משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
1 ימים
חברה חסויה
Location: Netanya and Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Researcher to join the team. As a researcher, you will perform security research on open-source projects in both web and low-level technologies. You will define how to identify exploitable security issues in an automated manner and develop code for that purpose.
As a Security Researcher you will...
Research CVEs and 1-day vulnerabilities in various programming languages and ecosystems
Define how to automatically find exploitable vulnerabilities & develop code that identifies the instances where a vulnerability is exploitable
Perform security research on various open-source technologies, frameworks, and libraries
Write technical reports regarding all research subjects mentioned above.
Requirements:
To be a Security Researcher you need...
At least 3 years of experience as a Security Researcher
Vulnerability research experience in any of the following languages: Python, Node.JS, Java, C
Experience with code exploitation (for example, Penetration testing in backend environments or web applications, or binary exploitation)
Programming experience in Python
Experience in writing technical reports
Experience in binary reverse engineering - an advantage
DevOps experience - an advantage.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8625487
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
31/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Security Researcher who thrives on both sides of the fence. You will develop offensive tradecraft-discovering new attack vectors and writing exploits-then use that perspective to engineer robust, product-level mitigations. If youre energized by finding a novel browser attack on Monday and shipping the defense for it by Friday, this role is for you.
Key Responsibilities
Offensive Research: Discover new attack vectors, abuse patterns, and security gaps in browsers, web applications, OS internals, and enterprise workflows.
Defensive Engineering: Design and implement detections, mitigations, and security policies informed by your offensive findings; close the loop from attack to protection.
Vulnerability & Malware Analysis: Perform reverse engineering on malware, exploits, and obfuscated code across Windows, macOS, and browser environments.
Web & Browser Security: Research techniques ranging from classic vulnerabilities (XSS, SSRF) to browser-specific primitives (extension abuse, DOM manipulation, same-origin bypasses).
Supply-Chain Security: Investigate threats in software supply chains, including browser extension marketplaces and package registries.
Threat Intelligence: Correlate signals across multiple sources to identify malicious infrastructure and adversary TTPs.
Public Impact: Write technical blog posts, publish research, and represent Island at major security conferences (Black Hat, DEF CON, etc.).
Requirements:
5+ years of experience in at least one of the following: security research, vulnerability research, malware analysis, threat intelligence, or detection engineering
Offensive security mindset with the ability to flip to the defensive side - finding attacks and building mitigations
Strong analytical skills - comfortable digging into unfamiliar code, protocols, or systems and figuring out how they break
Familiarity with operating system internals (Windows and/or macOS)
Hands-on experience with reverse engineering or dynamic/static analysis tools
Ability to write code for automation, tooling, and proof-of-concepts
Strong written and verbal communication - ability to write compelling research and present at conferences
Nice to have:
Solid understanding of web and browser security fundamentals
Experience with browser internals or browser extension security
Background in endpoint security, EDR, or DLP
Experience with static analysis tools (Semgrep, CodeQL, Joern, or similar)
Knowledge of software supply-chain attack patterns
Published security research - blog posts, CVEs, or conference talks (Black Hat, DEF CON, BSides, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598944
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - AI Security to join our highly technical product research team working at the core of our cloud security platform. This is a rare opportunity to define a new discipline. AI security is an emerging field with few established playbooks, and you will help write them. In this role, you will own the research direction for AI security across Tenable's platform, uncovering novel risks in AI-native systems and translating that knowledge into product capabilities and industry-leading research. You'll be surrounded by experienced researchers and engineers who live and breathe security, with the space and backing to do original work in a domain that is rapidly evolving.
We're looking for an exceptional security researcher who can navigate ambiguity, think like an attacker, and bring clarity to a space that lacks it. You're curious, technically deep, and energized by the challenge of defining risk in systems that are still being understood.

Your Role:

Be at the forefront of an emerging discipline. Conduct technical analysis of AI frameworks, services, and architectures to discover novel risks, vulnerabilities, and attack vectors before they become industry-wide problems .
Define AI security risk by analyzing how exposure is created and exploited in AI systems. Collaborate with engineering and product teams to translate AI research into product findings.
Evaluate the risk of pre-trained models, vector databases, and orchestration frameworks (e.g., LangChain, LlamaIndex) to define how shadow AI creates organizational exposure.
Author blogs, whitepapers, and technical advisories that set the industry narrative. Present original research at leading conferences and serve as Tenable's external voice on AI risk topics.
Analyze AI systems from an attacker's perspective to define trust boundaries, map attack techniques, and identify exploitable paths. Translate findings into product features and outbound research.
Investigate and analyze AI infrastructures and services to find 0-day vulnerabilities, security holes, weaknesses, and design flaws.
Requirements:
What You'll Need:
5+ years of experience in security research, vulnerability research, or offensive security.
Familiarity with OWASP Top 10 for Large Language Model Applications (prompt injection, data poisoning, system prompt leakage).
Ability to analyze complex systems from an attacker's perspective, identify weaknesses and exploit them.
Strong understanding of AI systems, frameworks, and deployment patterns, with proven ability to exploit them.
Proven track record of novel, complex security research in cloud security or application security, with published work (blogs, papers, conference presentations).
Highly motivated, curious, and comfortable navigating unknown territory.
Strong communication skills, written and verbal, with the ability to articulate novel risks and technical findings clearly.

And Ideally:
Experience discovering and disclosing vulnerabilities (CVEs, bug bounty, responsible disclosure).
Experience analyzing systems for data leakage or unintended information exposure.
Solid understanding of cloud platforms (AWS, Azure, GCP) and cloud security concepts.
Experience tracking the evolving AI ecosystem and translating new developments into security research.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606389
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior Security Researcher - Risk Researcher to join our highly technical product research team working at the core of our cloud security platform. This is a rare opportunity to join an elite cloud security research team and do work that directly shapes our product. In this role, you will define how cloud risk is understood and modeled, lead the development of novel risk logic and scoring methodologies, and translate complex attack paths into meaningful insights for customers.

You will conduct deep technical research across cloud environments to uncover new attack vectors, analyze real-world exploitation paths, and contribute to building a unified view of risk across identity, infrastructure, and data layers. Your work will directly influence how we prioritize risk, reduce noise, and establish a clear ground truth for what truly matters in cloud security.

We are looking for an exceptional, adversary-focused researcher who can bridge cloud security knowledge, threat modeling, and data-driven risk analysis. You are curious, comfortable with ambiguity, and driven to deeply understand how attackers operate in modern cloud environments.

Your Opportunity:

Own Risk Across our Cloud Security Platform: Define cloud risk by grounding findings in how exposure is actually created and exploited. Collaborate with engineering and product teams to introduce new data sources and signals that validate exposure. Establish a rigorous validation framework for risk logic to minimize noise and ensure high-fidelity alerts. Define the 'Ground Truth' for what constitutes a critical risk versus a theoretical vulnerability.
Lead Novel Toxic Combination Logic: Conduct deep technical research to discover novel risks and attack vectors across identity, network, workload, and third-party data to produce attack paths. Work with teams across us to develop and refine the quantitative scoring models that aggregate disparate signals (e.g., CVSS, EPSS, identity permissions) into a unified risk score.
Lead Complex Discovery: Build resource, identity, and permission relationships to improve our asset inventory and relationship modeling. Understand customers requirements and ensure deliverables address real needs.
Conduct Cloud Threat Modeling: Analyze services and architectures from an attackers perspective to define trust boundaries and data flows, and ensure the product covers newly identified attack paths. Present findings in blogs, reports, and leading industry conferences.
Research Emerging Cloud Services: Evaluate new cloud services to establish secure configuration and architectural best practices where no prior guidance exists, and partner with PMs to deliver them through the platform.
Shape Cloud Security Strategy: Provide a broad technical view across cloud domains to identify strategic gaps and drive product direction and features.
דרישות:
What You'll Need:
5+ years of hands-on experience in security research.
Deep understanding of attacker mindset, tradecraft, and real-world exploitation techniques. , with a strong focus on exploitation and adversary-driven analysis.
Strong technical background in cloud platforms (AWS, Azure, GCP), including how attackers operate within cloud environments.
Proven experience designing, building, or validating detection logic.
Highly curious, self-driven, and comfortable working in ambiguous, fast-evolving problem spaces.
Strong communication skills, both written and verbal, with the ability to clearly articulate complex technical findings.

And Ideally:
Experience designing or investigating cloud attack paths and complex toxic combinations across services and identities.
Background in offensive security, penetration testing, or red teaming.
Experience with detection languages or frameworks (Rego, Sigma, YARA or similar).
Track record of published research, conference talks, or technical blog posts.
Experience working with product teams and delivering value to customers המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606425
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: Full Time
The Staff Vulnerability Researcher will be involved with researching existing vulnerabilities, looking for new vulnerabilities, and developing checks/plugins to detect these vulnerabilities via our products. This role will involve some interfacing with stakeholders outside the Research team.

Your Opportunity:
Works on complex research and development initiatives.
Implements advanced detection logic while minimizing false positives & false negatives.
Participates in detection logic discussions and the research of new methods for detection.
Interfaces with stakeholders on externalizing the outcomes of some of the research.
Helps / trains other researchers, when needed.
Keep abreast with the advancements and developments in the security industry and perform original research to keep our customers secure.
Develop detection scripts for our sensors (Nessus vulnerability scanner and others) based on the research findings.
Research and develop methods of detection for additional services and products from different vendors.
May perform other duties and responsibilities that management may deem necessary from time to time.
Requirements:
B.S. degree in Computer Science or a related field, or equivalent work experience.
At least 5 years of R&D experience.
In depth understanding of common security vulnerabilities, CVSS scoring, vulnerability classification, detection and exploitation techniques.
In-depth protocol analysis and interaction. Expert level knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Some prior experience performing open-ended research when given high-level requirements and details of the desired output.
Experience with pen-testing, researching, discovering, or publishing vulnerabilities.
Reverse engineering experience including basic binary analysis, packet capture analysis, and firmware analysis (using binwalk). Prior experience with debuggers, disassemblers or decompilers (e.g. IDA Pro, Immunity Debugger, gdb).
Experience with C or C++, Assembly (x86/x64 and/or ARM/ARM64) and / or scripting languages.
One or more security related certifications (e.g. OSCP).
At least a years experience with Nessus Sensor and working with the NASL language.
An understanding of NASL coding standards.
Prior experience performing open-ended research when given high-level requirements and details of the desired output.
Some experience with reviewing code and providing feedback.
Experience with understanding and implementing RFC standards and protocols.
Experience with Python programming language.
Experience with systems administration and be comfortable working at the command line.
In depth understanding of common security vulnerabilities, CVSS scoring, vulnerability classification, detection and exploitation techniques.
In-depth protocol analysis and interaction. Expert level knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Some prior experience performing open-ended research when given high-level requirements and details of the desired output.
Some exposure to security standards such as NIST 800-53, CIS, or DISA STIGS.
In-depth protocol analysis and interaction. Solid knowledge of common protocols such as HTTP, DNS, SSH, SMB, etc. and fuzzing.
Experience with crash dump analysis and exploit development.
Experience writing blogs and whitepapers to showcase research as well as presenting at security conferences.
Ability to sit and work at a computer for extended periods of time.
Some travel may be required.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8610120
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a versatile and innovative Attack-oriented Cyber Researcher to join our R&D team and become part of the revolution. You will conduct state-of-the-art research across multiple environments, ranging from Windows internals and kernel-level security to cloud platforms like AWS, Azure, Web technologies, etc' to stay one step ahead of real threat actors.

Your findings, your code and attack tools will feed directly into our automated attack platform, enhancing its capabilities with new offensive techniques and AI-powered decision-making algorithms.



Roles and Responsibilities:

Perform in-depth research in multiple areas such from AV/EDR evasion, binary exploitation, vulnerability discovery, and subversion of communication channels across both OS-level, domains, cloud-native domains, external surfaces.
Integrate research outputs into production-grade attack functionalities within our automation ecosystem.
Architect and develop AI-driven decision-making modules that enable the platform to mimic experienced attackers, making real-time choices during automated operations.
Develop production-ready attack capabilities using whatever technologies are necessary, Python, C/C++, C#, Java, Office Macros, Bash, PowerShell, Go, Ruby, Assembly, etc.
Mentor and collaborate with fellow R&D team members, fostering a culture of innovation and continuous learning.
Requirements:
5+ years of experience in Windows internals, low and high-level attack-oriented development, penetration testing, and offensive security.
3+ years of experience in Python development.
Demonstrated skill in writing cyber-related code optimized for performance, memory, and stealth.
Experience with attack frameworks and tools such as Metasploit, Nmap, Cobalt Strike, Impacket, Burp, Pacu, and similar.
Proficiency in reverse engineering and debugging (e.g., IDA, Radare2, WinDBG) for low-level research.
Familiarity with cloud ecosystems and hybrid environments, specifically AWS, Azure.
Ability to apply AI or machine learning concepts and models to decision-making processes within the automated attack platform.
Excellent teamwork, adaptability, and a quick learning mindset.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8604222
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We're looking for an Application Security Researcher to join us. In this critical role, you will assist us in validating our services and environments according to the highest security standards. Also, You will work closely with our R&D and Product teams, and solve complex security problems.
Responsibilities:
Continuously checking and improving security measures to protect our systems.
Reviewing system architecture, design, and code to find and fix security weaknesses before they become a problem.
Helping developers follow secure coding practices and learn how to prevent security risks.
Staying updated on new security threats and best practices to keep our security standards high.
Contributing to our companys security research blog.
Requirements:
At least 3 years of experience in application security or vulnerability research.
Hands-on experience in penetration testing for web, mobile, infrastructure, and thick client applications.
Experience bypassing security tools like RBI, EDR, and DLP.
Programming skills, with a preference for Java, Go, or C.
Ability to find and fix security flaws in open-source libraries and third-party software.
Knowledge of supply chain attacks and how to prevent them.
Hands-on experience with AWS cloud attacks and mitigations (preferred).
Understanding of microservices architectures, Docker, and Kubernetes.
Strong problem-solving skills and the ability to work independently.
Good communication skills and a passion for sharing knowledge.
Understanding of network security and encryption protocols.
Additional Skills (Preferred):
Experience using SAST/DAST tools for static and dynamic code analysis.
Experience working in Agile teams and collaborating with different departments.
Security certifications like OSCP, CRTP, OSWE, or similar.
Ability to lead security projects and initiatives.
Adaptability to a fast-paced environment.
Knowledge of current security threats and how to defend against them.
Experience with writing security blogs, CVE research, or bug bounty programs is a plus.
BSc in Computer Science- an advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598396
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for Principal Cloud Security Researcher with a strong security background to join our innovative Research team.
The Role
We're looking for a Principal Cloud Security Researcher to serve as a senior technical leader within our Research team. This is a high-impact individual contributor role -- you won't manage people, but you'll shape the direction of our entire research function, mentor researchers, and act as a force multiplier across the organization.
You'll be the person who takes a vague threat signal and turns it into a detection strategy, a published finding, or a product capability. You'll operate as a trusted deputy to the research team lead, owning the most complex and ambiguous research challenges while raising the technical bar for the team.
What You'll Do
Drive Groundbreaking Research
Own and drive our most critical research initiatives end-to-end - from initial threat hypothesis through detection logic, product integration, and external publication.
Set the technical direction for cloud threat research across AWS, Azure, and GCP, identifying emerging attack surfaces and novel techniques before they become mainstream threats.
Investigate real-world cloud and SaaS security incidents, dissecting attacker tradecraft and extracting insights that evolve our detection capabilities.
Pioneer new forensic investigation techniques and detection methodologies for cloud-native and SaaS environments - pushing the state of the art, not just following it.
Be a Voice in the Community
Represent our company as a thought leader through high-quality research publications, conference presentations (BlackHat, DEF CON, RSA, fwd:cloudsec, and similar venues), and open-source contributions.
Build and maintain our reputation as a research-driven company that advances the field - not just a vendor with a blog.
Engage with the broader security research community, fostering relationships and collaborative knowledge-sharing.
Shape the Product
Bridge research and product - translate threat findings into actionable product requirements, working closely with engineering and product teams to ensure our CDR platform stays ahead of evolving threats.
Design and develop advanced detection algorithms that directly feed into our platform, closing the gap between research insight and customer protection.
Elevate the Team
Act as the team's go-to technical authority. When researchers hit a wall on complex cloud attack chains, IAM edge cases, or detection gaps - you're who they turn to.
Mentor and grow other researchers through research reviews, pair investigations, code reviews, and by setting quality standards and methodology best practices.
Influence technical decisions org-wide - contributing to architecture, tooling, and strategic research priorities.
Step in as the research team lead's deputy when needed - driving prioritization, representing research cross-functionally, and ensuring continuity.
Requirements:
Who You Are
8+ years in security research, threat research, or closely related fields (offensive security, detection engineering, incident response, cloud security engineering). Fewer years are fine if your depth and track record are exceptional.
Deep multi-cloud expertise - strong hands-on experience across at least two of the major cloud providers (AWS, Azure, GCP), with working knowledge of the third. You understand the IAM models, logging pipelines, APIs, and attack surfaces that matter in each.
A track record of original research - you've published meaningful technical findings through blog posts, conference talks, open-source tools, or vulnerability discoveries that moved the needle. We want someone who doesn't just consume research - you produce it.
Strong adversarial mindset and critical thinking - you think like an attacker targeting cloud infrastructure, SaaS platforms, identity systems, and Kubernetes. You can model threat scenarios, map out attack paths, and poke holes in defenses.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606762
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced Vulnerability Researcher to join our team, where our ethos of customer-centric problem solving, ownership, professionalism, and resourcefulness are at the heart of everything we do. The team faces complex research issues daily, solving new challenges and constantly improving the existing solutions. In this key position, you'll dive deep into complex security puzzles, pushing the boundaries of our vulnerability research and solutions. Collaborating on challenges with our team means working with the leading cloud platforms (AWS, GCP, Azure) and leveraging advanced technologies like Kubernetes, EBPF, Docker, and more.
Responsibilities :
Vulnerability research in the major Cloud providers and cutting-edge technologies.
Collaborate with teams across the organization, including Product, and GTM, to develop and integrate top-tier features.
Conduct deep technical research into cloud-native environments.
Lead offensive investigations in Kubernetes, eBPF, AI/ML‑based anomaly detection, and runtime security, translating findings into production‑grade detections.
Create authoritative content - white‑papers, conference papers, blogs, and release notes that educate users and elevate brand.
Deep dive into threat detection and product content that provide our customers deep insights and added value.
Requirements:
+4 years of experience as a Vulnerability or Offensive Security researcher, specializing in web exploitation and advanced offensive techniques.
Experience with cloud platforms and products (e.g. AWS, GCP, and Azure).
Military background or experience with Ex-CNAPP is highly advantageous.
Possession of a Vulnerability Research Certification, contributions to CVEs, or a recognized standing in global security rankings is highly desirable.
Ownership and Professionalism
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8600588
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Were looking for a Senior Security Researcher to drive high-impact research across cloud, runtime, and application environments, and translate it into product-grade detections. This is a hands-on role for someone who can lead investigations end-to-end: from understanding attacker tradecraft and vulnerabilities, through building reliable detection logic, to influencing product direction.
On a typical day youll:
Lead deep-dive research into real-world attacks, vulnerabilities, and emerging cloud and runtime techniques
Own complex investigations (DFIR, threat hunting, root-cause analysis) and convert learnings into durable detections
Design and implement advanced detection logic and analytics across cloud assets, containers, Kubernetes, and Linux runtime telemetry
Build prototypes and production-ready components that improve detection accuracy, fidelity, and coverage
Partner closely with engineering and product to shape roadmap priorities and guide implementation details
Develop research methodologies, testing frameworks, and validation processes for new detections
Mentor and level up other researchers and engineers through reviews, knowledge sharing, and technical guidance
Represent the team externally through publications, technical blogs, and conference talks.
Requirements:
7+ years of experience in security research, detection engineering, incident response, or comparable hands-on security roles
Demonstrated expertise in at least two of the following areas (and working knowledge in the others):
Linux internals / operating systems fundamentals
Cloud security (AWS/Azure/GCP), including common attack paths and misconfiguration patterns
DFIR, threat hunting, and investigation workflows using telemetry and logs
Vulnerability research or vulnerability management at scale (triage, prioritization, exploitation understanding)
Application and API security fundamentals
Strong programming skills in Python (Go is a strong plus); ability to produce maintainable research code and production logic
Strong data skills: comfortable working with large telemetry datasets (SQL and log analytics platforms such as Elastic or similar)
Ability to reason about attacker behavior, build threat models, and validate detections with repeatable testing
Excellent written and verbal English communication, including the ability to explain nuanced technical tradeoffs to non-research audiences
Track record of driving cross-team execution and shipping impactful security capabilities
Nice to have:
Experience with Kubernetes and container runtime security
eBPF or low-level telemetry approaches, syscall or kernel-level visibility
Reverse engineering and malware analysis
Offensive security background (web, cloud, exploit development)
Contributions to open-source security projects or published research
Experience using automation or AI-assisted techniques to scale research and detection workflows.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588592
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
In this role, you will be the architect of our "security brain." You will write the low-level code that observes what is happening (eBPF/Golang) and build the AI models that understand, diagnose, and prevent issues (LLMs/Python).
Key Responsibilities
1. The "Eyes": eBPF Development & Systems Engineering
Lead the Cimon Agent: Spearhead the active development of our high-performance eBPF agent "Cimon" using Golang and C.
Kernel-Level Innovation: Design and implement eBPF programs for deep observability, runtime security, and container monitoring.
Performance Obsession: Write beautiful, highly efficient code that runs in the Linux kernel with minimal overhead.
Community Leadership: Actively participate in the eBPF and open-source communities, contributing code and presenting technical deep dives at conferences.
2. The "Brain": AI Innovation & Security Research
AI-Driven Security Solutions: Architect and prototype models for:
Automated Exploitability: Checking SAST/SCA findings for validity.
AI Remediation: Automatically fixing Dockerfile misconfigurations and generating patches.
Model Detection: Identifying AI models embedded within codebases.
Benchmarking & Rigor: Design evaluation frameworks to measure model accuracy, false positives, and robustness in security contexts.
Prompt Engineering: Shape prompt strategies and workflows to translate real-world security challenges into actionable AI logic.
3. The Intersection: Collaboration & Evangelism
Cross-Functional Leadership: Serve as the technical link between the AI development team and the core security engineering team.
Thought Leadership: Author whitepapers, technical blogs, and deliver talks on the cutting edge of "AI for Systems Security."
Mentorship: Guide engineers on best practices for both low-level systems design and AI integration.
Why This Role?
No Context Switching Cost: You won't just be researching; you will be building the tools you research. You control the data collection (eBPF) and the analysis (AI).
Deep Tech Focus: This isn't a wrapper-API role. You will be dealing with kernel bypasses, memory safety, and LLM hallucinations all in the same week.
Impact: Your work will directly power the next generation of automated security remediation.
Requirements:
The Core Stack:
Systems: 3+ years of experience with Golang and Linux Kernel development (eBPF or Kernel modules).
AI/ML: Hands-on experience with LLMs, prompt engineering, and Python-based data analysis.
Security: Deep understanding of SAST/SCA tools (e.g., SonarQube, Bearer, Snyk) and Container Security (Docker, K8s, Trivy).
Technical Qualifications:
Strong knowledge of Linux systems design, networking, and OS internals.
Proficiency in Python (for AI research) and Go/C (for Agent development).
Experience in analyzing container build pipelines and identifying vulnerability origins.
Ability to distill complex topics (both kernel-level and AI-level) for diverse audiences.
Bonus Points:
Experience with Rego/Open Policy Agent (OPA).
Publications or presentations at venues like KubeCon, Black Hat, or AI conferences.
Experience with Cloud Security (AWS/Azure/GCP) and Infrastructure-as-Code scanning.
Experience fine-tuning models for specific code-generation or security tasks.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8588407
סגור
שירות זה פתוח ללקוחות VIP בלבד