משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
5 טיפים לכתיבת מכתב מקדים מנצח
נכון, לא כל המגייסים מקדישים זמן לקריאת מכתב מק...
קרא עוד >
הטבות ובונוסים בעבודה בחברות הייטק
מכון כושר צמוד, חדר אוכל משובח, חדר משחקי וידאו...
קרא עוד >
טעויות נפוצות בניהול קריירה
הדרך לחיים של חוויות והזדמנויות עוברת דרך תכנון...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Managed Cloud Detection and Response Analyst to join our newly established team. The team is responsible for monitoring customers cloud environments and workloads, triaging security alerts, and mitigating cyber incidents.
WHAT YOULL DO
Continuously monitor customers cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents.
Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively.
Work closely with customer teams to guide and assist with investigation and remediation of incidents.
Create and deliver incident reports that document findings and response actions taken for customers.
Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customers specific cloud environment.
Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team.
Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods.
Requirements:
2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments.
Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure).
Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights.
Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security.
Excellent communication skills verbal and written both in Hebrew and English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8574079
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an experienced Incident Responder to join our newly established team and spread the power!
WHAT YOULL DO
Investigate real-world cyber-attacks on customers cloud environments and cloud workloads, understanding their root causes and the full scope of compromise, leveraging the platform.
Perform proactive threat hunting to identify undetected cyber-attacks and cloud threats within customer environments.
Collaborate with customer teams during engagements to effectively respond to threats.
Develop and deliver professional engagement reports, including high-level summaries and deep dives into technical findings.
Develop and document incident response methodologies, best practices, and standard operating procedures tailored to cloud environments and cloud workloads.
Collaborate with the threat research and engineering groups to refine and enhance incident response detections, tools, and features, based on real-world investigation experiences.
Requirements:
5+ years of experience in cyber-security, cyber-incident response, and threat hunting.
Solid foundation in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure).
In-depth knowledge of OS internals for both Windows and Linux.
Strong analytical skills with a keen attention to detail.
Experience with scripting languages and querying languages.
Excellent communication skills, both verbal and written, in Hebrew and English.
Passion to solve any problem and to thrive as an independent and innovative Incident Responder.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8574068
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a top-notch Detection Software Engineer to join our Threat Research team and further develop the Runtime Sensor. In this role, you will work on a world-class runtime security solution affecting some of the largest cloud workloads, collaborating closely with engineering and research to enable new and better threat detection capabilities.
WHAT YOULL DO
Work on a world-class runtime security solution affecting some of the largest cloud workloads
Work closely with engineering and research to enable new and better threat detection capabilities
Build and extend our research infrastructure, automated testing infra and release processes
Conduct research and develop new detection capabilities, from concept to implementation
Constantly shift things from an art to a science - make the hard things easy, fast and scalable
Quickly address gaps and changes when needed. Bias towards action
Analyze, debug and solve problems in test, staging and production environments
Create and enforce best practices and security policies
Work with customers in response to requests and questions when needed.
Requirements:
5+ years of experience in software engineering
3+ years of experience in cloud-based development. Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)
Deep knowledge of OS internals (Windows/Linux) and networking
Experience delivering real-world impact on products affecting customers
The ability to learn independently, to be self-driven and goal-oriented
Excellent communication and teamwork skills
ADVANTAGE
Experience with runtime security products
Hands-on experience in a detection engineering role/malware analysis/reverse engineering/vulnerability research
Familiarity with notable threat actors and threat intelligence analysis
IR/red-team/threat-hunting experience
Familiarity with the following languages / tools: Python, PowerShell, Linux shell scripting, Terraform, CircleCI, Github Actions.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8574008
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
we are a leading hybrid cloud security company revolutionizing the way organizations manage cyber risk. We provide cutting-edge exposure management solutions by simulating real-world attack paths across cloud and on-prem environments. Our technology identifies misconfigurations, vulnerabilities, and identity exposures, allowing organizations to remediate risks with minimal effort. We are looking for a talented and motivated Software Developer Intern to join our development team in a part-time capacity. This is an exciting opportunity to gain hands-on experience working with modern cybersecurity technologies. Responsibilities:
* Develop and enhance server-side attack simulation logic using Node.js, MongoDB, and TypeScript/ JavaScript.
* Work with JAVA, Node.js, or Python to develop innovative security solutions.
* Explore and implement modern attack techniques in cloud environments (AWS, Azure, GCP) and enterprise networks.
* Collaborate with the development team to maintain and improve existing infrastructure.
Requirements:
Magshimim / Mamriot program trainee or equivalent independent Cybersecurity development experience
* Experience with JAVA / NodeJS/ Python development.
* Deep understanding of Computer Science principles, networking, data structures, and O
* Highly motivated, capable of taking full responsibility and facing a wide range of modern technologies and challenging development tasks, that include diving into a large existing infrastructure and team collaboration
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8573990
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Cloud Security Analyst to join our Product team and help expand the power.
In this role, youll play a key role in protecting our customers' cloud environments from cyber threats. Your work will directly contribute to customer success and push the boundaries of cloud security.
This isnt just a job-its a unique growth opportunity. Youll gain hands-on experience that can pave the way for exciting career paths in product management, security research, or development.
WHAT YOULL DO
Innovate and develop advanced detection mechanisms, algorithms, and automated solutions to accurately identify and classify technologies within cloud environments, enhancing our vulnerability management offering.
Analyze cloud services, APIs, and log payloads to ensure compliance with industry standards and customer requirements.
Stay current with the latest technologies and industry trends.
Implement customer requests and industry standards to position us as a market leader.
Collaborate with our Research and Backend teams.
Requirements:
Hands-on proficiency in Linux, Windows, Python, Bash, Docker, Kubernetes, PowerShell, and a strong understanding of the OSI model.
Solid knowledge of networking concepts and cloud infrastructure.
Proven experience in applying cybersecurity best practices to real-world scenarios.
Self-motivated and capable of working both independently and collaboratively within a team.
Strong communication skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8573987
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We're looking for a Application Security Product Analyst to join our Product team and spread the power. In this pivotal role, you will be the primary operator of our cutting-edge AI-driven Dynamic Application Security Testing (DAST) agent. You will bridge the gap between automated AI testing and security policy, defining the "rules of engagement" for our agents and ensuring they effectively simulate sophisticated attacks while maintaining operational safety.
WHAT YOULL DO
Oversee the daily deployment, health, and operation of DAST and penetration testing capabilities to ensure optimal scanning across diverse customer environments.
Develop and maintain attack policies and rules by creating and fine-tuning the logic that defines how the system identifies, prioritizes, and exploits vulnerabilities.
Analyze and validate findings by reviewing complex attack paths to reduce false positives and improve the core logic's performance.
Research novel attack vectors and emerging web/API threats to translate new techniques into executable behaviors for the DAST engine.
Collaborate on product evolution with R&D and Product teams, using operational insights to drive feature requests and continuous improvement.
Requirements:
Over 2 years of DAST and penetration testing expertise, including hands-on experience in application security or operating enterprise tools like Burp Suite, OWASP ZAP, or Acunetix.
Proven ability in security rule and policy development, specifically in writing custom scripts or signatures to translate vulnerability classes into detection rules.
Technical proficiency in web protocols and API standards, with a strong command of HTTP/S, REST, GraphQL, and authentication mechanisms like OAuth and SAML.
Proficiency in scripting languages such as Python, Go, or JavaScript to automate tasks and interact with the codebase.
An analytical mindset with the ability to diagnose complex logs and scans to distinguish between tool failures, configuration issues, and valid security findings.
BONUS POINTS
Knowledge of AI/ML and how LLMs or reinforcement learning agents operate within a cybersecurity context.
SaaS and cloud experience with familiarity in AWS, Azure, or GCP environments and modern cloud-native architectures.
