רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

מומחה אבטחת מידע / סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
שרת
שכר
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
להשיב נכון: "ספר לי על עצמך"
שימו בכיס וצאו לראיון: התשובה המושלמת לשאלה שמצ...
קרא עוד >
הטבות ובונוסים בעבודה בחברות הייטק
מכון כושר צמוד, חדר אוכל משובח, חדר משחקי וידאו...
קרא עוד >
טעויות נפוצות בניהול קריירה
הדרך לחיים של חוויות והזדמנויות עוברת דרך תכנון...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
Location: Merkaz
Job Type: Full Time
Were looking for our next Cybersecurity Specialist. Could It Be You?
Your contribution delivering sustainable and measurable results in the following areas will be very important:
The Cybersecurity Specialist role is a pivotal position within the CISO function, reporting to the Senior Manager, Cybersecurity Strategy & Risk. This role is dedicated to supporting the design, implementation and maturation of modern security frameworks, with a primary focus on driving the organizations Zero Trust journey.
Need more details? Keep reading
You will be:
Executing Strategic Security Controls: Supporting the design and implementation of ZTNA, Data Loss Prevention (DLP) and Application Control rules across endpoint, network, datacenter, cloud and SaaS environments to ensure comprehensive protection of enterprise systems and data.
Strengthening Network Defenses: Supporting the implementation and optimization of CASB profiles to enhance visibility into the security posture of SaaS environments.
Identifying and Mitigating Emerging Risks: Supporting the implementation of advanced capabilities to proactively prevent endpoint software supply-chain risks and the unauthorized use of applications, extensions, plugins, and AI Agents, ensuring these do not compromise the enterprise security posture.
Driving Continuous Improvement: Identifying existing and emerging risks; Researching and implementing innovative security tools and methodologies to enhance overall security maturity and resilience against a dynamic threat landscape.
Collaborative Implementation: Working closely with cross-functional IT and business teams to embed security-by-design principles and operationalize security capabilities across the organization.
Requirements:
Experience: a minimum of 2 years of experience in Cybersecurity, Network Engineering, or a related technical role within a complex enterprise environment. Experience in a regulated financial services environment is a plus.
Network Security & Infrastructure: Strong understanding of networking fundamentals, Routing protocols, next-gen firewalls, DNS and Windows/Linux OS, and the ability to troubleshoot complex connectivity issues. Experience or good knowledge of firewall administration, and rules management is a plus.
Identity & Access: Understanding of Identity & Access Management (IAM) lifecycles and the principle of least privilege. Foundational knowledge of Authentication protocols (SAML, OIDC, Kerberos, Multi-Factor Authentication) and their role in a modern perimeter.
Web & Cloud Security: Understanding of secure web gateways and cloud-native security architectures. Experience operating Zscaler is considered a strong asset.
Data Protection: Strong conceptual understanding of Data Loss Prevention (DLP) strategies across endpoints, networks, and cloud applications.
Modern Security Frameworks: Knowledge of Zero Trust Network Access (ZTNA) principles and how they differ from traditional VPN-based architect
SaaS Security: Familiarity with Cloud Access Security Broker (CASB) concepts, including API-based protection and forward-proxy modes.
Automation & Scripting: Proficiency in Python for automating security tasks, parsing logs, or integrating security tools via APIs and experience with "Vibe Coding" or using AI-assisted development tools (e.g., Cursor, GitHub Copilot, Claude Code, and Gemini LLMs) to rapidly prototype security solutions, dashboards, and scripts.
Technical Visualization: Support the creation of professional architectural diagrams and data-flow visualizations to document ZTNA environments and security control implementations.
Strong verbal and written communication skills in English
Education: University degree or College diploma in Computer Science, Cybersecurity, Information Technology, or a related field or relevant experience.
Certifications (Preferred): Progress towards or achievement of relevant certifications such as CompTIA Security+, CCNA, or vendor-specific clo
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621247
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
Location: Merkaz
Job Type: Full Time
oin us to help leverage the data we have, as we solve exciting challenges such as building out new models, algorithms and solving complex business problems to grow and deliver customer-centric solutions in a multi-product/multi-channel financial services environment.
Whats it like working as a Junior SOC Specialist, Incident Response, ?
Your contribution delivering sustainable and measurable results in the following areas will be very important:
Identifying and responding to cyber threats - safeguarding our company's infrastructure and data. You will be primarily involved in supporting the alert development cycle, triaging and investigating alerts, assisting with the incident response lifecycle (investigation, containment, eradication, and recovery) and collecting and tracking metrics for reporting. You will be working alongside internal customers and our vendor support teams to ensure we are utilizing our security tools in accordance with corporate policies and growing business needs. You will work closely with Cybersecurity and IT teams to align priorities and execute plans for new initiatives, as well as contribute to process improvements and build documentation for new tools.
Need more details? Keep reading...
You will:
Monitor, analyze and report possible cybersecurity attacks.
Assist senior analysts with investigations and escalate findings as needed.
Investigate and perform analysis of threat indicators.
Gather Indicators of compromise and any relevant data to use with threat hunting activities.
Leverage security tools (Elastic, CrowdStrike and more) for analysis to identify malicious activities.
Analyze identified malicious activity to determine Tactics, Techniques and Procedures.
Assist with research, analysis and correlate gathered data from various resources to determine the impact of the incident.
Execute containment and eradication actions under guidance, following established playbooks.
Participate in on-call and hands-on scheduled shift rotations, including outside of business hours.
Support Security Incident Response and investigation alongside internal teams and 3rd party providers.
Document incident timelines, evidence, and actions taken for post-incident review.
Participate in post-incident reviews and contribute to lessons-learned reports.
Follow and contribute to incident response playbooks and runbooks.
Participate in tabletop exercises and IR simulations.
Assist with proactive security investigation and searches on corporate environments to detect malicious activities.
Maintain up-to-date understanding of security threats, countermeasures, security tools, cloud security and SaaS technologies.
Maintain technical proficiency through training, keeping up with industry est practices, and security frameworks.
Escalate investigation findings and security concerns to senior team members.
Contribute to tracking SOC operational metrics (MTTD, MTTR, alert fidelity).
דרישות:
1+ years of relevant experience in performing Cybersecurity Incident Response and Threat Hunting activities.
Familiarity with detection rules and alert logic.
Exposure to security tool integrations and basic understanding of SOAR concepts.
Familiarity with investigations and incident response using EDR tools such as CrowdStrike Falcon and SIEM tools such as Elastic Security (KQL, ESQL, Timeline analysis).
Basic understanding of forensic triage (disk, memory, network) and multiple operating systems (Mac, Linux, Windows).
Familiarity with SOC processes, playbooks, and incident reports.
Ability to communicate clearly and work effectively under pressure.
Basic understanding of programming and scripting concpts.
Basic understanding of NIST Cybersecurity Framework, MITRE ATT&CK.
Basic understanding of security products and device monitoring tools including Firewalls, IDS/IPS, Phishing and e-mail security, content filtering, DDoS, WAF, and more.
Brownie points if
GSEC, Security+, CySA+, CSA, CEH or similar relevan המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621233
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
Location: Merkaz
Job Type: Full Time
Were looking for our next Specialist, Digital Threat Hunting.
Could It Be You?
Your contribution delivering sustainable and measurable results in the following areas will be very important:
Identifying and taking down customer-facing and external digital threats - monitoring phishing sites, brand impersonation, typosquatting domains, and fraud campaigns targeting the organization and its customers. You will be primarily involved in investigating digital fraud patterns, coordinating takedowns with registrars and hosting providers, monitoring social media for brand threats, and maintaining relationships with external abuse teams and law enforcement. You will be working alongside internal customers and our vendor support teams to ensure we are utilizing our security tools in accordance with corporate policies and growing business needs. You will work closely with Cybersecurity and IT teams to align priorities and execute plans for new initiatives, as well as contribute to process improvements and build documentation for new tools.
Requirements:
3+ years of relevant experience in threat intelligence, OSINT, digital fraud investigation, or security operations.
Experience with OSINT techniques, tools, and methodologies for investigating external threats and digital fraud.
Practical experience with phishing kit analysis, credential harvesting page identification, and fraud pattern recognition.
Experience with brand protection and monitoring platforms for detecting impersonation, counterfeiting, and fraud campaigns.
Experience coordinating takedown requests with domain registrars, hosting providers, and social media platforms.
Experience investigating and tracking digital fraud TTPs, credential harvesting, and customer-targeted scams.
Strong understanding of domain registration, DNS, WHOIS, and internet infrastructure fundamentals.
Knowledge of social media platforms, fraud detection indicators, and brand impersonation identification.
Knowledge of dark web monitoring tools, underground forums, and threat actor communication channels.
Knowledge of fraud frameworks, anti-fraud platforms, and industry standards for brand protection and customer safety.
Experience with dark web monitoring and threat intelligence platforms.
Scripting skills (Python) for OSINT automation.
Active participation in fraud prevention and brand protection communities.
Brownie points if you have...
GOSI, SANS FOR589, GCTI, HTB CDSA or similar relevant certifications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621218
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Conduct research and analysis on microtrends as well as specific incidents in the maritime world based on the interests of current and potential clients. Perform ad-hoc research and analysis on emerging trends in the shipping and maritime domain as it relates to client concerns. Stay current of different arenas and distribute this information internally. Closely follow the news and data on maritime security events for important developments and distribute analysis internally and externally. Analyze patterns and search results of the system to generate new insights and create content relevant to customers. Recommend process improvements where applicable. Maintain and update our knowledge center and training materials.



Who Are you?



Naval Intelligence / Think tanks & OSINT NGOs / Maritime Fusion & Security institutes / International Relations background

Proven experience in analyzing and visualizing research insights including analysis of GEOINT/OSINT/ADINT/ELINT etc. data



Responsibilities

Develop and deliver reports by analyzing data via the Windward platform, as well as with relevant open-source research tools
Provide insights from data analysis to support decision-making processes
Ensure and incorporate feedback to improve and maintain data quality
Seek to improve processes to exceed customer expectations
Provides clear documentation for all relevant processes when necessary
Requirements:
Background in Naval Intelligence, think tanks & OSINT NGOs, Maritime Fusion & Security institutes, and International Relations background - a Must
Expiriece with analysis and research of one or more of the following - ADINT/GEOINT/OSINT/ELINT
Expert analytical skills and ability to brief senior military leadership.
Proficiency in Excel/PowerPoint.
Ability to write clearly and concisely
Excellent attention to detail
Fast learner, independent, and detail-oriented
Highly structured with the ability to multitask under deadlines
Ability to work collaboratively and independently as required by the team
Excel and Word proficiency - a must
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8619498
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a top-notch Security Researcher, to resolve the toughest issue in cybersecurity: utilizing terabytes of data for detecting attacks, incident investigation and prioritizing threats, while leveraging LLM capabilities to automate investigation procedures.
Responsibilities:
Threat Analysis and Research: Dive deep into terabytes of data to identify new attack vectors, emerging threats, and vulnerabilities across various attack surfaces. Stay up-to-date with the latest cybersecurity trends and contribute to the development of cutting-edge threat detection methodologies.
Incident Investigation: Utilize your technical prowess to investigate complex security incidents, analyzing data from diverse sources to uncover the root causes and methods of attack. Collaborate with incident response teams to develop effective strategies for containment and mitigation.
False Positive Reduction: Leverage your expertise in data analysis and correlation to fine-tune detection rules and algorithms, minimizing false positives and enhancing the accuracy of our platform's threat alerts.
Thought Leadership and Community Engagement: Drive thought leadership initiatives by creating technical blog posts, delivering webinars, and speaking at conferences to share insights, educate the community, and enhance the company's reputation in the cybersecurity landscape.
Be at the forefront of the mission and work closely with customers regarding cyber security investigations and incidents detected in their environments
Requirements:
A background of at least 5 years in defensive and/or offensive Cyber Security:
Red Teaming / Penetration Testing
Blue Teaming / Threat Hunting
Solid understanding of various enterprise technologies, such as:
OS internals and Windows domain environments.
Cloud technologies such as AWS, Microsoft Azure and GCP
Security products (EDR, FW, Mail Relay, etc.)
Identity & SSO products such as Okta, Auth0 and OneLogin
Kubernetes
Experience with Python, SQL or similar data analysis capabilities
Proficient in English (both written and spoken)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8618775
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
20/04/2026
Location: Herzliya
Job Type: Full Time
We are seeking for an Network Security Specialist. This role requiresEstablishment, operation and maintenance of communications and information security systems in the organization Monitoring, control and ongoing maintenance of communication systems and lines Troubleshooting and full hands-on Technical Support Initiating and leading projects in the field of communications and information security Ongoing work with internal organizational teams and external suppliers Reporting to the head of the communications and information security team
Requirements:
* At least 5 years of experience in the field of communications and information security - mandatory
* Proven experience working with WAN/LAN networks - mandatory
* In-depth knowledge of L2 and L3 protocols
* Experience working with Checkpoint or Fortigate type firewalls - mandatory
* Familiarity with information security solutions: EDR, NAC, EPS, Firewall, secure browsing
* Experience working with security products such as CrowdStrike, Azure Protection
* Experience in managing firewall rules, version updates and system operation
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8618283
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Were looking for an Application Security Engineer with a passion for AppSec to join our growing team.
Responsibilities:
‍‍Build and maintain an advanced security research lab to test, evaluate, and supercharge detection tools.
Analyze tools across multiple domains: SAST, SCA, DAST, Secret Detection, IaC Scanning, Container Scanning, CSPM, and more.
Identify detection gaps and develop techniques and rules to close them.
Leverage Python and AI practices to automate research and drive smarter detection strategies.
Monitor emerging threats, CVEs, and high-profile incidents - and develop relevant detection content and platform enhancements.
Collaborate closely with engineering, product, and marketing
Requirements:
Strong hands-on interest experience in Application Security - including knowledge of software vulnerabilities, secure coding practices, and modern development workflows (a strong advantage).
2+ years of experience as a backend engineer building large-scale products.
Proficiency in Python/Node/Go with a passion for writing clean, maintainable code.
Experience with Docker containers.
Familiarity with at least one major AppSec domain: SAST, SCA, Secret Detection, IaC Scanning, Container Scanning, CSPM, or DAST.
Understanding of CI/CD pipelines and modern DevOps workflows.
Self-driven and curious, with the ability to work independently in a dynamic startup environment.
Hands-on experience with AI dev assistants such as Cursor is required, since we rely on them in day-to-day development.
Advantage:
‍‍Experience using AI tools and practices.
Knowledge of cloud-native security (AWS, GCP, Azure).
Service in elite tech units (e.g., 81, 8200, Talpiot) or equivalent experience is a nice-to-have.
Contributions to open-source security tools, technical blogs, or research publications
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616859
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
we are looking for an experienced Cyber Security Consulting Manager (Engagement Manager) to lead proactive consulting engagements with clients worldwide. The appropriate candidate will be responsible for the engagement lifecycle - from engagement planning, throughout the day-to-day engagement execution, management of consulting team and client interaction, until the successful engagement presentation and delivery.
Main Responsibilities:
Lead a team of top cyber security consultants (matrix management), to conduct and deliver a variety of proactive cyber security assessments and resilience-enhancing engagements.
Work on multiple engagements in parallel, at client sites or remotely.
Ensure the timely and successful delivery of services according to the engagement scope, objectives, budget, timelines, and clients needs.
Develop and present status updates and summary reports to a variety of audiences, including technical teams, CISOs, CIOs/CTOs, and executive management.
Serve as the trusted advisor to industry-leading multinational organizations, acting as the primary point of contact with clients before, during, and after engagements.
Support the building of long-term relationships with clients, ensuring continuous client impact and success.
Participate in and lead business development activities, internal capability-building efforts, methodology development, and strategic discussions.
Requirements:
Minimum of five years of experience managing complex short to medium-term client-facing cyber security engagements in parallel, with excellent engagement management skills and a proven record.
Extensive understanding of cyber security, security governance, and cyber risk management best practices, frameworks, and principles.
Ability to collaborate with individuals across all levels in a dynamic matrix organizational structure, and coordinate with other departments.
Outstanding analytical, creative, and problem-solving skills and mindset, with the ability to handle uncertainty and complexity.
Excellent communication and presentation skills at all levels of the organization. Ability to articulate security concepts to technical staff and explain them to non-technical staff, including senior management.
Attention to detail and a commitment to maintaining high standards.
Certifications such as C-CISO, CISM, PMP, or similar are an advantage.
Knowledge of regulatory requirements and compliance standards such as NIST, ISO, and others is an advantage.
Excellent communication and presentation skills at all levels of the organization, in both English and Hebrew.
The position requires travel abroad (~15-20%).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616696
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
we are looking for a Incident Response Director.
The Incident Response Director will be key to the success of Incident Response projects worldwide, and should possess strong leadership and client-facing skills, be highly technical and thrive in a fast-paced and dynamic environment.
Main Responsibilities :
Lead multiple teams of top-tier cyber security researchers and forensic experts responding to large-scale and complex cyber-attacks globally, beating real-world sophisticated threat actors.
Become a trusted advisor for client executives during incidents, and the main escalation point for crisis management.
Oversee all client-facing engagements within the EMEA region, assuring top quality delivery standards.
Train, guide and empower team leaders and team members, enhancing their technical, managerial, and consulting skills.
Support efforts to generate new business, by creating professional content and attending events, conferences and client meetings.
Be part of the management group Sygnias global IR department, lead and take part in cross-company projects and cooperations.
Requirements:
Minimum of 3 years of experience leading cybersecurity teams in Penetration Testing, Red Team operations, and/or Research (Malware Analysis, EDR/XDR).
Hands-on technical background in cybersecurity - MUST; Incident Response technical/managerial background - an advantage.
Client-facing experience.
Experience working with global clients - an advantage.
Experience in professional cybersecurity services consulting roles - an advantage.
Strong ability to perform under pressure, manage heavy workloads, and operate effectively in crisis situations.
Proven ability to thrive in a dynamic environment and handle multiple projects under tight deadlines.
Exceptional analytical, reporting, and communication skills in both Hebrew and English (written and spoken).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616675
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for an Adversarial Builder to lead the defense of our Global Application Landscape-securing everything from our core SDLC and Software Supply Chain to our enterprise-wide AI adoption.
In this hands-on role, you will:
Engineer, Dont just triage: Move beyond manual reviews to build code-driven detection logic and custom AI agents that automate vulnerability hunting, triaging and remediation.
Security by design: Partner with R&D teams (including Infra and DevOps) to define the application-level technical guardrails for internal and external-facing products.
Scout the Frontier: Act as an early adopter of state-of-the-art systems, evaluating and integrating cutting-edge tech from frontier security startups in AI and Cloud Runtime security.
This role demands a practitioner who thinks like an attacker, possesses a developers urge to automate, and has the broad landscape understanding to connect dots across complex, modern domains.
What Youll Do:
Promote Enterprise-Grade Security Initiatives: Engineer and scale the security strategy for entire product ecosystem, spanning both internal infrastructure and external-facing products. You will ensure code security at scale by hardening the SDLC, securing the Software Supply Chain perimeter, and designing the technical guardrails for AI adoption at both the enterprise and product levels.
AI Solutions Builder: scale our security program using AI-driven tools. You will develop and fine-tune autonomous agents to handle complex code analysis, vulnerability hunting, and automated remediation.
Drive Early Adoption of Frontier Tech: Act as a scout and evaluator for the worlds most innovative security startups. Youll partner with cutting-edge vendors in emerging fields like AI Security and Cloud Runtime Security, ensuring remains an early adopter of state-of-the-art defensive systems.
Scale Through Engineering: Move beyond manual reviews. Youll manage and extend AppSec tools to eliminate false positives and build custom logic that reflects our unique codebase.
Collaborative Engineering: Work alongside our in-house DevOps team to rapidly deploy custom security tools at an enterprise grade.
Requirements:
5-7 Years of AppSec Experience-Must!
Broad Security Horizon: A deep understanding of the modern security landscape, including Identity (OIDC, OAuth, IAM), Supply Chain security, and Cloud-native architectures-Must
Technical Versatility: Strong code review skills and proficiency in at least one major language (Python, TypeScript, etc.). You should be comfortable navigating complex microservices and CI/CD pipelines (GitHub Actions, ArgoCD)-Must
Adversarial Intuition: You have a hacker heart-experience in pentesting or security research helps you anticipate risks before they manifest.
Strategic Communication: You can translate complex security concepts into a roadmap that engineers and stakeholders actually want to follow.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614267
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a Senior Information Security Engineer.
As a Senior Information Security Engineer, youll be on the front lines of protecting the systems, users, and data at scale. This role is about turning strategy, architecture, and intent into enforced controls, effective detections, and resilient operations. Youll work hands-on with the tools, signals, and incidents that define our real security posture.
If you believe security should be practical, measurable, and embedded into daily operations-and not just documented-we want you on the team.
What the Role Looks Like in Practice
You will be the technical anchor of our internal security posture:
Architectural Ownership: Deploy, manage, and tune enterprise-grade security stacks (EDR, DLP, IAM, CASB, MDM) with a focus on deep integration and automation.
The AI Frontier: Lead the charge on AI Security. You will implement and secure AI-driven workflows, ensuring LLM use is governed and protected against emerging threats such as data leakage and prompt injection.
Proactive Defense: Build and maintain high-fidelity detections and guardrails that align with real-world attack techniques.
Cross-Functional Synergy: Partner as a peer with Engineering, IT, and DevOps to ensure security controls are frictionless, automated, and effective.
Requirements:
7+ Years of Senior Experience: Extensive hands-on experience in InfoSec Engineering or SecOps within high-growth, cloud-native environments.
AI Security Mastery (Required): You are ahead of the curve. You have practical experience securing AI adoption and leveraging AI-driven platforms to scale defensive capabilities.
Deep Technical Stack: Expert-level knowledge of endpoint security (macOS/Linux), SaaS ecosystems, and Identity (Okta/OIDC).
The Developer Mindset: Advanced scripting skills (Python is a must) to automate away manual toil and build custom security integrations.
Professional & Interpersonal Excellence:
Strategic Communication: The ability to articulate complex technical risks as actionable business intelligence for diverse stakeholders, ensuring alignment between security objectives and business goals.
Collaborative Influence: A track record of fostering strong partnerships with R&D and DevOps. You are a facilitator of Secure-by-Design principles, focused on engineering solutions rather than creating administrative bottlenecks.
Crisis Management & Decisiveness: The capacity to maintain operational composure during high-stakes incidents, applying rigorous prioritization and risk-based analysis to drive remediation.
Pragmatic Professionalism: A disciplined approach to balancing theoretical security ideals with the functional requirements of a high-velocity, global financial infrastructure.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614261
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a passionate and experienced Governance, Risk, and Compliance (GRC) operations specialist to contribute to our companys efforts in making the most security and trusted provider of digital asset management solutions.
This role is critical in driving our day-to-day GRC programs, ensuring they are well maintained, run according to schedule, and align with our business needs.
As the GRC operations specialist, you will oversee the successful implementation and progress of GRC programs, practices, and projects, while collaborating with multiple cross-functional teams within the security department and outside of it.
What You Will Do:
Own, manage, and continuously improve the companys Third Party Risk Management (TPRM) program, making sure it is both aligned with expected security standards and best practices, and meets business requirements and SLAs.
Own, manage, and continuously improve the companys security awareness program, making sure its scope, content, cadence and overall performance are always aligned with the latest and most relevant expectations, while also well received and relevant to the business.
Manage ongoing operations within the GRC team including project management and tracking, financial planning and reporting, annual and periodic planning, and more.
Drive ongoing GRC efficiency through innovation, automation, data-driven decision making research and exploration.
Support and contribute to ongoing GRC operations such as internal and external audits, risk assessments, certification processes, policy management, business continuity program and more.
Requirements:
Minimum of 3+ years of experience in cybersecurity or GRC.
Proven experience in cyber or IT or third party risk management.
Proven experience in the security awareness domain, including development and implementation of security training programs and their testing (phishing, vishing, social engineering etc.).
Strong understanding of industry best practices, regulations, frameworks, standards and certifications such as SOC 2, ISO, NIST, CIS, DORA, GDPR, etc.
Visionary and innovation-driven, capable of implementing security and compliance programs in complex, fast-paced organizations.
Exceptional communication, collaboration, and interpersonal skills, with the ability to engage both technical and non-technical audiences.
Strong analytical, problem-solving skills and attention to detail, with the ability to manage multiple projects simultaneously and meet tight deadlines.
Preferred Qualifications:
Experience working with GRC software and utilities such as compliance management, policy management, risk management, vendor management, awareness, training and phishing simulation platforms, etc
Background in the financial/digital assets sector.
Good technological understanding and familiarity with product development practices.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614258
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced Incident Response leader to own and lead the companys response to large-scale, high-impact cyber incidents. This role is responsible not only for technical response, but for cross-company crisis coordination, executive decision support, and ensuring fast, controlled mitigation across engineering, product, legal, communications, and leadership teams.
This is a leadership role for someone who has personally led complex incidents under pressure - including situations involving material business risk, customer impact, regulatory exposure, and executive visibility.
Key Responsibilities:
Incident Leadership & Crisis Management
Serve as the Incident Commander for high-severity cyber incidents, including breaches, supply-chain attacks, insider threats, and platform-wide security events.
Lead company-wide incident response efforts, coordinating technical, operational, legal, communications, and executive stakeholders.
Stand up and orchestrate crisis management teams during major incidents, ensuring clear ownership, decision-making, and execution under pressure.
Drive rapid containment, eradication, and recovery while balancing business continuity, customer impact, and regulatory obligations.
Act as the primary point of contact to executive leadership during incidents, providing clear, concise, timely, and actionable updates.
Cross-Department Coordination
Orchestrate response activities across Security, Infrastructure / Cloud Operations, Product & Application Security
Ensure alignment between technical response actions and business, legal, and regulatory considerations.
Manage external parties when needed
Preparedness & Operational Excellence
Own and continuously improve the incident response framework, including severity definitions, escalation paths, and decision authority.
Design and run executive-level incident simulations and tabletop exercises, including cross-functional and leadership participation.
Ensure high-quality post-incident reviews that result in measurable improvements to controls, detection, and response readiness.
Define and track incident response metrics (MTTD, MTTR, blast radius, decision latency).
Track and follow-up on lessons learned and enhancements to ensure implementation and continuous improvement.
דרישות:
10+ years in cybersecurity, with significant incident response management experience.
Proven experience leading large-scale, cross-company cyber incidents, including incidents involving:
Multiple engineering and operational teams
Executive leadership and board-level visibility
Demonstrated experience acting as Incident Commander or equivalent role during major security events for at least 15 incidents in the past 5 years.
Strong understanding of:
Cloud and SaaS architectures
Identity, access control, and infrastructure security
Detection and response technologies (SIEM, EDR, cloud-native tools)
Offensive background
Ability to translate technical facts into business impact and risk-based decisions.
Critical Skills & Attributes
Crisis leadership: Calm, decisive, and structured under extreme pressure.
Authority without ego: Able to lead across departments without formal reporting lines.
Executive communication: Clear, concise, and credible with senior leadership.
Systems thinker: Understands how technical, human, and process failures compound during incidents.
Bias for action: Moves quickly while maintaining discipline and documentation.
Analytical thinking: Attention to details and ability to connect multiple dots into a concise and accurate picture.
Previous experience at Mandiant, Sygnia, CrowdStrike, Unit 42, or similar elite IR teams
Experience in crypto, fintech, custody, payments, or highly regulated environments
Hands-on background in forensics, threat hunting, or security engineering
Nice to Have
Experience in crypto, fintech, cloud infrastructure, or highly regulated environments
Experience supporting regulatory notifications המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614256
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a senior, hands-on Security Operations Lead to build, mature, and operate detection, response, and corporate security capabilities. You will own the engineering, workflows, and processes that keep secure day-to-day, while continuously improving visibility, automation, and operational resilience across both corporate and production environments. This role requires a technical operator who can architect scalable detection and response pipelines, manage endpoint and identity security controls, streamline GTM security enablement, and collaborate across the company to reduce risk. You will balance strategic direction with hands-on execution-ensuring threats are identified quickly, incidents are handled effectively, and the organizations operational security posture remains strong as grows.
Responsibilities:
Own and mature Detection & Response program, including alerting, triage workflows, incident playbooks, and end-to-end response processes.
Build and maintain detection logic, integrations, and automation across logging, SIEM, EDR, cloud telemetry, and internal monitoring systems.
Lead incident investigations, coordinate response across engineering and business teams, and ensure clear communication and post-incident reviews.
Manage Corporate Security Program, including identity and access management, endpoint posture management, corporate data security controls, and DLP practices.
Oversee privileged access workflows and JIT access for corporate and production systems in alignment with least-privilege principles.
Partner with engineering teams to ensure production environments maintain strong security baselines, logging, and monitoring coverage.
Collaborate with GTM/Sales teams to support Security Enablement, including third-party security questionnaires, customer assurance needs, and auditor inquiries.
Build automation-first operational processes that reduce manual overhead and provide consistent, repeatable security outcomes.
Develop and refine detection and response runbooks, escalation paths, and cross-team coordination models.
Maintain and improve incident and operational metrics, dashboards, and KPIs to measure operational efficiency and threat coverage.
Drive the intake and prioritization of security operations requests through Jira and internal workflows.
Work closely with Product Security, Cloud/DevOps, and GRC to ensure shared visibility and aligned operational practices.
Identify operational security gaps, propose improvements, and lead implementation efforts across tooling, processes, and controls.
Promote a culture of proactive detection, fast response, and shared responsibility for organizational security.
Requirements:
Five (5) + years of experience in Engineering / Security Engineering
We build solutions when faced with a capability gap
Youre very comfortable with Kubernetes, Helm, and Terraform
Youre very comfortable with Python, Typescript, or Go
Two (2) + years of experience in Incident Response role
Youve led at least 2 high risk production security incidents
Youve handled the investigation of hundreds of client endpoint security alerts
Bonus points for significant experience in macOS
Youve developed or improved threat detection and signal triage programs
Two (2) + years of experience managing enterprise wide security projects
You have a strong opinion on what a project plan doc should look like
Youve owned and delivered the migration of a high impact security tool (EDR, SIEM, ZTNA, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8613629
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Merkaz
,As an Information security engineer, you will be responsible for designing, developing
implementing, and managing complex cybersecurity systems. Both cloud and on-prem
backend development. You will be required to develop software and use monitoring tools to
ensure resilience and high availability. The systems are highly sensitive and will be built with
top-notch security standards (OWASP TOP-10 to say the least). The development is mostly
server-side, with about 20% client-side
Job location- Central Israel
Employment type- Full Time.
Requirements:
.Theoretical and practical knowledge in information and network security - MUST
.At least 3 years of experience in Backend development - MUST
Knowledge in cyber security, including a basic understanding of common threats and security principles, especially in Supply Chain Security and Pipeline Protection - Major Advantage
Hands-On experience in authentication protocols like Kerberos and OIDC, and Encryption & Signing algorithms - Advantage
.High-level programming languages, C#, and .NET Core ecosystem work experience Advantage
Knowledge or hands-on experience with CICD and DevOps or DevSecOps, Kubernetes, and microservices architecture - Advantage
.Experience with any client-side framework, knowledge of Angular - Advantage
.Experience with RDBMS, MSSQL, and Oracle - Advantage
.Preference to degrees in Computer Science\Software Engineering, or an equivalent military experience.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8611652
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו