רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

חוקר סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Android Security Researcher
Position Overview:
As a talented researcher, you will be joining the industrys leading digital intelligence Security Research Labs group. In this position you will be taking part and leading new projects in little-explored vulnerability research territories, producing world-unique capabilities to extract evidence from phones and other embedded devices. Recent phones (from burner phones to the latest flagships) are increasingly challenging from a forensics perspective, and involve hardware-backed encryption (FDE/FBE), secure boot chains (Verified Boot/dm-verity), evolving hardened SELinux policies, as well as adventures in ARM TrustZone secure worlds.
Key Responsibilities:
You will join our digital intelligence Security Research Labs Group and be a part of a team of passionate researchers, dedicated to solving modern digital intelligence challenges, years ahead of others in the industry. Our world-class research results assist law enforcement by enabling lawful evidence extraction, and putting criminals behind bars, every day.
You are a security researcher who cares about the ethical use case for his/her work, and if the art of engineering and crafting a platform-wide native payload in a fragmented ecosystem of gaping variance is the kind of challenge you appreciate, you belong with us. We need your help to make the world a safer place.
Requirements:
Practical experience performing vulnerability research and exploitation, preferably in mobile or other modern environments, eg. Windows/Linux/iOS/MacOS
Practical reverse engineering experience, preferably in ARM / TrustZone / Hypervisors
Advantage: Cryptographic primitives and weaknesses
Advantage: Advanced fuzzing
Advantage: Offensive hardware research/board design
Advantage: Experience dealing with modern memory corruption mitigations, such as PAC and MTE.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547377
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo and Haifa
The Student Researcher Program fosters academic collaborations by hiring students onto research projects aligned to company priorities in scientific advancement. The program offers placements on teams across our company, for research, engineering, and science roles. As a Student Researcher, you will have the opportunity to participate in research projects focused on developing solutions for real-world, large-scale problems.
Student Researcher projects are exploratory and direct experiences that drive scientific advancement across a multitude of research areas. Students will work collaboratively on projects that explore innovative research challenges and support the creation of breakthrough technologies.
The program is open to students enrolled in a Bachelors, Masters, or PhD program. Projects vary in duration and location based on team and student requirements. It is required that you are located in one of the specific country locations identified for this role for the full duration of the engagement. When you apply, you will be considered for Student Researcher positions across all of our company's research teams, including our company DeepMind, our company Research, our company Cloud and more. This allows us to find the right project match for your skills and interests.
Researchers across our company are working to advance the computing and build the next generation of intelligent systems for all our company products. To achieve this, we invest in foundational research and work on projects that utilize the latest computer science techniques developed by skilled software developers and research scientists. Whether we're shaping the future of sustainability, optimizing algorithms, or pioneering AI systems, our teams strive to continuously progress science, advance society, and improve the lives of billions of people.
our company Research is building the next generation of intelligent systems for all our company products. To achieve this, were working on projects that utilize the latest computer science techniques developed by skilled software developers and research scientists. our company Research teams collaborate closely with other teams across our company, maintaining the flexibility and versatility required to adapt new projects and foci that meet the demands of the world's fast-paced business needs.
Responsibilities
Participate in research to develop solutions for real-world, large-scale problems.
Requirements:
Minimum qualifications:
Currently pursuing a Bachelors, Masters, or PhD degree in Computer Science, Linguistics, Statistics, Biostatistics, Applied Mathematics, Operations Research, Economics, or Natural Sciences, or equivalent practical experience.
Experience in one area of computer science (e.g., Natural Language Understanding, Human Computer Interactions, Generative Media, Computer Vision, Machine Learning, Deep Learning, Algorithmic Foundations of Optimization, Quantum Information Science, Data Science, Software Engineering, or similar areas).

Preferred qualifications:
Currently enrolled in a full-time degree program in EMEA and returning to the program after completion of the internship.
Experience as a researcher, including internships, full-time, or at a lab.
Experience contributing to research communities or efforts, including publishing papers in major conferences or journals.
Experience with one or more general purpose programming languages (e.g., C/C++, Java, MATLAB, Go, Python, etc.).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8544033
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
Location: Ramat Gan
Job Type: Full Time and Hybrid work
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response. You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541605
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a highly motivated and technically proficient Security Researcher to join our security research division.
Requirements:
We are looking for a highly motivated and technically proficient Security Researcher to join our security research division.
This role is dedicated to performing advanced offensive security assessments against the biggest companies in the world
You need to be independent, attentive to details, organized, eager to learn new things, and like to research and solve problems
Engage in sophisticated Red Team projects, including the identification of undisclosed API endpoints and development of novel bypass techniques for established security controls Requirements:
Minimum of 3 years of proven, hands-on experience in application security analysis and Web penetration testing
Strong experience with reverse engineering and dynamic analysis of Android and IOS applications, including hands-on experience with techniques like detours, hooking, and runtime code manipulation
Proficiency in developing and automating tasks using at least one language like Python, JavaScript, or GoLang.
Deep, hands-on knowledge of the latest tactics, techniques, and procedures (TTPs) used in advanced penetration testing and network analysis.
Ability to author comprehensive and technically rigorous reports detailing identified vulnerabilities and research outcomes.
OSCP, OSWE, eWPTXv2, CRTP, or other high-level offensive certifications.
Hands-on experience with industry-standard reversing tools like JADX, Ghidra, or IDA Pro.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541263
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a leader with a strong passion for offensive security, technical excellence, and people development -someone who can lead and scale a global team, build strong relationships, and drive measurable impact across customers, services, and internal teams.
This role is ideal for a relationship-driven, customer-centric leader who values service excellence and consistently delivers a high-quality customer experience across all engagements.
A leader who can influence without authority, collaborate with diverse stakeholders, and move complex initiatives forward in a global environment.
In this position, you will leverage your expertise in penetration testing, customer engagement, and operational leadership to own delivery excellence end-to-end, participate in pre-sales discussions, support scoping, and continuously elevate our offensive security practice worldwide.
Key Responsibilities
Team Leadership
Lead and scale a global team of penetration testers across multiple regions.
Mentor, coach, and support continuous technical and professional growth.
Foster a high-performance culture based on expertise, collaboration, and ownership.
Delivery & Customer Excellence
Own delivery excellence end-to-end, ensuring high-quality, accurate, and consistent execution of penetration testing engagements.
Participate in pre-sales and scoping meetings to define technical requirements and expectations.
Ensure a high-quality customer experience throughout every engagement.
Assign resources, manage workload balance, and drive optimal team utilization.
Operational Excellence
Drive operational efficiency and measurable KPIs, including utilization, delivery timelines, report quality, and customer satisfaction.
Identify and implement improvements in methodologies and internal processes.
Cross-Functional Collaboration
Partner cross-functionally with Sales, Product, and R&D, as well as PS Delivery and IR teams.
Build strong relationships and align stakeholders to support strategic opportunities and service growth.
Contribute technical insights to help shape new offensive security offerings.
Innovation & Service Development
Contribute to global knowledge bases, training materials, and methodology evolution.
Lead initiatives that improve service quality, efficiency, and technical depth.
Requirements:
3+ years of hands-on penetration testing experience (Web, Mobile, API, Cloud).
Experience leading, mentoring, and guiding technical teams.
Strong experience participating in pre-sales and technical scoping with Sales and Account Managers.
Customer-centric mindset, with proven ability to communicate clearly and deliver an excellent customer experience.
Deep understanding of offensive methodologies (OWASP, MITRE ATT&CK, cloud security).
A relationship-oriented leader with strong influencing skills - able to build trust, collaborate across global teams, and drive progress without formal authority.
Experience working with distributed global teams and time-zone-based workflows.
Certifications such as OSCP, OSEP, OSWE, GXPN, CRTE - an advantage.
Fluent English (spoken and written).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8540439
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for an experienced Security Researcher to join our growing research team. The team's responsibility is vulnerability research for both PR purposes and research for our companys product. In this role, you will focus on vulnerability research of open-source projects and reverse engineering of low-level binaries. The team also focuses on AI security and low-level product security research.
A key part of your work will include analyzing internal code and identifying security risks to improve our companys overall security posture and support our PR efforts.
What you will do
Vulnerability Discovery: Research and discover vulnerabilities across AI applications, low-level products, and cloud environments, including the development of functional Proof-of-Concepts (PoCs).
Public Research & PR: Publish technical blogs and present your research at major security conferences.
Technical Product Research: Produce in-depth technical research and conduct reverse engineering of security products to directly support the development of our companys product and platform.
Stay up to date with newly discovered CVEs, attack techniques, and threat trends
Cross-Functional Collaboration: Partner with product and engineering teams to help improve our companys security.
Requirements:
5+ years of hands-on experience in security research, including a track record of finding vulnerabilities in complex systems..
Strong understanding of vulnerabilities, exploit techniques, and attack vectors.
Experience in reverse engineering binaries, security products, and complex low-level systems.
Hands-on experience with Linux systems, networking, and cloud environments
Ability to analyze complex systems and think like an attacker
Strong written communication skills in English, including technical documentation.
Self-driven, curious, and passionate about security research
Experience with the following is a plus
Experience contributing to blogs, public research, conference talks, or media-facing security content
Familiarity with AI systems, AI security, and model behavior.
Experience in software development.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8538004
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/02/2026
Location: Ramat Gan
Job Type: Full Time
We are seeking a highly motivated and technically proficient Security Researcher to join our security research division. This role is dedicated to performing advanced offensive security assessments against the biggest companies in the world You need to be independent, attentive to details, organized, eager to learn new things, and like to research and solve problems What you’ll do:
* Engage in sophisticated Red Team projects, including the identification of undisclosed API endpoints and development of novel bypass techniques for established security controls
* Lead and execute comprehensive, technically rigorous security research targeting complex web and mobile applications, including reverse engineering and proprietary protocols investigation

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must have:
* Minimum of 3 years of proven, hands-on experience in application security analysis and Web penetration testing
* Strong experience with reverse engineering and dynamic analysis of Android and iOS applications, including hands-on experience with techniques like detours, hooking, and runtime code manipulation
* Proficiency in developing and automating tasks using at least one language like Python, JavaScript, or GoLang.
* Deep, hands-on knowledge of the latest tactics, techniques, and procedures (TTPs) used in advanced penetration testing and network analysis.
* Ability to author comprehensive and technically rigorous reports detailing identified vulnerabilities and research outcomes. Nice to have:
* OSCP, OSWE, eWPTXv2, CRTP, or other high-level offensive certifications.
* Hands-on experience with industry-standard reversing tools like JADX, Ghidra, or IDA Pro.
* Demonstrated online achievements, write-ups, or contributions on platforms such as HackTheBox, Pwn2Own, TryHackMe, Bug Bounty programs, or published security research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8536694
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
08/02/2026
Location: Herzliya
Job Type: Full Time
we are looking for a brilliant Security Researcher to join our elite team. In this role, you will combine offensive research with product innovation. You will conduct in-depth research and penetration testing on Automotive ECUs, uncovering vulnerabilities at both the hardware and software levels. Additionally, you will act as the "Red Team" for our vehicle protection systems, simulating sophisticated attacks to ensure our detection capabilities stay ahead of global threats.
What Youll Do: ECU & Low-Level Research: Conduct deep-dive security research into Automotive Electronic Control Units (ECUs). Automotive Offensive Research: Analyze automotive protocols and architectures to identify, develop, and implement end-to-end attack vectors. Red Teaming: Serve as the internal adversary for our vehicle protection products. You will execute attacks to validate detection efficacy and provide the offensive "ground truth" needed to improve our security logic. Collaborate with data Scientists: Work closely with our data Science teams to fine-tune AI-based detection features, helping to translate complex exploit behaviors into actionable data features.
Advantages:
data Science & AI: Experience working with data teams, understanding of feature engineering, or experience fine-tuning AI models based on security domain expertise. OS Internals: High level of expertise in Linux / QNX / Android internals (both user and Kernel space). Product Security: Experience building or testing Intrusion Detection/Prevention Systems (IDS/IPS) or EDR/XDR platforms. Automotive Knowledge: Understanding of automotive-specific protocols (CAN, Automotive Ethernet, UDS, etc.) and the ability to implement functional attacks against them.
Requirements:
Offensive Mindset: Proven experience in exposing and exploiting vulnerabilities in complex systems. Embedded Expertise: Hands-on research experience with Embedded /low-level systems. Network Communication Expertise: Deep understanding of the logic and vulnerabilities within network protocols and the ability to implement functional attacks against them. Security Fundamentals: Strong grasp of cybersecurity principles, including cryptography. Programming: Strong scripting and development skills in Python (for research/tooling) and C / C ++ (for exploit development). Execution: A "get-things-done" attitude; self-driven and thrives in fast-paced, problem-solving environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8535362
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for driven and talented people like you to join our team and our mission to change the future of cloud security. Ready to dive in and swim with our pod?
About the role
As the Head of Research, you will lead our threat-research, security-innovation, and vulnerability-discovery efforts. You will define the strategy for how we uncover threats, identify novel attack vectors, influence product direction, and contribute thought leadership to the cybersecurity community. You will manage and grow a team of world-class researchers, work closely with product, engineering and go-to-market teams, and ensure our research remains cutting-edge, rigorous and impactful. This role emphasizes strong people leadership and cross-functional execution, alongside technical depth and hands-on research judgment.
What youll do
Develop, own and evolve the research strategy by defining high value focus areas (for example misconfigurations, identity threats, workload vulnerabilities, and emerging attack techniques), and ensure alignment with our product roadmap and business objectives.
Lead, coach, and mentor a multidisciplinary research team (researchers, threat analysts, and engineers).
Build a healthy, high-performing org, including hiring, onboarding, and performance management.
Partner closely with product and engineering leadership to turn research insights into concrete roadmap items, detection logic, and customer value.
Drive discovery of new vulnerabilities, attack techniques, or adversary behaviors across cloud and modern infrastructure environments (for example containers, serverless, data stores, IAM).
Define metrics for research impact (for example vulnerabilities discovered, time to validate and operationalize new findings, research-driven product improvements, external reach).
Establish and maintain external partnerships (industry peers, academic groups, independent researchers) to expand our capabilities and pipeline.
Publish and present research findings (blog posts, white papers, conference talks).
Lead vulnerability disclosure and responsible communications.
Ensure the research function has the right infrastructure and processes (tooling, sandboxes, repeatable experimentation, documentation standards).
Stay current with the threat landscape, emerging technologies, attacker tradecraft, and relevant compliance or regulatory shifts.
Requirements:
7+ years of experience in security research, threat intelligence, vulnerability discovery, offensive security, or closely related roles.
Proven people management experience (mandatory), including hiring, mentoring, and growing high-performing teams.
Demonstrated ability to set a research vision, prioritize effectively, and execute through others in a cross-functional environment.
Strong research fundamentals: designing experiments, validating hypotheses, and turning ambiguous signals into clear findings and recommendations.
Excellent stakeholder management and partnership skills, including the ability to collaborate deeply with engineering and product teams.
Strong written and verbal communication skills, including the ability to communicate complex technical concepts to varied audiences.
Ability to operate hands-on when needed (for example to review technical work, guide investigations, or unblock the team).
Solid coding fluency and automation mindset (languages and stack flexible, Python/Go helpful).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8533470
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Work At Home
Job Type: Full Time
we are looking for a Cyber Security Researcher II.
The Security Researcher role involves developing detection methods and techniques to identify emerging threats for customers. Collaboration with researchers, data engineers, and product teams is essential to convert threat intelligence into actionable analytics. The position emphasizes hands-on work, research-focused tasks, and teamwork to address real-world security challenges effectively.
In this role you will be:
Designing, building, and validating new detections across large-scale customer and cloud telemetry, transforming threat research into impactful results.
Developing AI-powered techniques to improve detection precision, prioritization, and automated investigative functionalities effectively.
Analyzing various data sources like forensics, Active Directory, network, and cloud to identify threats and anomalies.
Collaborating with data scientists, engineers, and researchers to implement detection methods and enhance accuracy, scalability, and resilience.
Leading key research initiatives and proofs-of-concept, shaping Hunt's detection and analytics platform's strategic direction in hybrid and cloud-native environments.
Translating investigations into clear recommendations while communicating insights and findings effectively to customers.
Requirements:
4+ years of experience in cybersecurity research, detection engineering, threat hunting, or incident response (including military experience).
Have hands-on experience in developing, testing, and tuning detections based on attacker behavior or system telemetry.
Have a solid understanding of networking protocols and technologies (TCP/IP, DNS, SMB, HTTP/S, etc.) and their application in cloud environments.
Be familiar with attacker tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK framework (including Cloud TTPs).
Demonstrate programming skills in Python and SQL with experience analyzing large datasets using common tools.
Have a curious, team-oriented mindset and an interest in applying AI and automation to cybersecurity detection.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8530068
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
03/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Job description Appdome is looking for a talented, passionate Offensive Researcher to join our innovative research team. If you’re eager to explore cutting-edge mobile security techniques and help safeguard the mobile app ecosystem, this is the role for you! As a key player in our security team, you'll design and execute sophisticated attack simulations on the Appdome platform. Your work will touch on diverse attack vectors, including file systems, networks, jailbreaks, memory injections, and more.
Requirements:
Requirements
* 1-3 years of experience in Offensive Security/Cyber.
* Extended knowledge in researching, simulating, and analyzing different application attack vectors.
* Advantage – Experience using a hacking framework or pen-testing tools such as Frida, Magisk, Multiproxy, and Cheat Engine.
* Ability to create analysis plans and execute them, as well as document and troubleshoot errors.
* Ability to understand the system from multiple perspectives, including high-level and low-level technical architecture.
* Experience in Mobile (iOS/Android) analysis environments and automation tools. Advantages
* Bachelor’s degree in a relevant field.
*  Software development and scripting experience.
Company Overview Appdome's mission is to safeguard mobile apps and their users globally. We offer the industry's only patented, centralized, data-driven Mobile Cyber Defense Automation platform, providing rapid no-code, no-SDK security and integrated defenses against fraud, malware, and bots, along with Threat-Events™ UI/UX controls, ThreatScope™ Mobile XDR, and Certified Secure™ DevSecOps Certification. With Appdome, mobile developers and cyber teams can expedite delivery, ensure compliance, and utilize automation for building, testing, and monitoring mobile app security within DevOps and CI/CD pipelines. Our platform is trusted by leading brands across financial, healthcare, m-commerce, consumer, and B2B sectors, securing over 50,000 apps and protecting over 3 billion end users worldwide. Equal Opportunity Employment Appdome is an Equal Opportunity Employer committed to diversity, equity, and inclusion. We evaluate all qualified applicants without discrimination based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or other protected characteristics.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8529956
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
29/01/2026
Location: Netanya
Job Type: Full Time
DRS RADA is a global pioneer for active military protection, counter-drone applications, critical infrastructure protection, and border surveillance. Join Our Team as a Information Security Specialist at DRS RADA Technologies! Key Responsibilities:
* Maintain, and enhance cloud and SaaS security architectures, including Microsoft 365.
* Work routinely with the SOC team to investigate, analyze, and respond to security incidents in a timely manner.
* Manage the Vulnerability Management lifecycle, ensuring timely remediation via the Patch Management platform.
* Implement and maintain security tools such as firewalls, endpoint detection & response (EDR), mobile device management (MAM), mail relay/hygiene, etc.
* Collaborate with IT teams to support secure system design and architecture.
* Responding to /Handling Information Security team tickets.
* Keep up to date with emerging cyber threats, technologies, and industry trends.
* The role includes travel to various sites across the country.
Requirements:
* At least 2–3 years of proven experience in information security – mandatory
* Hands-on experience with EDR solutions (e.g., Microsoft Defender, CrowdStrike, etc.), MDM (e.g., Intune, JAMF, Kandji) and email security/mail relay solutions.
* Solid knowledge of endpoint hardening techniques (Windows, MacOS, Linux), device management and protection strategies.
* Experience with cybersecurity technologies, tools, and frameworks - EPM, PAM, Whitening systems, WAF, FW, ZTNA, EDR, NAC.
* Excellent communication skills (English & Hebrew).
* Knowledge of cloud environments and Microsoft 365 security
* Strong knowledge of network security, operating systems (Windows/Linux/Mac), and cloud security concepts.
* Familiarity with standards and regulations such as ISO 27001, NIST, or similar.
* Understanding of networking infrastructure, routers, and switches
* Strong problem-solving skills.
* Ability to work independently and manage multiple priorities.
* Relevant certifications (e.g., Security+, CySA+, Microsoft AZ-500)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8455364
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Weʼre looking for a highly technical and creative Security Researcher to join our research group. This role is central to navigating complex security landscapes, advancing our CNAPP offerings, crafting sophisticated algorithms, and pioneering cloud security research. Working alongside a diverse team, youʼll explore the cutting edge of cloud and AI-driven security, uncovering critical vulnerabilities, developing novel detection techniques, and driving impactful research publications. Join us in shaping the future of cloud security, where your work not only advances our technology but also deeply resonates with our commitment to exceeding customer expectations, streamlining for simplicity, and tackling challenges with creative solutions.
Responsibilities
● Collaborate with teams across the organization, including Product and GTM, to develop and integrate top-tier features.
● Conduct deep technical research into cloud-native environments.
● Vulnerability research in the major Cloud providers and cutting-edge technologies.
● Lead offensive investigations in Kubernetes, eBPF, AI/ML‑based anomaly detection, and runtime security, translating findings into production‑grade detections.
● Create authoritative content - white papers, conference papers, blogs, and release notes that educate users and elevate our companyʼs brand.
● Deep dive into threat detection and product content that provide our customers deep insights and added value.
Requirements:
● +5 years of experience in cybersecurity, particularly in cloud environments.Military background experience, University Degree, or Ex-CNAPP.
● Proficiency in Offensive Cyber Security, Vulnerability Research, and familiarity with web, cloud technologies, and platforms.
● Proven ability to research complex security topics: Kubernetes, eBPF, runtime-based security, AI/ML-driven anomaly detection, and threat modeling.
● Demonstrated customer-first approach, committed to exceeding expectations and simplifying processes to enhance overall customer success.
● Exceptional communication skills and professionalism, with meticulous attention to detail and a proactive stance in all interactions and tasks.
● Resourcefulness and creativity in problem-solving, capable of achieving high standards and overcoming challenges with less.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522503
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced Vulnerability Researcher to join our team, where our ethos of customer-centric problem solving, ownership, professionalism, and resourcefulness are at the heart of everything we do. The team faces complex research issues daily, solving new challenges and constantly improving the existing solutions. In this key position, you'll dive deep into complex security puzzles, pushing the boundaries of our vulnerability research and solutions. Collaborating on challenges with our team means working with the leading cloud platforms (AWS, GCP, Azure) and leveraging advanced technologies like Kubernetes, EBPF, Docker, and more.
Responsibilities
Vulnerability research in the major Cloud providers and cutting-edge technologies.
Collaborate with teams across the organization, including Product, and GTM, to develop and integrate top-tier features.
Conduct deep technical research into cloud-native environments.
Lead offensive investigations in Kubernetes, eBPF, AI/ML‑based anomaly detection, and runtime security, translating findings into production‑grade detections.
Create authoritative content - white‑papers, conference papers, blogs, and release notes that educate users and elevate our companys brand.
Deep dive into threat detection and product content that provide our customers deep insights and added value.
Requirements:
+4 years of experience as a Vulnerability or Offensive Security researcher, specializing in web exploitation and advanced offensive techniques.
Experience with cloud platforms and products (e.g. AWS, GCP, and Azure).
Military background or experience with Ex-CNAPP is highly advantageous.
Possession of a Vulnerability Research Certification, contributions to CVEs, or a recognized standing in global security rankings is highly desirable.
Ownership and Professionalism
you ARE required for a deep sense of responsibility towards work, with attention to detail, and a proactive approach to tackling any task, regardless of its nature.
Resourcefulness
Ability to achieve more with less, utilizing creativity and high standards to navigate and overcome challenges pragmatically.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522502
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
28/01/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a highly technical and creative Security Researcher to join our research group. This role is central to navigating complex security landscapes, advancing our CNAPP offerings, crafting sophisticated algorithms, and pioneering cloud security research. Working alongside a diverse team, youll explore the cutting edge of cloud and AI-driven security, uncovering critical vulnerabilities, developing novel detection techniques, and driving impactful research publications. Join us in shaping the future of cloud security, where your work not only advances our technology but also deeply resonates with our commitment to exceeding customer expectations, streamlining for simplicity, and tackling challenges with creative solutions.
Responsibilities
Collaborate with teams across the organization, including Product, Frontend, DevOps, and GTM, to develop and integrate top-tier features.
Conduct deep technical research into cloud-native environments.
Lead initiatives from their inception through to deployment, emphasizing backend system efficiency, scalability, and reliability.
Innovate in Defense Evasion, amplifying the capabilities of our agents and engines.
Forge new paths in cloud security research and cyber security algorithm development.
Deep dive into threat detection and product content that provide deep insights and added value to our customers.
Requirements:
+3 years of experience in cybersecurity, particularly in cloud environments.
Military background experience, University Degree, or Ex-CNAPP.
Proficiency in Cyber Security, Posture management, and familiarity with cloud technologies and platforms.
Proven ability to research complex security topics: Kubernetes, eBPF, runtime-based security, AI/ML-driven anomaly detection, and threat modeling.
Demonstrated customer-first approach, committed to exceeding expectations and simplifying processes to enhance overall customer success.
Exceptional communication skills and professionalism, with meticulous attention to detail and a proactive stance in all interactions and tasks.
Resourcefulness and creativity in problem-solving, capable of achieving high standards and overcoming challenges with less.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8522499
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו