רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

מומחה אבטחת מידע / סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
שרת
שכר
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
5 טיפים לכתיבת מכתב מקדים מנצח
נכון, לא כל המגייסים מקדישים זמן לקריאת מכתב מק...
קרא עוד >
הטבות ובונוסים בעבודה בחברות הייטק
מכון כושר צמוד, חדר אוכל משובח, חדר משחקי וידאו...
קרא עוד >
טעויות נפוצות בניהול קריירה
הדרך לחיים של חוויות והזדמנויות עוברת דרך תכנון...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/03/2026
Location: Ramat Gan
Job Type: Full Time and Temporary
We are looking for a Red Team specialist for our Infrastructure Red Team department for a maternity leave replacement. This role includes researching, assessing and challenging digital identity verification and access mechanisms across a variety of platforms and solutions. The position includes creative red team projects and infrastructure management alongside end-to-end delivery to key clients. You will be responsible for the generation of insights, means, methods and signals provided from diverse intelligence streams alongside red team exercises meant to assist with identifying key vulnerabilities, high risk abuses, and mitigation solutions and planning. Key responsibilities:
* Red Team operations - strategic planning and execution of red team exercises
* Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying abuse methods
* Research and development of new operational bypass methods
* Provide insights on intricate means and methods being used by threat actors to abuse the worlds most popular tech platforms while putting users at risk
* Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
* Content creation and management.
Requirements:
* Hands on experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
* Knowledge in OSINT investigation techniques and red teaming
* Online and infrastructure security orientation
* Fluent English - Strong written and verbal communication skills
* Curiosity and out of the box thinking
* Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management
* A proactive and independent learner of new practice areas and technological tools
* Ability to work under pressure Nice to have
* Additional languages
*  Python proficiency
* Experience in threat modeling and adversary emulation specifically focused on digital identity attacks
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8571820
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
06/03/2026
Location: Ramat Gan
Job Type: Full Time
Alice is seeking an experienced Malware Research Director to build and manage multiple teams dedicated to malware research. This role presents an exciting opportunity to establish a new operation from the ground up, creating processes, optimizing and setting up cross-team collaboration while serving as the primary client interface. The position is primarily leadership, client-facing, creating solutions and requiring exceptional team-building and operational setup skills. The ideal candidate demonstrates high technical skills, proven experience in building teams from scratch, establishing new operations, and strong client relationship management capabilities. Key Responsibilities:
* Establish operational processes, workflows, and quality standards for the new teams
* Coordinate with other departments to integrate the new operation into the existing infrastructure
* Serve as primary client interface, managing relationships and ensuring client satisfaction
* Present research findings and malicious evidence to clients and stakeholders
* Advise on technical aspects for malware research challenges and automated solutions
* Create training programs and onboarding processes for new team members
* Develop performance metrics and evaluation frameworks for team effectiveness
* Lead client meetings, requirement discussions, and project planning sessions
* Collaborate with sales and business development teams on client engagements

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.



Hybrid:
No
Requirements:
Must-Have:
* Management experience - managing at least 10 employees for a minimum of 2 years, with extensive experience in recruiting and building teams
* Strong client-facing experience with excellent presentation and communication skills
* At least 3 years of proven experience in one of the following: malware research, reverse engineering, penetration testing, embedded software development
* Understanding of malware research principles and the cybersecurity landscape
* Experience managing client relationships and delivering technical solutions to business stakeholders
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
* Excellent spoken and written English.
Nice-to-Have:
* Android malware research / reverse engineering hands on experience from the last 3 years
* Experience in leading multiple teams comprising of a few dozen employees
* Experience in leading cybersecurity researchers or other research operations
* Experience establishing new departments or research operations within organizations
* Background in technical sales or business development in cybersecurity
* Experience presenting to C-level executives and technical stakeholders
* Experience with decompilers, debuggers, and disassemblers (e.g., JADX, JEB, LLDB, GDB, x86dbg, Ghidra, IDA Pro)
* Familiarity with instrumentation frameworks like Frida or Xposed
* Proficiency with HTTP debuggers, MITM tools, and network analyzers (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark, Little Snitch, mitmproxy)
* Understanding of network communications and protocols
* Familiarity with multiple programming languages (Java, C/C++, JavaScript, Python)
* Familiarity with multiplatform development frameworks such as Unity, Flutter and React Native
* Under
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375228
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Petah Tikva
Job Type: Full Time
As a Principal Software Security Engineer, you'll be responsible for delivering offensive security engagements against public-facing and internal products. Youll also be responsible for security auditing of the product stack and researching nuances of securing SaaS platforms. This will require an in-depth knowledge of various approaches to application auditing, including secure code review, debugging, dynamic web application testing, analysis and threat modeling. Youll work closely with product engineering teams to provide investigative reports to improve platform resiliency and ensure best-in-class security solutions.

