רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

חוקר סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly skilled and experienced Windows Internals Team Leader to lead a specialized attack team focused on developing offensive, production-ready attack capabilities. This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations.

You will be hands-on in both leadership and development, guiding technical direction, mentoring engineers, and contributing code across kernel-mode and user-mode components.

The Impact You Will Have

Lead the design, development, and deployment of production-grade offensive capabilities targeting Windows systems
Develop low-level Windows components including kernel-mode code, user-mode loaders, and OS-level evasion mechanisms
Implement Python bindings to connect native low-level components with Python-based research tools and automation
Debug complex issues in both kernel and user space using tools such as WinDBG and KD
Research and develop bypass techniques for modern Windows security controls
Collaborate with the Research Team and other R&D stakeholders to implement and refine offensive concepts
Provide technical mentorship and drive engineering best practices within the team
Requirements:
5+ years of hands-on experience in Windows Internals or kernel-mode development using C and C++
3+ years of Python experience, especially for integrating with native modules and supporting research workflows
Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling
Proficient in Windows debugging using WinDBG, KD, and similar tools
Deep knowledge of Windows APIs, security controls, and undocumented behaviors relevant to offensive security
Familiarity with EDR evasion, API hooking, and direct system call manipulation
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8558168
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a visionary VP of Research to lead our elite research group, based out of our Tel Aviv R&D center. Reporting directly to the CTO, you will be responsible for the companys threat research strategy, driving original vulnerability discovery, and ensuring our "Hackers Playbook" remains the most comprehensive in the industry.

This is a highly visible role that balances deep technical leadership with external evangelism. You will not only manage a team of top-tier security researchers but also serve as the public face of our research. You will be presenting at major global conferences, briefing executive customers, and shaping the industry narrative on offensive security.

THE IMPACT YOU WILL HAVE

Research Leadership & Strategy

Lead, mentor, and grow a high-performing team of security and threat researchers.
Define the research roadmap, balancing original vulnerability research (novel attack vectors) with threat intelligence (analyzing emerging APTs, ransomware, and TTPs).
Foster a culture of innovation, guiding the team to discover new attack surfaces in Windows, Linux, macOS, and LLMs.
Thought Leadership & Evangelism

Serve as a primary spokesperson . You must have a proven track record of speaking at top-tier industry conferences (e.g., Black Hat, DEF CON, RSA, BlueHat).
Drive the creation of high-impact technical content, including white papers, technical blogs, and press commentary on breaking security news.
Represent in the media and create relationships with the broader security community.
Product & Business Alignment

Collaborate closely with Product Management and R&D to translate research findings into product capabilities.
Ensure our customers are protected against the latest threats (e.g., US-CERT alerts, Flash reports) within hours of disclosure.
Customer Engagement

Act as a trusted advisor to C-level executives (CISOs, CIOs) at our strategic customers.
Support the Sales and Customer Success teams by providing deep technical insights during high-stakes briefings and QBRs.
Requirements:
Experience: At least 5+ years of hands-on experience in Security Research (Offensive Security, Vulnerability Research, or Threat Intelligence).
Management: Proven experience managing and mentoring research teams. You know how to retain top talent and foster creativity while meeting deadlines.
Public Speaking: Demonstrated experience presenting technical research at major international security conferences (Must provide examples/links to talks).
Customer Facing: Proven experience in a customer-facing capacity, with the ability to explain complex technical threats to executive audiences.
Technical Depth: Deep understanding of OS internals (Windows/Linux/Mac), Reverse Engineering, Network Protocols, and modern adversary tradecraft (MITRE ATT&CK framework).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8558167
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Petah Tikva
Job Type: Full Time
As a Cloud Security Researcher, you will explore and exploit cloud-native attack surfaces, uncovering new vulnerabilities and researching misconfigurations across AWS, Azure, GCP, and container ecosystems. Youll work on offensive cloud security projects that blend creativity, technical depth, and innovation, contributing to cutting-edge tools and methodologies.
Roles and Responsibilities:
Research and develop novel attack techniques targeting cloud environments and infrastructure.
Analyze and exploit vulnerabilities across multi-cloud platforms (AWS, Azure, GCP).
Identify and document security flaws in cloud configurations, networking, and identity systems.
Perform hands-on testing in containerized and Kubernetes-based systems.
Collaborate with engineering and product teams to translate research into security features and best practices.
Develop PoCs, tools, and scripts to automate vulnerability discovery.
Contribute to the wider security research community through responsible disclosure and technical publications.
Stay ahead of emerging cloud threats, security trends, and adversarial TTPs (MITRE ATT&CK, OWASP Cloud-Native Top 10).
Requirements:
In-depth understanding of cloud services (AWS, Azure, GCP) and their security models.
Practical experience in attacking or defending cloud environments.
Experience with Kubernetes, containerized workloads, and CI/CD environments.
Strong scripting/programming skills (Python, Go, or similar).
Analytical mindset and hands-on experience identifying and exploiting real-world vulnerabilities.
Preferred Skills:
Research background in cloud or infrastructure security.
Knowledge of IaC (Terraform, CloudFormation) and its security implications.
Familiarity with cloud-native security tooling and monitoring systems.
Contributions to open-source security projects or research publications.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8556189
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Petah Tikva
Job Type: Full Time
We are seeking a Cyber Research Architect to join our cutting-edge Research Group. This is a full-time hybrid role where you will play a key part in shaping how our products evolve from a cyber perspective, operating as an innovation hub within the company.
You will have the freedom to explore new domains, identify gaps in our products, and pioneer techniques that will directly shape our product architecture and capabilities. From researching emerging technologies to discovering vulnerabilities and developing advanced attacks, you will push the boundaries of whats possible in automated offensive security.
Roles and Responsibilities:
Lead offensive research and vulnerability discovery across diverse and emerging technologies, identifying novel attack surfaces and spearheading new research domains.
Pioneer research into AI/ML systems and LLM-based applications, uncovering adversarial tactics and developing unique attack vectors.
Directly shape product architecture by converting research insights into scalable, high-fidelity offensive capabilities and sophisticated attack modules.
Architect and build advanced tools and frameworks that automate and scale security research operations across the organization.
Identify and emulate the most sophisticated real-world cyber attacks to continuously evolve the company's automated security validation engine.
Requirements:
6+ years of hands-on experience in security research, with at least 3 years focused on vulnerability research, Red Teaming, or offensive cyber operations.
Proven track record of breaking complex systems across diverse environments (cloud, hybrid, on-prem, web applications, and container/VM escape).
Deep hands-on expertise in AI/ML security, including model architectures, adversarial ML tactics, and attacking LLM-based applications.
Advanced proficiency in multiple programming languages (e.g., Python, C/C++, Go) and a strong grasp of Windows/Linux internals and reverse engineering.
Demonstrated ability to innovate by developing original tools, frameworks, or techniques that enhance and automate security research.
Thorough understanding of the modern threat landscape, attacker kill chains, and the MITRE ATT&CK framework.
Preferred skills:
Active participation in the security community (CTFs, CVEs, research papers, or conference presentations).
Experience in designing security architectures for large-scale enterprise environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8556184
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Petah Tikva
Job Type: Full Time
We are looking for a versatile and innovative Attack-oriented Cyber Researcher to join our R&D team and become part of the revolution. You will conduct state-of-the-art research across multiple environments, ranging from Windows internals and kernel-level security to cloud platforms like AWS, Azure, Web technologies, etc' to stay one step ahead of real threat actors.
Your findings, your code and attack tools will feed directly into our automated attack platform, enhancing its capabilities with new offensive techniques and AI-powered decision-making algorithms.
Roles and Responsibilities:
Perform in-depth research in multiple areas such from AV/EDR evasion, binary exploitation, vulnerability discovery, and subversion of communication channels across both OS-level, domains, cloud-native domains, external surfaces.
Integrate research outputs into production-grade attack functionalities within our automation ecosystem.
Architect and develop AI-driven decision-making modules that enable the platform to mimic experienced attackers, making real-time choices during automated operations.
Develop production-ready attack capabilities using whatever technologies are necessary, Python, C/C++, C#, Java, Office Macros, Bash, PowerShell, Go, Ruby, Assembly, etc.
Mentor and collaborate with fellow R&D team members, fostering a culture of innovation and continuous learning.
Requirements:
5+ years of experience in Windows internals, low and high-level attack-oriented development, penetration testing, and offensive security.
3+ years of experience in Python development.
Demonstrated skill in writing cyber-related code optimized for performance, memory, and stealth.
Experience with attack frameworks and tools such as Metasploit, Nmap, Cobalt Strike, Impacket, Burp, Pacu, and similar.
Proficiency in reverse engineering and debugging (e.g., IDA, Radare2, WinDBG) for low-level research.
Familiarity with cloud ecosystems and hybrid environments, specifically AWS, Azure.
Ability to apply AI or machine learning concepts and models to decision-making processes within the automated attack platform.
Excellent teamwork, adaptability, and a quick learning mindset.
Preferred skills:
IDF cyber team veteran.
Passion for cyber research and hands-on experience with red/blue team operations.
Experience in Agile methodology and security product development.
Bachelors degree in Computer Science or related field.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8556182
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
As an Embedded Cyber Security Researcher, youll dive deep into the heart of modern vehicles, uncovering vulnerabilities and helping manufacturers build safer, more secure systems. Your responsibilities will include:

Conducting offensive security research on embedded automotive systems.
Hacking into ECUs (Electronic Control Units) from various OEMs to identify and exploit vulnerabilities.
Reverse engineering firmware and hardware components.
Investigating cryptographic systems, privacy mechanisms, and anti-theft technologies.
Collaborating with internal teams and external partners to deliver actionable insights and recommendations.
Requirements:
3+ years of experience in the cybersecurity field, including:
Strong reverse engineering skills.
A proven interest in offensive research and vulnerability exploitation.
At least 2 years in penetration testing or a research-focused role.
[Advantage] Experience with embedded systems (either in research or development).
Ability to understand and analyze complex systems and identify critical security gaps.
[Advantage] Familiarity with automotive technologies (e.g., communication protocols, system architecture).
A hands-on approach to problem-solving and a passion for learning new technologies.
A creative mindset and a hackers curiosity.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8554032
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Team Leader, youll guide a talented group of 3-5 researchers, leading hands-on and strategic efforts across multiple projects. Youll:

Lead and mentor a team of security researchers.
Drive offensive security projects, including:
Reverse engineering and vulnerability research on ECUs from various OEMs.
Penetration testing and exploitation of embedded automotive systems.
Research into cryptographic protocols, privacy mechanisms, and anti-theft technologies.
Collaborate with cross-functional teams and global customers to deliver impactful insights and solutions.
Shape the future of automotive security through innovation and deep technical exploration.
Requirements:
1+ years of experience in team leadership or technical management.
4+ years of hands-on experience in security research, including:
Strong reverse engineering skills.
Proven track record in offensive security and vulnerability exploitation.
At least 2 years working with embedded systems (research or development).
Excellent interpersonal and communication skills - with both team members and customers.
Strong organizational abilities and a passion for tackling complex challenges.
A creative mindset and a hackers curiosity - you love to break (into) things to understand how they work.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8554031
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Hod Hasharon
Job Type: Full Time
We are seeking an experienced Security Researcher to join our development team for an XDR system on Windows. The role involves in-depth research into cyber threats, vulnerability analysis, and developing tools for system protection. The ideal candidate has extensive knowledge of Windows Internals, cybersecurity, and how EDR systems operate. Knowledge of Linux is a significant advantage.
Key Responsibilities
Conduct in-depth research on emerging cyber threats, including analysis of malicious behaviors in Windows environments.
Develop and implement tools and scripts for real-time threat detection and response in the XDR system.
Analyze Windows Internals, including processes, memory, and system files, to identify vulnerabilities.
Collaborate with the development team to integrate research findings into the product code.
Write technical reports and articles on findings and cybersecurity trends.
Test existing tools and improve them based on developments in the security field.
Requirements:
Bachelor's degree in Computer Science, Software Engineering, or a related field (advanced degree is an advantage).
At least 3 years of experience in security research or cyber tool development.
Deep knowledge of Windows Internals (e.g., Kernel, Drivers, Registry).
Comprehensive understanding of cybersecurity, including malware analysis, APT threats, and defense techniques.
Knowledge of how XDR/EDR systems work, including detection of suspicious behaviors and alerts.
Proficiency in Python and C++ programming languages (experience in developing cyber tools).
Ability to work independently and in a team in a dynamic environment.
High level of English (reading, writing, speaking).
Advantages
Knowledge of Linux environments, including Internals and tool development.
Experience in developing XDR or similar security tools.
Relevant certifications such as CEH, OSCP, or CISSP.
Experience with tools like IDA Pro, WinDBG and more.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8550331
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are expanding our Research Team and are looking for a Junior Malware Researcher with a strong technical mindset, excellent communication skills, and a passion for problem-solving.
As a Malware Researcher, you will be responsible for hunting emerging malware and malvertising campaigns and developing effective detection methods to protect our global customers. You will work closely with the R&D and Product teams and be part of a friendly, professional team based in Tel Aviv, supporting customers worldwide.
Responsibilities:
Detect, monitor, and hunt new malvertising and malware threats
Research new attack vectors, delivery methods, and evasion techniques
Develop and improve detection logic and signatures
Investigate malicious campaigns using internal tools, databases, logs, and external intelligence sources to uncover hidden patterns
Analyze web traffic, scripts, redirects, and network behavior to identify malicious activity
Collaborate with R&D and Product teams to translate research into production-grade protections
Contribute to internal documentation, research reports, and best practices to improve knowledge sharing and support processes
Requirements:
0-1 years of relevant experience, or equivalent technical background (military, academic, or self-driven research)
Strong understanding of web technologies , including HTML, JavaScript, browser behavior, and client-side execution
Solid foundation in security concepts, such as web threats, malware behavior, and attack chains
Familiarity with networking concepts (HTTP/HTTPS, DNS, redirects, basic TCP/IP)
Hands-on experience with at least one programming or scripting language: JavaScript, TypeScript, or Python
Basic experience working with SQL and data analysis
Ability to investigate issues end-to-end, from technical root cause to customer impact
Strong analytical thinking and problem-solving skills
Fluent English (written and spoken)
Independent, accountable, proactive, and comfortable taking ownership of tasks
Advantages (Nice to Have):
Experience or familiarity with the ad tech ecosystem (DSPs, SSPs, publishers, ad networks)
Exposure to malware analysis, threat intelligence, or SOC workflows
Familiarity with AI tools or AI-assisted research workflows
Experience with monitoring, visualization, or log analysis tools (e.g., Kibana, Grafana)
Basic experience with automation, scripting, or data parsing.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8550262
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Ra'anana
Job Type: Full Time and Hybrid work
Required Senior Embedded Vulnerability Researcher
Our mission is to deend and mitigate the danger from rogue drones.
We are looking to expand our drone take-over research team, which is responsible for the core technology of our product.
This is a great opportunity for you to expand your capabilities working on versatile and innovative cyber research projects as part of a young and extremely talented team.
Requirements:
4+ years of relevant industry experience as embedded vulnerability researcher or equivalent.
Experience with a dis-assembler for vulnerability research (IDA Pro or GHIDRA).
Deep understanding of OS internals (Linux, RTOS, Android etc.).
Experience with complicated exploitation methods on embedded systems.
Experience with writing code in assembly or c and Python.
Advantage - Graduate of an elite technological unit in IDF.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8548445
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a talented team leader to join the industrys leading digital intelligence Labs group. In this role, you will lead and participate in innovative projects to implement and productize groundbreaking, world-unique capabilities for extracting evidence from Android or iOS devices.
Modern Android and iOS platforms present increasing challenges from a forensics perspective, incorporating robust protection mechanisms such as File-Based Encryption, Secure Element, and mitigations like Pointer Authentication Codes.
A team of passionate researchers and developers dedicated to solving cutting-edge digital intelligence challenges, staying years ahead of others in the industry.
Our world-class R&D efforts assist law enforcement agencies by enabling lawful evidence extraction, helping to bring criminals to justice every day.
Key Responsibilities:
Oversee Vulnerability Research Projects: Lead and manage projects focused on discovering and exploiting vulnerabilities in mobile platforms.
Mentor and Guide Team Members: Provide mentorship and guidance to researchers, helping them navigate complex technological challenges.
Deliver Comprehensive Solutions: Develop complete solutions, moving beyond proof-of-concept demonstrations to fully implementable exploits.
Recruit and Develop Talent: Identify and recruit new researchers as needed, building a skilled and dynamic team to enhance the department's capabilities.
Requirements:
Over 3 years of experience leading security research projects and managing teams.
At least 6 years of experience in vulnerability research.
Full proficiency in English.
Excellent interpersonal skills.
Experience in mobile vulnerability research and exploitation is an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547418
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking talented researchers to join our industry-leading Digital Intelligence Security Research Labs.
As a security researcher on our team, you will focus on identifying vulnerabilities within Apples ecosystem and developing innovative exploit strategies to gain access to iPhones and other devices, enabling the extraction of crucial evidence for law enforcements.
Key responsibilities:
Research on territories with little-explored vulnerability
Work on the production of world-unique capabilities to extract evidence from phones and other embedded devices.
iPhones and other iOS devices present tough challenges from a forensics perspective and involve hardware-backed encryption (SiDP), secure crypto coprocessor (SEP), and secured boot chain (SecureROM).
New iPhones present state-of-the-art exploit mitigations such as PAC, KTRR, and PPL.
Become a member of Labs Group, focusing on Security Research for mobile devices.
Execute your own (shell) code on top-notch technology mobile platforms hardened with challenging mitigations
Collaborate with a team of passionate researchers dedicated to solving modern digital intelligence challenges, years ahead of others in the industry.
Take part in world-class research results, assisting law enforcement by enabling lawful evidence extraction, and putting criminals behind bars every day.
Requirements:
Proven vulnerability research experience (preferably in iOS)
Experience with advanced exploitation techniques
ARM reverse engineering
Cryptographic primitives and weaknesses
Hardware research/board design - Advantage
You are a security researcher who cares about the ethical values of your work
You love the art of engineering and crafting a platform-wide native payload, in a fragmented ecosystem of gaping variance
You are passionate about technology and keen to use your skills to make the world a safer place.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547394
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/02/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Android Security Researcher
Position Overview:
As a talented researcher, you will be joining the industrys leading digital intelligence Security Research Labs group. In this position you will be taking part and leading new projects in little-explored vulnerability research territories, producing world-unique capabilities to extract evidence from phones and other embedded devices. Recent phones (from burner phones to the latest flagships) are increasingly challenging from a forensics perspective, and involve hardware-backed encryption (FDE/FBE), secure boot chains (Verified Boot/dm-verity), evolving hardened SELinux policies, as well as adventures in ARM TrustZone secure worlds.
Key Responsibilities:
You will join our digital intelligence Security Research Labs Group and be a part of a team of passionate researchers, dedicated to solving modern digital intelligence challenges, years ahead of others in the industry. Our world-class research results assist law enforcement by enabling lawful evidence extraction, and putting criminals behind bars, every day.
You are a security researcher who cares about the ethical use case for his/her work, and if the art of engineering and crafting a platform-wide native payload in a fragmented ecosystem of gaping variance is the kind of challenge you appreciate, you belong with us. We need your help to make the world a safer place.
Requirements:
Practical experience performing vulnerability research and exploitation, preferably in mobile or other modern environments, eg. Windows/Linux/iOS/MacOS
Practical reverse engineering experience, preferably in ARM / TrustZone / Hypervisors
Advantage: Cryptographic primitives and weaknesses
Advantage: Advanced fuzzing
Advantage: Offensive hardware research/board design
Advantage: Experience dealing with modern memory corruption mitigations, such as PAC and MTE.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8547377
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
11/02/2026
Location: Ramat Gan
Job Type: Full Time and Hybrid work
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response. You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8541605
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/02/2026
Location: Ramat Gan
Job Type: Full Time
We are seeking a highly motivated and technically proficient Security Researcher to join our security research division. This role is dedicated to performing advanced offensive security assessments against the biggest companies in the world You need to be independent, attentive to details, organized, eager to learn new things, and like to research and solve problems What you’ll do:
* Engage in sophisticated Red Team projects, including the identification of undisclosed API endpoints and development of novel bypass techniques for established security controls
* Lead and execute comprehensive, technically rigorous security research targeting complex web and mobile applications, including reverse engineering and proprietary protocols investigation

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must have:
* Minimum of 3 years of proven, hands-on experience in application security analysis and Web penetration testing
* Strong experience with reverse engineering and dynamic analysis of Android and iOS applications, including hands-on experience with techniques like detours, hooking, and runtime code manipulation
* Proficiency in developing and automating tasks using at least one language like Python, JavaScript, or GoLang.
* Deep, hands-on knowledge of the latest tactics, techniques, and procedures (TTPs) used in advanced penetration testing and network analysis.
* Ability to author comprehensive and technically rigorous reports detailing identified vulnerabilities and research outcomes. Nice to have:
* OSCP, OSWE, eWPTXv2, CRTP, or other high-level offensive certifications.
* Hands-on experience with industry-standard reversing tools like JADX, Ghidra, or IDA Pro.
* Demonstrated online achievements, write-ups, or contributions on platforms such as HackTheBox, Pwn2Own, TryHackMe, Bug Bounty programs, or published security research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8536694
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו