and threat mitigation. Own day-to-day SOC operations, ensuring effective threat detection, incident response, and containment across all environments.
Develop and implement SOC policies, processes, and playbooks to improve security effectiveness.
Continuously evaluate and enhance SIEM configurations, alerting mechanisms, and automation. Continuously optimize SIEM content, alert quality, detection coverage, and automation capabilities.
Team Management & Training- Recruit, mentor, and manage a team of SOC analysts and incident responders.
Lead incident investigation, containment, and remediation efforts, coordinating with internal teams and external partners.
Align security operations with MITRE ATT&CK, NIST, and other cybersecurity frameworks.
Produce clear, executive-level incident reporting and risk summaries for security leadership and stakeholders.
Stay updated on emerging threats, attack techniques, and security technologies to drive continuous improvements.
Requirements:
5+ years of experience in SOC leadership, cybersecurity operations, or incident response.
Strong hands-on experience with SIEM platforms (Splunk preferred) and threat detection methodologies.
Deep expertise in incident response, threat hunting, and forensic analysis.
Knowledge of cloud security (AWS, Azure, GCP) and network defense strategies.
Proficiency in scripting (Python, PowerShell, or Bash) for security automation.
Familiarity with MITRE ATT&CK, NIST, CIS, and other security frameworks.
Excellent communication and leadership skills with a track record of team development and cross-functional collaboration.
Preferred Qualifications
Security certifications such as CISSP, GCIH, GCFA, OSCP, or SIEM-specific certifications.
Experience leading SOC optimization projects and implementing SOAR solutions.
Background in offensive security (Red Team/Purple Team) is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8492132
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly skilled and experienced Attacks and Exploits Developer to join a specialized team focused on developing offensive, production-ready attack capabilities.
This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations.
Requirements:
4+ years of hands-on experience in OS Internals or kernel-mode development using C and C++
3+ years of Python experience, especially for integrating with native modules and supporting research workflows
Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling
Proficient in Windows debugging using WinDBG, KD, and similar tools
Deep knowledge of Windows APIs, security controls, and undocumented behaviors relevant to offensive security
Familiarity with EDR evasion, API hooking, and direct system call manipulation
Personal Attributes:
Passionate about offensive security and deep technical research
Self-motivated and capable of operating independently in high-trust environments
Creative and methodical in problem solving, with a strong attention to detail
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8489678
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly skilled and experienced Windows Internals Team Leader to lead a specialized attack team focused on developing offensive, production-ready attack capabilities.
This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations.
You will be hands-on in both leadership and development, guiding technical direction, mentoring engineers, and contributing code across kernel-mode and user-mode components.
Requirements:
5+ years of hands-on experience in Windows Internals or kernel-mode development using C and C++
3+ years of Python experience, especially for integrating with native modules and supporting research workflows
Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling
Proficient in Windows debugging using WinDBG, KD, and similar tools
Deep knowledge of Windows APIs, security controls, and undocumented behaviors relevant to offensive security
Familiarity with EDR evasion, API hooking, and direct system call manipulation
Personal Attributes:
Passionate about offensive security and deep technical research
Self-motivated and capable of operating independently in high-trust environments
Creative and methodical in problem solving, with a strong attention to detail
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8489671
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a Security Researcher to join our world-class original research team!
If you are interested in conducting innovative vulnerability/security research while becoming a worldwide known researcher, then this is your opportunity.
As a researcher, youll be joining a top-notch security research team that produces some of the worlds most novel research projects.
Youll be provided with guidance for finding creative research targets and performing groundbreaking research, in order to get accepted to present your findings in the worlds top conferences such as Black Hat, DEF CON and more! The teams primary expertise lies in vulnerability research in Windows and endpoint security controls, though research is made in a variety of other scopes as well such as Android, applications, embedded devices, AI, and more!
Requirements:
At least 5 years of experience in offensive approach
At least 3 years of experience in reverse engineering
Knowledge of networking and internet protocols
Knowledge of Windows/Linux internals
Ability and desire to work in a high paced startup environment
Ability to handle new technological concepts
Self drive and autonomous learning abilities
💥 Even BETTER if you have
Past security/malware/vulnerability research experience
Public speaking skills
Offensive tools development experience
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8489636
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for an Incident Response Team Leader to lead investigations and response activities in support of organizations worldwide.

Cyber threats are constantly growing in volume, velocity and sophistication. When an organization is confronted with an advanced attack, it needs the strongest capabilities on its side. In many cases, an incident response engagement is in fact a battle within a network. The operational art, experience, focus, and speed of response teams can mean the difference between a minor blow, and a devastating impact on an organizations performance and reputation.