What you get to do in this role:

Work with diverse business and technology owners
Participate in offensive security engagements including external adversarial emulation.
Perform security audits to discover, communicate, and recommend remediation activities for vulnerabilities
Work with engineering teams on remediation
Create and maintain strategic relationships
Requirements:
Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AIs potential impact on the function or industry.
A passion for security and problem solving
Background in software security auditing, computer security and the statistical methods
15+ years of experience performing software security auditing including code review, reverse engineering, thick app analysis, and black-box web application testing or related experience and education
Familiarity with NIST 800-53 and similar controls framework
Developer-level proficiency in Python, Java, and JavaScript, including modern client-side JavaScript frameworks
Experience writing static code analysis rules a plus
Experience with Python data science and machine learning frameworks a plus
Network and system security engineering skills a plus
Degree in computer science / engineering, informatics, mathematics/statistics, or equivalent work experience
Offensive Security OSWE and/or OSCP certification(s) a plus
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569759
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
מיקום המשרה: חולון
סוג משרה: משרה מלאה
דרוש מומחה הגנה בסייבר, כמומחה הגנה בסייבר תעבוד בשיתוף פעולה הדוק עם צוותי התשתיות והפיתוח בכדי לוודא את אבטחת הרשת והשירותים אותם מספקת החברה ללקוחותיה.
תחומי אחריות:
תכנון ארכיטקטורה מאובטחת.
תכנון ובניית ההגנה על מערכות ההפעלה, רשת התקשורת, הקוד והיישומים.
הגדרת שיטת העבודה במערכות האבטחה והתקשורת - מדיניות, הנחייה ובקרה .
תפעול מערכות אבטחת מידע ותקשורת.
מעקב אחר אירועים לצורך איתור התקפה.
ניטור כלי אבטחת המידע בארגון.
ביצוע בקרות על החוקים המיושמים בכלי האבטחה.
הנחייה לתגובה וההתמודדות עם התקפה.
הנחיית גורמים שונים בארגון בהיבטי אבטחת המידע במערכות התשתית והאפליקציה.
ליווי סקרי אבטחת מידע וליווי הטיפול בממצאי סקרים.
דרישות:
דרישות התפקיד:
ניסיון של שנתיים כמומחה הגנה בסייבר, תפעול Hands On של מערכות אבטחה ותקשורת.
ניסיון בתכנון ארכיטקטורה מאובטחת.
ניסיון מוכח ביישום בקרות אבטחת מידע ברכיבים שונים ברשת ובמערכות האבטחה.
הסמכות אבטחת מידע - יתרון. המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569744
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced compliance professional to join our team and support compliance for our SaaS platform.
About the Position:
As Compliance Lead for the SaaS platform, you will be focused on leading and supporting compliance efforts with various regulatory regimes that apply to our SaaS business, including, but not limited to, economic sanctions, anti-bribery, and anti-corruption programs. In addition to these responsibilities, the Compliance Lead will conduct risk reviews of SaaS business customers and report findings to senior management. Risk reviews will encompass initial assessments of new SaaS licensees and ongoing reviews leveraging public information and blockchain analytics.
To be successful in this role, the candidate will need to work closely with internal and external stakeholders, including senior management, front line business leaders, and prospective SaaS licensees. Expertise in digital asset investigative processes, including customer due diligence and blockchain analysis, will be crucial in establishing and executing operations for this role. The ideal candidate will be comfortable working in a fast-paced environment handling multiple ongoing projects that are delivered on time. We are looking for a candidate armed with a roll-up-your-sleeves mentality and forward-thinking approach that is eager to help across multiple verticals and advise business teams on global risks.
This position reports directly to the company's Senior Director of Compliance and will be an independent contributor initially. This role will be based in the US, with preference for candidates based near our NYC HQ; although qualified candidates from other locations are highly encouraged to apply.
Requirements:
5+ years of experience working in Web3 organizations with an intermediate familiarity of digital assets and their various use cases.
Substantial experience conducting investigations into digital asset activities, leveraging a blockchain analytics platform (e.g., Chainalysis, TRM, Elliptic).
Ability to contribute to the design of effective compliance controls for applicable regulatory regimes.
Growth mindset to tackle any problem and learn any skill that will support the evolution of the compliance programs.
Strong analytical and problem-solving skills, including how to identify patterns of unusual or suspicious activity.
Excellent personal, political, analytical, and communications skills with a high attention to detail.
Excellent written work with a concise, direct style.
Preferred Qualifications
Although this role is with a non-regulated company, experience working with financial institutions in an investigative or customer monitoring capacity, especially within AML/CTF Compliance Programs, is a favorable attribute for this role.
Experience as a manager is helpful, but not required.
An advanced degree in finance, business, or law (e.g., Masters, Juris Doctor) can be substituted for some years of working experience.
Domain-specific certification(s), such as Anti-Money Laundering Specialist (CAMS), or blockchain analytics tool, e.g., Chainalysis Reactor Certificate.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569364
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Cloud Infrastructure and AI Security, you will play a key role in securing multi-cloud infrastructure, embedding security into DevSecOps, and ensuring AI platforms and agentic integrations are built and operated with enforceable security controls.
This role requires deep, hands-on expertise across Cloud Infrastructure Security and AI Security. You will actively design, implement, and enforce security controls across multi-cloud environments and Agentic AI, working closely with R&D, Product, and DevOps teams to embed security directly into architecture and development from day one.
You will operate at the forefront of cloud security, AI and blockchain, helping define how agentic AI systems are implemented safely in production. This is an opportunity to work on cutting edge technologies, collaborate with experienced security and engineering professionals, and grow within one of the most advanced and rapidly evolving domains in modern security.
What You'll Do:
Design, implement, and maintain security controls across multi-cloud infrastructures
Work closely with R&D teams to understand constraints and risks in Agentic AI and Infrastructure
Design and implement runtime AI security controls (guardrails, filters, policy engines, gateways).
Build protections for LLM inference, agent tool execution, MCP / plugin frameworks, and RAG pipelines.
Implement prompt, input, and output inspection for abuse, jailbreaks, data leakage, and policy violations.
Secure Infrastructure, CI/CD pipelines, and automation workflows by embedding DevSecOps best practices
Conduct security reviews of product features, new technologies and ensure they meet security requirements.
Secure Kubernetes clusters and containerized workloads in production environments
Evaluate AI attack vectors (prompt injection, model poisoning, data exfiltration, jailbreaks, emerging attack patterns) and implement effective mitigations
Collaborate with other security teams to resolve security issues and implement security improvements.
Lead security projects and initiatives across environments to enhance the platform's security.
Requirements:
At least 3 years of experience with AWS, GCP, or Azure
Experience working with Agentic AI platforms such as Onyx, Noma, Cyata, Pilar, AKTO, or similar enterprise Agentic AI, strong plus but not mandatory.
Strong knowledge and experience with DevSecOps practices
In-depth knowledge of security best practices and technologies, including encryption, identity and access management, and network security
Experience with securing Kubernetes
Proficiency with cloud security tools such as CSPM, CWPP, CADR
Strong communication and collaboration skills, with the ability to work effectively with cross-functional teams
Experience in leading security projects across complex multi-cloud architectures
Industry certifications, CISSP,, AWS Certified Security Specialty, or AI security certifications
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569125
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a passionate and experienced Governance, Risk, and Compliance (GRC) operations specialist to contribute to our companys efforts in making the most security and trusted provider of digital asset management solutions. This role is critical in driving our day-to-day GRC programs, ensuring they are well maintained, run according to schedule, and align with our business needs.
As the GRC operations specialist, you will oversee the successful implementation and progress of GRC programs, practices, and projects, while collaborating with multiple cross-functional teams within the security department and outside of it.
What You Will Do:
Own, manage, and continuously improve the companys Third Party Risk Management (TPRM) program, making sure it is both aligned with expected security standards and best practices, and meets business requirements and SLAs.
Own, manage, and continuously improve the companys security awareness program, making sure its scope, content, cadence and overall performance are always aligned with the latest and most relevant expectations, while also well received and relevant to the business.
Manage ongoing operations within the GRC team including project management and tracking, financial planning and reporting, annual and periodic planning, and more.
Drive ongoing GRC efficiency through innovation, automation, data-driven decision making research and exploration.
Support and contribute to ongoing GRC operations such as internal and external audits, risk assessments, certification processes, policy management, business continuity program and more.
Requirements:
Minimum of 3+ years of experience in cybersecurity or GRC.
Proven experience in cyber or IT or third party risk management.
Proven experience in the security awareness domain, including development and implementation of security training programs and their testing (phishing, vishing, social engineering etc.).
Strong understanding of industry best practices, regulations, frameworks, standards and certifications such as SOC 2, ISO, NIST, CIS, DORA, GDPR, etc.
Visionary and innovation-driven, capable of implementing security and compliance programs in complex, fast-paced organizations.
Exceptional communication, collaboration, and interpersonal skills, with the ability to engage both technical and non-technical audiences.
Strong analytical, problem-solving skills and attention to detail, with the ability to manage multiple projects simultaneously and meet tight deadlines.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569120
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
The Security & Information team is looking for someone who is passionate about technology and has a roll-up-their-sleeves mentality to join our global team. Youll play a crucial role in enhancing our security infrastructure, improving networking, ensuring scalability, and maintaining strong security as we continue to grow. If you want to be an industry leader, on a team experiencing hyper-growth, look no further!
Responsibilities :
Operates as the primary escalation point for critical security alerts, performing deep-dive DFIR investigations, analyzing attacker techniques and vectors, proactively hunting threats, and directing incident response activities.
Lead SecOps projects from inception to execution, ensuring effective implementation and ongoing maintenance.
Mentor a team of SecOps experts, providing technical guidance in a fast-paced environment.
Research how to leverage security telemetry and existing security solutions to improve triage and automated response.
Work cross-functionally to refine and evolve agentic workflows that drive automated security operations.
Coordinate investigation, containment, and other response activities with business stakeholders and groups.
Perform hands-on forensic investigations, log reviews, cloud investigations, and root-cause analysis
Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement.
Requirements:
5+ years experience working in an Incident Response/Cyber Security Operations Center (in-house or outsourced) addressing, escalating, and managing security incidents and creating incident reports.
Extensive experience in managing the lifecycle of security incidents in a global, 24/7 production environment..
Collaborating with various cross-organizational stakeholders to drive incident response and remediation.
Development of common runbooks for most frequent or critical incident types.
Strong development fundamentals with experience delivering and maintaining production-grade code.
Coding & Scripting: Hands-on programming experience (Python, Bash, etc.) with proven ability to build automation processes.
Proven expertise in attack and mitigation methods within Cloud and SaaS environments
Solid understanding of system and security controls on at least two OSs (Windows, Linux / Unix, and MacOS (Advantage), including host-based forensics and experience with analyzing OS artifacts.
Problem solver, an in-depth thinker with a growth mindset.
Excellent communication skills and ability to work collaboratively with other teams
Preferred Qualifications:
Bachelor's degree in Computer Science, Information Technology, or related field
Solid understanding of LLM concepts and architectures, with hands-on experience applying them in practice.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569113
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a highly skilled Technical GRC Expert with strong technical and hands-on cybersecurity expertise. This role bridges the gap between compliance and technology - ensuring that GRC frameworks are not just compliant on paper but effective in practice across infrastructure, SaaS, and cloud environments.
As the Cybersecurity GRC Engineer you will oversee the technical execution of GRC initiatives, collaborating with cross-functional teams (Security Engineering, IT, DevOps, Product) to drive resilience, risk reduction, and audit readiness across the organization.
Reporting line: GRC Director
What you will do:
Collaborate with R&D and DevOps teams to integrate security into development and deployment processes.
Perform technical risk assessments, vulnerability trend analysis, and threat modeling to ensure risk registers reflect the true security posture.
Lead security awareness and social-engineering simulations, correlating campaign results with real technical findings (phishing, MFA bypass, insider threat trends).
Initiate and coordinate offensive security activities including penetration testing, red teaming, and vulnerability assessments to proactively identify and mitigate risks.
Support incident response readiness by integrating lessons learned into policy, control design, and awareness materials.
Leverage AI to automate GRC reporting, surface risk insights, and maintain intelligent dashboards integrated with platforms like ServiceNow, Jira, and internal data sources.
Partner with Security Engineering and IT teams to ensure consistent endpoint hardening, patch management, and configuration compliance.
Coordinate DR exercises and tabletop simulations, track findings, and oversee remediation to strengthen resilience.
Prepare for and support internal and external audits, including SOC 2, ISO 27001, NYDFS, and customer due-diligence requests.
Requirements:
+3 years of experience in GRC, IT Risk, or Security Operations, with at least 2 years hands-on in technical environments (e.g., system administration, cloud security, endpoint management, vulnerability management).
Strong working knowledge of cloud security (AWS, GCP, or Azure) and endpoint management (Jamf, Intune, CrowdStrike).
Proven ability to automate or optimize GRC workflows using tools, APIs, and AI.
Practical experience designing or testing Disaster Recovery and Business Continuity programs.
Strong analytical and problem-solving skills; able to translate complex technical risks into actionable business terms.
Visionary and innovation-driven, capable of implementing security and compliance programs in complex, fast-paced organizations.
Exceptional communication, collaboration, and interpersonal skills, with the ability to engage both technical and non-technical audiences.
Strong analytical, problem-solving skills and attention to detail, with the ability to manage multiple projects simultaneously and meet tight deadlines.
Preferred Qualifications:
Certifications such as CISA, CISM, CISSP, or Security+.
Background in the financial / digital assets sector or regulated environments.
Strong technological understanding and familiarity with product development practices.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8569109
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a senior, hands-on Security Operations Lead to build, mature, and operate Zenitys detection, response, and corporate security capabilities. You will own the engineering, workflows, and processes that keep Zenity secure day-to-day, while continuously improving visibility, automation, and operational resilience across both corporate and production environments. This role requires a technical operator who can architect scalable detection and response pipelines, manage endpoint and identity security controls, streamline GTM security enablement, and collaborate across the company to reduce risk. You will balance strategic direction with hands-on execution-ensuring threats are identified quickly, incidents are handled effectively, and the organizations operational security posture remains strong as Zenity grows.
Responsibilities:
Own and mature Zenitys Detection & Response program, including alerting, triage workflows, incident playbooks, and end-to-end response processes.
Build and maintain detection logic, integrations, and automation across logging, SIEM, EDR, cloud telemetry, and internal monitoring systems.
Lead incident investigations, coordinate response across engineering and business teams, and ensure clear communication and post-incident reviews.
Manage Zenitys Corporate Security Program, including identity and access management, endpoint posture management, corporate data security controls, and DLP practices.
Oversee privileged access workflows and JIT access for corporate and production systems in alignment with least-privilege principles.
Partner with engineering teams to ensure production environments maintain strong security baselines, logging, and monitoring coverage.
Collaborate with GTM/Sales teams to support Security Enablement, including third-party security questionnaires, customer assurance needs, and auditor inquiries.
Build automation-first operational processes that reduce manual overhead and provide consistent, repeatable security outcomes.
Develop and refine detection and response runbooks, escalation paths, and cross-team coordination models.
Maintain and improve incident and operational metrics, dashboards, and KPIs to measure operational efficiency and threat coverage.
Drive the intake and prioritization of security operations requests through Jira and internal workflows.
Work closely with Product Security, Cloud/DevOps, and GRC to ensure shared visibility and aligned operational practices.
Identify operational security gaps, propose improvements, and lead implementation efforts across tooling, processes, and controls.
Promote a culture of proactive detection, fast response, and shared responsibility for organizational security.
