דרושים | עבודה | חיפוש משרות אבטחת מידע

CISO & Head of IT
Wed, 25 Feb 2026 15:11:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, מחשבים ורשתות, מנהל IT, מערכות מידע, מנהל פרויקטים במערכות מידע, מנהל אבטחת מידע / סייבר / CISO, מומחה אבטחת מידע / סייבר 
סוג/היקף המשרה: משרה מלאה 
seeking a senior, hands-on CISO & Head of IT to act as "one-man-show" authority for IT operations and information security. This role owns IT and Information Security e2e for core business functions:
setting direction, making structural and vendor decisions, and defining what "good" looks like, while also answering questions in real time, exercising sound judgment, and taking ownership when issues arise.
This is a highly visible leadership role focused on judgment, ownership, and practical execution.

Key Responsibilities

Information Security & Risk

Build and maintain a pragmatic information security and IT risk management program aligned with business priorities.
Lead security risk assessments and drive remediation in partnership with engineering, IT, and business teams.
Define and maintain security policies, standards, and secure-by-design practices in collaboration with our Product House organization.
Promote security awareness and accountability across the company, including ownership of employee security training programs.
IT Ownership

Own internal IT environment, including identity and access management (e.g., Okta), Google Workspace, endpoints, and core SaaS tools.
Ensure smooth employee onboarding and offboarding.
Act as a point of escalation for IT issues and access problems, including hands-on work.
Manage external IT service providers and helpdesk vendors, including SLAs and escalation.
Security Operations

Own the overall effectiveness of security monitoring, detection, and response.
Design and maintain preventive controls, processes, and readiness measures to reduce the likelihood and impact of data security incidents.
Ensure vulnerabilities, findings, and incidents are identified, prioritized, and addressed.
Lead preparation for security incidents, including incident response planning, tabletop exercises, and coordination with Legal, Product House, and external partners.
Stay current on emerging threats and translate them into practical, risk-based improvements for the business.
Audits, Customers & Vendors

Lead security audits and certifications (e.g., SOC 2, ISO 27001) and serve as the primary contact for auditors.
Personally own customer security questionnaires and security discussions.
Partner closely with Legal on privacy, regulatory, and contractual security matters.
Oversee the IT and security budget and manage relevant vendors and advisors.
Requirements:
8+ years of experience across IT operations and information security, preferably in a SaaS or cloud environment.
Hands-on experience with enterprise IT systems (e.g., Google Workspace, Okta) and security governance frameworks (SOC 2, ISO 27001).
Experience supporting audits, certifications, and customer security requirements.
Ability to manage vendors and drive outcomes through others.
Strong communication skills and sound judgment in balancing risk, speed, and practicality.
Security certifications (e.g., CISSP, CISM) are a plus, not a requirement.
Full professional proficiency in English is required.
This position is open to all candidates.
Cyber Threat Researcher- Customers
Wed, 25 Feb 2026 14:48:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
we are seeking a Threat Researcher to analyze enterprise environments and strengthen network resilience. This role focuses on researching device configurations, network relationships, and lateral movement opportunities, while developing methods and tools to harden infrastructures against advanced threats.
The ideal candidate will also support PoCs by applying research capabilities to real-world govermental environments and working closely with customers to validate threat scenarios and demonstrate cyber value.
The Responsibilities
Analyze various network devices, configurations, and security products
Implement methods and algorithms to discover network topology, relationships between devices, and potential lateral movement paths
Conduct network security assessments to identify weaknesses in customers' network infrastructure and recommend mitigations to monitor and limit unauthorized access
Develop research tools and frameworks to perform automatic analysis of network devices and security products
Research and analyze network-related cybersecurity threats and trends
Drive threat research efforts in customer and PoC environments to uncover, simulate, and validate real-world attack scenarios, demonstrating cyber value through our company Securitys platform capabilities
Translate technical research findings into actionable insights for customer-specific environments.
Work closely with other internal engineering and AI teams to integrate new capabilities into our platform and guide cross-product architectural decisions
Act as a security subject matter expert for multidisciplinary teams
Produce technical reports and research publications to share findings and methodologies.
Requirements:
5+ years of experience in the cybersecurity landscape
Strong understanding of network protocols, routing, switching, and firewalling
Experience with enterprise security products and configurations
Strong understanding of security across identity/IAM, cloud/virtualization, network topologies, lateral movement techniques, and attack surface modeling
Excellent problem-solving, research, and communication skills
Strong collaboration skills with the ability to work across departments to bring research into practice
Advantages:
Experience with IR/Threat hunting operations
Experience in a customer-facing role.
This position is open to all candidates.
Cyber Research Team Lead - Posture
Wed, 25 Feb 2026 14:36:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר, ראש צוות פיתוח אבטחת מידע / סייבר 
סוג/היקף המשרה: משרה מלאה 
We are seeking an experienced, visionary Cyber Research Team Lead to guide and grow a multidisciplinary cyber research team. You will lead a group of domain experts - from network engineers and identity specialists, to red-teamers, protocol researchers, penetration testers, data analysts and cloud/virtualization experts - working collaboratively to build our next-gen AI-based posture management platform. As team lead, you will both manage the team and shape the research agenda: coordinating cross-domain investigations, defining priorities, mentoring researchers, and ensuring that research output feeds directly into scalable, intelligent workflows and product capabilities.
