משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Herzliya
Job Type: Full Time
Our Security team is looking for a hands-on Cloud Security Specialist with a strong focus on Identity & Access Management (IAM) to help drive our security posture across cloud environments. In this role, youll be the go-to expert for IAM governance and cloud identity controls across AWS and GCP- enabling secure access at scale, while working closely with security, DevOps, and engineering teams to solve complex security problems.
The ideal candidate is highly motivated, demonstrates a can do' attitude and needs to have a combination of technical and communication skills, as well as the ability to handle a mix of multiple tasks including projects and technical work.
What you'll do:
Lead the design and enforcement of IAM controls across AWS and GCP.
Build and maintain secure role, permissions, and account structures aligned with least privilege and zero trust principles.
Manage and govern human and non-human (machine) access to sensitive SaaS applications (e.g., Okta, Git, etc.).
Monitor and improve cloud identity hygiene: users, roles, service accounts, federated access, and third-party integrations.
Automate detection and remediation of IAM misconfigurations and over-privileged identities.
Collaborate with DevOps and engineering to embed IAM best practices into infrastructure pipelines and app deployments.
Support incident response and investigations related to IAM abuse, access misuse, or privilege escalations.
Contribute to detection rules, playbooks, and cloud-specific DFIR processes.
Provide guidance during access reviews, role audits, and trust relationship validation.
Requirements:
4+ years of experience in security, with at least 23 years focused on cloud IAM, especially in AWS (IAM roles, policies, STS, Organizations, Identity Center, SCPs).
Experience managing IAM in GCP (service accounts, workload identity federation, custom roles).
Solid knowledge of IAM principles: least privilege, zero trust, RBAC/ABAC, identity lifecycle, and access governance.
Familiarity with DFIR in cloud environments: log analysis, alert triage, evidence collection, and investigations.
Hands-on experience with infrastructure-as-code (e.g., Terraform, CloudFormation).
Proficient in scripting (e.g., Python, Bash) for automation and IAM enforcement.
Proven experience collaborating with engineers, SREs, and IT to solve complex identity and access issues.
Excellent English communication skills verbal and written.
Self-starter with strong problem-solving skills and attention to detail.
Bonus Points:
Familiarity with Wiz or similar CSPM/CIEM platforms.
Certified AWS Security Specialty.
Experience in handling or supporting IAM-related incidents (escalations, investigations, remediation).
Experience with cloud-native detection tools (AWS GuardDuty, CloudTrail, GCP SCC, etc.).
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8325830
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 6 שעות
ריקרוטיקס בע"מ
דרושים בריקרוטיקס בע"מ
Location: More than one
Job Type: Full Time and Hybrid work
"As a Security Researcher, your primary focus will be on the inner workings of IOS and Android operating systems. Youll dive into codebases, analyze security mechanisms, and identify potential vulnerabilities.
In addition, youll work collaboratively with the team to develop protective strategies and contribute to ongoing innovations in mobile app security.
This role requires a keen analytical mind, a passion for research, and a drive for continuous improvement in the mobile security domain. Join us in shaping secure solutions for the future of mobile apps.

What will you do?
Undertake detailed low-level research on Android and IOS platforms.
Conduct reverse engineering on a wide variety of devices running IOS / Android to gain deeper insights into their system.
Requirements:
At least 2 years of experience in reverse engineering of large system /OS, preferably with IDA
At least 2 years of experience in C / C ++ programming
OS Internals/Low Level/ Kernel experience
Eager to take on challenging tasks
Curious and quick to learn on your own
Team player with good interpersonal skills
Advantages:
Experience in vulnerability research
Familiarity with assembly and ARM instruction set
Mobile apps development experience
Low-Level experience in IOS or Android
This position is open to all candidates.
 
Show more...
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8333316
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
CodeValue is looking for a skilled and experienced Security Architect to join our team and take a leading role in designing, implementing, and governing the security posture of our cloud and enterprise environments. This individual will work closely with cross-functional teams to ensure security is embedded across systems, applications, and workflows, aligning with industry best practices and compliance requirements.
Requirements:
Mandatory Qualifications
* At least 3 years of experience as a Security Engineer.
* Understanding of the Shared Responsibility Model
* In-depth knowledge of securing at least one cloud platform: AWS / Azure / GCP
* Understanding of Landing Zone and Well-Architected Best Practices
* Expertise in IAM (Identity and Access Management) network security (VPC, SG, FW).
* Experience in writing cloud policies (e.g., SCP Monitoring and logging (CloudTrail, GuardDuty, Security Hub).
* Strong understanding of general information security: security principles, encryption, risk management, incident response
* Scripting languages: Python / Bash / PowerShell
* Experience in configuring WAF Infrastructure as Code (IaC): Terraform / CloudFormation Preferred Qualifications:
* Experience in Kubernetes and container security Data security (encryption, KMS ), securing cloud services (e.g., EC2, Lambda, Containers
* Relevant certifications: AWS Certified Security – Specialty, Azure Security Engineer, CCSP (strong advantage).
* Familiarity with DevSecOps and code security tools (SAST/DAST)
* Experience with CSPM tools (e.g., Wiz, Orca Security, Prisma Cloud).
* Familiarity with SIEM tools (Splunk, Sentinel) and investigation capabilities.
* Experience securing Microsoft 365 services and Google Workspace
* Understanding of regulations and standards (GDPR, ISO 27001). Personal Skills Hands-on approach. Strong interpersonal communication skills and teamwork capabilities. High-level English proficiency.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8235613
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
Location: Herzliya
Job Type: Full Time
Were looking for a Cybersecurity Threat Detection & Response Engineer to lead and grow this critical function as part of our expanding security team. This role will focus on evolving detection engineering, incident response, and security automation capabilities to support our growing organization and evolving threat landscape.

Youll join a mature and collaborative environment where foundational work has already been laid, and you'll have the opportunity to advance how we detect, investigate, and respond to threats - with the support of strong cross-functional partnerships and best-in-class tools.

RESPONSIBILITIES

Detection Engineering
Develop, tune, and maintain detection rules, correlation logic, and alerting workflows within our SIEM.
Integrate high-quality telemetry from cloud environments, infrastructure, SaaS applications, and internal systems.
Collaborate with Engineering and DevOps to improve visibility, signal-to-noise ratio, and logging coverage.
Automation & Enrichment
Design and implement enrichment and response automation (e.g., SOAR platforms, serverless functions).
Explore and integrate LLM-based agents or AI-enhanced triage/classification tools where practical.
Continuously improve response playbooks, integrations, and automation pipelines.
Incident Response Leadership
Serve as the operational lead for security incident response, from triage through resolution and post-incident review.
Maintain and evolve IR runbooks; lead tabletop exercises to strengthen organizational readiness.
Coordinate investigations across Security, Engineering, GRC, IT, and Legal as needed.
Metrics & Reporting
Own and continuously improve dashboards and reporting that track key detection and response KPIs (e.g., MTTR, detection coverage, false positive rates).
Deliver data-driven insights to security and engineering leadership to inform strategy and operational improvements.
Case Management
Take responsibility for the case management lifecycle across detection, triage, and incident handling.
Ensure the incident handling process is tightly integrated with automation, documentation standards, and relevant security tooling.
Evaluate opportunities to enhance case tracking infrastructure in alignment with program growth and maturity.
Collaboration & Growth
Partner cross-functionally with teams in Engineering, DevOps, IT, Privacy, and GRC.
Support ongoing vendor relationships and bring a continuous improvement mindset to tooling and processes.
Requirements:
5+ years in a threat detection, SOC, or incident response role in a cloud-native environment.
Strong hands-on engineering experience with SIEM tools (e.g., Sumo Logic, Sentinel, Splunk, ELK).
Solid scripting and automation skills (Python preferred); familiarity with SOAR platforms or cloud-native functions (Lambda, GCP Cloud Functions).
Deep understanding of cloud environments (AWS/GCP), logging, and security telemetry.
Experience managing real-world incidents in production systems.
Experience managing or enhancing security case management processes and tooling.
Familiarity with AI/LLM tools applied to security - a plus.
Hands-on experience with technologies supporting web application protection, fraud detection, behavioral analytics, and automated threat mitigation (e.g., Cloudflare, AWS WAF, Akamai, Imperva, ThreatMetrix) - a plus
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8332140
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
Data has never been more valuable and vulnerable. As cybercriminals become more sophisticated and regulations more strict, organizations struggle to answer one key question: Is my data safe?"
At our company, we see the world of cybersecurity differently. Instead of chasing threats, we believe the most practical approach is protecting data from the inside out. Weve built the industrys first fully autonomous Data Security Platform to help our customers dramatically reduce risk with minimal human effort.
At our company, we move fast. Were an ultra-collaborative company with brilliant people who care deeply about the details. Together, were solving interesting and complex puzzles to keep the worlds data safe.
We work in a flexible, hybrid model, so you can choose the home-office balance that works best for you
Position Overview:
our company's MDR team is at the forefront of worldwide data detection and response services. We lead and redefine how data should be monitored, and protected and how data breach incidents should be handled. Its a 24/7 global security service assisting customers to investigate and respond to security incidents.
We are seeking an experienced MDR Team Lead who will oversee a team of MDR Security Analysts. This oversight includes training and developing the knowledge and skills needed to execute the MDR mission, ensuring adherence to all operating policies and procedures, ensuring the delivery of the MDR service within all SLAs, and serving as a point of technical and operational escalation for MDR analysts. Data is the #1 target of attackers, and our company's Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. MDR Team Leads are the lynchpin of MDR operations, ensuring the team is working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs.
Responsibilities:
Technical and operational escalation point for investigations, incidents, and other elements of the MDR service.
Assist in the development, documentation, analysis, testing, and modification of our companys threat detection systems, playbooks, runbooks, and MDR team operations.
Continuously train the team so they are equipped with the required skills and knowledge to effectively execute the MDR service.
Validate findings and coordinate investigative efforts with customers and internal teams.
Ensure all investigative findings are documented and communicated appropriately by the team, including tracking in CRM.
Maintain up-to-date knowledge of all aspects of our company's MDR service.
Oversee and execute programs, projects, operational tasks, and responsibilities related to the MDR service.
Conduct regular performance reviews and quarterly SWOT analyses to drive team growth and development.
Requirements:
Proven success in leading and managing within a team-oriented environment.
4+ years of experience working in cybersecurity operations in a global cybersecurity company
2+ years of experience leading a team.
Degree or certification(s) in cybersecurity and/or proven ability to execute across cybersecurity operations disciplines, including monitoring, detection, investigation, and incident response.
Proven ability to deliver security operations service while meeting SLA and other operational requirements.
Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM).
Proven ability to creatively problem-solve when handling complex issues.
Strong analytical and critical thinking skills.
Excellent communication skills in English (written and oral) and interpersonal skills (direct reports, colleagues, and customers).
Attention to detail and the capability to deliver outcomes autonomously.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8306565
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time
we are at the forefront of worldwide data detection and response services. We lead and redefine how data should be monitored, and protected and how data breach incidents should be handled. Its a 24/7 global security service assisting customers to investigate and respond to security incidents.
A Senior (Level 3) Security Analyst within our MDR team is expected to serve as their teams technical lead and a key escalation point for complex security incidents.
In your role, you will lead complex investigations, working directly with customers by assisting them in investigating and responding to security incidents.
As a senior staff in your team, you are expected to mentor junior analysts, and drive continuous improvement of our detection and response capabilities. You will collaborate with internal and external stakeholders, and ensure best practices are followed across monitoring, detection, and incident response processes. This position requires a strong foundation in cybersecurity operations, a deep understanding of SIEM technologies and log sources, as well as the ability to train and document processes for others.
Responsibilities:
Incident Escalations & Investigations
Serve as an escalation point for security alerts and incidents, ensuring timely and thorough investigations.
Perform end-to-end incident handling, including scoping, containment, and eradication activities.
Coordinate and communicate with customers, leadership, and other stakeholders throughout the incident response lifecycle.
Understand, interpret, and analyze a diverse range of log sources (Exchange Online, Entra, Active Directory, Windows events, Azure, DNS, VPN, etc.).
Proactively identify potential threats and anomalies, recommending and implementing improvements in detection logic.
Training & Mentorship:
Assist in training and upskilling junior and mid-level analysts, including sharing best practices in investigations, threat hunting, and emerging threats.
Provide guidance in troubleshooting escalated issues, ensuring efficient knowledge transfer and professional growth within the team.
Contribute to the development, documentation, analysis, testing, and modification of threat detection systems and playbooks.
Provide feedback on gaps or improvements needed in processes, documentation, or technology.
Work closely with Team Leads and other senior staff to align on operational goals, SLA adherence, and service delivery standards.
Communicate findings, root causes, and recommended actions to both technical and non-technical stakeholders clearly and effectively.
Share insights and best practices with the broader team, championing a culture of continuous learning.
Requirements:
3+ years of experience in cybersecurity operations (monitoring, detection, investigation, and incident response) at a global cybersecurity company.
Advanced knowledge of SIEM technologies, including log collection, analysis, and correlation.
Expertise with various log sources (Exchange Online, Entra, Active Directory, Windows Events, SharePoint_0365, Azure, Syslog, DNS, OneDrive, VPN) and the ability to interpret and analyze these logs for security incidents.
Strong understanding of authentication protocols, both modern and legacy (Kerberos, NTLM).
Proven ability to handle escalations from end to end, including incident scoping, containment, eradication, and post-incident activities such as lessons learned and documentation.
Excellent communication skills in English (written and oral) to interface effectively with customers, peers, and leadership.
Ability to mentor and train junior analysts, providing feedback and sharing best practices.
Strong analytical and problem-solving skills, with an eye for detail and the capability to deliver autonomously.
Familiarity with common security tools and technologies, such as EDR, AV, DLP, DSPM, PAM, IAM, firewalls, and IDS/IPS.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8306556
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
17/08/2025
Location: Herzliya
Job Type: Full Time
Data has never been more valuable and vulnerable. As cybercriminals become more sophisticated and regulations more strict, organizations struggle to answer one key question: Is my data safe?"
At our company, we see the world of cybersecurity differently. Instead of chasing threats, we believe the most practical approach is protecting data from the inside out. Weve built the industrys first fully autonomous Data Security Platform to help our customers dramatically reduce risk with minimal human effort.
At our company, we move fast. Were an ultra-collaborative company with brilliant people who care deeply about the details. Together, were solving interesting and complex puzzles to keep the worlds data safe.
We work in a flexible, hybrid model, so you can choose the home-office balance that works best for you.
Responsibilities
Team Leadership
Lead and mentor a team of top notch cloud security researchers.
Foster a culture of innovation, collaboration, and excellence within the team.
Provide technical guidance and support to team members.
Research and Development
Conduct advanced research in cloud security, focusing on emerging threats, vulnerabilities, and mitigation strategies.
Analyze logs and behavior of user activities on Cloud Environments & SaaS Applications
Hunt threat actors & insider threats
Optimizing existing algorithms to reduce false positives and increase the value of our products
Lead the publications of cyber security oriented blogs and articles
Drive the development of new security technologies and methodologies for cloud environments.
Stay updated with industry trends and advancements in cloud security.
Collaboration:
Collaborate with product management, engineering, and other stakeholders to implement your team latest research
Work closely with development teams to integrate security features into our product
Communicate research findings and recommendations effectively
Security Strategy:
Contribute to the development and implementation of cloud security strategies and policies
Assess and mitigate risks associated with cloud deployments and operations.
Ensure compliance with industry standards and regulations related to cloud security.
Requirements:
Cybersecurity professional with 5+ years experience as on-prem/cloud security researcher
Proven experience in leading technical teams and driving research projects with 2+ years management experience.
Knowledge and experience researching IaaS platforms like AWS, Azure or GCP (advantage)
Knowledge and experience researching SaaS and IDP platforms (advantage)
Experience with identifying and analyzing trends or patterns related to security incidents and abnormal behaviors
In-depth understanding of an organizations security, risks, and potential attack vectors in all the organizations perimeters
Understanding security issues, attack vectors, and related security trends
Strong knowledge of SQL language
3+ years of Hands-on experience in programming and scripting (C++/Python)
Passion for conducting Value-to-customers-driven research
Must possess strong verbal & written communication skills in English
Problem-solving skills in an effective and creative way while maintaining a prominent level of flexibility
Experience with data analysis of large data sets.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8307010
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/08/2025
חברה חסויה
Location: Herzliya
Job Type: Full Time and Hybrid work
we are looking for a Cyber Security Expert with hands-on experience in offensive security, possessing strong technical capabilities, in-depth knowledge of adversary simulation, and a passion for Red Team operations.
Responsibilities:
Participate in Red Team assessments that simulate real-world threats and remain undetected by the client's defensive team. These stealth operations simulate advanced adversaries and require careful planning, execution, and OPSEC
Lead or co-lead portions of internal and external offensive assessments, including perimeter exploitation and post-exploitation in Active Directory
Perform Purple Team engagements to help clients improve their monitoring and detection capabilities while sharpening your own offensive skills
Document attack paths, risk analysis, technical findings and remediation guidance in detailed reports tailored to both technical and executive audiences.
Collaborate with the team to develop and maintain internal tooling, scripts, and documentation for offensive operations
Continuously research and test new techniques, tools, and attack paths to further enhance Red Team capabilities
Requirements:
2+ years of hands-on experience in offensive security, red teaming, or penetration testing
Hands-on experience with C2 frameworks (e.g., Cobalt Strike, Mythic, Sliver)
Strong understanding of Active Directory, domain escalation paths, Kerberos, trust relationships, GPO abuse, credential access, etc.
Proficiency in various offensive techniques such as Relay Attacks, Coercion, Kerberos Attacks, Privilege Escalation, etc.
Familiarity with network protocols (e.g., SMB, DNS, LDAP, HTTP) and system internals (Windows and Linux)
Strong understanding of OPSEC considerations during covert operations
Ability to present and produce clear and actionable technical reports and documentation in English
Experience working in client-facing roles or as part of structured engagements
Proficient in one or more scripting/programming languages: Python, PowerShell, C#, or C++
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8320510
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/08/2025
Location: Herzliya
Job Type: Full Time and Hybrid work
we are looking for a Junior Cyber Security Specialist with a deep interest and basic knowledge of both information security and computer science.
we are a cybersecurity firm specializing in advanced adversary simulation and offensive security testing.
We deliver Red Team assessments for Fortune 500 companies, simulating sophisticated, real-world attacks across external, internal, cloud and Active Directory environments. Our services span both stealth-based Red Team operations and risk-focused assessments, covering a wide range of attack surfaces including on-premise and cloud environments.
Responsibilities:
Participate in Red Team and Risk assessments under the guidance of senior team members
Assist in documenting findings, writing technical reports, and contributing to final deliverables for clients
Learn and simulate attacker tactics, techniques, and procedures (TTPs)
Support Risk Assessments, where the objective is to identify vulnerabilities, especially in Active Directory, without the requirement for stealth. These engagements provide deep insight into systemic weaknesses and offer high exposure to internal infrastructure.
Contribute to external assessments, such as, perimeter testing, and reconnaissance
Participate in internal, hands-on training program, which covers red team TTPs, tool usage, internal methodologies, and real-world scenarios
Requirements:
Strong interest in offensive security and Red Team methodologies
Foundational understanding of Active Directory architecture, domain trust, Kerberos, GPOs, and domain privilege structures
Familiarity with network protocols such as SMB, LDAP, DNS, and HTTP
Knowledge of common attack techniques such as enumeration, privilege escalation, exploitation, credential dumping and C2 operations
Ability to write or assist in technical documentation and reporting in English
Comfortable working in a collaborative environment and eager to learn from experienced team members
Experience with security tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools
Comfortable with basic scripting and using CLI tools
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8320496
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
04/08/2025
Location: Herzliya
Job Type: Full Time
Required Principal Security Engineering Manager
The Cloud & AI organization accelerates our mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. We are one of the largest enterprise service companies in the world.
Our Red team is launching the AI Adversary Lab (AIAL) in ILDC, a new extension of the U.S.based Red Team, to address the growing threat of AI-enabled adversaries through deep engineering and applied research. The team will comprise approximately 10 people, split between engineering and research, with an extreme focus on AI Security. This is a manager position focused on building this team that will establish you as a leader in AI Security.
Your team will have two groups: an engineering group and a research group reporting up to the Red Team. The engineering group will collaborate with U.S.-based Red Team engineers to enhance and scale an AI-driven adversary emulation platform that we use to protect us. The research group will analyze our AI infrastructure, especially Azure AI services, to identify risks and improve resilience. Both groups will work together under your leadership, building solutions and identifying vulnerabilities for further research.
We are looking for a Software Engineering and Research Manager to lead AIAL under the Red team. In this role, you will grow and lead a high-performing team of engineers who are building and evolving the next generation of AI-based red teaming tools. Youll work closely with Red Team operators, global defenders, and peer teams in the U.S. including MSTIC and GHOST.
Our mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
In alignment with our values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
Responsibilities
Lead and support a team of software engineers building AI-enhanced adversary emulation tools
Partner with U.S.based Red Team engineering counterparts to improve and scale our existing AI platform
Collaborate with the local research team to integrate infrastructure vulnerabilities into automated test campaigns
Align closely with Red Team operators, MSTIC, and GHOST to capture attacker TTPs and turn them into automated, scalable simulations
Maintain a strong engineering culture focused on security, reliability, and innovation
Mentor, develop, and grow your team with a focus on clarity, purpose, and career growth
Drive meaningful impact in our security posture through continuous adversary simulation.
דרישות:
You have at least 15+ years of professional software development experience
You have experience with managing technical engineering teams
Ability to hire and mentor highly technical engineers
Experience building distributed systems or AI-enabled services in production
Familiarity with attacker tradecraft and adversary emulation methodologies
You are Experience in the security domain. 
Preferred
Experience with Red Team operations or offensive security tooling
Knowledge of large language models, agent-based systems, or AI-native security applications
Strong proficiency in modern programming languages (e.g., Python, C#) and cloud-native architectures (especially Azure)
Proven ability to lead technical efforts in high-impac המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8288352
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
חברה חסויה
Location: Herzliya
Job Type: Full Time
We are looking for a Security Researcher.
As a Security Researcher, you will:
Be a part of the OPSEC department which is in charge of research, design, development and enforcement of advanced OPSEC solutions
Be in charge of the operational security research of a cyber intelligence product
Conduct advanced analysis of operating system internals, including binary and architectural evaluation, security testing and exploit mitigation research
Define product requirements, alert mechanisms and working procedures
Requirements:
Strong knowledge of operating system internals
At least 2 years of experience in one or more of the following areas: malware research, mobile forensics or vulnerability research
At least 2 years of experience with advance static and dynamic analysis tools (e.g., IDA Pro, Ghidra, Radare2, Binary Ninja, Hopper or similar tools)
At least 2 years of experience with ARM64 assembly and low-level debugging (e.g., LLDB, GDB)
Software development skills in at least one programming language: Objective-C, swift, C/C++
B.Sc. in a technological field or a relevant IDF background
Ability to work independently and as a part of a team
It would be great if you also have:
Familiarity with mobile security testing methodologies and security hardening techniques
Experience with network analysis tools, such as Wireshark, Fiddler and Burp
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8326091
סגור
שירות זה פתוח ללקוחות VIP בלבד