The Incident Response Team Leader will be key to the success of Incident Response projects worldwide, and should possess strong leadership skills, be highly technical and thrive in a fast-paced and dynamic environment.

Main Responsibilities

Lead a team of top-tier cyber security researchers and forensic experts conducting assessments and in-depth analysis in complex investigations, as well as security assessments.

Guide and empower team members, enhancing their technical and research skills.

Lead client-facing projects including incident response and hunting efforts for large-scale sophisticated attacks, to contain and defeat real-world cyber threats.

Collaborate and work with clients IT and Security teams during investigations.

Design and improve internal incident response technologies, methodologies, and processes.
Requirements:
At least 3 years experience in team management (from military service and/or industry).

Excellent English - spoken and written.

In-depth understanding of the lifecycle of advanced security threats, attack vectors and methods of exploitation.

Strong technical understanding of network fundamentals, common internet protocols and system and security controls.

Experience with the tools and techniques used in security event analysis, incident response, computer forensics, malware analysis, or other areas of security operations.

Multidisciplinary knowledge and competencies, such as:

o Hands-on experience in data analysis (preferably network traffic or log analysis) in relevant data analysis and data science platforms (Jupyter, Splunk, pandas, SQL).

o Familiarity with cloud infrastructure, web application and servers, Android and iOS mobile platforms.

o Experience with malware analysis and reverse engineering.

o Familiarity with enterprise SIEM platforms (e.g. Splunk, QRadar, ArcSight).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8488244
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.



Responsibilities

Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics.
Solving security incidents in accordance with defined service level agreements and objectives.
Prioritizing and differentiating between potential incidents and false alarms.
Addressing clients enquiries via phone, email, and live chat.
Working side-by-side with customers, providing insightful incident reports.
Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards.
Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas.
Identifying and offering solutions to gaps in current capabilities, visibility, and security posture.
Correlating information from disparate sources to develop novel detection methods.
Requirements:
At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts.
Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment.
Independent, bright and positive analyst who strives for excellence.
Proficiency and experience with scripting (Python).
Strong capabilities in drafting cyber security reports for clients.
Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation.
Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.)
Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR).
Strong technical understanding of network fundamentals, common internet protocols, and system and security controls.
Basic knowledge of host-based forensics and OS artifacts.
Familiarity with cloud infrastructure, web application and servers - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8488240
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Senior Staff Product Manager to join AI SIEM Data Platform product team to lead the vision, strategy, and execution for unified log collection from our unified agent. This role focuses on driving product direction and cross-functional delivery of agent-based collection for both Windows, MacOS, and Linux flat file logs and Windows Event Logs. The Product Manager ensures that customers benefit from a seamless, single-agent solution that streamlines log onboarding, normalization, and centralized security analytics for threat hunting, detection, response, and reporting.


What will you do?
Product Strategy and Ownership

Define product vision, priorities, and multi-phase roadmap for unified agent log collection capabilities
Lead requirement gathering and translate business needs into clear, actionable product requirements
Own the lifecycle of agent log collection features from ideation through development, launch, and ongoing iteration
Collaborate with engineering, UX, and architect teams to design configurable, user-friendly log collection workflows.
Collaborate with cross-functional product areas to specify requirements for agent-side features
Establish technical and UX specifications for integration with the Singularity Operations Center
Champion the consolidation of flat file log, event log, and telemetry collection into a unified, enterprise-grade agent deployment
Minimize operational overhead and complexity for customer environments
Ensure secure, performant, and reliable ingestion of collected logs into the AI SIEM/Singularity Data Lake
Drive initiatives on data normalization, parsing, and searchability to maximize downstream analytics and compliance value
Develop enablement material, size and performance guidance, and support playbooks for internal and external stakeholders
Serve as an escalation point for validation, troubleshooting, and feedback cycles with field, support, and customer teams
Requirements:
Bachelors degree in Computer Science, Engineering, Information Security, or a related technical discipline
8-12 years of product management at enterprise-level organizations
Demonstrated track record driving agent-based product initiatives in SIEM, XDR, or related data platforms
Expertise in Windows logging subsystems (Event Logs and flat files) and endpoint agent architectures
Fluency in SIEM and/or XDR concepts, log normalization, and relevant protocols
Experience delivering scalable agent deployment, upgrade, and remote configuration solutions for large enterprises
Proficiency managing backlogs, epics, and user stories using agile tools such as JIRA
Customer Focus - Ability to create a shared vision with customers and deliver on it
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8487984
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an Application Security Engineer to join our Security Engineering team.

