דרושים » אבטחת מידע וסייבר » Information Security Manager

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
 
משרה בלעדית
לפני 6 שעות
דרושים בריקרוטיקס בע"מ
Job Type: More than one
Our company specializes in cybersecurity consulting and is currently expanding our team. We offer a dynamic and challenging role in a company that greatly values human capital.

Job Description:
Lead and manage the company's cybersecurity strategies and processes.
Enhance cybersecurity across both on-premises and cloud networks.
Draft and maintain documents, including information security policies, procedures, and reports.
Provide consultancy on cybersecurity solutions and controls.
Requirements:
At least 1 year of experience in a CISO or CTO role.
Knowledge of web security and familiarity with the OWASP Top 10 security risks is advantageous.
Extensive knowledge of cybersecurity best practices for network and cloud infrastructure.
Professional certification in information technology/security.
Familiarity with privacy protection regulations and certifications such as ISO 27001 and SOC2.
Strong organizational skills, team-oriented, and service-focused.
Hands-on experience with technical security controls (FW, EDR, etc).
High proficiency in English.
This position is open to all candidates.
 
Hide
הגשת מועמדות
עדכון קורות החיים לפני שליחה
8645966
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
29/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a highly experienced and visionary Information Security Group Leader. As a part of this role, you will define strategy and roadmap, design and implement scalable controls, and ensure robust protection of enterprise systems, applications, and data across on‑prem, hybrid, and cloud environments.
This role requires deep technical expertise, risk-based decision-making, and the ability to drive security outcomes through cross-functional partnership with IT, R&D, and business stakeholders.
This role combines strategic leadership, hands-on technical expertise, and cross-functional collaboration to continuously reduce risk, improve detection and response, and enable the business to move fast while meeting security and compliance obligations.

What will you do?
Security Leadership & Operations
Manage and mentor a team of security professionals, set objectives, develop skills, and build a high-performing, service-oriented security function.
Lead risk assessments and threat modeling for infrastructure and applications, drive remediation plans and risk acceptance decisions.
Oversee security operations, monitoring, and incident response in partnership with internal teams and service providers.
Define KPIs/KRIs and report security posture to leadership; manage budget, tools lifecycle, and security vendor relationships.
Security Architecture & Design
Define and maintain enterprise security architecture across applications, network, endpoints, identity, and core infrastructure.
Requirements:
Experience: 10+ years in information security, IT, and/or security architecture, with demonstrated leadership across security operations, infrastructure, and cloud environments.
Expertise:
Security frameworks and risk management (e.g., NIST CSF/800-53, ISO 27001, SOC 2), including control ownership and audit readiness.
Cloud security for AWS/Azure/GCP and hybrid architectures (identity, network, logging/monitoring, workload protection, CSPM/CWPP concepts).
Advanced networking and network security (firewalls, segmentation, SD-WAN, Zero Trust, VPN/secure remote access, DNS security).
Virtualization (Nutanix, VMware).
Storage systems (Netapp).
Identity & Access Management (SSO, MFA, PAM, lifecycle automation) and strong authentication/authorization patterns.
Application Security and DevSecOps (secure SDLC, code review practices, SAST/DAST, dependency and container security, CI/CD integrations).
Vulnerability management (scanning, prioritization, patching governance) and security hardening for endpoints, servers, and cloud workloads.
Security operations tooling and processes (SIEM, SOAR, EDR/XDR), logging strategy, detection engineering, and incident response.
Proven ability to lead through influence, driving a security-first culture across IT and business units while navigating complex organizational changes.
A track record of building high-performing teams by fostering a culture of continuous learning and clear career pathing for security professionals.
Exceptional ability to translate complex technical risks into business-impact narratives for leadership.
Strong "leader-as-a-partner" mindset, balancing security requirements with the need for business agility and speed.
Proficiency in developing security frameworks for the safe adoption of Generative AI and LLMs.
Certifications: CISSP and/or CISM, cloud security/architecture certifications (AWS/Azure/GCP) or equivalent experience.
Skills: Strong analytical and problem-solving skills, Strategic thinker with the ability to translate long term vision into practical execution, Comfortable navigating ambiguity and balancing competing priorities, Genuine interest in emerging technologies, including AI and security automation, Results-oriented with strong focus on measurable outcomes, Excellent written and verbal communication, stakeholder management, and program/project management.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8629592
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/04/2026
Location: Petah Tikva
Job Type: Full Time
This role oversees security governance, risk management, compliance, and incident readiness, while working closely with engineering, product, legal, MIS and other teams to embed security across the organisation and support customer trust and business growth.
Key Responsibilities
Develop and maintain the companys information security strategy, policies, and long-term roadmap. Both for production environments and for internal business by overseeing security of enterprise systems.
Lead security risk assessments, mitigation planning, and ongoing security monitoring.
Lead incident response planning, preparedness, and execution.
Manage security governance, including controls, documentation, and audit readiness.
Ensure compliance with relevant standards and regulations such as SOC 2, ISO 27001, GDPR, and emerging AI frameworks.
Direct security architecture reviews and support secure development practices across product and engineering teams.
Ensure security is integrated into engineering culture and delivery without hindering velocity, while aligning platform security with engineering practices and production resiliency requirements.
Oversee vendor security, penetration testing, and third-party risk management.
Serve as the primary security contact for customers, partners, auditors, and regulators, and own the security aspects of the companys products, in alignment with business and customers needs.
Provide regular updates to executive leadership on security posture, risks, and priorities.
Requirements:
Extensive experience in information security leadership, including prior ownership of a security program at scale at SaaS companies.
Strong understanding of security frameworks, cloud security, risk management, and secure software development.
Expertise in security governance, threat modeling, and compliance frameworks (SOC 2, ISO 27001, GDPR, and emerging AI regulations).
Proven ability to manage incidents, lead cross-functional teams, and implement organisation-wide security practices.
Effective communicator with experience supporting enterprise customers and executive stakeholders.
Proven ability to represent the companys security posture to enterprise customers, partners, auditors, and regulators.
Relevant certifications (CISSP, CISM, or equivalent) preferred.
Experience as CISO in a publicly traded company or IPO planning is preferred.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8600325
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
In this position, you will have the autonomy to choose the best tools for the job, manage our corporate environment from the ground up, and have a direct impact on protecting the financial data of global enterprises while ensuring our team has the best technical tools to succeed.
What youll do
IT Operations & Employee Experience
Youll work closely with the CTO, engineering, and business teams, combining hands-on execution with real ownership and impact.
Manage corporate SaaS platforms, identity management (SSO), and Google Workspace.
Compliance & audits (SOC2, PCI)
Acting as the security point of contact for customers, auditors, and internal teams
Act as the primary technical point of contact for all employees, providing hands-on support and troubleshooting.
Deploy and operate endpoint security and management tools (EDR, MDM, DLP) across a distributed workforce.
Cloud & Infrastructure Security
Improve and maintain the security posture of our AWS/GCP-based cloud infrastructure.
Operate cloud security platforms, such as Upwind / Wiz / Oligo, or similar solutions to prioritize and remediate risks.
Design and enforce secure access controls and least-privilege IAM policies.
Investigate cloud security alerts and support incident response.
Application Security
Integrate security into the SDLC and CI/CD pipelines by automating SAST, SCA, and secret scanning.
Secure containerized workloads (Kubernetes / EKS) focusing on runtime protection and image hardening.
Provide guidelines and safeguards for AI-powered development processes and AI models within our SaaS platform.
Compliance & Security Culture
Support SOC2 and PCI DSS compliance initiatives and audit readiness.
Serve as the primary security focal point for external auditors.
Contribute to security awareness and best practices across the company, explaining the rationale behind security requirements.
Requirements:
5+ years of experience in Security Operations, Cloud Security, or IT Systems Administration in a high-growth environment.
Experience owning and managing employee-facing systems and IT environments- a must
Strong hands-on experience with cloud platforms (preferably AWS) - a must.
Experience with identity platforms and SaaS security (Google Workspace / SSO).
Familiarity with cloud security platforms (Upwind / Wiz / Orca or similar).
Experience securing container environments (Kubernetes / AWS EKS).
Strong Service-oriented mindset with excellent collaboration and communication skills.
Fluent English
Nice to Have
Experience in fintech or highly regulated environments.
Practical experience with PCI DSS and SOC2 audits.
Familiarity with MDM solutions (e.g., Kandji, Jamf) and EDR tools.
Working experience with Jira and GitHub.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8607471
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
We are looking for a Junior Cyber Security Specialist with a deep interest and basic knowledge of both information security and computer science. We are a cybersecurity firm specializing in advanced adversary simulation and offensive security testing. We deliver Red Team assessments for Fortune 500 companies, simulating sophisticated, real-world attacks across external, internal, cloud and Active Directory environments. Our services span both stealth-based Red Team operations and risk-focused assessments, covering a wide range of attack surfaces including on-premise and cloud environments.

Responsibilities:
Participate in Red Team and Risk assessments under the guidance of senior team members.
Assist in documenting findings, writing technical reports, and contributing to final deliverables for clients.
Learn and simulate attacker tactics, techniques, and procedures (TTPs).
Support Risk Assessments, where the objective is to identify vulnerabilities, especially in Active Directory, without the requirement for stealth. These engagements provide deep insight into systemic weaknesses and offer high exposure to internal infrastructure.
Contribute to external assessments, such as, perimeter testing, and reconnaissance.
Participate in our internal, hands-on training program, which covers red team TTPs, tool usage, internal methodologies, and real-world scenarios.
Requirements:
Requirements:
Strong interest in offensive security and Red Team methodologies.
Foundational understanding of Active Directory architecture, domain trust, Kerberos, GPOs, and domain privilege structures.
Familiarity with network protocols such as SMB, LDAP, DNS, and HTTP.
Knowledge of common attack techniques such as enumeration, privilege escalation, exploitation, credential dumping and C2 operations.
Ability to write or assist in technical documentation and reporting in English.
Comfortable working in a collaborative environment and eager to learn from experienced team members.
Experience with security tools such as - Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools.
Comfortable with basic scripting and using CLI tools.

Advantages:
Personal projects, CTF participation, or lab-based experience in offensive security.
Exposure to cloud environments (Azure, AWS, GCP).
Programming/scripting experience in Python, PowerShell, C++, C#, etc.
Hands-on experience with C2 frameworks (e.g., Cobalt Strike, Mythic, Sliver).
High level of spoken and written English, including the ability to clearly explain technical topics to both technical and non-technical audiences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8610264
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Herzliya
Job Type: Full Time
Our Security team is looking for a highly skilled and security-savvy Application Security Engineer to lead our product and application security efforts. In this role, you will drive security design, ensure secure coding practices, and validate our services and environments against the highest security standards.

You will work closely with our R&D and Product teams to identify, mitigate, and prevent security risks throughout the software development lifecycle (SDLC). As a senior engineer, you will own security initiatives, mentor developers on security best practices, and play a key role in shaping the security posture of our products.

The ideal candidate is highly motivated, eager to learn, and has a security by design mindset. This role provides career growth opportunities, enabling you to deepen your expertise in AppSec, DevSecOps, and cloud security.

What you'll do:
Partner with development and product teams to integrate security best practices into the SDLC.
Lead threat modeling and architecture security reviews to proactively identify and mitigate risks.
Conduct security assessments, including code reviews, vulnerability scans, penetration testing, and secure product design reviews.
Stay up to date with emerging security threats, vulnerabilities, and industry trends, ensuring we remain ahead of evolving risks.
Support and contribute to security incident response activities, including root cause analysis and post-incident improvements.
Automate security processes and integrate security tools within CI/CD pipelines.
Develop and deliver secure coding training to engineering teams.
Requirements:
What you have:
4+ years of experience in Application Security, Penetration Testing, or Product Security in a SaaS company.
Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
Deep understanding and hands-on experience of web application security, including OWASP Top 10, authentication, encryption, and secure coding principles.
Proficiency in scripting or programming languages (Python, JavaScript, Go, etc.) for security automation.
Experience with cloud security best practices (AWS, GCP, or Azure).
Hands-on experience with DevSecOps and integrating security tools into CI/CD pipelines.
Strong communication skills, with the ability to explain security risks and recommendations to technical and non-technical stakeholders, including executive management.
Experience working with large-scale, complex R&D environments

Bonus Points:
Being introduced by our team member.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8605892
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
13/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are currently seeking a skilled and dynamic Director of IT & Security to lead our IT department, managing on-prem and cloud infrastructure of the company.
In this pivotal role, you will lead the companys IT and Security strategy, overseeing both on-premises and cloud environments to ensure a robust, secure, and scalable infrastructure. Youll manage the full spectrum of IT operations, from system architecture and cybersecurity to vendor management and process optimization, ensuring business continuity and efficiency across all global sites.
Responsibilities
Oversee IT operations and supervise systems and IT staff both on-premises and cloud
Maintain and preserve a 24/7 production environment
Plan and manage the company's physical infrastructure and network design
Develop, manage, and track the IT department's annual budget including infrastructure, Software & Hardware in cloud and various geographical locations
Create and maintain processes and standards for selection, implementation, and support of systems
Lead the company Cyber security, operational and projects wise
Oversee the company's cybersecurity strategy, operations, and project execution.
Requirements:
10+ years experience as a system administrator/equivalent
10+ years experience managing an IT department and teams
Experience Planning and managing physical IT & Security infrastructure
Experience managing medium to large scale windows-based infrastructure across multiple locations
Experience with Macs and their relevant management systems (e.g. Jamf)
Familiarity with Web & DB servers, mainly Windows based
Familiarity with Kubernetes and DevOps - an advantage
Familiar with industrial workflows - an advantage
Experience in managing remote teams
Strong managerial skills both with employees, peers and management level
Experience with Procurement processes in medium-large scales
Proven skills of IT suppliers/Vendors management
Experience with AWS cost optimizations.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608312
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/04/2026
Location: Petah Tikva
Job Type: Full Time
Responsibilities
Develop, enforce, and maintain security policies and procedures for information systems in accordance with customer and corporate standards.
Manage the security authorization process to include supporting systems owners with accreditation and compliance reviews.
Monitor and manage security controls such as firewalls, access controls, data encryption, and system hardening.
Risk assessment and management to include conducting vulnerability assessments and developing risk mitigation strategies.
Incident response to include investigations, stakeholder communication, and reporting.
Manage and maintain personnel security qualifications, to include:
Initial processing
Briefings
Annual Trainings
Debriefings
Monitor secure facility compliance with facility accreditation standards.
Conduct inspections; manage preparations for and representation at security inspections and audits by customer security personnel.
Establish security trainings and briefings specifically tailored to the unique requirements of the program(s).
Assist with administering Insider Threat Awareness Program.
Oversee visitor and access control program.
Manage items lifecycle, to include creation, documentation, storage, transfer and destruction in accordance with customer procedures.
Support cross border collaboration and contribute to corporate best practices.
Maintain and administer information management plan for customer infrastructure.
Requirements:
Position Requirements

Prior experience as an Information System Security Officer or equivalent and at least eight years experience in the following areas:

Information Systems Security.

Implementation and administration of security processes and procedures.

Establishing and administering material control programs, including transfer, transmission, reproduction, destruction, and accountability.

Management of an accredited secure facility.

Delivering security awareness trainings and compliance programs.

Required Education/Skills:

Demonstrated leadership or command experience within the IDF, Police, or ISA

Working knowledge of cloud technologies and cloud-security frameworks.
Masterss degree in a relevant discipline (or equivalent) with 8+ years of security experience in support of sensitive programs within Defense Industry.

Must possess a high level of understanding of security related policies, procedures, and initiatives.

Ability to apply knowledge of security requirements in a complex multi-level secure environment to ensure program compliance.

Ability to work independently to identify, assess & resolve unique security situations to facilitate contract performance within the bounds of security.

Highly proficient written and verbal communications skills with emphasis on clear and concise presentation of complex information.

Must have a professional demeanor, good people skills, ability to communicate effectively, and be able to perform in a dynamic environment.

Full professional proficiency in English; portions of the recruitment process will be conducted in English.
Strong analytical and technological systems-evaluation capabilities.
Background in a global, matrixed corporate or cloud-service organization.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8624043
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
looking for a Compliance Analyst to join the CISO team. Reporting to the GRC Team Leader, you will fulfill an essential role, joining the team in accomplishing important Compliance projects, ensuring that all systems and products are safe and meet the required standard.

What will you actually be doing?
Track enterprise compliance across multiple security frameworks including security, privacy and AI frameworks (ISO, SOC, etc) and maintain up-to-date records of requirements and corresponding mitigating controls.

Continuous monitoring of internal security processes to ensure compliance, and liaise with IT and business stakeholders to confirm current security arrangements and maintain systems security process.

Assist with the education and awareness programs to promote security and privacy in the company.

Creatively overcome obstacles so that the Compliance Controls will continuously operate alongside the business activities.

Review proposed changes on an ongoing basis to determine the impact on security and privacy.
Requirements:
1-2 years of experience in security compliance frameworks such as ISO 27001 and SOC 2.

High level of professionalism, analytical, detail-oriented, proactive, organized, responsible, deadline-focused, self-driven and highly motivated with a can do attitude.

Ability to work with cross-functional teams, maintain strong working relationships, and maximize collaboration.

BSc. in Computer Science, Information Systems or other information security-related certificates - Advantage.

Experience with Jira and Confluence - Advantage.

Experience in implementing compliance tools - Advantage.

Experience working in a Global, International, SaaS Company as an in-house Compliance function - Advantage.

Excellent written and verbal communication skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8636263
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and English Speakers
we are looking for highly capable Incident Response Expert. The Incident Response Expert role includes conducting in-depth forensic analysis, investigation and response to real-world cyber threats. A significant part of our investigations is performed onsite at the client location, in collaboration with the clients IT and security teams.
Main Responsibilities:
Participate in forensic and incident response investigations, including large scale sophisticated attacks, conduct log analysis, host and network-based forensics and malware analysis.
Participate in threat hunting: proactively hunt for targeted attacks and new emerging threats in clients networks; as well as security assessments and simulations.
Identify indicators of compromise (IOCs) and tools, tactics, and procedures (TTPs) to help ascertain whether and how breaches have occurred.
Utilize and develop tools and methodologies to improve existing investigative and hunting technological stack.
Collaborate with IT and Security teams during investigations.
Generate and present a comprehensive and professional report of findings from investigations.
Requirements:
At least 3 years of a relevant experience (from military service and/or industry).
Bright, curious and determined team player, who strive for excellency.
Problem solver, in-depth thinker with growth mindset.
Demonstrated in-depth understanding of the life cycle of advanced security threats, attack vectors and variant methods of exploration.
Deep technical understanding of network fundamentals and common Internet protocols.
Solid understanding of system and security controls on at least two OSs (Windows, Linux / Unix and MacOS), including host-based forensics and experience with analyzing OS artifacts.
Fluency with one or more scripting language (i.e. Python).
Multidisciplinary knowledge and competencies, such as:
Hands-on experience in data analysis (preferably network traffic or log analysis) in relevant data analysis and data science platforms (Jupyter, Splunk, pandas, SQL).
Familiarity with cloud infrastructure, web application and servers, android and iOS mobile platforms.
Experience with malware analysis and reverse engineering.
Familiarity with enterprise SIEM platforms (e.g. Splunk, QR.adar, ArcSight).
Excellent communication and interpersonal skills. Fluent English, including the ability to document and explain technical information in a concise, understandable manner.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616665
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
27/04/2026
חברה חסויה
Location: Tel Aviv-Yafo and Netanya
Job Type: Full Time
Required Offensive Security Team Lead
As an Offensive Security Team Lead, you will spearhead our offensive security operations and lead advanced threat research initiatives, playing a pivotal role in safeguarding our organization and customers from evolving cyber threats. You will develop and execute Red Team exercises, simulate real-world attacks, and identify security weaknesses in our systems and applications. We seek a highly skilled, proactive tech leader who thrives in challenging environments and is passionate about advancing security research and offensive strategies.
As an Offensive Security Team Lead, you will
Lead, plan, design, and execute Red Team operations, threat modeling, and adversarial simulations against our infrastructure and cloud environments
Drive threat research and intelligence initiatives to stay ahead of emerging cyber threats, attack techniques, and vulnerabilities
Develop and execute advanced attack scenarios to assess security defenses and provide actionable recommendations for improving our security posture
Collaborate closely with security engineering, DevOps, and software development teams to implement findings and enhance our defenses
Lead the development of tooling, frameworks, and methodologies to automate and optimize Red Team exercises
Mentor and guide a team of security professionals, fostering a culture of innovation, collaboration, and continuous learning
Participate in incident responses when Red Team exercises reveal vulnerabilities, providing expertise on attack techniques, forensics, and post-attack mitigation
Continuously assess and improve security processes, playbooks, and threat detection mechanisms.
Requirements:
7+ years of experience in offensive security operations, Red Teaming, threat hunting, or threat research
Deep knowledge of attack techniques, TTPs (Tactics, Techniques, and Procedures), adversary simulations, and threat-hunting methodologies
Hands-on experience with Red Team tools, frameworks (e.g., Metasploit, Cobalt Strike, Burp Suite), and custom exploit development
Strong experience with cloud platforms (AWS, GCP, Azure) and containerized environments (Kubernetes, Docker)
Familiarity with the MITRE ATT&CK Framework and its application in Red Team and threat-hunting scenarios
Proficiency with scripting and automation languages for tool development, threat detection, and attack simulation
Solid understanding of offensive security best practices, vulnerability management, threat detection, and advanced threat analysis
Ability to effectively communicate and collaborate with cross-functional teams, translating complex security concepts into actionable insights
A passion for continuous learning, research, and innovation in the fields of offensive security, threat hunting, and cyber threats.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8625654
סגור
שירות זה פתוח ללקוחות VIP בלבד