Requirements:
Five (5) + years of experience in Engineering / Security Engineering
We build solutions when faced with a capability gap
Youre very comfortable with Kubernetes, Helm, and Terraform
Youre very comfortable with Python, Typescript, or Go
Two (2) + years of experience in Incident Response role
Youve led at least 2 high risk production security incidents
Youve handled the investigation of hundreds of client endpoint security alerts
Bonus points for significant experience in macOS
Youve developed or improved threat detection and signal triage programs
Two (2) + years of experience managing enterprise wide security projects
You have a strong opinion on what a project plan doc should look like
Youve owned and delivered the migration of a high impact security tool (EDR, SIEM, ZTNA, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8568946
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were seeking a Senior Security Researcher to drive end-to-end research initiatives that strengthen detection capabilities. In this role, youll investigate emerging attack surfaces, craft and implement innovative detection logic, and test your findings in real-world environments. Its a hands-on position ideal for someone eager to transform research insights into effective, production-grade security defenses.
Responsibilities:
Research AI Agent and LLM-related risks, such as prompt injection and jailbreaking and implement sophisticated detection strategies.
Conduct research on cloud, web, and API security to uncover new threats and attack vectors.
Develop, refine, and design world-class detection logic and rules to enhance runtime protection.
Perform threat-hunting activities across large data sources to identify emerging attack patterns
Drive full-cycle research: from hypothesis and experimentation to production validation.
Collaborate with engineering and product teams to deliver actionable insights.
Requirements:
4+ years in security research, including cloud, web, or API security.
Experience in detection engineering and building or working with detection-driven security products.
Strong coding and data analytics skills in scripting and programming languages such as Python, JavaScript and bash, and proficiency with SQL-like queries.
Solid grasp of security principles, cloud security, and runtime defense.
Curiosity, creativity, and a self-driven approach to research.
Experience tinkering with LLMs and AI security - a strong plus.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8568879
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
04/03/2026
Location: Ramat Gan
Job Type: Full Time
As a Mobile Threat Analyst at Alice, you will use your internet-fluency, online resourcefulness, broad areas of interest, technical skills, AI-driven methodologies, and hacker-like thinking to solve puzzles and lawfully access difficult-to-come-by open-source data from the deep web.
Responsibilities include:
*  data mining and advanced analysis - conducting high-level Open Source Intelligence
* Collaboration with technical teams
* Analyzing malicious activities online, getting to their sources & distribution methods
* Analyzing large, complex datasets using statistical, scripting, and AI-based techniques.
* Researching new online platforms to discover methods for automating data collection.
* Monitoring third-party websites, forums, messaging app channels, dark web communities, and emerging platforms to uncover malicious activities.
* Translating analytical findings into actionable recommendations for detection systems and enforcement strategies.
* Generate intelligence reports often regarding highly technical concepts and TTPs.
Requirements:
Play-to-win attitude ; Curiosity and proactive approach to learning and developing technical skills as well as out-of-the-box and creative thinking
* Experience writing technical intelligence reports and presenting complex findings in clear, accessible English for non-technical stakeholders Fluent in written English, with the ability to communicate clearly and professionally -a must Strong communication skills, with the ability to collaborate effectively across diverse teams Comfortable with basic coding principles, including the ability to read and understand code (preferably in JAVA, JavaScript and PythongreenTxtBg!)
* Extensive intelligence analysis experience (3+ years) - advantage
* Understanding of the mobile threat ecosystem / threat intelligence analysis background (1-2 years) - advantage
* Ability to leverage AI-assisted coding to develop scripts and lightweight internal tools, with a strong motivation to further develop technical and programming skills - advantage
* Proficiency in additional languages - advantage
* Technically oriented - Big advantage!
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8568079
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
03/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were seeking an experienced Security Solutions Engineer to help us create new automations and scalable solutions for our customers. Your role will be both strategic and tactical, as youll be working directly with customers to understand their requirements, design solutions, and implement security controls. Join us on our mission to help every security team achieve operational excellence.
Your responsibilitie:
Design and implement security solutions to automate the real-world customer pains.
Provide expert advice and recommendations for security solutions that can achieve customer objectives.
Collaborate with the Sales team to establish a reputation for technical excellence and trustworthiness with potential customers.
Work jointly with other Solutions Engineers & Architects to support the Sales team with technical content and call support.
Establish and maintain a knowledge hub or repository of security best practices, resources, and insights.
Collaborate with the marketing team to generate demos, case studies, blogs, and videos.
Requirements:
Proven experience in technical-customer facing related roles.
Strong knowledge of security best practices and industry standards including SIEM, SOAR, CSPM, public and private cloud architectures and practices.
Experience with modern cloud infrastructure and security products.
3+ years of software development experience.
Strong understanding of networking and application security.
Excellent communication skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8567364
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
01/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Security Incident Response Group Lead - (250000G4)
What will you do?
A global provider of cybersecurity protection solutions for networks and applications. We are looking to enhance our Cloud Services, the fastest growing business, in key markets.
Security operation leadership - Oversee the daily operation by leading projects & processes, tracking tasks & progress, and mentoring of a global Incident Response (IR) group that is specialized in detection & mitigation of various network threats, such as Denial-of-service attacks, application server-side & client-side threats, botnets, and more.
Incident response leadership - Oversee & coordinate RT security incidents globally by maintaining & developing solid IR processes & playbooks, crisis management & de-escalation techniques, lead escalation calls, and identify & improve gaps in technical & operational procedures among the global security group.
Global IR team leadership - Lead and mentor a multidisciplinary cloud security group consists of security IR analysts & security experts, fostering a collaborative and high-performance culture, oversee the global recruitment & training process of new employees, and develop & maintain high performance teams with deep technical knowledge, customer orientation, and operational attitude.
Customer engagement - Ensure customer's SLA & satisfaction, build and maintain strong relationship with customers & stakeholders, and maintain regular communication through meetings, reports, and updates to ensure stakeholders are informed about security initiatives, incident responses, and risk posture.
Strategic planning - Develop & execute roadmaps, strategies, and frameworks aligned with organizational goals.
Requirements:
What you need:
At least 8 years of experience in the domain of cybersecurity operations & investigations, especially in network security & incident response.
A proven & solid experience in leading & overseeing a global group from the technical & operational points of view.
A proven & solid experience in recruiting & training new employees.
Strong & deep knowledge & experience in networking, especially network protocols of various OSI layers - application layer protocols, transport and network layer protocols.
Strong & deep knowledge & experience in the domain of network security threats such as DDoS/DoS, API security, OWASP T10, etc.
Strong & deep knowledge & experience with security controls and tools such as FW, SIEM, IDS/IPS, and vulnerability scanners.
Solid experience in customer service & customer engagement during incidents and crisis.
Proven problem-solving capabilities under pressure.
Strong leadership skills.
Good communication skills and customer experience.
Fluent English.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565198
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
01/03/2026
Location: Merkaz
Job Type: Full Time and Hybrid work
we are looking for a Cyber Threat Intelligence Analyst to join our Cyber team
mission is to provide easy access to high quality web content to companies who wish to focus on data analysis and not data collection.
We work to provide access to the biggest data repositories in each vertical we serve, and we take pride in our ability to quickly take care of our clients, and fulfill their data requirements.
What Youll be Doing:
Maintain deep, ongoing knowledge of deep and dark web sources, actively tracking forums, marketplaces, blogs, and chat platforms, while ensuring data coverage, quality, and continuity.
Perform continuous cyber threat research across the cyber landscape, maintaining up-to-date knowledge of trends and incidents across malware campaigns, ransomware attacks, and data breaches, including threat profiling and ecosystem analysis to enhance detections and customer outcomes.
Own the technical delivery of cyber trials by building tailored POCs, validating data relevance, and demonstrating measurable value aligned with customer KPIs.
Act as a technical point of contact for customers, supporting investigations, resolving data and coverage issues, and contributing to retention and expansion efforts.
Collaborate closely with Product and Development teams to improve data deliverables and help define and develop new product capabilities and features based on customer needs and threat-landscape insights.
Requirements:
2-4 years of experience as an OSINT / WEBINT analyst, cyber intelligence analyst, or in a similar investigative role.
Hands-on experience conducting cyber investigations, analyzing online sources, and producing actionable intelligence.
Strong familiarity with deep and dark web environments, forums, marketplaces, and underground ecosystems (advantage).
Experience working with global customers in a B2B SaaS environment and supporting customer-facing technical engagements.
Fluent English (written, spoken, and reading).
Strong ability to multitask, manage priorities, and operate effectively in a fast-paced environment.
Excellent communication and collaboration skills, with the ability to work cross-functionally with Sales, Product, and Development teams.
Good technological understanding, fast learning capabilities, and strong analytical thinking.
Highly motivated, ambitious, and driven to grow within a cyber intelligence environment.
At least 1 year of experience as a Cyber Analyst - an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8565096
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו