דרושים » אבטחת מידע וסייבר » Principal Consultant, Reactive Services, DFIR (Unit 42)

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 13 שעות
Location: Tel Aviv-Yafo
Job Type: Full Time
This client-facing role requires the Principal Consultant to lead and produce deliverables for reactive services engagements. You will work directly with multiple customers and key stakeholders, from technical administrators to the C-Suite, to manage incident response engagements from start to finish and provide expert guidance on long-term security posture remediation.
Key Responsibilities
Manage end-to-end incident response engagements, including scoping work, guiding clients through forensic investigations, containing security incidents, and providing long-term remediation recommendations.
Perform reactive incident response functions, including host-based analysis of Windows, Linux, and Mac OS X systems to identify Indicators of Compromise (IOCs).
Investigate data breaches by leveraging digital forensics tools (e.g., EnCase, FTK, X-Ways, SIFT, Splunk) to determine the root cause of compromises and malicious activity.
Examine firewall, web, database, and other log sources to identify evidence of malicious activity, focusing on the details to ensure a thorough and accurate investigation.
Proactively collaborate with and mentor junior team members, sharing expertise in incident response and forensics best practices to empower others and ensure team alignment.
Effectively communicate complex technical findings and strategic recommendations to both technical and executive-level stakeholders.
Travel as needed to meet client engagement demands, typically averaging 20%.
Requirements:
Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent military/professional experience.
8+ years of experience in incident response or digital forensics consulting.
Demonstrated experience leading complex technical engagements and interfacing directly with clients and stakeholders.
Proficiency in host-based forensics, data breach response, and network traffic analysis.
Hands-on experience with forensic tools such as EnCase, FTK, X-Ways, SIFT, Splunk, Volatility, or similar technologies.
Preferred Qualifications
Master's degree in a relevant technical field.
Strong executive presence with experience presenting complex technical concepts to C-suite stakeholders.
Established external presence through public speaking, conference presentations, or industry publications.
Relevant industry certifications such as GIAC (GCFA, GCFE, GNFA), CISSP, or similar.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8638015
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a senior, hands-on Security Operations Lead to build, mature, and operate detection, response, and corporate security capabilities. You will own the engineering, workflows, and processes that keep secure day-to-day, while continuously improving visibility, automation, and operational resilience across both corporate and production environments. This role requires a technical operator who can architect scalable detection and response pipelines, manage endpoint and identity security controls, streamline GTM security enablement, and collaborate across the company to reduce risk. You will balance strategic direction with hands-on execution-ensuring threats are identified quickly, incidents are handled effectively, and the organizations operational security posture remains strong as grows.
Responsibilities:
Own and mature Detection & Response program, including alerting, triage workflows, incident playbooks, and end-to-end response processes.
Build and maintain detection logic, integrations, and automation across logging, SIEM, EDR, cloud telemetry, and internal monitoring systems.
Lead incident investigations, coordinate response across engineering and business teams, and ensure clear communication and post-incident reviews.
Manage Corporate Security Program, including identity and access management, endpoint posture management, corporate data security controls, and DLP practices.
Oversee privileged access workflows and JIT access for corporate and production systems in alignment with least-privilege principles.
Partner with engineering teams to ensure production environments maintain strong security baselines, logging, and monitoring coverage.
Collaborate with GTM/Sales teams to support Security Enablement, including third-party security questionnaires, customer assurance needs, and auditor inquiries.
Build automation-first operational processes that reduce manual overhead and provide consistent, repeatable security outcomes.
Develop and refine detection and response runbooks, escalation paths, and cross-team coordination models.
Maintain and improve incident and operational metrics, dashboards, and KPIs to measure operational efficiency and threat coverage.
Drive the intake and prioritization of security operations requests through Jira and internal workflows.
Work closely with Product Security, Cloud/DevOps, and GRC to ensure shared visibility and aligned operational practices.
Identify operational security gaps, propose improvements, and lead implementation efforts across tooling, processes, and controls.
Promote a culture of proactive detection, fast response, and shared responsibility for organizational security.
Requirements:
Five (5) + years of experience in Engineering / Security Engineering
We build solutions when faced with a capability gap
Youre very comfortable with Kubernetes, Helm, and Terraform
Youre very comfortable with Python, Typescript, or Go
Two (2) + years of experience in Incident Response role
Youve led at least 2 high risk production security incidents
Youve handled the investigation of hundreds of client endpoint security alerts
Bonus points for significant experience in macOS
Youve developed or improved threat detection and signal triage programs
Two (2) + years of experience managing enterprise wide security projects
You have a strong opinion on what a project plan doc should look like
Youve owned and delivered the migration of a high impact security tool (EDR, SIEM, ZTNA, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8613629
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced Incident Response leader to own and lead the companys response to large-scale, high-impact cyber incidents. This role is responsible not only for technical response, but for cross-company crisis coordination, executive decision support, and ensuring fast, controlled mitigation across engineering, product, legal, communications, and leadership teams.
This is a leadership role for someone who has personally led complex incidents under pressure - including situations involving material business risk, customer impact, regulatory exposure, and executive visibility.
Key Responsibilities:
Incident Leadership & Crisis Management
Serve as the Incident Commander for high-severity cyber incidents, including breaches, supply-chain attacks, insider threats, and platform-wide security events.
Lead company-wide incident response efforts, coordinating technical, operational, legal, communications, and executive stakeholders.
Stand up and orchestrate crisis management teams during major incidents, ensuring clear ownership, decision-making, and execution under pressure.
Drive rapid containment, eradication, and recovery while balancing business continuity, customer impact, and regulatory obligations.
Act as the primary point of contact to executive leadership during incidents, providing clear, concise, timely, and actionable updates.
Cross-Department Coordination
Orchestrate response activities across Security, Infrastructure / Cloud Operations, Product & Application Security
Ensure alignment between technical response actions and business, legal, and regulatory considerations.
Manage external parties when needed
Preparedness & Operational Excellence
Own and continuously improve the incident response framework, including severity definitions, escalation paths, and decision authority.
Design and run executive-level incident simulations and tabletop exercises, including cross-functional and leadership participation.
Ensure high-quality post-incident reviews that result in measurable improvements to controls, detection, and response readiness.
Define and track incident response metrics (MTTD, MTTR, blast radius, decision latency).
Track and follow-up on lessons learned and enhancements to ensure implementation and continuous improvement.
דרישות:
10+ years in cybersecurity, with significant incident response management experience.
Proven experience leading large-scale, cross-company cyber incidents, including incidents involving:
Multiple engineering and operational teams
Executive leadership and board-level visibility
Demonstrated experience acting as Incident Commander or equivalent role during major security events for at least 15 incidents in the past 5 years.
Strong understanding of:
Cloud and SaaS architectures
Identity, access control, and infrastructure security
Detection and response technologies (SIEM, EDR, cloud-native tools)
Offensive background
Ability to translate technical facts into business impact and risk-based decisions.
Critical Skills & Attributes
Crisis leadership: Calm, decisive, and structured under extreme pressure.
Authority without ego: Able to lead across departments without formal reporting lines.
Executive communication: Clear, concise, and credible with senior leadership.
Systems thinker: Understands how technical, human, and process failures compound during incidents.
Bias for action: Moves quickly while maintaining discipline and documentation.
Analytical thinking: Attention to details and ability to connect multiple dots into a concise and accurate picture.
Previous experience at Mandiant, Sygnia, CrowdStrike, Unit 42, or similar elite IR teams
Experience in crypto, fintech, custody, payments, or highly regulated environments
Hands-on background in forensics, threat hunting, or security engineering
Nice to Have
Experience in crypto, fintech, cloud infrastructure, or highly regulated environments
Experience supporting regulatory notifications המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614256
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and English Speakers
we are looking for a Incident Response Director.
The Incident Response Director will be key to the success of Incident Response projects worldwide, and should possess strong leadership and client-facing skills, be highly technical and thrive in a fast-paced and dynamic environment.
Main Responsibilities :
Lead multiple teams of top-tier cyber security researchers and forensic experts responding to large-scale and complex cyber-attacks globally, beating real-world sophisticated threat actors.
Become a trusted advisor for client executives during incidents, and the main escalation point for crisis management.
Oversee all client-facing engagements within the EMEA region, assuring top quality delivery standards.
Train, guide and empower team leaders and team members, enhancing their technical, managerial, and consulting skills.
Support efforts to generate new business, by creating professional content and attending events, conferences and client meetings.
Be part of the management group Sygnias global IR department, lead and take part in cross-company projects and cooperations.
Requirements:
Minimum of 3 years of experience leading cybersecurity teams in Penetration Testing, Red Team operations, and/or Research (Malware Analysis, EDR/XDR).
Hands-on technical background in cybersecurity - MUST; Incident Response technical/managerial background - an advantage.
Client-facing experience.
Experience working with global clients - an advantage.
Experience in professional cybersecurity services consulting roles - an advantage.
Strong ability to perform under pressure, manage heavy workloads, and operate effectively in crisis situations.
Proven ability to thrive in a dynamic environment and handle multiple projects under tight deadlines.
Exceptional analytical, reporting, and communication skills in both Hebrew and English (written and spoken).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616675
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
were looking for a Incident Management Analyst to help ensure the stability and reliability of our global IT services.
As a key member of the IT Operations team, youll support the rapid response and coordination of critical IT incidents. This role is ideal for someone who thrives in fast-paced environments, communicates clearly under pressure, and enjoys working cross-functionally to solve complex operational challenges.
Youll work closely with technical teams, stakeholders, and leadership to ensure incidents are managed efficiently, communication flows smoothly, and services are restored as quickly as possible. Your work will play a key role in maintaining service continuity and minimizing business impact.

What Youll Do

Identify, log, and classify major IT incidents reported by internal teams or external users
Coordinate response efforts by engaging appropriate technical teams and vendors to diagnose and resolve incidents,coordination calls and document actions, updates, and timelines
Track incidents ,provide a clear and timely communication between technical teams, business stakeholders, and leadership during major incidents. Along with root cause analyses (RCAs), including performance incidents reports,
Assist in preparing RCA reports and ensure documentation and communication are completed as required, Be a contribute to knowledge base articles.
Support daily review meetings to discuss recent and ongoing high-priority incidents and operational work
Follow established Major Incident and Change Management processes, policies, and tools
Generate reports, dashboards, and performance metrics for operational and leadership reviews
Support process adoption and assist with training or guidance related to incident management practices
Requirements:
Bachelors degree in Information Technology, Computer Science, or a related field
3-5 years of experience in IT operations, incident management, or service management
Experience working with enterprise-level incident response or IT service management processes
Strong analytical and problem-solving skills with attention to detail
Excellent written and verbal communication skills
Ability to stay organized and perform effectively under pressure while managing multiple priorities
Familiarity with ITIL principles and service management best practices
Experience with ITSM tools (e.g., ServiceNow or similar platforms) - an advantage
Strong documentation and organizational skills
Fluent in spoken and written English
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621822
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: More than one
we are looking for an experienced Cyber Security Consulting Manager (Engagement Manager) to lead proactive consulting engagements with clients worldwide. The appropriate candidate will be responsible for the engagement lifecycle - from engagement planning, throughout the day-to-day engagement execution, management of consulting team and client interaction, until the successful engagement presentation and delivery.
Main Responsibilities:
Lead a team of top cyber security consultants (matrix management), to conduct and deliver a variety of proactive cyber security assessments and resilience-enhancing engagements.
Work on multiple engagements in parallel, at client sites or remotely.
Ensure the timely and successful delivery of services according to the engagement scope, objectives, budget, timelines, and clients needs.
Develop and present status updates and summary reports to a variety of audiences, including technical teams, CISOs, CIOs/CTOs, and executive management.
Serve as the trusted advisor to industry-leading multinational organizations, acting as the primary point of contact with clients before, during, and after engagements.
Support the building of long-term relationships with clients, ensuring continuous client impact and success.
Participate in and lead business development activities, internal capability-building efforts, methodology development, and strategic discussions.
Requirements:
Minimum of five years of experience managing complex short to medium-term client-facing cyber security engagements in parallel, with excellent engagement management skills and a proven record.
Extensive understanding of cyber security, security governance, and cyber risk management best practices, frameworks, and principles.
Ability to collaborate with individuals across all levels in a dynamic matrix organizational structure, and coordinate with other departments.
Outstanding analytical, creative, and problem-solving skills and mindset, with the ability to handle uncertainty and complexity.
Excellent communication and presentation skills at all levels of the organization. Ability to articulate security concepts to technical staff and explain them to non-technical staff, including senior management.
Attention to detail and a commitment to maintaining high standards.
Certifications such as C-CISO, CISM, PMP, or similar are an advantage.
Knowledge of regulatory requirements and compliance standards such as NIST, ISO, and others is an advantage.
Excellent communication and presentation skills at all levels of the organization, in both English and Hebrew.
The position requires travel abroad (~15-20%).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616696
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
30/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are seeking a highly skilled and experienced Head of Application Security to join our dynamic team.
Job Id: 24652
This role is pivotal in driving the security of our software development lifecycle and ensuring the robustness of our applications against potential threats. The ideal candidate will have a strong background in secure software development practices, including SSDLC implementation, and a deep understanding of security risks & tools. This position reports directly to an R&D VP.
Key Responsibilities
Lead the application security team, providing strategic direction and mentorship.
Develop and implement a comprehensive Secure Software Development Lifecycle (SSDLC) framework.
Oversee the integration of security practices into all phases of the software development lifecycle, including CI/CD guardrails.
Conduct risk assessments and threat modeling to identify and mitigate potential security vulnerabilities.
Collaborate with development teams to ensure secure coding practices and adherence to security standards, while maintaining developer productivity.
Implement and manage security automation tools and processes to enhance the efficiency of security operations.
Stay up-to-date on the latest security trends, vulnerabilities, and technologies to continuously improve our security posture.
Provide expert guidance on security architecture and design for new and existing applications.
Lead incident response efforts related to application security breaches and vulnerabilities.
Foster a culture of security awareness and continuous improvement within the organization.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field.
Minimum of 7 years of experience in application security, with at least 3 years in a leadership role.
Proven experience in implementing and managing SSDLC frameworks.
In-depth knowledge of security frameworks and methodologies.
Strong understanding of threat modeling methodologies, secure coding practices and common vulnerabilities (e.g., OWASP Top Ten).
Proficiency in programming languages such as Java, Python, C#, or similar.
Experience in implementing security tools and technologies such as ASPM, SAST, DAST in complex and high-scale environment.
Excellent communication and leadership skills, with the ability and passion to drive change across the organization.
Relevant certifications such as CISSP, CISM, or CSSLP are desirable.
Proven experience in a similar role at another leading software development company.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597491
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Security Research Team Leader to join our team of highly skilled professionals, which includes security researchers, operations analysts, and data scientists.
This team continuously hunts for threats, evaluates emerging attack vectors, and develops innovative detection techniques in the field of malvertising and advertising security. Our mission is to protect customers from attacks generated by malicious advertisements (malvertising).
What You'll Do:
Lead detection innovation. Design and implement new methodologies to identify and stop malvertising attacks before they reach end users.
Drive signal research. Research and develop signal-collection strategies across mobile and desktop environments to strengthen detection and enhance customer protection.
Expand scanning capabilities. Devise approaches to overcome bot detection mechanisms and ensure comprehensive website coverage.
Deliver customer impact. Understand customer-specific security requirements, translate them into actionable research, and consistently exceed expectations.
Map adversary behavior. Discover and document the tactics, techniques, and procedures (TTPs) employed by malvertisers and related threat actors.
Elevate data-driven detection. Create and validate data insights that enhance detection quality and drive measurable improvements in protection efficacy.
Share knowledge broadly. Publish security research through blog posts, internal knowledge bases, conference presentations, and external engagements - translating complex discoveries into clear, impactful narratives.
Hunt threats proactively. Identify malicious activity across the internet, reverse-engineer attack execution, and produce thorough technical documentation.
Stay ahead of the curve. Continuously monitor the cybersecurity landscape for trends, emerging threats, and developments relevant to our mission.
Mentor and lead. Contribute high-impact work that moves team-level metrics, while actively providing leadership, guidance, and mentorship to peers and junior researchers.
Build better tools. Develop techniques, scripts, and tooling to streamlne workflows and amplify the broader team's productivity.
Requirements:
Education: A Bachelor of Science in Computer Science or equivalent experience (e.g., alumni of a technological or military intelligence unit).
Deep Web Expertise: Strong understanding of web architecture and protocols, including the Document Object Model (DOM), JavaScript, HTTP/HTTPS, and IPv4/IPv6.
Security Minded: Solid knowledge of the broader cybersecurity threat landscape and the mindsets of adversaries.
Experienced Leader: Over 3 years of proven experience in leading cybersecurity research, with a track record of delivering meaningful outcomes.
Strong Communicator: Excellent written and spoken English skills, with the ability to clearly convey technical findings to both technical and non-technical audiences.
Skilled in Scripting: Hands-on proficiency in Python and JavaScript for research, automation, and tooling.
Data Fluent: Solid experience in data analysis using SQL, Python, or equivalent tools.
Self-Driven and Passionate: Motivated, independent, and genuinely committed to finding and stopping bad actors on the internet.
Natural Leader: Capable of inspiring and elevating those around you through contributions, professionalism, and a collaborative spirit.
Curious about AI/ML: Foundational understanding of machine learning and AI concepts, with a strong aptitude and enthusiasm for rapidly acquiring new skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8627385
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
30/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
since 2006, weve grown to around 5,300 employees in 22 countries, launched over 40 products, and serve over 282 million users and their visitors worldwide. here, we push you to innovate, evolve in non-traditional ways, and collaborate. we operate in small teams that work closely together at a high level.
although were already industry leaders in web creation and business, our work is nowhere near done. our goal is to become the main engine of the internet so we can create a more open web for all.
we're proud to be an equal opportunity employer. was built around the idea that everyone has the right to be successful, online. this same vision defines us as an employer: creating a work environment where everyone is welcome, and anyone has the right to succeed.
were looking for a hands-on incident response expert thats passionate about investigating real threats, building scalable detections, and improving automation across modern cloud-native environments. this is a high-impact role within our security group, ideal for someone who thrives on both investigation and building long-term solutions. in your day-to-day, youll:
investigate complex security incidents in cloud (aws/gcp), containerized (kubernetes), and endpoint environments
design and maintain detection rules and anomaly-based logic to identify emerging threats in production systems
automate forensic evidence collection and response actions across diverse platforms and services
collaborate with SOC analysts, security architects, and engineering teams to improve detection coverage and data visibility
lead incident retrospectives and document technical findings, response steps, and process improvements
develop and maintain investigation playbooks, chain-of-custody protocols, and sprint-based ir deliverables
participate in on-call rotations and contribute to incident readiness exercises and escalation protocols
we are s security guild. were a group of highly motivated security engineers that form part of the r&d group. we allow developers and users to achieve their goals without risk, often meaning we find or create unique solutions. our work is exceptionally challenging due to s scale, agility, and advanced technical diversity. when it comes to technology, we have the ultimate playground, and although we work together closely, theres always space for independence, innovation, and creativity.
Requirements:
requirements
4+ years of hands-on experience in incident response or security operations
proficiency in Python for scripting, automation, and tool development
strong knowledge of cloud platforms (aws and/or gcp) and container technologies (kubernetes)
experience with detection engineering, threat hunting, and automated response tooling
familiarity with scripting or automation tools for investigation and remediation
excellent written and verbal communication skills in english
ability to work effectively with global teams across time zones
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8597551
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
29/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a highly skilled and motivated Cloud security Team Lead to lead a team of cloud security professionals. This role focuses on designing and implementing secure cloud environments, guiding clients through cloud security strategies, and driving innovation in cloud-native security solutions.
Responsibilities:
Lead and mentor a team of cloud security experts
Design and implement secure cloud architectures across AWS, Azure, and GCP
Develop cloud security strategies, policies, and governance frameworks
Support pre-sales activities and lead technical discussions with clients
Stay up to date with evolving cloud threats, technologies, and best practices
Promote a security-first mindset in digital transformation and cloud migration projects
Educate and collaborate with clients technical and management teams (CIOs, CTOs, Architects, DevOps, Security team, etc.)
Requirements:
Proven experience in leading cybersecurity or cloud security teams
Deep understanding of cloud platforms (AWS, Azure, GCP) and cloud-native security tools
Strong knowledge of cloud security architecture, IAM, network security, and data protection
Experience with security frameworks and methodologies (e.g., NIST, MITRE ATT&CK, CSA)
Ability to design, implement and troubleshoot cloud services, including hybrid models, VMs, storage, and networking and security
AWS / Azure / GCP Cloud certifications- an advantage
Proven ability to motivate and engage team members
Able to work independently
Hands-on experience with cloud compliance, governance, and risk management
Client facing, manages client interactions, expectations, deliverables
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8595893
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are expanding our Research Team and are looking for a Junior Malware Researcher with a strong technical mindset, excellent communication skills, and a passion for problem-solving.
As a Malware Researcher, you will be responsible for hunting emerging malware and malvertising campaigns and developing effective detection methods to protect global customers. You will work closely with the R&D and Product teams and be part of a friendly, professional team based in Tel Aviv, supporting customers worldwide.
Responsibilities:
Detect, monitor, and hunt new malvertising and malware threats
Research new attack vectors, delivery methods, and evasion techniques
Develop and improve detection logic and signatures
Investigate malicious campaigns using internal tools, databases, logs, and external intelligence sources to uncover hidden patterns
Analyze web traffic, scripts, redirects, and network behavior to identify malicious activity
Collaborate with R&D and Product teams to translate research into production-grade protections
Contribute to internal documentation, research reports, and best practices to improve knowledge sharing and support processes
Requirements:
0-1 years of relevant experience, or equivalent technical background (military, academic, or self-driven research)
Strong understanding of web technologies , including HTML, JavaScript, browser behavior, and client-side execution
Solid foundation in security concepts, such as web threats, malware behavior, and attack chains
Familiarity with networking concepts (HTTP/HTTPS, DNS, redirects, basic TCP/IP)
Hands-on experience with at least one programming or scripting language: JavaScript, TypeScript, or Python
Basic experience working with SQL and data analysis
Ability to investigate issues end-to-end, from technical root cause to customer impact
Strong analytical thinking and problem-solving skills
Fluent English (written and spoken)
Independent, accountable, proactive, and comfortable taking ownership of tasks
Advantages (Nice to Have):
Experience or familiarity with the ad tech ecosystem (DSPs, SSPs, publishers, ad networks)
Exposure to malware analysis, threat intelligence, or SOC workflows
Familiarity with AI tools or AI-assisted research workflows
Experience with monitoring, visualization, or log analysis tools (e.g., Kibana, Grafana)
Basic experience with automation, scripting, or data parsing
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8627389
סגור
שירות זה פתוח ללקוחות VIP בלבד