What you will be doing:

As an Application Security Engineer , you will play a critical role in ensuring our software applications are secure by design and resilient against evolving threats. You will collaborate closely with development, DevOps, and product teams to embed security throughout the SSDLC and drive secure coding practices.

Conduct security assessments, penetration tests, and code reviews across web, mobile, and cloud applications.

Integrate security tools (SAST, DAST, SCA) into CI/CD pipelines using platforms like Azure DevOps, GitHub Actions.

Design and enforce secure coding standards and SSDLC policies.

Collaborate with developers to remediate vulnerabilities and provide inline guidance during PR reviews.

Lead threat modeling and architecture reviews for new features and services.

Manage secrets, access controls, and data confidentiality assurance across applications.

Monitor public exposure of cloud resources and enforce Azure policies to prevent misconfigurations.

Participate in incident response and forensic analysis for application-related security events.

Deliver security awareness training and documentation for engineering teams.

Maintain up-to-date knowledge of OWASP Top 10, secure coding techniques, and emerging threats.
Requirements:
3+ years of experience in application security or related fields.

Strong understanding of secure development practices, cryptography, and vulnerability management.

Familiarity with tools like CodeQL, GitHub Advanced Security, and container image scanning platforms.

Experience with cloud platforms (Azure preferred), microservices, and containerized environments.

Knowledge of authentication protocols (OAuth 2.0, OIDC), RBAC, and VPN architecture.

Familiarity with SBOM generation and supply chain security practices.

Certifications such as OSCP, CSSLP, or GWAPT are a plus.

Excellent communication skills and ability to work cross-functionally.

Internally motivated, well organized, able to work proficiently both independently and in a team environment.

Strong communication skills with both internal team members and external business stakeholders.

All-around team player who is self-motivated with a high work ethic.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8485886
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Security Engineer to join our security operations team with a strong focus on detection and response.

This is a unique opportunity to leverage your threat detection and response experience and build some of the foundational systems and services to keep our infrastructure free from malicious actors and threats. You will partner closely with all engineering teams, IT administrators, and compliance analysts to ensure that we maintain sufficient visibility into our environments and develop effective programs and practices to ensure that our environments are always secure. Tooling and automation will be key to success as we scale our environments to meet customer demand.



What You Will Do:

Collaborate with different teams for building and setting up pipelines needed to gather relevant security telemetry.

Build and maintain an effective and scalable security monitoring infrastructure solution.

Develop detection strategies to identify anomalous activity and ensure that our critical infrastructure and services operate in a safe environment.

Triage alerts and drive security incidents to closure while reducing their potential impact .

Build processes and workflows to triage security alerts and respond to real incidents.

Research new threat attack vectors and ensure that our detection and response capability is in line with the current threat landscape.

Proactively improve the quality of our detection rules and strive to eliminate classes of issues by working directly with engineering teams.

Contribute to strategy, risk management, and prioritization for all efforts around detection and response.

Collaborate with the compliance team to maintain and audit security controls and processes, ensure compliance with relevant security frameworks and certifications.

Pragmatic implementing business-focused controls to safeguard the companys multi-cloud entities.
Requirements:
5+ years of relevant industry experience.

Strong domain knowledge in security incident detection and response, with a proven ability to operate, optimize, and enhance the effectiveness of the Security Operations Center (SOC).

Demonstrated experience with effective incident response and containment practices, preferably in a cloud-first environment.

Hands-on experience in instrumenting and deploying telemetry solutions.

Experience with operating open-source and/or commercial solutions for logging and security event management, including SIEM and SOAR platforms such as Splunk, Microsoft Sentinel, SolarWinds, Trellix, and similar tools.

Experience in managing and fine tunning CNAPP platforms such as WIZ, Orca, Defender, Singularity or other similar solutions.

Ability to script or code fluently in an interpreted language like Python, PowerShell or Javascript.

Proficiency in automation using tools such as Logic Apps, Azure Functions, AWS Lambda, and Runbooks.

Strong experience in analyzing IAM configurations and entities behavior across multi-cloud and multi-account environments, detecting potential breaches, identifying security gaps, and responding to threats in real time.

Decision-maker with the ability to operate with freedom and autonomy.

Experience working with distributed teams and other cross-functional stakeholders.

Ability to manage competing priorities and workload.

Experience or strong familiarity with DevOps practices and Agile methodologies is a plus.