A red teaming background with experience in simulated adversarial attacks and bypassing standard WAF or security controls.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8573980
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time and Internship
We are a leading hybrid-cloud security company revolutionizing the way organizations manage cyber risk. We provide cutting-edge exposure management solutions by simulating real-world attack paths across cloud and on-prem environments. Our technology identifies misconfigurations, vulnerabilities, and identity exposures, allowing organizations to remediate risks with minimal effort. We are looking for a brilliant and motivated Product Management Intern to join our product team. This is a unique opportunity to sit at the intersection of Cybersecurity Research and Software Development, to add AI capabilities to the product. You wont just be watching. You'll be working with the Product group to brainstorm and TEST new AI-powered features for our platform.
Responsibilities:
* AI-driven research: use LLMs and AI tools to find better ways to explain and fix complex security issues. Use Python to analyze datasets and benchmark prompt performance to ensure AI accuracy in security contexts. Rapid Prototyping: Build functional Proof of Concepts (POCs) for AI Agents that automate complex security workflows. This includes enhancement to server-side attack simulation logic using Node.js, MongoDB.
* Work with Python and Node.js to develop innovative security solutions.
* Translate new cloud attack techniques into logic that our AI can simulate and explain.
* Collaborate with the development team to maintain and improve existing AI infrastructure.
Requirements:
Requirements:
* The Background: Magshimim / Mamriot program trainee or equivalent independent Cybersecurity research and development experience. AI Native: Expert at using Cursor, Claude, and LLM APIs to build and iterate faster than traditional development cycles.
* Native: You are an expert at using AI (Cursor, Claude, etc.) to research, write code, and solve problems faster.
* The Tech: Strong Python / Node.js skills and the ability to "speak Developer " while maintaining a product-first mindset. You have hands-on experience designing and implementing RESTful APIs, alongside a deep understanding of Computer Science principles, LLM APIs (e.g., OpenAI, Anthropic), networking, and data structures.
* The Mindset: You are curious, independent, and love digging into how things work (and how to break them). You are capable of taking full responsibility and facing a wide range of modern technologies and challenging development tasks, that include diving into a large existing infrastructure and team collaboration.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8572726
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/03/2026
Location: Ramat Gan
Job Type: Full Time and Temporary
We are looking for a Red Team specialist for our Infrastructure Red Team department for a maternity leave replacement. This role includes researching, assessing and challenging digital identity verification and access mechanisms across a variety of platforms and solutions. The position includes creative red team projects and infrastructure management alongside end-to-end delivery to key clients. You will be responsible for the generation of insights, means, methods and signals provided from diverse intelligence streams alongside red team exercises meant to assist with identifying key vulnerabilities, high risk abuses, and mitigation solutions and planning. Key responsibilities:
* Red Team operations - strategic planning and execution of red team exercises
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying abuse methods
* Research and development of new operational bypass methods
* Provide insights on intricate means and methods being used by threat actors to abuse the worlds most popular tech platforms while putting users at risk
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Content creation and management.
Requirements:
* Hands on experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* Knowledge in OSINT investigation techniques and red teaming
* Online and infrastructure security orientation
* Fluent English - Strong written and verbal communication skills
* Curiosity and out of the box thinking
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Ability to work under pressure Nice to have
* Additional languages
*  Python proficiency
* Experience in threat modeling and adversary emulation specifically focused on digital identity attacks
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8571820
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
08/03/2026
Location: Petah Tikva
Job Type: Full Time
The Chief Information Officer (CIO) is responsible for the strategic leadership, security, reliability, and evolution of all information systems, networks, communications, and IT services across the organization. This role oversees operations spanning highly classified environments as well as open and unclassified networks, ensuring strict separation, compliance, and resilience. The CIO leads system architecture, cybersecurity, networks, help desk, communications platforms, and enterprise IT services while acting as a senior crisis manager, risk owner, and cross-organizational change leader.

Responsibilities:
Strategic Leadership: - Define and execute IT and information security strategy aligned with organizational objectives. - Advise executive leadership on technology, cyber risk, and operational resilience.
Systems, Networks, and Operations: - Oversee classified, unclassified, and open networks. - Ensure secure system architecture, segmentation, and access control. - Maintain a hands-on role in critical technical domains, including architecture decisions, cybersecurity posture, and complex operational issues
Cybersecurity & Risk Management: - Own enterprise technology and cyber risk management. - Ensure compliance with security and regulatory requirements.
Crisis Management & Incident Response: - Act as executive lead during IT or cybersecurity crises. - Coordinate response and recovery efforts.
Help Desk & End-User Services: - Oversee help desk and user support services.
Communications Systems: - Own secure and enterprise communication platforms.
Cross-Organizational Leadership: - Lead complex, multi-department initiatives.
Team Leadership: - Lead and develop IT and security teams.
Requirements:
- Senior leadership experience in IT or information systems. - Experience managing classified and unclassified environments. - Strong hands-on technical capabilities, with the ability and willingness to actively engage in system architecture, infrastructure, and cybersecurity - Strong background in cybersecurity, risk management, and crisis response. - Excellent decision-making and communication skills. Academic Background & Education - B.Sc. in Information Technology Engineering, Information Systems, Computer Science, Technology Management, or a related field. - Graduate-level education strongly preferred. Key Competencies - Crisis leadership - Strategic thinking - Risk management - Cross-functional leadership
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8509920
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/03/2026
Location: Herzliya
Job Type: Full Time and Hybrid work
we are seeking a Junior Cybersecurity Architect (GRC & Risk) to support governance, risk analysis, and security process design. The role focuses on translating security findings into structured mitigation plans and improving methodologies and frameworks-without hands‑on technical configuration.You will work with CISOs, security leaders, engineering teams, and customers on due diligence, maturity assessments, and development of security processes and documentation.

Responsibilities
Conduct customer and third‑party security assessments and questionnaires.
Lead or support mitigation workshops and build actionable remediation plans.
Develop and refine methodologies, processes, and architectural guidelines.
Map technical findings to governance, risk, and control gaps.
Perform NIST CSF 2.0-aligned maturity assessments.
Produce clear reports and executive summaries.
Maintain internal documentation and ensure framework alignment.
Requirements:
1-2 years in cybersecurity GRC, IT risk, compliance, audit/assurance, or related process‑oriented security roles.
Strong understanding of governance, risk management, and operational processes.
Familiarity with cybersecurity frameworks (NIST CSF, ISO 27001 concepts), risk assessment, mitigation planning, and third‑party risk management.
Basic conceptual understanding of cloud/SaaS shared responsibility models.
Ability to communicate technical issues in business‑aligned language.
Strong writing, communication, and facilitation skills.
Comfortable collaborating with internal stakeholders and external customers.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8570038
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/03/2026
Location: Herzliya
Job Type: Full Time and Hybrid work
This position is intended for a candidate with a background in security engineering who is looking to transition into a cybersecurity architecture role. The role focuses on reviewing cloud and SaaS environments, assessing the effectiveness of security controls, and supporting security maturity assessments and mitigation planning activities.This is a junior‑level architecture role with an emphasis on technical analysis, control review, and security design assessment. The position prioritizes architectural evaluation and advisory activities over hands‑on implementation.

Responsibilities
Perform security maturity assessments, including reviews of technical controls, configurations, and architectural designs, aligned with the NIST CSF 2.0 cybersecurity framework.
Conduct technical configuration and control reviews of cloud environments and SaaS platforms (read‑only / observer role).
Analyze security architectures and technical implementations to identify gaps, risks, and improvement opportunities.
Translate technical findings into clear architectural observations and recommendations.
Produce structured assessment reports and technical findings for both technical and non‑technical audiences.
Maintain internal technical documentation and contribute to architectural knowledge within the team.
Collaborate with R&D and product teams on ad‑hoc cases as a cybersecurity technical subject‑matter contributor.
Requirements:
1-2 years of experience as a security engineer, security operations engineer, or similar technical security role.
Strong understanding of technical security controls and architectures.
Familiarity with:
Cloud identity and access management (e.g., Entra ID / Azure AD).
Microsoft Defender suite, endpoint security, and DLP.
Firewalls, network segmentation, and core network security concepts.
SOC / SIEM concepts and incident response processes.
SaaS security and cloud shared responsibility models.
Ability to analyze configurations and understand architectural/risk implications.
Strong analytical skills and attention to detail.
Clear technical writing and documentation capabilities.
Motivation to grow into an architecture‑focused career path.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8570033
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/03/2026
Location: Ramat Gan
Job Type: Full Time
Alice is seeking a driven, detail-focused professional to become a vital part of our team as a Generative AI Analyst. In this role, you'll dive into the cutting-edge of technology, meticulously analyzing various content infringements to secure the new wave of Generative AI tools. Your duties will include collaborating with experts in diverse fields such as Hate Speech, Misinformation, Intellectual Property and Copyright, Child Safety, among others. Your tasks will involve writing adversarial; prompts to identify weaknesses in various AI models, including Large Language Models (LLMs), Text-to-Image, Text-to-Video, and beyond. You'll also oversee data management to guarantee the highest quality of outputs. Responsibilities
* Developing adversarial and risky prompt strategies across several areas of abuse to expose potential vulnerabilities in models.
* Managing projects end-to-end, from initial planning and oversight through quality assurance to final delivery.
* Handling extensive datasets across multiple languages and areas of abuse, ensuring precision and meticulous attention to detail.
* Ongoing investigation into new tactics for circumventing foundational models' safety measures.
* Working alongside diverse teams, engineering, product, policy, to tackle new challenges and craft forward-thinking strategies and resolutions.
* Promoting a culture of knowledge exchange and continual learning within the team.


About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must have:
* Background in AI Safety and/or Responsible AI and/or AI Ethics
* Familiarity with recent Generative AI models and agents is essential, though direct technical experience is not a prerequisite.
* Command of English at a near-native level.
* Attention to detail, organizational capabilities, and the capacity to juggle numerous tasks concurrently. Additional Wants:
* Experience with various model types (Text-to-Text, Text-to-Image) is desirable.
* Prior experience with OSINT (Open Source Intelligence) will be considered an asset.
* A self-starter attitude, with the energy to excel in a fast-moving and variable environment.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8508180
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/03/2026
Location: Ramat Gan
Job Type: Full Time
Alice is seeking an experienced Malware Research Director to build and manage multiple teams dedicated to malware research. This role presents an exciting opportunity to establish a new operation from the ground up, creating processes, optimizing and setting up cross-team collaboration while serving as the primary client interface. The position is primarily leadership, client-facing, creating solutions and requiring exceptional team-building and operational setup skills. The ideal candidate demonstrates high technical skills, proven experience in building teams from scratch, establishing new operations, and strong client relationship management capabilities. Key Responsibilities:
* Establish operational processes, workflows, and quality standards for the new teams
* Coordinate with other departments to integrate the new operation into the existing infrastructure
* Serve as primary client interface, managing relationships and ensuring client satisfaction
* Present research findings and malicious evidence to clients and stakeholders
* Advise on technical aspects for malware research challenges and automated solutions
* Create training programs and onboarding processes for new team members
* Develop performance metrics and evaluation frameworks for team effectiveness
* Lead client meetings, requirement discussions, and project planning sessions
* Collaborate with sales and business development teams on client engagements

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.



Hybrid:
No
Requirements:
Must-Have:
* Management experience - managing at least 10 employees for a minimum of 2 years, with extensive experience in recruiting and building teams
* Strong client-facing experience with excellent presentation and communication skills
* At least 3 years of proven experience in one of the following: malware research, reverse engineering, penetration testing, embedded software development
* Understanding of malware research principles and the cybersecurity landscape
* Experience managing client relationships and delivering technical solutions to business stakeholders
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
* Excellent spoken and written English.