If youre passionate about cyber research, enjoy nurturing technical talent, and thrive on building complex, multi-domain security products - this is your chance to build and lead a research team that defines how AI defends modern enterprise infrastructure.
The Responsibilities
Lead, mentor, and coordinate a diverse, multi-domain cyber research team.
Define and drive the teams research agenda, establishing multi-domain security research priorities aligned with company goals and product roadmap.
Translate research findings into actionable AI-based deliverables - such as automated workflows and agentic flows integrated into the AI-based posture management product.
Coordinate and work in multidisciplinary squads to build customer facing product, ensuring real-world relevance and impact.
Maintain research excellence and innovation culture - encourage internal knowledge-sharing, code/tool reuse, and continuous learning.
Recruit, grow, and manage talent -identify skill gaps, hire new researchers, mentor researchers, and foster a collaborative, high-performance team environment.
Stay current with emerging cyber threats, infrastructure trends (cloud, virtualization, identity systems), adversarial techniques and AI-driven security trends - and evolve research strategies accordingly.
Requirements:
7+ years of hands-on cybersecurity research, including leadership of multidisciplinary teams.
Strong technical depth in multiple security domains, such as (but not limited to):
-Network security: protocols, traffic analysis, lateral movement.
-Identity/IAM: AD, Azure AD/Entra, Kerberos, OAuth/OIDC, SAML, privilege escalation.
-Cloud & virtualization: AWS/Azure/GCP, Kubernetes, container and hypervisor security.
-Offensive research: exploit development, red teaming, protocol reverse engineering.
Ability to review and guide complex research, validate PoCs, and challenge technical assumptions.
Proven experience translating research into product-ready deliverables.
Strong understanding of attacker TTPs in the context of complex large-scale enterprise networks.
Excellent leadership and communication skills - able to mentor experts, drive priorities, and coordinate cross-functional work with engineering and product.
This position is open to all candidates.
AI Cyber Security Researcher
Wed, 25 Feb 2026 14:35:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
: Were looking for a hands-on AI Cyber Intelligence Engineer - in the domain of attack surface. Someone who lives and breathes cyber security, loves exploring how attackers move through real environments, and is excited to shape how AI can automate and extend that process.
In this role, youll analyze real-world environments, identify potential attack vectors, and work closely with our AI engineering teams to translate your domain expertise into actionable, intelligent workflows. Youll play a key role in guiding how our platform learns to think and act like a top-tier security analyst.
The Responsibilities
Design and shape AI-driven security agents by encoding expert attacker and defender reasoning into agentic flows, prompts, decision logic, and investigative strategies.
Translate offensive security and red-team expertise into structured knowledge that enables AI systems to identify, prioritize, and reason about real-world attack paths in complex enterprise environments.
Model attacker behavior and multi-step attack scenarios, focusing on lateral movement, privilege escalation, and cross-domain exploitation - and guide how AI agents simulate and evaluate these scenarios.
Act as a domain expert partner for product and engineering teams, ensuring AI-driven security decisions remain grounded in real attacker tradecraft and operational reality.
Requirements:
5+ years of experience in cybersecurity research, offensive security, penetration testing, red teaming, threat analysis, or related security engineering roles.
Demonstrated experience in penetration testing and adversary simulation against complex enterprise environments.
Strong understanding of security across network, identity/IAM, cloud/virtualization, and systems/protocols
Experience analyzing attacks, lateral movement, pivoting, privilege escalation, and detection gaps.
Curiosity and understanding of modern AI techniques - or a strong motivation to partner with AI experts to integrate domain knowledge into intelligent systems.
Excellent communication, teamwork, and problem-solving skills.
This position is open to all candidates.
Malware Researcher- CTI
Wed, 25 Feb 2026 14:28:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
As a Malware Researcher, you will analyze and reverse engineer malware and tooling used by advanced threat actors, particularly those targeting governments and critical infrastructure. You will apply deep expertise in binary and script analysis to uncover capabilities, configurations, and C2 infrastructure for threat actor attribution and mitigations.
Your work will power our companys malware catalog, strengthen our understanding of threat actors technical capabilities, and directly support the development of next-generation AI-driven "artificial cyber researchers".
The Responsibilities
Perform in-depth static and dynamic analysis of malware, implants, loaders, and related tooling used by APTs and other sophisticated adversaries.
Reverse engineer binaries and scripts (e.g., PE, ELF, .NET, PowerShell, JavaScript/VBA) to determine capabilities, execution flow, persistence mechanisms, and evasion techniques.
Extract and document configuration data and C2 information, and map these to campaigns, infrastructure, and threat actors in collaboration with CTI researchers.
Develop and maintain detection and hunting artifacts such as YARA rules, VT LiveHunt queries, CAPA rules, and sandbox behavior signatures.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
4+ years of experience in cyber security, with significant hands-on experience in malware research focused on APTs and state-linked actors.
Strong proficiency with RE tools such as IDA Pro, Ghidra, x64dbg/WinDbg, and common dynamic analysis/sandbox environments.
Deep understanding of OS internals (Windows/Linux/Android/Mac), common persistence and execution techniques, and modern offensive tradecraft.
Demonstrated experience extracting configs, C2 endpoints, and capabilities from both compiled and scripted malware.
Strong investigative mindset, attention to detail, and ability to work with incomplete or obfuscated data.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
מנהל /ת הגנת סייבר ואבטחת מידע
Wed, 25 Feb 2026 14:13:00 GMT
מיקום המשרה: חולון 
תחומי המשרה: אבטחת מידע וסייבר, מנהל אבטחת מידע / סייבר / CISO 
סוג/היקף המשרה: משרה מלאה, עבודה היברידית 
תיאור המשרה:
בניית והובלת אסטרטגיית אבטחת מידע וסייבר.
ניהול תוכנית עבודה שנתית/רבשנתית ועמידה ביעדים.
ניהול סיכונים, סקרים וציות (GRC).
ניהול סיכוני ספקים וצד ג': בדיקות ספקים, דרישות אבטחה חוזיות, מעקב אחר עמידה ותיקון ממצאים.
הפעלת ספקי אבטחת מידע.
ניהול SOC חיצוני: הגדרת שירות, בקרה, מדדים, ותהליכי ניטור ותגובה.
ניהול אירועי סייבר: תהליכי תגובה לאירועים, תרגולים, ניהול משברים והפקת לקחים.
אבטחת מידע בפרויקטים ופיתוח: ליווי היבטי אבטחת מידע משלב ההסכם ועד לעליה לאוויר.
פרטיות והגנת מידע אישי: ניהול הבטי הגנת הפרטיות בשיתוף פעולה עם DPO החברה.
תוכנית הדרכות ארגונית, סימולציות פישינג והטמעת תרבות אבטחה.
הצגה בוועדות שונות / דירקטוריון.
הובלה/ ליווי תחום המשכיות עסקית (BCP/DR) והיערכות לאירועי חירום.
דרישות:
ניסיון משמעותי קודם בתפקיד CISO (עדיפות לתפקיד אחרון) - חובה.
יכולת הובלה, הנעה וביצוע ברמה גבוהה.
יחסי אנוש מצוינים ויכולת עבודה בצוות.
יכולות פרזנטציה והצגת מסרים להנהלה ולדירקטוריון.
עצמאות, יוזמה ויכולת קבלת החלטות.
נכונות לעבודה מול ממשקים רבים, כולל גורמים בכירים בארגון.
התפקיד כולל יום עבודה מהבית. המשרה מיועדת לנשים ולגברים כאחד.
Threat Engineering Team Lead- Detection & Response
Wed, 25 Feb 2026 14:09:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, ראש צוות פיתוח אבטחת מידע / סייבר 
סוג/היקף המשרה: משרה מלאה 
We are on the lookout for a driven and experienced hands-on Team Leader to lead a group of cyber security experts responsible for our detection platform.
In this role, you will lead a team of security engineers and own the security coverage and accuracy of our detection platform to guide development and strengthen our customers' resilience to emerging unknown threats. Your expertise in cyber security will drive our true AI-driven detection platform.
The Responsibilities
Mentor engineers, grow the team, and foster a culture of technical excellence and innovation.
Work closely with developers and data scientists to produce AI detection models.
Apply your cyber expertise to investigate emerging threats and define technical requirements to mitigate them.
Continuously assess and evaluate security coverage and accuracy.
Architect and build scalable solutions for evaluating the platform security metrics.
Bring your excellent interpersonal skills to foster collaboration and maintain a positive attitude within the team.
Requirements:
5+ years of experience in the cybersecurity field.
2+ years leading and mentoring.
Understanding the threat landscape, attacker's mindset and techniques.
Background in malware analysis and OS internals.
Solid coding skills with the ability to dive into internals and develop proof-of-concepts.
Strong debugging skills and analytical thinking.
Previous member of a red team- an advantage.
Strong ownership and leadership skills, with a track record of driving initiatives forward.
Work well within a team.
This position is open to all candidates.
Threat Engineer- Detection
Wed, 25 Feb 2026 14:08:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, מהנדס סייבר 
סוג/היקף המשרה: משרה מלאה 
Were looking for a Threat Engineer to assess and develop our state-of-the-art detection solution. In this role, you will own the security coverage of our detection platform and guide development to strengthen our customers' resilience to emerging unknown threats. Your expertise in cyber security will drive our true AI-driven detection platform.
The Responsibilities
Work closely with developers and data scientists to produce AI detection models.
Apply your cyber expertise to investigate emerging threats and define technical requirements to mitigate them.
Continuously assess and evaluate security coverage and false-positive rates.
Architect and build scalable solutions for evaluating the platform security metrics.
Bring your excellent interpersonal skills to foster collaboration and maintain a positive attitude within the team.
Requirements:
5+ years of experience in the cybersecurity field.
Understanding the threat landscape, attacker's mindset and techniques.
Background in malware analysis and OS internals.
Solid coding skills with the ability to dive into internals and develop proof-of-concepts.
Strong debugging skills and analytical thinking.
Previous member of a red team- an advantage.
Strong ownership and leadership skills, with a track record of driving initiatives forward.
Work well within a team.
This position is open to all candidates.
Threat Intelligence Researcher- CTI
Wed, 25 Feb 2026 14:07:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
We are on an expedition to find you, someone who is passionate about turning research into reliable, production-grade capabilities. Youll play a major role in building and shaping our next-gen CTI platform across attribution, pivoting, infrastructure prediction, EASM, and the STIX/OpenCTI knowledge base.
The Responsibilities
Execute the CTI research roadmap across attribution, infra prediction, EASM, and the STIX knowledge base.
Design and implement graph-pivoting, attribution heuristics, and temporal/link models (sequence/survival/Hawkes-style).
Build high-signal EASM detectors: passive discovery and safe active probing per ROE; capture reproducible evidence.
Normalize, enrich, and deduplicate intel into STIX 2.1 aligned to our ontology; maintain/enhance TAXII/OpenCTI/MISP connectors.
Ship detectors/models and enrichment services with AI/Platform teams; contribute tests, docs, and runbooks.
Curate datasets, define ground truth, and evaluate KPIs (coverage, lead-time, precision/recall, FPR); iterate to improve signal-to-noise.
Produce watchlists, concise briefs, and early-warning hypotheses for stakeholders and priority investigations.
Uphold governance, ethics, provenance, and data-quality standards.
Requirements:
4-7+ years in CTI/EASM/offensive research or adversary-infra analysis.
DNS, BGP/ASNs, TLS/PKI & CT logs, hosting/CDN/cloud patterns, domain lifecycle, phishing ecosystems.
Communities/embeddings/clustering; temporal/link modeling and practical evaluation.
Passive discovery and safe active probing; evidence discipline and noise reduction.
STIX 2.1, ATT&CK, TAXII; advantage for OpenCTI/MISP; ontology alignment and validation.
Python (pandas, notebooks, scikit-learn, networkx/igraph); Neo4j/Elasticsearch; Kafka/SQS/Redis; Docker/Kubernetes.
Prompting/tool-use for extraction/normalization; agentic patterns with guardrails and sanity checks.
Analytical writing; collaborative, version-controlled workflow (Git); documentation rigor.
This position is open to all candidates.
Threat Intelligence Analyst- CTI
Wed, 25 Feb 2026 14:06:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, אנליסט סייבר 
סוג/היקף המשרה: משרה מלאה 
We are on an expedition to find you, someone who is passionate about turning research into reliable, production-grade capabilities. Youll play a major role in building and shaping our next-gen CTI platform across attribution, pivoting, infrastructure prediction, EASM, and the STIX/OpenCTI knowledge base.
The Responsibilities
Execute the CTI research roadmap across threat actor attribution, adversary infrastructure analysis, EASM insights, and STIX-based knowledge management.
Conduct in-depth infrastructure and campaign analysis, including domain/IP relationships, hosting patterns and certificates.
Identify, validate, and track Indicators of Compromise (IOCs) and emerging threats using passive sources and approved active campaigns.
Normalize, enrich, deduplicate, and maintain intelligence in STIX 2.1, aligned with internal ontology and quality standards.
Collaborate with the Engineering, MLOps, and Data teams to translate intelligence into actionable intelligence, alerts, and customer-facing outputs.
Produce high-quality intelligence reports, threat briefs, watchlists, and early-warning assessments for internal teams and customers.
Support investigations by providing contextual analysis, confidence scoring, and evidence-backed assessments.
Ensure adherence to governance, ethics, sourcing, provenance, and data-quality standards across all intelligence outputs.
Requirements:
4+ years of experience in Cyber Threat Intelligence, SOC/IR intelligence support, or adversary infrastructure analysis.
Strong understanding of DNS, IPs, ASNs, hosting/cloud providers, TLS/PKI, domain lifecycle, and phishing infrastructure.
Hands-on experience with open-source and commercial CTI sources (OSINT, feeds, telemetry, reputation systems).
Practical knowledge of STIX 2.1, MITRE ATT&CK, TAXII; experience with OpenCTI and is a strong advantage.
Ability to perform passive discovery and controlled active validation, with a focus on accuracy, evidence discipline, and noise reduction.
Experience using Python for analysis and enrichment (pandas, notebooks); familiarity with Neo4j or Elasticsearch is a plus.
Strong analytical and threat-intelligence writing skills, able to translate technical findings into clear, actionable insights.
Comfortable working in a collaborative, version-controlled environment (Git), with attention to documentation and reproducibility.
Curious, methodical, and impact-driven mindset with a strong sense of intelligence rigor and accountability.
This position is open to all candidates.
Senior Malware Researcher
Wed, 25 Feb 2026 13:58:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
At our company, we redefine cyber defense vision by combining AI and human expertise to create products that protect nations and critical infrastructure. This is more than a job; its a Dream job. we are where we tackle real-world challenges, redefine AI and security, and make the digital world safer. Lets build something extraordinary together.
our company's AI cybersecurity platform applies a new, out-of-the-ordinary, multi-layered approach, covering endless and evolving security challenges across the entire infrastructure of the most critical and sensitive networks. Central to our our company's proprietary Cyber Language Models are innovative technologies that provide contextual intelligence for the future of cybersecurity.
At our company, our talented team, driven by passion, expertise, and innovative minds, inspires us daily. We are not just dreamers, we are dream-makers.
The Dream Job
As a Senior Malware Researcher, you will analyze and reverse engineer malware and tooling used by advanced threat actors, particularly those targeting governments and critical infrastructure. You will apply deep expertise in binary and script analysis to uncover capabilities, configurations, and C2 infrastructure for threat actor attribution and mitigations.
Your work will power our companys malware catalog, strengthen our understanding of threat actors technical capabilities, and directly support the development of next-generation AI-driven "artificial cyber researchers".
The Responsibilities
Perform in-depth static and dynamic analysis of malware, implants, loaders, and related tooling used by APTs and other sophisticated adversaries.
Reverse engineer binaries and scripts (e.g., PE, ELF, .NET, PowerShell, JavaScript/VBA) to determine capabilities, execution flow, persistence mechanisms, and evasion techniques.
Extract and document configuration data and C2 information, and map these to campaigns, infrastructure, and threat actors in collaboration with CTI researchers.
Develop and maintain detection and hunting artifacts such as YARA rules, VT LiveHunt queries, CAPA rules, and sandbox behavior signatures.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
7+ years of experience in cyber security, with significant hands-on experience in malware research focused on APTs and state-linked actors.
Strong proficiency with RE tools such as IDA Pro, Ghidra, x64dbg/WinDbg, and common dynamic analysis/sandbox environments.
Deep understanding of OS internals (Windows/Linux/Android/Mac), common persistence and execution techniques, and modern offensive tradecraft.
Demonstrated experience extracting configs, C2 endpoints, and capabilities from both compiled and scripted malware.
Strong investigative mindset, attention to detail, and ability to work with incomplete or obfuscated data.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
Security Researcher
Wed, 25 Feb 2026 13:53:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
We are on an expedition to find you, someone who is passionate about creating intuitive, out-of-this-world security research. You'll help us harness the power of our companys trillions of security signals to rapidly diagnose and alert the latest attacker behaviors, drive critical context-rich signals, construct new tools and automations to support customers, identify threats, and detect advanced attacker techniques.
The Responsibilities
Analyze various network devices, configurations and security products
Implement methods and algorithms to discover network topology, relationships between devices and potential lateral movement paths
Conduct network security assessments to identify weaknesses in customers network infrastructure, and recommend mitigations to monitor and limit unauthorized access
Develop research tools and frameworks to perform automatic analysis of network devices and security products
Research and analyze network-related cybersecurity threats and trends
Work closely with other internal engineering and AI teams to integrate new capabilities into our platform and guide cross-product architectural decisions
Act as a security subject matter expert for multidisciplinary teams.
Requirements:
5+ years of experience in cybersecurity landscape
Deep understanding of networking technologies and protocols, network security principles, firewalls, network access controls and network-based attacks
Experience in monitoring or analyzing network topologies, captures and flows
Deep knowledge in security mechanisms, products, detection techniques
Strong coding skills, with ability to develop end-to-end POC for new security capabilities
Excellent communication and team collaboration skills
Fluency in English.
This position is open to all candidates.
Senior Threat Intelligence Researcher
Wed, 25 Feb 2026 13:52:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
As a Senior Threat Intelligence Researcher, you will be responsible for tracking advanced adversaries and leveraging your deep technical expertise across attacker capabilities, infrastructure, and tactics. You will create and refine approaches to uncover and monitor active threat actors, as well as surface irregular and emerging behaviors in the broader threat landscape. The intelligence you generate will directly strengthen our companys understanding of threat actors and will inform proactive hunting, detection engineering, and defensive decision-making.
The Responsibilities
Lead complex threat intelligence investigations through in-depth analysis of the global threat landscape, with a focus on advanced and state-linked actors.
Define and prioritize threat research focus areas (actors, campaigns, sectors, techniques) aligned with our companys customers and product roadmap.
Deliver actionable cyber threat intelligence and design and execute hunting campaigns using analytics, automation, and advanced AI capabilities.
Curate and maintain structured knowledge on actors, campaigns, infrastructure, and TTPs in our companys internal threat knowledge base.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
7+ years of experience in cyber security, with significant hands-on experience in threat intelligence research focused on APTs or state-linked actors.
Detailed understanding of existing APT groups historical activities, TTPs, motivations, and targeting patterns.
Strong investigative mindset, high level of intellectual curiosity, and comfort working with incomplete or ambiguous data.
Proficiency in infrastructure research, including WHOIS, passive DNS, SSL certificate analysis, BGP/ASN data, and platforms such as Censys and VirusTotal.
Strong written and verbal communication skills, with experience producing clear and concise threat intelligence reports or briefs.
Experience in software development and data analysis (e.g., Python, Jupyter, or similar) to support investigations and hypothesis testing.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
Senior Security Engineer
Tue, 24 Feb 2026 18:39:00 GMT
מיקום המשרה: נתניה 
תחומי המשרה: אבטחת מידע וסייבר, מהנדס סייבר, ניהול ביניים, Senior Security Specialist, Senior Security Specialist 
סוג/היקף המשרה: משרה מלאה, עבודה היברידית 
Were hiring a Senior Security Engineer to help shift security left across product and platform teams, while also supporting internal corporate security needs. Youll drive impact through enablement, automation, and practical risk reduction.
Why this role matters?
Youll secure both what we build and how we work. That means embedding security into our products and CI/CD, and also supporting internal teams.
Security here is not a gate; its a force multiplier. Youll help engineering teams move faster safely, and ensure our colleagues have a secure foundation to do their best work.
Success means faster, safer releases and fewer reactive security escalations.
What will you do?
As a Senior Security Engineer, your mission will be to:
Partner with developers to embed security into design, build, and deploy stages
Automate vulnerability triage and mitigation flows
Secure CI/CD pipelines (GitHub, Jenkins) and execution environments (Kubernetes, Docker)
Tune WAFs, manage cloud security (AWS, GCP, Azure), and evolve Terraform practices
Support internal teams with secure production accesses, endpoint hardening, and access policies
Lead security reviews across app, infra, and corporate environments
Advocate for security standards with clarity and empathy
The Team Environment:
Youll join a cross-cultural, globally distributed security team that thrives on collaboration, curiosity, and continuous learning. We bring together a wide range of experiences and backgrounds to solve meaningful problems.
We support each other through knowledge sharing sessions, workshops, and async collaboration. Youll have the chance to attend industry conferences, participate in internal guilds, and continuously sharpen your skills using our dedicated security training platform.
How we work:
Autonomy with alignment: own your work, stay connected to purpose
Bias for action: ship, learn, improve
Enablement mindset: security exists to empower teams, not slow them down
Simple and pragmatic: perfect is the enemy of shipped
Please submit your CV in English.
Requirements:
You might be a fit if you:
See security as an enabler of speed, not an obstacle
Are comfortable in cloud and on-prem worlds
Value autonomy, and naturally take ownership from idea to execution
Can zoom out to prioritize risks and zoom in to fix root causes
Communicate clearly with devs, ops, and business teams alike
Eager to work in a technically challenging environment
Youll grow by working with:
Terraform, Docker, Kubernetes
Modern security tools
GitHub Actions, Jenkins
AWS, Azure, GCP
Teams building external-facing services (web apps, APIs) and internal platforms (CI/CD, admin tooling) to embed security by design.
Supporting a public company environment with compliance requirements across multiple standards, including SOC 2 and ISO 27001
Skills that help (well support your growth):
Application Security: code review, threat modeling, WAF
CloudSec: IAM, policy-as-code, workload hardening
On-Prem/Corporate: endpoint protection, monitoring and production access control
Communication: making risk visible and actionable.
This position is open to all candidates.
Senior Backend Engineer - Core Group
Tue, 24 Feb 2026 17:05:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: תוכנה, אבטחת מידע וסייבר, איש אבטחת מידע / סייבר, ניהול ביניים, Senior Backend Developer, Senior Backend Developer, Backend Engineer 
סוג/היקף המשרה: משרה מלאה 
Are you a super-talent Senior Software Engineer with a deep passion for cybersecurity and a profound understanding of AI-driven attack techniques? We are looking for a highly professional and responsible R&D member to join our team.
This role is for someone who thrives on technical challenges and is ready to leverage their expertise to identify, analyze, and defend against advanced cyber threat
Responsibilities:
As a Senior Software Engineer in R&D, you will be a key player in the design, development, and deployment of our cybersecurity platform. Your responsibilities will include:
Leading the research and implementation of techniques to identify and mitigate AI-related attack methods, such as data manipulation and adversarial attacks on security systems.
Developing and integrating new security features into our platform to proactively defend against modern cyber threats.
Collaborating with our team to define technical requirements and architectural solutions for cutting-edge security features.
Tackling challenging technical problems at the intersection of cybersecurity and low-level systems.
Requirements:
Minimum of 5 years experience in software development
Background in cybersecurity is a plus.
Languages: Extensive experience with Java, JavaScript/TypeScript, or Scala.
Distributed Systems: Proficiency with Node.js, Apache Flink, Apache Spark, and Apache Airflow.
Containerization & Orchestration: Strong knowledge of Docker and Kubernetes (K8s).- MUST
Microservices: Experience designing and implementing microservices architectures.- MUST
Big Data: Hands-on experience with big data technologies and processing.
Bonus: AI Knowledge
This position is open to all candidates.
SoC / IP Architect
Tue, 24 Feb 2026 15:43:00 GMT
מיקום המשרה: חיפה 
תחומי המשרה: תוכנה, אבטחת מידע וסייבר, ארכיטקט מערכת תוכנה, SOC/SIEM 
סוג/היקף המשרה: משרה מלאה 
Chips Talk, We Listen
we are a game-changing startup that's giving advanced electronics the power to report on their own health. In a digital world built for autonomous driving, cloud computing, and AI, we depend on computing systems daily. But how can we guarantee their safety, reliability and functionality? we are the first-ever company to provide visibility into next-gen chips while they are operating, based on the power of on-chip monitoring, machine learning, and data analytics.
Here at our company, you'll be part of a team that's unlocking deep insights to make electronics more reliable, efficient, and high-quality. We're trusted by industry leaders in data centers, automotive, communications, and consumer devices - we work with the world's largest and most notable companies in tech.
Why our company is a great place to work:
Fast-paced and impactful: We're a mission-driven startup, so you'll tackle new challenges daily, wear many hats, and see your work directly influence the future of electronics.
Supportive company culture: Learn from the best. Our 200+ team members are experts in their field with a proven track record of success, and they're committed to fostering a collaborative and supportive work environment.
International presence: We're a multinational company with a diverse team across multiple locations around the globe. You'll collaborate on projects with international impact, gaining a global perspective of the tech industry.
Work with industry leaders: Our solutions are used by the biggest names in tech. You'll be part of the team creating the next generation of groundbreaking products.
Cutting-edge playground: We use the latest machine learning, platforms, and tools to push boundaries and achieve breakthroughs.
Real-world impact: Our work keeps data centers, cars, and other critical systems running smoothly. Your work will directly contribute to safer, more reliable electronics.
We are here for the win: Backed by industry veterans and leading investors, we offer a stable and secure work environment with plenty of room for growth.
we are looking for a SoC / IP Architect to shape the next revolution in electronics!
Responsibilities
Define and design architecture: Create the overall SoC/IP architecture based on product and customer requirements and define detailed technical specifications.
Collaborate with cross-functional teams: Work with a variety of teams, including logic design, verification, firmware architecture and development teams, and physical design, to ensure successful execution.
Lead technical discussions and architectural reviews, guiding design and verification teams to deliver scalable, high-quality implementations.
System-level integration: Ensure seamless hardware-software co-design by working on aspects like control paths, interrupt schemes, and debug infrastructure.
Drive architectural decisions that optimize scalability, and future readiness for next-generation applications.
Act as Functional Safety manager, leading the definition,
דרישות:
B.Sc. or M.Sc. in Electrical or Computer Engineering (or related field).
3+ years experience in SOC architectural roles
Technical knowledge: Strong understanding of SoC design flows, and system requirements.
Power and performance analysis: Ability to analyze and balance performance, power, and area trade-offs.
Strong system thinking - ability to move between micro-architecture depth and system-level abstraction.
Hardware and software collaboration: Proven experience working across hardware and software teams to achieve system goals.
Experience defining and documenting architecture specifications, interfaces, and integration flows.
Excellent communication and collaboration skills, with the ability to lead cross-functional discussions and influence stakeholders.
Experienc המשרה מיועדת לנשים ולגברים כאחד.
אחראי/ת מערכות ניטור ובקרה
Tue, 24 Feb 2026 12:11:00 GMT
מיקום המשרה:  
תחומי המשרה: אבטחת מידע וסייבר, מחשבים ורשתות, שליטה ובקרה, איש אבטחת מידע / סייבר, SOC/SIEM 
סוג/היקף המשרה: משרה מלאה 
חברה מגייסת אחראי/ת מערכות ניטור ובקרה לארגון גדול ומוביל במרכז הארץ!
ניהול תהליכים פנימיים, תחקור פעולות משתמשים ויצירת בקרות לאיתור מקרי התחזותו זיהוי מעילות והונאות.
דרישות:
שנה ניסיון בתפקיד SOC / NOC
ניסיון בעבודה עם מערכות למניעת דלף מידע DLP
ניסיון בעבודה עם Splunk
ניסיון בתחקור מקרי התחזות
יכולת תחקור אירועי אבטחת מידע וניתוח לוגים
עבודה עם Varonis, היכרות עם ניהול זהויות והרשאות, ידע בעולמות רגולציה והגנת פרטיות- המשרה מיועדת לנשים ולגברים כאחד.
Security Operations Engineer
Mon, 23 Feb 2026 19:42:00 GMT
מיקום המשרה: בני ברק 
תחומי המשרה: אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר, ארכיטקט סייבר 
סוג/היקף המשרה: משרה מלאה 
You will join our Cyber Security Operations team and play a key role in protecting our cloud-native and enterprise environments. In this hands-on role, youll design, implement, and operate security controls across AWS, Kubernetes, CI/CD pipelines, and identity systems. Youll lead incident response efforts, build security automation, and drive continuous improvement of our detection and prevention capabilities in a fast-paced, highly technical environment.

The day-to-day

Own and enhance security for large-scale AWS environments (IAM, VPC, CloudTrail, GuardDuty, EKS, S3).
Build and operate threat detection, incident response, and DFIR processes across cloud, Kubernetes, identity, and SaaS platforms.
Design and implement security automation for access control, cloud hygiene, incident response, and SIEM workflows.
Drive DevSecOps initiatives, securing CI/CD pipelines and enabling shift-left security.
Develop and tune SIEM detections, threat hunting queries, and automated remediation pipelines.
Manage identity, access, and Zero Trust / ZTNA architectures using IdP, SSO, RBAC, and federation.
Simulate real-world attacks and perform vulnerability discovery to validate security controls.
Requirements:
4+ years of experience in SecOps, Cloud Security, DevSecOps, or Security Engineering.
Strong hands-on experience with AWS, Kubernetes/EKS, Terraform, and cloud-native security tooling.
Proven incident response and threat hunting experience in distributed, cloud-native environments.
Deep understanding of security best practices for cloud-native and distributed systems (eg. NIST & CIS), with the ability to apply them pragmatically in enterprise environments.
Ability to build security automation using Python, Bash, APIs, or similar tools.
This position is open to all candidates.
Application Security Engineer
Mon, 23 Feb 2026 13:54:00 GMT
מיקום המשרה: תל אביב יפו 
תחומי המשרה: אבטחת מידע וסייבר, מהנדס סייבר 
סוג/היקף המשרה: משרה מלאה, עבודה היברידית 
We are looking for a skilled Application Engineer to join our security team as Application Security Engineer and help ensure the security, reliability, and integrity of our application ecosystem. In this role, you will work closely with Engineering, Product, and Customer-facing teams to identify, analyse, and mitigate security risks across APIs, integrations, and cloud-based systems.
Job responsibilities:
Design, assess, and improve the security of application-level integrations, including APIs, webhooks, and SFTP-based data flows.
Act as a subject matter expert for complex integration and application security issues, supporting high-impact customers and strategic partners.
Investigate and resolve security and data inquires using logs, SQL queries, and debugging tools.
Collaborate closely with Development and Product teams on security-related bugs, architectural decisions, and product roadmap discussions.
Review and troubleshoot integration flows involving AWS services and third-party systems, with a focus on secure design and implementation.
Contribute to the continuous improvement of application security practices, processes, and tooling.
Support incident analysis and root cause investigations related to application security and integrations.
Requirements:
3 years experience as application engineer, security engineer or related positions.
Strong hands-on experience with Bob Public APIS (REST), webhooks, and integration-based architectures.
Experience working with cloud environments, preferably AWS.
Solid understanding of application-layer security concepts, including authentication, authorization, and data protection.
Experience analyzing logs, executing SQL queries, and using developer tools to troubleshoot complex application issues.
Proven ability to work cross-functionally with Engineering, Product, and customer-facing teams.
Strong analytical skills and the ability to handle complex, high-pressure technical scenarios.
Experience supporting costumers requests and issues in Bob platform.
Background in customer-facing technical roles or escalation engineering in Bob platform.
Nice to Have:
Experience supporting large-scale SaaS platforms with numerous third-party integrations.
Understanding of secure code and CI/CD security.
Understanding of secure integration patterns and common API security risks.
This position is open to all candidates.
Cloud Security Researcher
Sun, 22 Feb 2026 18:53:00 GMT
מיקום המשרה: פתח תקווה 
תחומי המשרה: אבטחת מידע וסייבר, חוקר סייבר 
סוג/היקף המשרה: משרה מלאה 
As a Cloud Security Researcher, you will explore and exploit cloud-native attack surfaces, uncovering new vulnerabilities and researching misconfigurations across AWS, Azure, GCP, and container ecosystems. Youll work on offensive cloud security projects that blend creativity, technical depth, and innovation, contributing to cutting-edge tools and methodologies.
Roles and Responsibilities:
Research and develop novel attack techniques targeting cloud environments and infrastructure.
Analyze and exploit vulnerabilities across multi-cloud platforms (AWS, Azure, GCP).
Identify and document security flaws in cloud configurations, networking, and identity systems.
Perform hands-on testing in containerized and Kubernetes-based systems.
Collaborate with engineering and product teams to translate research into security features and best practices.
Develop PoCs, tools, and scripts to automate vulnerability discovery.
Contribute to the wider security research community through responsible disclosure and technical publications.
Stay ahead of emerging cloud threats, security trends, and adversarial TTPs (MITRE ATT&CK, OWASP Cloud-Native Top 10).
Requirements:
In-depth understanding of cloud services (AWS, Azure, GCP) and their security models.
Practical experience in attacking or defending cloud environments.
Experience with Kubernetes, containerized workloads, and CI/CD environments.
Strong scripting/programming skills (Python, Go, or similar).
Analytical mindset and hands-on experience identifying and exploiting real-world vulnerabilities.
Preferred Skills:
Research background in cloud or infrastructure security.
Knowledge of IaC (Terraform, CloudFormation) and its security implications.
Familiarity with cloud-native security tooling and monitoring systems.
Contributions to open-source security projects or research publications.
This position is open to all candidates.
עמוד הבא ››

אינדקס משרות

חיפוש עבודה אבטחה, שמירה וביטחון חיפוש עבודה אבטחת איכות QA חיפוש עבודה אבטחת מידע חיפוש עבודה אדמיניסטרציה חיפוש עבודה אומנות, בידור ומדיה חיפוש עבודה אופטיקה חיפוש עבודה אופנה וטקסטיל חיפוש עבודה אחזקה וניקיון חיפוש עבודה אינטרנט חיפוש עבודה אלקטרוניקה וחשמל חיפוש עבודה ביוטכנולוגיה חיפוש עבודה ביטוח חיפוש עבודה בניין, בינוי ותשתיות חיפוש עבודה הוראה, חינוך והדרכה חיפוש עבודה הנדסה חיפוש עבודה התנדבות חיפוש עבודה חומרה חיפוש עבודה טלקום חיפוש עבודה יבוא יצוא חיפוש עבודה יופי, טיפוח וספא חיפוש עבודה יזמות חיפוש עבודה ייצור ותעשיה חיפוש עבודה כספים וכלכלה חיפוש עבודה לוגיסטיקה ומחסנאות חיפוש עבודה ללא ניסיון חיפוש עבודה מדעי החברה חיפוש עבודה מדעי החיים, טבע וחקלאות חיפוש עבודה מדעים מדוייקים חיפוש עבודה מזון, מסעדנות ואירועים חיפוש עבודה מחשבים ורשתות חיפוש עבודה מכירות חיפוש עבודה מערכות מידע חיפוש עבודה משאבי אנוש חיפוש עבודה משפטים חיפוש עבודה נדל"ן חיפוש עבודה נהגים שליחים והפצה חיפוש עבודה ניהול בכיר חיפוש עבודה ניתוח מערכות חיפוש עבודה סטודנטים חיפוש עבודה ספורט חיפוש עבודה עבודה בחו"ל חיפוש עבודה עיצוב חיפוש עבודה עריכה, תוכן וספרות חיפוש עבודה פרסום שיווק ויחסי ציבור חיפוש עבודה קמעונאות חיפוש עבודה רכב ומכונאות חיפוש עבודה רפואה ופארמה חיפוש עבודה רפואה משלימה חיפוש עבודה שירות לקוחות חיפוש עבודה תוכנה חיפוש עבודה תיירות ומלונאות חיפוש עבודה תעופה ואווירונאוטיקה