Experience with cloud deployments in AWS, GCP, or Azure is a plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8485876
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
01/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a talented team leader to join the industrys leading digital intelligence Labs group. In this role, you will lead and participate in innovative projects to implement and productize groundbreaking, world-unique capabilities for extracting evidence from Android or iOS devices.
Modern Android and iOS platforms present increasing challenges from a forensics perspective, incorporating robust protection mechanisms such as File-Based Encryption, Secure Element, and mitigations like Pointer Authentication Codes.
A team of passionate researchers and developers dedicated to solving cutting-edge digital intelligence challenges, staying years ahead of others in the industry.
Our world-class R&D efforts assist law enforcement agencies by enabling lawful evidence extraction, helping to bring criminals to justice every day.
Key Responsibilities:
Oversee Vulnerability Research Projects: Lead and manage projects focused on discovering and exploiting vulnerabilities in mobile platforms.
Mentor and Guide Team Members: Provide mentorship and guidance to researchers, helping them navigate complex technological challenges.
Deliver Comprehensive Solutions: Develop complete solutions, moving beyond proof-of-concept demonstrations to fully implementable exploits.
Recruit and Develop Talent: Identify and recruit new researchers as needed, building a skilled and dynamic team to enhance the department's capabilities.
Requirements:
Over 3 years of experience leading security research projects and managing teams.
At least 6 years of experience in vulnerability research.
Full proficiency in English.
Excellent interpersonal skills.
Experience in mobile vulnerability research and exploitation is an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8482915
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
01/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking talented researchers to join our industry-leading Digital Intelligence Security Research Labs.
As a security researcher on our team, you will focus on identifying vulnerabilities within Apples ecosystem and developing innovative exploit strategies to gain access to iPhones and other devices, enabling the extraction of crucial evidence for law enforcements.
Key responsibilities:
Research on territories with little-explored vulnerability
Work on the production of world-unique capabilities to extract evidence from phones and other embedded devices.
iPhones and other iOS devices present tough challenges from a forensics perspective and involve hardware-backed encryption (SiDP), secure crypto coprocessor (SEP), and secured boot chain (SecureROM).
New iPhones present state-of-the-art exploit mitigations such as PAC, KTRR, and PPL.
Become a member of Labs Group, focusing on Security Research for mobile devices.
Execute your own (shell) code on top-notch technology mobile platforms hardened with challenging mitigations
Collaborate with a team of passionate researchers dedicated to solving modern digital intelligence challenges, years ahead of others in the industry.
Take part in world-class research results, assisting law enforcement by enabling lawful evidence extraction, and putting criminals behind bars every day.
Requirements:
Proven vulnerability research experience (preferably in iOS)
Experience with advanced exploitation techniques
ARM reverse engineering
Cryptographic primitives and weaknesses
Hardware research/board design - Advantage
You are a security researcher who cares about the ethical values of your work
You love the art of engineering and crafting a platform-wide native payload, in a fragmented ecosystem of gaping variance
You are passionate about technology and keen to use your skills to make the world a safer place.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8482909
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
01/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Android Security Researcher
Position Overview:
As a talented researcher, you will be joining the industrys leading digital intelligence Security Research Labs group. In this position you will be taking part and leading new projects in little-explored vulnerability research territories, producing world-unique capabilities to extract evidence from phones and other embedded devices. Recent phones (from burner phones to the latest flagships) are increasingly challenging from a forensics perspective, and involve hardware-backed encryption (FDE/FBE), secure boot chains (Verified Boot/dm-verity), evolving hardened SELinux policies, as well as adventures in ARM TrustZone secure worlds.
Key Responsibilities:
You will join our digital intelligence Security Research Labs Group and be a part of a team of passionate researchers, dedicated to solving modern digital intelligence challenges, years ahead of others in the industry. Our world-class research results assist law enforcement by enabling lawful evidence extraction, and putting criminals behind bars, every day.
You are a security researcher who cares about the ethical use case for his/her work, and if the art of engineering and crafting a platform-wide native payload in a fragmented ecosystem of gaping variance is the kind of challenge you appreciate, you belong with us. We need your help to make the world a safer place.
Requirements:
Practical experience performing vulnerability research and exploitation, preferably in mobile or other modern environments, eg. Windows/Linux/iOS/MacOS
Practical reverse engineering experience, preferably in ARM / TrustZone / Hypervisors
Advantage: Cryptographic primitives and weaknesses
Advantage: Advanced fuzzing
Advantage: Offensive hardware research/board design
Advantage: Experience dealing with modern memory corruption mitigations, such as PAC and MTE.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8482887
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו
ישנן -191 משרות במרכז אשר לא צויינה בעבורן עיר הצג אותן >