Nice-to-Have:
* Android malware research / reverse engineering hands on experience from the last 3 years
* Experience in leading multiple teams comprising of a few dozen employees
* Experience in leading cybersecurity researchers or other research operations
* Experience establishing new departments or research operations within organizations
* Background in technical sales or business development in cybersecurity
* Experience presenting to C-level executives and technical stakeholders
* Experience with decompilers, debuggers, and disassemblers (e.g., JADX, JEB, LLDB, GDB, x86dbg, Ghidra, IDA Pro)
* Familiarity with instrumentation frameworks like Frida or Xposed
* Proficiency with HTTP debuggers, MITM tools, and network analyzers (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark, Little Snitch, mitmproxy)
* Understanding of network communications and protocols
* Familiarity with multiple programming languages (Java, C/C++, JavaScript, Python)
* Familiarity with multiplatform development frameworks such as Unity, Flutter and React Native
* Under
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375228
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/03/2026
Location: Ramat Gan
Job Type: Full Time
What We Are Looking For As a Red Team Specialist focused on GenAI models, you will play a critical role in safeguarding the security and integrity of commercial cutting-edge AI technologies. Your primary responsibility will be to analyze and test commercial GenAI systems including, but not limited to, language models, image generation models, and related infrastructure. The objective is to identify vulnerabilities, assess risks, and deliver actionable insights that strengthen AI models and guardrails against potential threats. Key Responsibilities
* Execute sophisticated and comprehensive attacks on generative foundational models and agentic frameworks.
* Assess the security posture of AI models and infrastructure, identifying weaknesses and potential threats.
* Collaborate with security teams to design and implement effective risk mitigation strategies that enhance model resilience.
* Apply innovative testing methodologies to ensure state-of-the-art security practices.
* Document all red team activities, findings, and recommendations with precision and clarity.

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.

Hybrid:
Yes
Requirements:
Must-Have
* Strong understanding of AI architecture, frameworks and agentic applications.
* Hands on experience in AI vulnerability research.
* Minimum of 3 years of experience in offensive cybersecurity, with a focus on penetration testing.
* Exceptional analytical, problem-solving, and communication skills.
* Ability to thrive in a fast-paced, dynamic environment. Nice-to-Have
* Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field.
* Advanced certifications in offensive cybersecurity (e.g., OSWE, OSCE3, SEC542, SEC522).
* Proficiency in Python.
* Webint / OSINT experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375262
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Petah Tikva
Job Type: Full Time
As a Principal Software Security Engineer, you'll be responsible for delivering offensive security engagements against public-facing and internal products. Youll also be responsible for security auditing of the product stack and researching nuances of securing SaaS platforms. This will require an in-depth knowledge of various approaches to application auditing, including secure code review, debugging, dynamic web application testing, analysis and threat modeling. Youll work closely with product engineering teams to provide investigative reports to improve platform resiliency and ensure best-in-class security solutions.

What you get to do in this role:

Work with diverse business and technology owners
Participate in offensive security engagements including external adversarial emulation.
Perform security audits to discover, communicate, and recommend remediation activities for vulnerabilities
Work with engineering teams on remediation
Create and maintain strategic relationships
Requirements:
Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AIs potential impact on the function or industry.
A passion for security and problem solving
Background in software security auditing, computer security and the statistical methods
15+ years of experience performing software security auditing including code review, reverse engineering, thick app analysis, and black-box web application testing or related experience and education
Familiarity with NIST 800-53 and similar controls framework
Developer-level proficiency in Python, Java, and JavaScript, including modern client-side JavaScript frameworks
Experience writing static code analysis rules a plus
Experience with Python data science and machine learning frameworks a plus
Network and system security engineering skills a plus
Degree in computer science / engineering, informatics, mathematics/statistics, or equivalent work experience
Offensive Security OSWE and/or OSCP certification(s) a plus
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569759
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו