רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

חוקר סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
להשיב נכון: "ספר לי על עצמך"
שימו בכיס וצאו לראיון: התשובה המושלמת לשאלה שמצ...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
מיקום המשרה: מרכז
סוג משרה: משרה מלאה
מסלול ההכשרה אורך כשנה ושמונה חודשים והוא מיועד לחסרי רקע, רקע חלקי או בעלי שליטה בשפת הערבית.
מועד תחילת ההכשרה: נובמבר 2026.
חלקה הראשון כולל לימוד השפה הערבית (בתנאי בית הארחה) וחלקה השני כולל לימודים מודיעיניים-מקצועיים.
עבודה מבצעית ומאתגרת של הפקת מידע מודיעיני בשפה הערבית ממקורות טכנולוגים.
איסוף, עיבוד ומיצוי מידע רב, תוך שימוש בטכנולוגיות מהמתקדמות בעולם.
עבודה מודיעינית-מבצעית (במשרד), המצריכה נכונות לעבודה בשעות לא שגרתיות.
ההתחייבות הראשונית לתפקיד הינה ל- 5 שנים (כולל תקופת ההכשרה). לאחר מכן, למתאימים/ות קיימת אפשרות לקבלת קביעות בשירות המדינה.
דרישות:
בעלי תואר ראשון לפחות.
יכולת ניהול משימות, יוזמה, הובלה והנעה.
יכולת קבלת החלטות בתנאי עומס ולחץ.
יכולת עיבוד ומיצוי מידע רב, תוך הבחנה בין עיקר לטפל.
ניסיון/רקע מודיעיני - יתרון.
ידיעת שפה נוספת ברמת שפת אם - יתרון.
נדרשת נכונות להעתקת מקום המגורים על פי הצורך. המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8610601
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are a global leader in ad security and quality solutions, trusted by top publishers, app developers, and ad platforms worldwide. Our mission is to maintain a safe and transparent digital advertising ecosystem, ensuring that users everywhere enjoy a clean and trustworthy online experience. We are expanding our Research Team and are looking for a Junior Malware Researcher with a strong technical mindset, excellent communication skills, and a passion for problem-solving. As a Malware Researcher, you will be responsible for hunting emerging malware and malvertising campaigns and developing effective detection methods to protect our global customers. You will work closely with the R&D and Product teams and be part of a friendly, professional team based in Tel Aviv, supporting customers worldwide.
Responsibilities:
* Detect, monitor, and hunt new malvertising and malware threats.
* Research new attack vectors, delivery methods, and evasion techniques.
* Develop and improve detection logic and signatures.
* Investigate malicious campaigns using internal tools, databases, logs, and external intelligence sources to uncover hidden patterns.
* Analyze web traffic, scripts, redirects, and network behavior to identify malicious activity.
* Collaborate with R&D and Product teams to translate research into production-grade protections.
* Contribute to internal documentation, research reports, and best practices to improve knowledge sharing and support processes.
Requirements:
0-1 years of relevant experience, or equivalent technical background (military, academic, or self-driven research).
* Strong understanding of web technologies, including HTML, JavaScript, browser behavior, and client-side execution.
* Solid foundation in security concepts, such as web threats, malware behavior, and attack chains.
* Familiarity with networking concepts (HTTP/HTTPS, DNS, redirects, basic TCP/IP).
* Hands-on experience with at least one programming or scripting language: JavaScript, TypeScript, or Python.
* Basic experience working with SQL and data analysis.
* Ability to investigate issues end-to-end, from technical root cause to customer impact.
* Strong analytical thinking and problem-solving skills.
* Fluent English (written and spoken).
* Independent, accountable, proactive, and comfortable taking ownership of tasks.
Advantages (Nice to Have):
* Experience or familiarity with the ad tech ecosystem (DSPs, SSPs, publishers, ad networks).
* Exposure to malware analysis, threat intelligence, or SOC workflows.
* Familiarity with AI tools or AI-assisted research workflows.
* Experience with monitoring, visualization, or log analysis tools (e.g., Kibana, Grafana).
* Basic experience with automation, scripting, or data parsing.
Why Join Us?
* Be part of a global leader in ad security and quality with a strong industry reputation.
* Join a collaborative, supportive team that values curiosity, ownership, and learning.
* Gain hands-on experience at the intersection of security, web technologies, and large-scale data.
* Work on meaningful challenges that protect millions of users worldwide.
* Clear opportunity for professional growth and development in cybersecurity research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8520772
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Ramat Gan
Job Type: Full Time
Alice is seeking to hire an Intelligence Infrastructure Expert for a full time position. The role includes creation, management, and integration of the company’s unique infrastructure and tools across the different Web environments. The position includes infrastructure establishment and processes management alongside end to end delivery to the different teams within the organization. You will be responsible for the generation of insights, means, and methods provided from diverse intelligence streams enabling the organization’s teams to make the internet a safer place. Responsibilities:
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying distribution methods.
* Provide insights on intricate means and methods being used by threat actors to abuse the tech world’s most popular platforms while putting users at risk.
* Identify and address opportunities alongside potential problems in operational processes.
* Research, development and strategizing of new operational methods and logics. We are looking for an expert with a ‘Can Do!’ approach with the following desirable skills, qualities and experience:


