רובוט
היי א אי
stars

תגידו שלום לתפקיד הבא שלכם

לראשונה בישראל:
המלצות מבוססות AI שישפרו
את הסיכוי שלך למצוא עבודה

חוקר סייבר

מסמך
מילות מפתח בקורות חיים
סימן שאלה
שאלות הכנה לראיון עבודה
עדכון משתמש
מבחני קבלה לתפקיד
משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP

חברות מובילות
כל החברות
כל המידע למציאת עבודה
להשיב נכון: "ספר לי על עצמך"
שימו בכיס וצאו לראיון: התשובה המושלמת לשאלה שמצ...
קרא עוד >
לימודים
עומדים לרשותכם
מיין לפי: מיין לפי:
הכי חדש
הכי מתאים
הכי קרוב
טוען
סגור
לפי איזה ישוב תרצה שנמיין את התוצאות?
Geo Location Icon

לוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
25/03/2026
מיקום המשרה: תל אביב יפו
סוג משרה: משרה מלאה
לתפקיד משמעותי בעולמות הסייבר הלאומי, אנחנו מחפשים חוקר/ת מודיעין איומים מנוסה, לעבודה מחקרית-טכנולוגית עמוקה על תקיפות מתקדמות.
לא מדובר בתפקיד IR קלאסי - אלא בפוקוס מחקרי (Threat Intelligence), עם עבודה Hands-on על לוגים, נוזקות ודאטה.
מה עושים בתפקיד?
מחקר מודיעיני טכנולוגי על תקיפות סייבר מתקדמות
ניתוח לוגים, נוזקות ודפוסי תקיפה
בניית תפיסות חקירה בסביבות מורכבות (כולל ענן)
עבודה עם כלי ניטור, מחקר ואיסוף מודיעין
הפקת דוחות מחקר והובלת תובנות אופרטיביות
שיתוף פעולה עם צוותי חקירה וגורמים נוספים בארגון
עבודה במשרה מלאה בת"א (קו רכבת)
דרישות:
ניסיון של 7+ שנים בעולמות הסייבר (חובה)
ניסיון מוכח באחד או יותר:
מחקר נוזקות
חולשות / פורנזיקה
הנדסה לאחור
Threat Intelligence
פרוטוקולי תקשורת / Penetration Testing
ניסיון בעבודה עם לוגים וכלי ניטור ומחקר
יכולת אנליטית גבוהה וחשיבה מחקרית
יתרון לבעלי רקע מיחידות טכנולוגיות / הכשרות רלוונטיות המשרה מיועדת לנשים ולגברים כאחד.
 
עוד...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8590674
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Head of Research
About the role:
As the Head of Research, you will lead our threat-research, security-innovation, and vulnerability-discovery efforts. You will define the strategy for how we uncover threats, identify novel attack vectors, influence product direction, and contribute thought leadership to the cybersecurity community. You will manage and grow a team of world-class researchers, work closely with product, engineering and go-to-market teams, and ensure our research remains cutting-edge, rigorous and impactful. This role emphasizes strong people leadership and cross-functional execution, alongside technical depth and hands-on research judgment.
What youll do:
Develop, own and evolve the research strategy by defining high value focus areas (for example misconfigurations, identity threats, workload vulnerabilities, and emerging attack techniques), and ensure alignment with our product roadmap and business objectives.
Lead, coach, and mentor a multidisciplinary research team (researchers, threat analysts, and engineers).
Build a healthy, high-performing org, including hiring, onboarding, and performance management.
Partner closely with product and engineering leadership to turn research insights into concrete roadmap items, detection logic, and customer value.
Drive discovery of new vulnerabilities, attack techniques, or adversary behaviors across cloud and modern infrastructure environments (for example containers, serverless, data stores, IAM).
Define metrics for research impact (for example vulnerabilities discovered, time to validate and operationalize new findings, research-driven product improvements, external reach).
Establish and maintain external partnerships (industry peers, academic groups, independent researchers) to expand our capabilities and pipeline.
Publish and present research findings (blog posts, white papers, conference talks).
Lead vulnerability disclosure and responsible communications.
Ensure the research function has the right infrastructure and processes (tooling, sandboxes, repeatable experimentation, documentation standards).
Stay current with the threat landscape, emerging technologies, attacker tradecraft, and relevant compliance or regulatory shifts.
Requirements:
7+ years of experience in security research, threat intelligence, vulnerability discovery, offensive security, or closely related roles.
Proven people management experience (mandatory), including hiring, mentoring, and growing high-performing teams.
Demonstrated ability to set a research vision, prioritize effectively, and execute through others in a cross-functional environment.
Strong research fundamentals: designing experiments, validating hypotheses, and turning ambiguous signals into clear findings and recommendations.
Excellent stakeholder management and partnership skills, including the ability to collaborate deeply with engineering and product teams.
Strong written and verbal communication skills, including the ability to communicate complex technical concepts to varied audiences.
Ability to operate hands-on when needed (for example to review technical work, guide investigations, or unblock the team).
Solid coding fluency and automation mindset (languages and stack flexible, Python/Go helpful).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588603
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Security Researcher to help us stay ahead of threats across cloud, runtime, and application environments. This role is intentionally broad and can fit backgrounds in operating systems and Linux internals, vulnerability research, DFIR, penetration testing, and incident response, threat detection, AppSec, and cloud security.
On a typical day youll:
Research and analyze emerging threats across cloud platforms, applications, APIs, and runtime environments
Investigate attacks and security incidents, then turn findings into improved detections and product capabilities
Build detection logic, analytics, rules, and signatures for vulnerabilities, exposures, and active threats
Contribute to runtime and cloud security visibility and detection (Linux, containers, Kubernetes)
Prototype tools and automation to speed up research and improve detection accuracy
Share knowledge through internal enablement, blog posts, whitepapers, or conference talks.
Requirements:
4+ years in security research or security engineering
Strong foundation in one or more of:
Operating systems (especially Linux)
Vulnerability management/research
DFIR, incident response, or threat hunting
Cloud/container/runtime security
Strong analytical attacker mindset and ability to explain complex findings clearly
Proficiency in Python (Go is a plus)
Experience working with telemetry and data (SQL/Elastic or similar is a plus)
Comfortable collaborating across teams in English
Nice to have:
Kubernetes/containers, major clouds (AWS/Azure/GCP)
eBPF, reverse engineering, offensive security experience
Open-source security tooling familiarity, or AI/automation in security workflows.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588597
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Senior Security Researcher to drive high-impact research across cloud, runtime, and application environments, and translate it into product-grade detections. This is a hands-on role for someone who can lead investigations end-to-end: from understanding attacker tradecraft and vulnerabilities, through building reliable detection logic, to influencing product direction.
On a typical day youll:
Lead deep-dive research into real-world attacks, vulnerabilities, and emerging cloud and runtime techniques
Own complex investigations (DFIR, threat hunting, root-cause analysis) and convert learnings into durable detections
Design and implement advanced detection logic and analytics across cloud assets, containers, Kubernetes, and Linux runtime telemetry
Build prototypes and production-ready components that improve detection accuracy, fidelity, and coverage
Partner closely with engineering and product to shape roadmap priorities and guide implementation details
Develop research methodologies, testing frameworks, and validation processes for new detections
Mentor and level up other researchers and engineers through reviews, knowledge sharing, and technical guidance
Represent the team externally through publications, technical blogs, and conference talks.
Requirements:
7+ years of experience in security research, detection engineering, incident response, or comparable hands-on security roles
Demonstrated expertise in at least two of the following areas (and working knowledge in the others):
Linux internals / operating systems fundamentals
Cloud security (AWS/Azure/GCP), including common attack paths and misconfiguration patterns
DFIR, threat hunting, and investigation workflows using telemetry and logs
Vulnerability research or vulnerability management at scale (triage, prioritization, exploitation understanding)
Application and API security fundamentals
Strong programming skills in Python (Go is a strong plus); ability to produce maintainable research code and production logic
Strong data skills: comfortable working with large telemetry datasets (SQL and log analytics platforms such as Elastic or similar)
Ability to reason about attacker behavior, build threat models, and validate detections with repeatable testing
Excellent written and verbal English communication, including the ability to explain nuanced technical tradeoffs to non-research audiences
Track record of driving cross-team execution and shipping impactful security capabilities
Nice to have:
Experience with Kubernetes and container runtime security
eBPF or low-level telemetry approaches, syscall or kernel-level visibility
Reverse engineering and malware analysis
Offensive security background (web, cloud, exploit development)
Contributions to open-source security projects or published research
Experience using automation or AI-assisted techniques to scale research and detection workflows.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588592
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
In this role, you will be the architect of our "security brain." You will write the low-level code that observes what is happening (eBPF/Golang) and build the AI models that understand, diagnose, and prevent issues (LLMs/Python).
Key Responsibilities
1. The "Eyes": eBPF Development & Systems Engineering
Lead the Cimon Agent: Spearhead the active development of our high-performance eBPF agent "Cimon" using Golang and C.
Kernel-Level Innovation: Design and implement eBPF programs for deep observability, runtime security, and container monitoring.
Performance Obsession: Write beautiful, highly efficient code that runs in the Linux kernel with minimal overhead.
Community Leadership: Actively participate in the eBPF and open-source communities, contributing code and presenting technical deep dives at conferences.
2. The "Brain": AI Innovation & Security Research
AI-Driven Security Solutions: Architect and prototype models for:
Automated Exploitability: Checking SAST/SCA findings for validity.
AI Remediation: Automatically fixing Dockerfile misconfigurations and generating patches.
Model Detection: Identifying AI models embedded within codebases.
Benchmarking & Rigor: Design evaluation frameworks to measure model accuracy, false positives, and robustness in security contexts.
Prompt Engineering: Shape prompt strategies and workflows to translate real-world security challenges into actionable AI logic.
3. The Intersection: Collaboration & Evangelism
Cross-Functional Leadership: Serve as the technical link between the AI development team and the core security engineering team.
Thought Leadership: Author whitepapers, technical blogs, and deliver talks on the cutting edge of "AI for Systems Security."
Mentorship: Guide engineers on best practices for both low-level systems design and AI integration.
Why This Role?
No Context Switching Cost: You won't just be researching; you will be building the tools you research. You control the data collection (eBPF) and the analysis (AI).
Deep Tech Focus: This isn't a wrapper-API role. You will be dealing with kernel bypasses, memory safety, and LLM hallucinations all in the same week.
Impact: Your work will directly power the next generation of automated security remediation.
Requirements:
The Core Stack:
Systems: 3+ years of experience with Golang and Linux Kernel development (eBPF or Kernel modules).
AI/ML: Hands-on experience with LLMs, prompt engineering, and Python-based data analysis.
Security: Deep understanding of SAST/SCA tools (e.g., SonarQube, Bearer, Snyk) and Container Security (Docker, K8s, Trivy).
Technical Qualifications:
Strong knowledge of Linux systems design, networking, and OS internals.
Proficiency in Python (for AI research) and Go/C (for Agent development).
Experience in analyzing container build pipelines and identifying vulnerability origins.
Ability to distill complex topics (both kernel-level and AI-level) for diverse audiences.
Bonus Points:
Experience with Rego/Open Policy Agent (OPA).
Publications or presentations at venues like KubeCon, Black Hat, or AI conferences.
Experience with Cloud Security (AWS/Azure/GCP) and Infrastructure-as-Code scanning.
Experience fine-tuning models for specific code-generation or security tasks.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588407
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Lead and grow the team in charge of researching and developing Autopilot, an innovative product for graph-based fully-autonomous investigation and response (Over the Cortex platform).
As the manager of the Autopilot team, you'll lead a team of security researchers, set the project's technical vision and standards, and own its success.
You will lead an innovative team on the research, design, and development of a new graph-oriented security product. Creating investigation modules that allow Autopilot to autonomously detect, investigate, and respond to advanced threats at a massive scale.
You'll work closely with other development and product teams to turn a successful POC into a full-fledged product, staying agile in a dynamic environment and using data-driven empirical research to determine and drive the project in the best direction.
Youll analyze everything from new malware behaviors to attacker techniques and process activity in enterprise-scale networks, using data collected from across millions of endpoints. Your work will span identifying attack patterns and uncovering statistical anomalies, as well as validating that the system responds effectively to real-world attacks and APT campaigns using production data.
Key Responsibilities
Lead and developa team of security researchers, providing mentorship, guidance, and continuous feedback to help them grow their careers (Manage the team, develop the people).
Drive the research strategy and executionfor new autonomous methods for investigating and responding to targeted attackers, leveraging large-scale XDR data and graph-based algorithms.
Ensure collaboration with engineering, product, and other research teams, acting as a key interface to push the project forward and align on cross-functional goals.
Direct the team's work on deep, hands-on investigations of real incidents to reinforce the best investigation and response approach, leveraging a combination of os-internals, TTPs, semi-labeled data, and large-scale statistical methods.
Foster a disruptive environment that innovates using advanced techniques such as graph algorithms, machine learning, and LLM agents to mimic and scale human security analyst workflows.
Requirements:
Experience managing a technical research or R&D team.
5+ years of experience in security or threat research, with a proven track record of delivering actionable insights and real-world impact.
Experience driving projects from concept to execution with a strong sense of ownership.
Intimate knowledge and understanding ofattack methods and techniques (TTPs) over endpoints and enterprise networks.
Technical proficiency in Python, including experience providing code reviews for team members and adhering to best practices.
Ability to work with and extract meaningful insights from large-scale datasets, including strong foundational knowledge of basic statistics.
Excellent people management, verbal, and written communication skills, with a proven ability to collaborate across organizational boundaries.
Preferred Qualifications
In-depth knowledge of the inner workings of operating systems (especially Windows internals).
Experience in designing and implementing behavioral detection/investigation systems.
Experience working with graph DB and algorithms
Advanced background in statistics, data studies, or machine learning.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588246
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Ramat Gan
Job Type: Full Time
we are hiring Intermediate Malware Researchers to analyze and review malware applications. Candidates should have a background in cybersecurity and software development. The role includes training in malware analysis and detection and provides exposure to various malware threats and techniques. Researchers will combine technical and intelligence findings to reach accurate verdicts and assist in the bulk removal of malicious applications. The position requires adaptability and proactive identification of emerging malware trends. We are seeking candidates who are willing to learn, can perform effectively under pressure, and maintain high professional standards.

About us:
we are a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact-whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, our company provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.


Hybrid:
No
Requirements:
Must-Have: 2 years of proven experience in the industry in one of the following: malware research, reverse engineering, penetration testing, or software development Strong understanding of JAVA object-oriented programming
* Ability to trace execution flow through code analysis
* Comprehensive knowledge of cybersecurity, networking, and programming fundamentals
* Proficient English communication skills (reading and writing)
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction. Nice-to-Have:
*  Computer Science degree
* Proficiency in multiple programming languages (e.g., JavaScript, C / C ++)
* Experience with disassemblers such as IDA Pro or Ghidra
* Experience with decompilers such as JADX or JEB
* Familiarity with instrumentation frameworks like Frida or Xposed
* Experience with HTTP debugging and network analysis tools (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark)
* Knowledge of common malware threats and techniques
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375238
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As the Code & AI Security Research Manager, you will lead an elite team in redefining trust for an era of agentic automation and hyper-connected supply chains. You will serve as a technical lighthouse and strategic leader, managing a high-performance team to secure the core of modern engineering. Your mission is to bridge deep technical research with product innovation, ensuring our customers' security posture evolves faster than the way they build software.
Key Responsibilities
Lead, mentor, and empower a team of world-class security researchers to pioneer AI-native security strategies.
Define the vision for identifying and mitigating novel attack vectors targeting coding agents and autonomous development workflows.
Oversee the evolution of traditional code vulnerabilities into proactive, self-healing workflows that fix issues before they reach a pull request.
Drive deep-dive research into software supply chain vulnerabilities, including CI/CD pipeline risks and third-party package security.
Proactively collaborate with Product and Engineering leaders to integrate research findings into core platform detection and remediation logic.
Establish the team as a global thought leader by overseeing original research publications, influential blog posts, and conference presentations.
Requirements:
2+ years of experience in technical leadership or people management, with a proven track record of directing high-impact security research projects.
6+ years of professional experience in application security research, focusing on the security of modern software architectures.
Proven expertise in building AI-powered security solutions or securing AI-driven systems.
Strong understanding of modern software supply chain risks, including CI/CD exploitation and malicious package detection.
Hands-on expertise in both offensive and defensive security, with the ability to translate research into robust product defenses.
Strategic mindset with the ability to navigate the fast-moving AI security landscape and translate complex research into a clear product roadmap.
Preferred Qualifications
Previous experience in a security product company, translating research into scalable product features and detection logic.
Experience leveraging big data platforms (e.g., GCP BigQuery, AWS Athena) to validate security research at scale.
Proficiency in multiple programming languages (e.g., Python, Go, JavaScript) and their pitfalls in AI-generated code.
A portfolio of public-facing work such as CVEs, whitepapers, or talks at major global security conferences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8587395
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As a Principal/Senior Windows Exploit Researcher, you will be a key member of our Tel Aviv R&D center, responsible for leading research into Windows Anti-Exploit capabilities. You will leverage your top-notch knowledge of the latest exploitation techniques and deep Windows internals to architect and develop the next generation of security protections. Your work will directly contribute to safeguarding our customers from the most sophisticated cyber threats.
Key Responsibilities
Lead advanced research into novel vulnerabilities and complex exploits targeting the Windows operating system.
Architect, develop, and improve sophisticated anti-exploitation mitigations using low-level OS mechanisms, challenging the status quo with innovative solutions.
Drive the design, evaluation, and implementation of next-generation security technologies from conception to deployment.
Develop proof-of-concept (POC) exploits to validate research findings and test the effectiveness of new and existing mitigations.
Analyze customer escalations to help with detecting and preventing malicious activities in our customers networks
Publish research done internally.
Requirements:
3+ years of hands-on experience in reverse engineering, including both static and dynamic analysis.
2+ years of experience in vulnerability research, exploit development and bypassing OS-level mitigations.
Expert-level knowledge of Windows operating system internals and low-level OS research experience.
Experience in C/C++ development, including Win32 API.
Experience in a scripting language, with a preference for Python.
Ability to work independently and as a part of a team
Ability to work under pressure with strict deadlines, and to prioritize projects
Strong attention to detail.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8587390
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Appdome’s mission is to protect every mobile app in the world and the people who use mobile apps in their lives and at work. Appdome provides mobile brands with the only patented, centralized, data-driven Mobile Cyber Defense Automation platform, delivering rapid no-code, no-SDK mobile app security, anti-fraud, anti-malware, anti-cheat, anti-bot implementations, configuration as code ease, Threat-Events™ threat-aware UI/UX control, ThreatScope™ Mobile XDR, and Certified Secure™ DevSecOps Certification in one integrated system. With Appdome, mobile developers, cyber and fraud teams can accelerate delivery, guarantee compliance, and leverage automation to build, test, release, and monitor the full range of cyber, anti-fraud, and other defenses needed in mobile apps from inside mobile DevOps and CI/CD pipeline. Leading financial, healthcare, m-commerce, consumer, and B2B brands use Appdome to upgrade mobile DevSecOps and protect Android & iOS apps, mobile customers, and mobile businesses globally. Today, Appdome's customers use their platform to secure over 50,000+ mobile apps with protection of over 1B mobile end users projected. Job description Appdome is looking for a talented, passionate Offensive Researcher to join our innovative research team. If you’re eager to explore cutting-edge mobile security techniques and help safeguard the mobile app ecosystem, this is the role for you! As a key player in our security team, you'll design and execute sophisticated attack simulations on the Appdome platform. Your work will touch on diverse attack vectors, including file systems, networks, jailbreaks, memory injections, and more.
Requirements:
* 1-3 years of experience in Offensive Security/Cyber.
* Extended knowledge in researching, simulating, and analyzing different application attack vectors.
* Advantage – Experience using a hacking framework or pen-testing tools such as Frida, Magisk, Multiproxy, and Cheat Engine.
* Ability to create analysis plans and execute them, as well as document and troubleshoot errors.
* Ability to understand the system from multiple perspectives, including high-level and low-level technical architecture.
* Experience in Mobile (iOS/Android) analysis environments and automation tools.
* Bachelor’s degree in a relevant field.
* Software development and scripting experience.
Equal Opportunity Employment Appdome is an Equal Opportunity Employer committed to diversity, equity, and inclusion. We evaluate all qualified applicants without discrimination based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or other protected characteristics.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8529956
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות שנמחקו