דרושים » תוכנה » Staff Vulnerability Researcher - Office of the CTO

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 14 שעות
Location: Tel Aviv-Yafo
Job Type: Full Time
The Staff Vulnerability Researcher will be involved with researching existing vulnerabilities, looking for new vulnerabilities, and developing checks/plugins to detect these vulnerabilities via our products. This role will involve some interfacing with stakeholders outside the Research team.

Your Opportunity:
Works on complex research and development initiatives.
Implements advanced detection logic while minimizing false positives & false negatives.
Participates in detection logic discussions and the research of new methods for detection.
Interfaces with stakeholders on externalizing the outcomes of some of the research.
Helps / trains other researchers, when needed.
Keep abreast with the advancements and developments in the security industry and perform original research to keep our customers secure.
Develop detection scripts for our sensors (Nessus vulnerability scanner and others) based on the research findings.
Research and develop methods of detection for additional services and products from different vendors.
May perform other duties and responsibilities that management may deem necessary from time to time.
Requirements:
B.S. degree in Computer Science or a related field, or equivalent work experience.
At least 5 years of R&D experience.
In depth understanding of common security vulnerabilities, CVSS scoring, vulnerability classification, detection and exploitation techniques.
In-depth protocol analysis and interaction. Expert level knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Some prior experience performing open-ended research when given high-level requirements and details of the desired output.
Experience with pen-testing, researching, discovering, or publishing vulnerabilities.
Reverse engineering experience including basic binary analysis, packet capture analysis, and firmware analysis (using binwalk). Prior experience with debuggers, disassemblers or decompilers (e.g. IDA Pro, Immunity Debugger, gdb).
Experience with C or C++, Assembly (x86/x64 and/or ARM/ARM64) and / or scripting languages.
One or more security related certifications (e.g. OSCP).
At least a years experience with Nessus Sensor and working with the NASL language.
An understanding of NASL coding standards.
Prior experience performing open-ended research when given high-level requirements and details of the desired output.
Some experience with reviewing code and providing feedback.
Experience with understanding and implementing RFC standards and protocols.
Experience with Python programming language.
Experience with systems administration and be comfortable working at the command line.
In depth understanding of common security vulnerabilities, CVSS scoring, vulnerability classification, detection and exploitation techniques.
In-depth protocol analysis and interaction. Expert level knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Some prior experience performing open-ended research when given high-level requirements and details of the desired output.
Some exposure to security standards such as NIST 800-53, CIS, or DISA STIGS.
In-depth protocol analysis and interaction. Solid knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Experience with crash dump analysis and exploit development.
Experience writing blogs and whitepapers to showcase research as well as presenting at security conferences.
Ability to sit and work at a computer for extended periods of time.
Some travel may be required.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8610120
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
we are seeking a highly motivated and talented XDR Research Engineer to join our XDR Research team. In this role, you will develop advanced detection logic to identify and analyze security threats across the company XDR platform. Leveraging the rich data available in the company Cloud data lake, you will conduct extensive research and threat-hunting activities to broaden our detection capabilities and proactively uncover previously unknown threats.
Your work will directly influence the evolution of our companys XDR capabilities and strengthen the security posture of thousands of global customers.
This is an exceptional opportunity for security professionals passionate about Network Security, Detection Engineering, Malware Analysis, and Threat Hunting who want to make a meaningful impact on a fast-growing cybersecurity environment.
Responsibilities
Develop advanced detection logic for the XDR platform to identify security threats.
Conduct research using our company Cloud data, competitive intelligence, and newly published threat reports to expand detection coverage.
Create hunting heuristics and methodologies to uncover unknown or emerging threats.
Continuously improve detection accuracy and enhance the platforms ability to identify threats in a dynamic security landscape.
Participate in cybersecurity breach investigations and security incident activities.
Contribute to technical blogs and PR materials, and participate in cybersecurity conferences.
Requirements:
Proven hands-on experience in the cybersecurity industry, specifically in XDR\SIEM platforms (2+ years)
Comprehensive understanding of the cybersecurity landscape, common threats, and attack scenarios, such as malware infections, command and control (C&C) communication, drive-by attacks, phishing, and network scans
Practical experience with security technologies, including firewalls (FW), intrusion prevention systems/intrusion detection systems (IPS/IDS), antivirus (AV), endpoint protection, and network forensics tools
Strong knowledge of networking architecture and protocols, including TCP/IP, DNS, SSL, SMB, HTTP, IP Routing, etc.
Analytical mindset, capable of formulating hypotheses and validating them through in-depth analysis and technical evidence
Good written and verbal communication skills in English.
Proficiency in at least one scripting language such as Python or Ruby
Ability to work effectively as a team player, demonstrating responsibility and strong organizational skills
Education
Advantage - BSc. in Computer Science, Information technology, Mathematics or similar.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598175
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Senior Security Researcher to drive high-impact research across cloud, runtime, and application environments, and translate it into product-grade detections. This is a hands-on role for someone who can lead investigations end-to-end: from understanding attacker tradecraft and vulnerabilities, through building reliable detection logic, to influencing product direction.
On a typical day youll:
Lead deep-dive research into real-world attacks, vulnerabilities, and emerging cloud and runtime techniques
Own complex investigations (DFIR, threat hunting, root-cause analysis) and convert learnings into durable detections
Design and implement advanced detection logic and analytics across cloud assets, containers, Kubernetes, and Linux runtime telemetry
Build prototypes and production-ready components that improve detection accuracy, fidelity, and coverage
Partner closely with engineering and product to shape roadmap priorities and guide implementation details
Develop research methodologies, testing frameworks, and validation processes for new detections
Mentor and level up other researchers and engineers through reviews, knowledge sharing, and technical guidance
Represent the team externally through publications, technical blogs, and conference talks.
Requirements:
7+ years of experience in security research, detection engineering, incident response, or comparable hands-on security roles
Demonstrated expertise in at least two of the following areas (and working knowledge in the others):
Linux internals / operating systems fundamentals
Cloud security (AWS/Azure/GCP), including common attack paths and misconfiguration patterns
DFIR, threat hunting, and investigation workflows using telemetry and logs
Vulnerability research or vulnerability management at scale (triage, prioritization, exploitation understanding)
Application and API security fundamentals
Strong programming skills in Python (Go is a strong plus); ability to produce maintainable research code and production logic
Strong data skills: comfortable working with large telemetry datasets (SQL and log analytics platforms such as Elastic or similar)
Ability to reason about attacker behavior, build threat models, and validate detections with repeatable testing
Excellent written and verbal English communication, including the ability to explain nuanced technical tradeoffs to non-research audiences
Track record of driving cross-team execution and shipping impactful security capabilities
Nice to have:
Experience with Kubernetes and container runtime security
eBPF or low-level telemetry approaches, syscall or kernel-level visibility
Reverse engineering and malware analysis
Offensive security background (web, cloud, exploit development)
Contributions to open-source security projects or published research
Experience using automation or AI-assisted techniques to scale research and detection workflows.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588592
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for Principal Cloud Security Researcher with a strong security background to join our innovative Research team.
The Role
We're looking for a Principal Cloud Security Researcher to serve as a senior technical leader within our Research team. This is a high-impact individual contributor role -- you won't manage people, but you'll shape the direction of our entire research function, mentor researchers, and act as a force multiplier across the organization.
You'll be the person who takes a vague threat signal and turns it into a detection strategy, a published finding, or a product capability. You'll operate as a trusted deputy to the research team lead, owning the most complex and ambiguous research challenges while raising the technical bar for the team.
What You'll Do
Drive Groundbreaking Research
Own and drive our most critical research initiatives end-to-end - from initial threat hypothesis through detection logic, product integration, and external publication.
Set the technical direction for cloud threat research across AWS, Azure, and GCP, identifying emerging attack surfaces and novel techniques before they become mainstream threats.
Investigate real-world cloud and SaaS security incidents, dissecting attacker tradecraft and extracting insights that evolve our detection capabilities.
Pioneer new forensic investigation techniques and detection methodologies for cloud-native and SaaS environments - pushing the state of the art, not just following it.
Be a Voice in the Community
Represent our company as a thought leader through high-quality research publications, conference presentations (BlackHat, DEF CON, RSA, fwd:cloudsec, and similar venues), and open-source contributions.
Build and maintain our reputation as a research-driven company that advances the field - not just a vendor with a blog.
Engage with the broader security research community, fostering relationships and collaborative knowledge-sharing.
Shape the Product
Bridge research and product - translate threat findings into actionable product requirements, working closely with engineering and product teams to ensure our CDR platform stays ahead of evolving threats.
Design and develop advanced detection algorithms that directly feed into our platform, closing the gap between research insight and customer protection.
Elevate the Team
Act as the team's go-to technical authority. When researchers hit a wall on complex cloud attack chains, IAM edge cases, or detection gaps - you're who they turn to.
Mentor and grow other researchers through research reviews, pair investigations, code reviews, and by setting quality standards and methodology best practices.
Influence technical decisions org-wide - contributing to architecture, tooling, and strategic research priorities.
Step in as the research team lead's deputy when needed - driving prioritization, representing research cross-functionally, and ensuring continuity.
Requirements:
Who You Are
8+ years in security research, threat research, or closely related fields (offensive security, detection engineering, incident response, cloud security engineering). Fewer years are fine if your depth and track record are exceptional.
Deep multi-cloud expertise - strong hands-on experience across at least two of the major cloud providers (AWS, Azure, GCP), with working knowledge of the third. You understand the IAM models, logging pipelines, APIs, and attack surfaces that matter in each.
A track record of original research - you've published meaningful technical findings through blog posts, conference talks, open-source tools, or vulnerability discoveries that moved the needle. We want someone who doesn't just consume research - you produce it.
Strong adversarial mindset and critical thinking - you think like an attacker targeting cloud infrastructure, SaaS platforms, identity systems, and Kubernetes. You can model threat scenarios, map out attack paths, and poke holes in defenses.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606762
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - Risk Researcher to join our highly technical product research team working at the core of our cloud security platform. This is a rare opportunity to join an elite cloud security research team and do work that directly shapes our product. In this role, you will define how cloud risk is understood and modeled, lead the development of novel risk logic and scoring methodologies, and translate complex attack paths into meaningful insights for customers.

You will conduct deep technical research across cloud environments to uncover new attack vectors, analyze real-world exploitation paths, and contribute to building a unified view of risk across identity, infrastructure, and data layers. Your work will directly influence how we prioritize risk, reduce noise, and establish a clear ground truth for what truly matters in cloud security.

We are looking for an exceptional, adversary-focused researcher who can bridge cloud security knowledge, threat modeling, and data-driven risk analysis. You are curious, comfortable with ambiguity, and driven to deeply understand how attackers operate in modern cloud environments.

Your Opportunity:

Own Risk Across our Cloud Security Platform: Define cloud risk by grounding findings in how exposure is actually created and exploited. Collaborate with engineering and product teams to introduce new data sources and signals that validate exposure. Establish a rigorous validation framework for risk logic to minimize noise and ensure high-fidelity alerts. Define the 'Ground Truth' for what constitutes a critical risk versus a theoretical vulnerability.
Lead Novel Toxic Combination Logic: Conduct deep technical research to discover novel risks and attack vectors across identity, network, workload, and third-party data to produce attack paths. Work with teams across us to develop and refine the quantitative scoring models that aggregate disparate signals (e.g., CVSS, EPSS, identity permissions) into a unified risk score.
Lead Complex Discovery: Build resource, identity, and permission relationships to improve our asset inventory and relationship modeling. Understand customers requirements and ensure deliverables address real needs.
Conduct Cloud Threat Modeling: Analyze services and architectures from an attackers perspective to define trust boundaries and data flows, and ensure the product covers newly identified attack paths. Present findings in blogs, reports, and leading industry conferences.
Research Emerging Cloud Services: Evaluate new cloud services to establish secure configuration and architectural best practices where no prior guidance exists, and partner with PMs to deliver them through the platform.
Shape Cloud Security Strategy: Provide a broad technical view across cloud domains to identify strategic gaps and drive product direction and features.
דרישות:
What You'll Need:
5+ years of hands-on experience in security research.
Deep understanding of attacker mindset, tradecraft, and real-world exploitation techniques. , with a strong focus on exploitation and adversary-driven analysis.
Strong technical background in cloud platforms (AWS, Azure, GCP), including how attackers operate within cloud environments.
Proven experience designing, building, or validating detection logic.
Highly curious, self-driven, and comfortable working in ambiguous, fast-evolving problem spaces.
Strong communication skills, both written and verbal, with the ability to clearly articulate complex technical findings.

And Ideally:
Experience designing or investigating cloud attack paths and complex toxic combinations across services and identities.
Background in offensive security, penetration testing, or red teaming.
Experience with detection languages or frameworks (Rego, Sigma, YARA or similar).
Track record of published research, conference talks, or technical blog posts.
Experience working with product teams and delivering value to customers המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606425
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
31/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Researcher who thrives on both sides of the fence. You will develop offensive tradecraft-discovering new attack vectors and writing exploits-then use that perspective to engineer robust, product-level mitigations. If youre energized by finding a novel browser attack on Monday and shipping the defense for it by Friday, this role is for you.
Key Responsibilities
Offensive Research: Discover new attack vectors, abuse patterns, and security gaps in browsers, web applications, OS internals, and enterprise workflows.
Defensive Engineering: Design and implement detections, mitigations, and security policies informed by your offensive findings; close the loop from attack to protection.
Vulnerability & Malware Analysis: Perform reverse engineering on malware, exploits, and obfuscated code across Windows, macOS, and browser environments.
Web & Browser Security: Research techniques ranging from classic vulnerabilities (XSS, SSRF) to browser-specific primitives (extension abuse, DOM manipulation, same-origin bypasses).
Supply-Chain Security: Investigate threats in software supply chains, including browser extension marketplaces and package registries.
Threat Intelligence: Correlate signals across multiple sources to identify malicious infrastructure and adversary TTPs.
Public Impact: Write technical blog posts, publish research, and represent Island at major security conferences (Black Hat, DEF CON, etc.).
Requirements:
5+ years of experience in at least one of the following: security research, vulnerability research, malware analysis, threat intelligence, or detection engineering
Offensive security mindset with the ability to flip to the defensive side - finding attacks and building mitigations
Strong analytical skills - comfortable digging into unfamiliar code, protocols, or systems and figuring out how they break
Familiarity with operating system internals (Windows and/or macOS)
Hands-on experience with reverse engineering or dynamic/static analysis tools
Ability to write code for automation, tooling, and proof-of-concepts
Strong written and verbal communication - ability to write compelling research and present at conferences
Nice to have:
Solid understanding of web and browser security fundamentals
Experience with browser internals or browser extension security
Background in endpoint security, EDR, or DLP
Experience with static analysis tools (Semgrep, CodeQL, Joern, or similar)
Knowledge of software supply-chain attack patterns
Published security research - blog posts, CVEs, or conference talks (Black Hat, DEF CON, BSides, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598944
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
Designs, develops, troubleshoots and debugs software programs for enhancements and new products. Develops software and tools in support of designs. Analyzes, designs, programs, debugs, and modifies software enhancements and/or new products used in local, networked, cloud-based or Internet-related computer programs. Using current programming language and technologies, writes code, completes development, and performs testing and debugging of applications.

Your Opportunity:
Expertly implements designs using modern programming practices.
Obsessed with quality.
Eager to learn.
Should lead/drive software development initiatives.
Participates in/leads design.
May perform other duties and responsibilities that management may deem necessary from time to time.
Requirements:
What You'll Need:
B.S. degree in Computer Science or a directly related field, or equivalent work experience.
5+ years of software development experience in the [primary programming language used by the team].
Must have a strong initiative and the ability to work both in a self-directed manner and as part of a team.
Mentor software engineers on the team.
Strong written and verbal communication skills.
Strong understanding of a full software development life cycle (SDLC): requirements analysis, design, estimation, development, quality control and unit testing.
Ability to sit and work at a computer for extended periods of time.
Some travel may be required.

Additional Desired Skills:
Experience with multi-threaded and network programming.
Object-oriented development experience with languages such as C++.
Experience developing cloud-based applications for use in Public Cloud environments.
Application development experience on Unix/Linux (Windows a plus).
Strong understanding of design patterns and data structures.
In-depth knowledge of TCP/IP protocols, and Unix internals.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606438
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - AI Security to join our highly technical product research team working at the core of our cloud security platform. This is a rare opportunity to define a new discipline. AI security is an emerging field with few established playbooks, and you will help write them. In this role, you will own the research direction for AI security across Tenable's platform, uncovering novel risks in AI-native systems and translating that knowledge into product capabilities and industry-leading research. You'll be surrounded by experienced researchers and engineers who live and breathe security, with the space and backing to do original work in a domain that is rapidly evolving.
We're looking for an exceptional security researcher who can navigate ambiguity, think like an attacker, and bring clarity to a space that lacks it. You're curious, technically deep, and energized by the challenge of defining risk in systems that are still being understood.

Your Role:

Be at the forefront of an emerging discipline. Conduct technical analysis of AI frameworks, services, and architectures to discover novel risks, vulnerabilities, and attack vectors before they become industry-wide problems .
Define AI security risk by analyzing how exposure is created and exploited in AI systems. Collaborate with engineering and product teams to translate AI research into product findings.
Evaluate the risk of pre-trained models, vector databases, and orchestration frameworks (e.g., LangChain, LlamaIndex) to define how shadow AI creates organizational exposure.
Author blogs, whitepapers, and technical advisories that set the industry narrative. Present original research at leading conferences and serve as Tenable's external voice on AI risk topics.
Analyze AI systems from an attacker's perspective to define trust boundaries, map attack techniques, and identify exploitable paths. Translate findings into product features and outbound research.
Investigate and analyze AI infrastructures and services to find 0-day vulnerabilities, security holes, weaknesses, and design flaws.
Requirements:
What You'll Need:
5+ years of experience in security research, vulnerability research, or offensive security.
Familiarity with OWASP Top 10 for Large Language Model Applications (prompt injection, data poisoning, system prompt leakage).
Ability to analyze complex systems from an attacker's perspective, identify weaknesses and exploit them.
Strong understanding of AI systems, frameworks, and deployment patterns, with proven ability to exploit them.
Proven track record of novel, complex security research in cloud security or application security, with published work (blogs, papers, conference presentations).
Highly motivated, curious, and comfortable navigating unknown territory.
Strong communication skills, written and verbal, with the ability to articulate novel risks and technical findings clearly.

And Ideally:
Experience discovering and disclosing vulnerabilities (CVEs, bug bounty, responsible disclosure).
Experience analyzing systems for data leakage or unintended information exposure.
Solid understanding of cloud platforms (AWS, Azure, GCP) and cloud security concepts.
Experience tracking the evolving AI ecosystem and translating new developments into security research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606389
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
31/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for talented, fast learners to work on vulnerability research and exploitation in embedded and IoT environments. This role is ideal for researchers with strong low-level backgrounds who want to deepen their expertise in IoT and embedded systems security while working on real-world, complex technologies

You will analyze proprietary software and hardware, apply a deep understanding of low-level systems, and take your research from initial discovery to a full end-to-end solution in production.





Requirements
5+ years of experience as a security researcher or industry-equivalent experience.
Understanding of memory corruption (Stack/Heap, UAF) and logical vulnerabilities (Injection, Logic/Design flaws, TOCTOU).
Understanding of common security mitigations such as ASLR, DEP, and CFI.
Expertise in OS internals, file systems, network protocols and cryptography concepts.
Hands-on experience with reverse engineering and debugging tools such as IDA Pro or Ghidra, and GDB.
Proficient in Assembly, C, and Python.
Requirements:
B.Sc. or M.Sc. in Computer Science, Mathematics, or Engineering.
Published research (CVEs, blog posts, or talks).
Experience with RF communication schemes such as WiFi, Bluetooth, GPS
Experience with developing / researching in Android / iOS environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598135
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
we are looking for a high-energy, talented people to join the company Security team. As a Security Engineer, you will take part in product content development and build logics and signatures to mitigate emerging security threats. Your work outcome will feed our company Cloud security products such as the IPS and Suspicious Activity Monitoring with the latest protections. You will analyze protocols and investigate various attacks utilizing network analysis tools and modern data analysis frameworks. Joining our company is an excellent opportunity for network security enthusiasts who are passionate about the future of Networking and Security.
Responsibilities:
Research and analyze new threats and develop product content such as IPS signatures and logic to provide the best protection for our companys customers.
Enhance product accuracy and its ability to detect new threats in the dynamically-changed security landscape.
Monitor your work using different monitoring tools and methods over the cloud.
Utilize our company Data Warehouse with big-data technologies to support your work.
Requirements:
2-4 years of hands-on experience in the cyber-security industry.
Knowledge of networking architecture and protocols (TCP/IP, DNS, SSL, HTTP).
Understand the cyber-security landscape, and common attack scenarios: Malware C&C, Drive-by attacks, Phishing, Network scans, etc.
Experience (Hands-on) with Wireshark and PCAP analysis.
Experience with signature development for IPS and Firewall - Advantage
Experience with at least one scripting language such as Python or Ruby - Advantage
Analytic spirit: define a thesis and validate it based on in-depth analysis and technical facts.
Excellent English and communication skills.
Team player, responsible, and well-organized.
B.Sc.. in Computer Science, Information technology or Mathematics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598186
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
As the Code & AI Security Research Manager, you will lead an elite team in redefining trust for an era of agentic automation and hyper-connected supply chains. You will serve as a technical lighthouse and strategic leader, managing a high-performance team to secure the core of modern engineering. Your mission is to bridge deep technical research with product innovation, ensuring our customers' security posture evolves faster than the way they build software.
Key Responsibilities
Lead, mentor, and empower a team of world-class security researchers to pioneer AI-native security strategies.
Define the vision for identifying and mitigating novel attack vectors targeting coding agents and autonomous development workflows.
Oversee the evolution of traditional code vulnerabilities into proactive, self-healing workflows that fix issues before they reach a pull request.
Drive deep-dive research into software supply chain vulnerabilities, including CI/CD pipeline risks and third-party package security.
Proactively collaborate with Product and Engineering leaders to integrate research findings into core platform detection and remediation logic.
Establish the team as a global thought leader by overseeing original research publications, influential blog posts, and conference presentations.
Requirements:
2+ years of experience in technical leadership or people management, with a proven track record of directing high-impact security research projects.
6+ years of professional experience in application security research, focusing on the security of modern software architectures.
Proven expertise in building AI-powered security solutions or securing AI-driven systems.
Strong understanding of modern software supply chain risks, including CI/CD exploitation and malicious package detection.
Hands-on expertise in both offensive and defensive security, with the ability to translate research into robust product defenses.
Strategic mindset with the ability to navigate the fast-moving AI security landscape and translate complex research into a clear product roadmap.
Preferred Qualifications
Previous experience in a security product company, translating research into scalable product features and detection logic.
Experience leveraging big data platforms (e.g., GCP BigQuery, AWS Athena) to validate security research at scale.
Proficiency in multiple programming languages (e.g., Python, Go, JavaScript) and their pitfalls in AI-generated code.
A portfolio of public-facing work such as CVEs, whitepapers, or talks at major global security conferences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8587395
סגור
שירות זה פתוח ללקוחות VIP בלבד