About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Mandatory:
* Minimum 1 year experience in establishing and management of intelligence infrastructure
* Operational online security orientation: Demonstrate awareness of security risks in diverse operational environments and understand appropriate mitigation measures
* Experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* OSINT and online research experience
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Strong written and verbal communication skills
* Fluent English
Nice to have:
* Additional languages
* Curiosity and out of the box thinking
* Ability to work under pressure
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8576581
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Ramat Gan
Job Type: Full Time
we are seeking an experienced Researcher to join our team dedicated to Android malware research. This role presents an exciting opportunity to conduct comprehensive malware analysis, detect emerging threats, and contribute to our understanding of the Android threat landscape. The ideal candidate demonstrates a positive, proactive attitude and excels as a reliable team player with strong technical skills in Android malware analysis. Key Responsibilities:
* Conduct in-depth Android malware research and reverse engineering
* Detect and document emerging Android malware trends and attack vectors
* Analyze Android applications for malicious behavior
* Write detection rules and develop automation processes for Android malware identification
* Collaborate with team members and share knowledge across departments
* Perform static and dynamic analysis of Android malware samples
* Document findings and contribute to threat intelligence reports
About us:
we are a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact-whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, our company provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must-Have:
* At least 3 years of proven experience in one of the following:
* Research in Android /Windows/Mac/ Linux
* Low-level reverse engineering or development
* Proficiency in one or more programming languages: JAVA, Python, JavaScript, or C / C ++
* Experience with reverse engineering tools and decompilers (e.g. JADX, JEB, IDA Pro, Ghidra)
* Familiarity with instrumentation tools like Frida or debugging tools such as GDB/LLDB
* Understanding of networking fundamentals and protocols
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction Nice-to-Have:
* Experience with Android development
* Familiarity with Android frameworks, including Flutter, React Native, or Unity
* Understanding of Android application security
* Familiarity with the Android malware ecosystem and techniques
* Experience in building automated tools
* Experience with writing detailed reports in English
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8516812
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
The Staff Vulnerability Researcher will be involved with researching existing vulnerabilities, looking for new vulnerabilities, and developing checks/plugins to detect these vulnerabilities via our products. This role will involve some interfacing with stakeholders outside the Research team.

Your Opportunity:
Works on complex research and development initiatives.
Implements advanced detection logic while minimizing false positives & false negatives.
Participates in detection logic discussions and the research of new methods for detection.
Interfaces with stakeholders on externalizing the outcomes of some of the research.
Helps / trains other researchers, when needed.
Keep abreast with the advancements and developments in the security industry and perform original research to keep our customers secure.
Develop detection scripts for our sensors (Nessus vulnerability scanner and others) based on the research findings.
Research and develop methods of detection for additional services and products from different vendors.
May perform other duties and responsibilities that management may deem necessary from time to time.
Requirements:
B.S. degree in Computer Science or a related field, or equivalent work experience.
At least 5 years of R&D experience.
In depth understanding of common security vulnerabilities, CVSS scoring, vulnerability classification, detection and exploitation techniques.
In-depth protocol analysis and interaction. Expert level knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Some prior experience performing open-ended research when given high-level requirements and details of the desired output.
Experience with pen-testing, researching, discovering, or publishing vulnerabilities.
Reverse engineering experience including basic binary analysis, packet capture analysis, and firmware analysis (using binwalk). Prior experience with debuggers, disassemblers or decompilers (e.g. IDA Pro, Immunity Debugger, gdb).
Experience with C or C++, Assembly (x86/x64 and/or ARM/ARM64) and / or scripting languages.
One or more security related certifications (e.g. OSCP).
At least a years experience with Nessus Sensor and working with the NASL language.
An understanding of NASL coding standards.
Prior experience performing open-ended research when given high-level requirements and details of the desired output.
Some experience with reviewing code and providing feedback.
Experience with understanding and implementing RFC standards and protocols.
Experience with Python programming language.
Experience with systems administration and be comfortable working at the command line.
In depth understanding of common security vulnerabilities, CVSS scoring, vulnerability classification, detection and exploitation techniques.
In-depth protocol analysis and interaction. Expert level knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Some prior experience performing open-ended research when given high-level requirements and details of the desired output.
Some exposure to security standards such as NIST 800-53, CIS, or DISA STIGS.
In-depth protocol analysis and interaction. Solid knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Experience with crash dump analysis and exploit development.
Experience writing blogs and whitepapers to showcase research as well as presenting at security conferences.
Ability to sit and work at a computer for extended periods of time.
Some travel may be required.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8610120
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Security Researcher, you will play a crucial role in researching, building, and enhancing our cutting-edge technology to address the evolving cybersecurity challenges faced by the world's largest enterprises.

Responsibilities
Research, develop, and implement new offensive security capabilities that push the boundaries of the EASM category, including exploit development and PoC creation across web applications, AI/LLM assets, network infrastructure, cloud environments, and supply chain dependencies.
Drive innovation by conceptualizing, implementing, and adopting AI-driven initiatives and offensive security expertise to enhance IONIX's detection, validation, and automation capabilities at scale.
Conduct in-depth research to continuously expand platform coverage.
Develop exploitability tests to uncover critical, real-world findings across enterprise attack surfaces - directly demonstrating the power of the IONIX platform.
Collaborate with global enterprises as design partners to understand their security needs and design solutions accordingly.
Take ownership of key research projects, addressing security and scalability challenges from concept through to delivery.
Requirements:
8+ years of hands-on experience in security research, offensive security, or software development.
Practical experience conducting offensive security assessments, including web application exploitation, network-based attacks, and adversarial attack simulation.
Strong development skills (Python - advantage): capable of writing production-quality, scalable code.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608740
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Were looking for a Senior Web Security Researcher to be part of a team of highly skilled professionals that include security researchers, data researchers, data scientists and software engineers who continuously hunt for threats, evaluate and develop new detection techniques, and share intel and attribution for cybercrime activity with the goal of protecting our customers while keeping the internet human.
What you'll do:
Play a lot with the web-browsers, trying to find differences in behavior between them.
Research and develop signal collection on both mobile and desktop, which enables detection and improve our protection
Find ways to detect automation, for example, tools like Selenium, Playwright or Puppeteer.
Understand customer specific requirements, deliver with impact and exceed customer expectations.
Discover adversary tactics, techniques, and procedures leveraged by bots.
Create and validate data insights to enhance detection excellence.
Share security research topics through blogs, research talks, knowledge base and external engagements including conference presentations, detailing your discoveries for internal and external sharing.
Find bad stuff on the internet, see if you can figure out how it is done, document it.
Red team, experiment, and develop new tactics for various kinds of fraud and to bypass our detection, no need to wait for an attack to be discovered and used by adversaries first.
Stay abreast of cyber security trends and events related to our mission.
Contribute high impact work that substantially benefits team level metrics and OKRs.
Develop techniques, tools and scripts to simplify yours and others work.
Requirements:
Who you are:
B.sc in computer science or equivalent experience (technological unit alumni etc.)
Expertise in web architecture and protocols (DOM, Javascript, HTTP/HTTPS, IPv4/v6 etc.)
Understanding of the cybersecurity threat landscape.
3 years+ of proven Cyber Security Research experience.
Good English (Reading and Writing).
Proven experience in scripting languages (Python and JavaScript).
Decent experience in data analysis and relevant languages (SQL, Python).
Motivated, independent, and passionate about finding the bad guys.
Ability to motivate and lead those around you by your own contribution, professionalism, and teamwork.
Who you are - Nice to have:
Hands-on experience with data analysis of large and complex data sets (data manipulation, statistical analysis, Conclusions, etc.) - Great advantage.
Experience with threats created by bots / Creating automated web-related tools.
Reversing capabilities.
Experience with publishing technical blogs/speaking at conferences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608147
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for Principal Cloud Security Researcher with a strong security background to join our innovative Research team.
The Role
We're looking for a Principal Cloud Security Researcher to serve as a senior technical leader within our Research team. This is a high-impact individual contributor role -- you won't manage people, but you'll shape the direction of our entire research function, mentor researchers, and act as a force multiplier across the organization.
You'll be the person who takes a vague threat signal and turns it into a detection strategy, a published finding, or a product capability. You'll operate as a trusted deputy to the research team lead, owning the most complex and ambiguous research challenges while raising the technical bar for the team.
What You'll Do
Drive Groundbreaking Research
Own and drive our most critical research initiatives end-to-end - from initial threat hypothesis through detection logic, product integration, and external publication.
Set the technical direction for cloud threat research across AWS, Azure, and GCP, identifying emerging attack surfaces and novel techniques before they become mainstream threats.
Investigate real-world cloud and SaaS security incidents, dissecting attacker tradecraft and extracting insights that evolve our detection capabilities.
Pioneer new forensic investigation techniques and detection methodologies for cloud-native and SaaS environments - pushing the state of the art, not just following it.
Be a Voice in the Community
Represent our company as a thought leader through high-quality research publications, conference presentations (BlackHat, DEF CON, RSA, fwd:cloudsec, and similar venues), and open-source contributions.
Build and maintain our reputation as a research-driven company that advances the field - not just a vendor with a blog.
Engage with the broader security research community, fostering relationships and collaborative knowledge-sharing.
Shape the Product
Bridge research and product - translate threat findings into actionable product requirements, working closely with engineering and product teams to ensure our CDR platform stays ahead of evolving threats.
Design and develop advanced detection algorithms that directly feed into our platform, closing the gap between research insight and customer protection.
Elevate the Team
Act as the team's go-to technical authority. When researchers hit a wall on complex cloud attack chains, IAM edge cases, or detection gaps - you're who they turn to.
Mentor and grow other researchers through research reviews, pair investigations, code reviews, and by setting quality standards and methodology best practices.
Influence technical decisions org-wide - contributing to architecture, tooling, and strategic research priorities.
Step in as the research team lead's deputy when needed - driving prioritization, representing research cross-functionally, and ensuring continuity.
Requirements:
Who You Are
8+ years in security research, threat research, or closely related fields (offensive security, detection engineering, incident response, cloud security engineering). Fewer years are fine if your depth and track record are exceptional.
Deep multi-cloud expertise - strong hands-on experience across at least two of the major cloud providers (AWS, Azure, GCP), with working knowledge of the third. You understand the IAM models, logging pipelines, APIs, and attack surfaces that matter in each.
A track record of original research - you've published meaningful technical findings through blog posts, conference talks, open-source tools, or vulnerability discoveries that moved the needle. We want someone who doesn't just consume research - you produce it.
Strong adversarial mindset and critical thinking - you think like an attacker targeting cloud infrastructure, SaaS platforms, identity systems, and Kubernetes. You can model threat scenarios, map out attack paths, and poke holes in defenses.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606762
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
Location: Herzliya
Job Type: Full Time and Hybrid work
Required Vulnerability Researcher
Want to make an instant impact?
Be a part of the top cyber research teams in the industry and make the world a better place!
As a Vulnerability Researcher, you will be:
Work with top-notch researchers using the latest technologies
Research low-level mechanisms, finding vulnerabilities and circumventing modern mitigation techniques
Our perks:
A competitive compensation package
Hybrid and flexible
Multiple career advancement opportunities
Incredible benefits.
Requirements:
Vulnerability research and exploit development experience
Strong analytical and problem-solving skills
Knowledge of programming languages: Assembly, C and Python
Experience with reverse engineering tool
It would be great if you also have:
B.Sc. in Computer Science or equivalent
Relevant military experience
Knowledge of mobile devices internals/Linux kernel/Win internals.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606431
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - Risk Researcher to join our highly technical product research team working at the core of our cloud security platform. This is a rare opportunity to join an elite cloud security research team and do work that directly shapes our product. In this role, you will define how cloud risk is understood and modeled, lead the development of novel risk logic and scoring methodologies, and translate complex attack paths into meaningful insights for customers.

You will conduct deep technical research across cloud environments to uncover new attack vectors, analyze real-world exploitation paths, and contribute to building a unified view of risk across identity, infrastructure, and data layers. Your work will directly influence how we prioritize risk, reduce noise, and establish a clear ground truth for what truly matters in cloud security.

We are looking for an exceptional, adversary-focused researcher who can bridge cloud security knowledge, threat modeling, and data-driven risk analysis. You are curious, comfortable with ambiguity, and driven to deeply understand how attackers operate in modern cloud environments.

Your Opportunity:

Own Risk Across our Cloud Security Platform: Define cloud risk by grounding findings in how exposure is actually created and exploited. Collaborate with engineering and product teams to introduce new data sources and signals that validate exposure. Establish a rigorous validation framework for risk logic to minimize noise and ensure high-fidelity alerts. Define the 'Ground Truth' for what constitutes a critical risk versus a theoretical vulnerability.
Lead Novel Toxic Combination Logic: Conduct deep technical research to discover novel risks and attack vectors across identity, network, workload, and third-party data to produce attack paths. Work with teams across us to develop and refine the quantitative scoring models that aggregate disparate signals (e.g., CVSS, EPSS, identity permissions) into a unified risk score.
Lead Complex Discovery: Build resource, identity, and permission relationships to improve our asset inventory and relationship modeling. Understand customers requirements and ensure deliverables address real needs.
Conduct Cloud Threat Modeling: Analyze services and architectures from an attackers perspective to define trust boundaries and data flows, and ensure the product covers newly identified attack paths. Present findings in blogs, reports, and leading industry conferences.
Research Emerging Cloud Services: Evaluate new cloud services to establish secure configuration and architectural best practices where no prior guidance exists, and partner with PMs to deliver them through the platform.
Shape Cloud Security Strategy: Provide a broad technical view across cloud domains to identify strategic gaps and drive product direction and features.
דרישות:
What You'll Need:
5+ years of hands-on experience in security research.
Deep understanding of attacker mindset, tradecraft, and real-world exploitation techniques. , with a strong focus on exploitation and adversary-driven analysis.
Strong technical background in cloud platforms (AWS, Azure, GCP), including how attackers operate within cloud environments.
Proven experience designing, building, or validating detection logic.
Highly curious, self-driven, and comfortable working in ambiguous, fast-evolving problem spaces.
Strong communication skills, both written and verbal, with the ability to clearly articulate complex technical findings.

And Ideally:
Experience designing or investigating cloud attack paths and complex toxic combinations across services and identities.
Background in offensive security, penetration testing, or red teaming.
Experience with detection languages or frameworks (Rego, Sigma, YARA or similar).
Track record of published research, conference talks, or technical blog posts.
Experience working with product teams and delivering value to customers המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606425
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - Cloud Threats to join our highly technical product research team working at the core of our cloud security platform.

This is a rare opportunity to join an elite cloud security research team and do work that directly shapes our product. In this role, you will own the research direction for our Cloud Detection and Response (CDR) capabilities, designing detection strategies across agentless and agent-based telemetry, expanding coverage across cloud attack surfaces, and developing prioritization mechanisms that help customers focus on what matters.

You will perform novel security research to uncover attacker behavior, develop detection methodologies, and apply detection-as-code principles to build production-grade detections. Beyond product work, you'll contribute to our external thought leadership, writing and speaking about cloud threats, adversary tradecraft, and detection methodologies.

We're looking for an exceptional, adversary-focused security researcher who can bridge threat intelligence, cloud security knowledge, and detection engineering. You're curious, comfortable with ambiguity, and driven to understand how attackers operate in cloud environments.

Your Role:
Own the research direction for Cloud Detection and Response (CDR), driving the vision for how we detect and respond to cloud threats.
Design detection strategies across agentless and agent-based telemetry sources, focusing on quality and detecting what matters.
Perform novel security research to uncover attacker tradecraft, techniques, and behaviors in cloud environments, informing both product direction and external research.
Apply detection-as-code principles to build production-grade detections that ship directly in the Tenable Cloud Security platform.
Stay current with emerging cloud threats and translate threat intelligence into actionable detection logic and product capabilities.
Write and speak about cloud threats, adversary tradecraft, and detection methodologies to strengthen our voice in cloud security.
Requirements:
What You'll Need:
5+ years of experience in threat research, cloud security research, or detection engineering.
Strong understanding of attacker behavior, tradecraft, and threat intelligence
Solid technical understanding of cloud platforms (AWS, Azure, GCP), how attackers operate in them, and cloud-native telemetry.
Experience building or designing security detections, with familiarity in detection-as-code principles.
Highly motivated, curious, and able to work independently in ambiguous problem spaces.
Strong communication skills, written and verbal, with the ability to articulate technical findings and opinions clearly.

And Ideally:
Experience with detection languages or frameworks (YARA, Sigma, Rego, or similar).
Background in malware research, offensive security, or incident response
Track record of published threat research, conference talks, or technical blog posts.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606411
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - Cloud Threats to join our highly technical product research team working at the core of our cloud security platform.

This is a rare opportunity to join an elite cloud security research team and do work that directly shapes our product. In this role, you will own the research direction for our Cloud Detection and Response (CDR) capabilities, designing detection strategies across agentless and agent-based telemetry, expanding coverage across cloud attack surfaces, and developing prioritization mechanisms that help customers focus on what matters.

You will perform novel security research to uncover attacker behavior, develop detection methodologies, and apply detection-as-code principles to build production-grade detections. Beyond product work, you'll contribute to Tenable's external thought leadership, writing and speaking about cloud threats, adversary tradecraft, and detection methodologies.

We're looking for an exceptional, adversary-focused security researcher who can bridge threat intelligence, cloud security knowledge, and detection engineering. You're curious, comfortable with ambiguity, and driven to understand how attackers operate in cloud environments.

Your Role:

Own the research direction for Cloud Detection and Response (CDR), driving the vision for how we detect and respond to cloud threats.
Design detection strategies across agentless and agent-based telemetry sources, focusing on quality and detecting what matters.
Perform novel security research to uncover attacker tradecraft, techniques, and behaviors in cloud environments, informing both product direction and external research.
Apply detection-as-code principles to build production-grade detections that ship directly in the Tenable Cloud Security platform.
Stay current with emerging cloud threats and translate threat intelligence into actionable detection logic and product capabilities.
Write and speak about cloud threats, adversary tradecraft, and detection methodologies to strengthen Tenable's voice in cloud security.
Requirements:
What You'll Need:
5+ years of experience in threat research, cloud security research, or detection engineering.
Strong understanding of attacker behavior, tradecraft, and threat intelligence.
Solid technical understanding of cloud platforms (AWS, Azure, GCP), how attackers operate in them, and cloud-native telemetry.
Experience building or designing security detections, with familiarity in detection-as-code principles.
Highly motivated, curious, and able to work independently in ambiguous problem spaces.
Strong communication skills, written and verbal, with the ability to articulate technical findings and opinions clearly.

And Ideally:
Experience with detection languages or frameworks (YARA, Sigma, Rego, or similar).
Background in malware research, offensive security, or incident response.
Track record of published threat research, conference talks, or technical blog posts.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606397
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - AI Security to join our highly technical product research team working at the core of our cloud security platform. This is a rare opportunity to define a new discipline. AI security is an emerging field with few established playbooks, and you will help write them. In this role, you will own the research direction for AI security across Tenable's platform, uncovering novel risks in AI-native systems and translating that knowledge into product capabilities and industry-leading research. You'll be surrounded by experienced researchers and engineers who live and breathe security, with the space and backing to do original work in a domain that is rapidly evolving.
We're looking for an exceptional security researcher who can navigate ambiguity, think like an attacker, and bring clarity to a space that lacks it. You're curious, technically deep, and energized by the challenge of defining risk in systems that are still being understood.

Your Role:

Be at the forefront of an emerging discipline. Conduct technical analysis of AI frameworks, services, and architectures to discover novel risks, vulnerabilities, and attack vectors before they become industry-wide problems .
Define AI security risk by analyzing how exposure is created and exploited in AI systems. Collaborate with engineering and product teams to translate AI research into product findings.
Evaluate the risk of pre-trained models, vector databases, and orchestration frameworks (e.g., LangChain, LlamaIndex) to define how shadow AI creates organizational exposure.
Author blogs, whitepapers, and technical advisories that set the industry narrative. Present original research at leading conferences and serve as Tenable's external voice on AI risk topics.
Analyze AI systems from an attacker's perspective to define trust boundaries, map attack techniques, and identify exploitable paths. Translate findings into product features and outbound research.
Investigate and analyze AI infrastructures and services to find 0-day vulnerabilities, security holes, weaknesses, and design flaws.
Requirements:
What You'll Need:
5+ years of experience in security research, vulnerability research, or offensive security.
Familiarity with OWASP Top 10 for Large Language Model Applications (prompt injection, data poisoning, system prompt leakage).
Ability to analyze complex systems from an attacker's perspective, identify weaknesses and exploit them.
Strong understanding of AI systems, frameworks, and deployment patterns, with proven ability to exploit them.
Proven track record of novel, complex security research in cloud security or application security, with published work (blogs, papers, conference presentations).
Highly motivated, curious, and comfortable navigating unknown territory.
Strong communication skills, written and verbal, with the ability to articulate novel risks and technical findings clearly.

And Ideally:
Experience discovering and disclosing vulnerabilities (CVEs, bug bounty, responsible disclosure).
Experience analyzing systems for data leakage or unintended information exposure.
Solid understanding of cloud platforms (AWS, Azure, GCP) and cloud security concepts.
Experience tracking the evolving AI ecosystem and translating new developments into security research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606389
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
Location: Rishon Letsiyon
Job Type: Full Time
we are looking for a hands-on Penetration Tester / Red Teamer with strong infrastructure experience to join our team as a Cyber Security Researcher. Youll be part of the offensive team that researches cutting-edge attacks and translates them into realistic breach simulations across complex environments-Windows domains, cloud infrastructure, Linux systems, and more.
Your work directly powers our Exposure Validation platform, helping organizations understand and defend against modern adversaries.

What You Will Do?
Research & Simulate Real-World Attacks
Track and analyze the latest attacker TTPs
Build internal tools, scripts, and POCs to emulate real threat behavior
Design offensive simulations mapped to the MITRE ATT&CK framework
Focus areas include:
Active Directory attacks (on-prem & Azure)
Cloud infrastructure misconfigurations (AWS, Azure, GCP)
Linux and network-level attack vectors
Kubernetes threats and container-based environments
Write clean, reusable, and documented code in Python, PowerShell, and Bash
Requirements:
Proven background in infrastructure penetration testing or red teaming (not web-only)
Hands-on with Windows AD exploitation, network pivoting, lateral movement
Comfortable working across the entire attack chain-from recon to post-exploitation
Tool Proficiency
Experience with tools like BloodHound, Mimikatz, Metasploit, Cobalt Strike
Familiarity with attacker tradecraft and simulation tools
Scripting & Automation
Proficient in:
Python - for automation and tooling
PowerShell - for Windows attack scenarios
Bash - for Linux environments and scripting
Cloud & Linux Experience
Worked in Linux-based systems during offensive operations
Familiarity with cloud environments: AWS, Azure, GCP (attacks or research)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606355
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
Location: Herzliya
Job Type: Full Time
Required Security Researcher
As a Security Researcher, you will:
Analyze mobile applications
Perform in-depth technical research on Android and iOS application architectures
Identify forensic artifacts from mobile apps
Analyze both static and runtime behaviors of mobile applications
Develop scripts and tooling to automate process.
Requirements:
Strong knowledge of operating system internals
At least 2 years of experience with advance static and dynamic analysis tools (e.g., Ghidra and Jadx)
Strong ability to analyze and follow application logic in decompiled code (Java/Objective-C)
Basic understanding of ARM64 assembly
Solid understanding of Android and iOS application architecture
Familiarity with app sandboxing, file system layouts, common data storage locations such as SQLite databases/shared Preferences/Plist/Secure storage (Keychain/Keystore/Secure Enclave)
Experience or familiarity with Frida or mobile debuggers
Ability to trace function calls and intercept data at runtime
Strong software development skills in Python
Basic understanding of cryptographic concepts (Android Keystore/iOS Keychain)
Understating of common encryption patterns (symmetric & asymmetric)
Ability to recognize encryption usage within application logic
Ability to write efficient parsers and custom data-extraction logic
It would be great if you also have:
Familiarity with mobile malware analysis or mobile forensics tools
Experience in analyzing obfuscated code (ProGuard, R8 and custom obfuscation)
Experience handling binary or semi-structured data
Background in security research or digital forensics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606298
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו