|
Threat Intelligence Analyst Tue, 06 Jan 2026 15:24:00 GMT
מיקום המשרה:
הרצליה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, אנליסט סייבר
סוג/היקף המשרה:
משרה מלאה, לדוברי אנגלית
We are looking for an experienced, exceptional and passionate Threat Intelligence Analyst to join our Cyber Intelligence product business unit to drive the AI-powered threat intelligence product line.
you will: Monitoring and analyzing cyber threat-related data sources Identifying new cyber trends associated with different types of threat actors Researching potential cyber threats originating from a variety of attack groups Performing campaign tracking and TTP mapping Processing the harvested data into threat intelligence reports, coupled with actionable recommendations Delivering demo/methodology/training sessions to customers Handling ongoing interactions with product management and customer success Requirements: High level English writing skills High level Spanish writing and speaking skills - an advantage Ability to understand customer needs, translate them into clear technical value, deliver effective presentations and demos, and collaborate closely with sales. Ability to solve complex problems, participate in continuous improvement, adapt the ideas of others Demonstrate a proactive approach, getting things done, demonstrate accountability & ownership, prioritize workload Ability to apply learned skills, awareness beyond immediate area/role Military experience from intelligence units (cyber-related unit) - an advantage Understanding of cyber security (attack vectors, vulnerabilities and exploits, IOCs, etc.) - an advantage High level proficiency in additional languages - an advantage This position is open to all candidates. |
|
Attacks and Exploits Developer Tue, 06 Jan 2026 14:48:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
תוכנה, אבטחת מידע וסייבר, מתכנת ++C, מומחה אבטחת מידע / סייבר, מתכנת Python
סוג/היקף המשרה:
משרה מלאה
We are seeking a highly skilled and experienced Attacks and Exploits Developer to join a specialized team focused on developing offensive, production-ready attack capabilities.
This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations. Requirements: 4+ years of hands-on experience in OS Internals or kernel-mode development using C and C++ 3+ years of Python experience, especially for integrating with native modules and supporting research workflows Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling Proficient in Windows debugging using WinDBG, KD, and similar tools Deep knowledge of Windows APIs, security controls, and undocumented behaviors relevant to offensive security Familiarity with EDR evasion, API hooking, and direct system call manipulation Personal Attributes: Passionate about offensive security and deep technical research Self-motivated and capable of operating independently in high-trust environments Creative and methodical in problem solving, with a strong attention to detail This position is open to all candidates. |
|
Attacks and Exploits Team Lead Tue, 06 Jan 2026 14:47:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
תוכנה, אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, ניהול ביניים, Senior C++ Developer, Senior C++ Developer
סוג/היקף המשרה:
משרה מלאה
We are seeking a highly skilled and experienced Windows Internals Team Leader to lead a specialized attack team focused on developing offensive, production-ready attack capabilities.
This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations. You will be hands-on in both leadership and development, guiding technical direction, mentoring engineers, and contributing code across kernel-mode and user-mode components. Requirements: 5+ years of hands-on experience in Windows Internals or kernel-mode development using C and C++ 3+ years of Python experience, especially for integrating with native modules and supporting research workflows Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling Proficient in Windows debugging using WinDBG, KD, and similar tools Deep knowledge of Windows APIs, security controls, and undocumented behaviors relevant to offensive security Familiarity with EDR evasion, API hooking, and direct system call manipulation Personal Attributes: Passionate about offensive security and deep technical research Self-motivated and capable of operating independently in high-trust environments Creative and methodical in problem solving, with a strong attention to detail This position is open to all candidates. |
|
Security Researcher Tue, 06 Jan 2026 14:37:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר
סוג/היקף המשרה:
משרה מלאה
we are looking for a Security Researcher to join our world-class original research team!
If you are interested in conducting innovative vulnerability/security research while becoming a worldwide known researcher, then this is your opportunity. As a researcher, youll be joining a top-notch security research team that produces some of the worlds most novel research projects. Youll be provided with guidance for finding creative research targets and performing groundbreaking research, in order to get accepted to present your findings in the worlds top conferences such as Black Hat, DEF CON and more! The teams primary expertise lies in vulnerability research in Windows and endpoint security controls, though research is made in a variety of other scopes as well such as Android, applications, embedded devices, AI, and more! Requirements: At least 5 years of experience in offensive approach At least 3 years of experience in reverse engineering Knowledge of networking and internet protocols Knowledge of Windows/Linux internals Ability and desire to work in a high paced startup environment Ability to handle new technological concepts Self drive and autonomous learning abilities 💥 Even BETTER if you have Past security/malware/vulnerability research experience Public speaking skills Offensive tools development experience This position is open to all candidates. |
|
חוקר/ת סייבר Tue, 06 Jan 2026 12:21:00 GMT
מיקום המשרה:
באר שבע
תחומי המשרה:
אבטחת מידע וסייבר, חוקר סייבר
סוג/היקף המשרה:
משרה מלאה
לחברתנו דרוש/ה חוקר/ת סייבר מנוסה לניהול SOC תעשייתי שמטרתו להעלות את החוסן בסייבר למפעלי חומרים מסוכנים במשרד להגנת הסביבה
העבודה במשרה מלאה בבאר שבע עם היברידיות של יום אחד מהבית שכר גבוה ותנאים מפנקים התפקיד כולל ניהול SOC, ניהול אירועים המתקבלים ב SOC, תקשורת עם הגופים מנוטרים, חיבורי גופים נוספים, נדרש לפחות חמש שנות ניסיון כחוקר סייבר נדרש ניסיון בהפעלת SOC המנטר מערכות OT (operation technologies שליטה ובקרה במפעלי תעשייה) נדרש ניסיון מחקרי מקיף בתחומי מחקר בשניים או יותר מהתחומים הבאים: מחקר נוזקות, מחקר חולשות, מחקר פורנזי, מחקר מתקדם של פרוטוקולי תקשורת, ביצוע מבדקי חדירות, הנדסה לאחור, חילוץ תובנות מחקריות ממידע מודיעיני, בעל ידע נרחב, מתקדם ומוכח במגוון Big Data טכנולוגי,פיתוח כלים תומכים למחקר מתקדם, ביצוע מחקרים מבוססי מערכות ופרוטוקולים, נדרש ניסיון בתחומי מחקר ניטורי, מחקרי לוגים, תעבורה ותקשורות, חקירת אירועי סייבר, עבודות חקירה וניטור במחקרים מודיעיניים והכנת משטחי תקיפה, חילוץ תובנות מחקריות וכן ידע נרחב, מתקדם ומוכח במגוון מערכות ופרוטוקולים ובניהול סוק, המנטר מערכות SOC. קורות חיים לשלוח למייל. דרישות: תנאי סף/השכלה השכלה: אקדמאי בעל תואר ראשון במקצועות המחשוב ו/או המדעים המדויקים ו/או הנדסה טכנולוגית או הנדסאי בוגר מגמת מחשבים/טכנולוגיה או חסר תואר כנ"ל, בעל הכשרות מקצועיות בתחום הגנת סייבר בהיקף משמעותי (400 שעות רא"ם ובלבד שעסק בתחום במצטבר) או בוגר יחידה טכנולוגית בצה"ל (ממר"ם, 8200, תקשוב ויחידות מקבילות) ו/או הטכנולוגי בכפוף לאישורים מתאימים. *בשלב זה, ההסמכות טרם נכנסו לתוקף ועל כן לא תידרשנה. החל ממועד כניסת ההסמכות לתוקף, דרישה זו תהיה תנאי השכלה יחיד. כמו כן, כל נותן שירותים קיים יידרש לעבור הסמכה זו בתוך 24 חודשים ממועד כניסת ההסמכה לתוקף או לחילופין ההתקשרות תופסק. ניסיון נדרש: ניסיון של 5 שנים לפחות בביצוע מטלות התפקיד. המלצות ממעסיקים קודמים ניסיון בניהול SOC השכלה אקדמאית- בעל תואר ראשון רלוונטי/הנדסאי והכשרה בתחום הגהת הסייבר של 400 שעות רא"ם ניסיון בהפקת משטחי תקיפה במערכות כגון ביטסייט, פנורייז או ריסקנה היכרות עם מערכות כגון SOAR ו SIEM QRADAR/: SPLUNK/ARCSIGHT/CHRONICEL היכרות ועבודה עם מפעלים, מערכות ומפעלי חומרים מסוכנים בפרט OT הבנת אופן הניטור של רשתות OT, הכרות טובה עם לוגים המתקבלים ממערכות הגנה כמו FW,CrowdStrike,Sentinelone ובעולמות ה OT כמו TXONE, Aruba ידע בשפת קוד ו yara לצורך כתיבת חוקים עבודה מול לקוחות/אנשי מקצוע/מפעלים. המשרה מיועדת לנשים ולגברים כאחד. |
|
Operational Excellence Manager Tue, 06 Jan 2026 10:40:00 GMT
מיקום המשרה:
נתניה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, איש אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
DRS RADA is a global pioneer for active military protection, counter-drone applications, critical infrastructure protection, and border surveillance. Provide professional and technological ownership of the enterprise application landscape, including architecture, standards, and the overall quality of APEX solutions across the organization. Key Responsibilities:
* Serve as the professional owner of the enterprise application architecture, including ERP, MES, PLM, CRM, HRIS, BI, and Big Data platforms. * Translate business requirements into scalable, standardized, and sustainable technology solutions. * Lead the design authority function and define global best practices and standards. * Work closely with the parent company and subsidiaries. * Own system integrations, data quality, and Data Governance across the application landscape. * Lead complex technology initiatives end-to-end, from requirements definition through implementation. * Collaborate closely with cross-functional teams and manage multiple stakeholder interfaces. * Evaluate and implement new technologies in alignment with organizational strategy. * Support technology decision-making processes, including Make vs. Buy decisions. * Define and lead a multi-year application strategy and enterprise roadmap. * Own the budget, including multi-year planning, financial control, investment prioritization, and ROI management. * Lead Change Management initiatives, drive standards adoption, and ensure alignment across sites and regions. * Manage vendors, system integrators, and strategic partners at a managerial level. Requirements: * 5+ years of experience in operational Excellence , continues improvement , Processes improvements roles. * Experience in a manufacturing environment – mandatory * Deep experience with core systems (ERP, MES, PLM, etc.) and complex integrations. * Broad architectural understanding with strong system-level thinking. * Proven ability to work with business stakeholders and translate business needs into technology solutions. * Relevant Bachelor’s degree required; advanced degree is an advantage. * Strong leadership, influence, and executive-level communication skills This position is open to all candidates. |
|
Microsoft Cyber Security Specialist Mon, 05 Jan 2026 19:56:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
our company, one of the leading cyber and information security companies in the field, is recruiting for the position - Microsoft Information Security Specialist.
The role consists of: * Design, design and implementation of complex security solutions * Leading Microsofts POC processes * Development, implementation and management of the field of security training * Leading Microsoft and Cloud projects as the solution architect. Requirements: * 5+ years of experience in Microsoft environments * Extensive experience in solutions (Security, SaaS and IaaS) * Extensive experience in Microsoft 365 security system * Proven experience in implementing and designing security solutions (Firewall, Antivirus, SIEM, WAF) Proven experience in Microsoft solutions (ATP, Sentinel, MCAS) - an advantage * Certification in the field of Microsoft - an advantage * Proven experience in the SIEM / SOC worlds - an advantage Proven experience as a Presale engineer - an advantage * Certification in the field of information security - an advantage * Ability to integrate into the team and is highly motivated * Proficiency in Hebrew and English at a high level - required. This position is open to all candidates. |
|
Cyber security expert Mon, 05 Jan 2026 19:55:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
our company needs a Cyber security expert.
Requirements: The role consists of: * 3+ years experience in the SYSTEM field including: AD, Exchange, SQL * Familiarity with systems / technologies in the field of information security - required In-depth knowledge of the Microsoft environment - required * In-depth knowledge of the Linux environment - a significant advantage * Experience as an information security integrator - a significant advantage * Experience working with Proxy, Mail Relay, Endpoint products - a significant advantage * Experience with Azure AD and working in a 365 environment - an advantage * Ongoing work with clients and with senior executives * High level English - required * Experience in characterizing and planning a project, including construction, implementation, maintenance and support - a significant advantage Willingness to learn and develop at the professional level - required. This position is open to all candidates. |
|
CISO & GRC Consultant Mon, 05 Jan 2026 19:54:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מנהל אבטחת מידע / סייבר / CISO
סוג/היקף המשרה:
משרה מלאה
our company needs a Cyber security expert.
Requirements: The role consists of: * 3+ years experience in the SYSTEM field including: AD, Exchange, SQL * Familiarity with systems / technologies in the field of information security - required In-depth knowledge of the Microsoft environment - required * In-depth knowledge of the Linux environment - a significant advantage * Experience as an information security integrator - a significant advantage * Experience working with Proxy, Mail Relay, Endpoint products - a significant advantage * Experience with Azure AD and working in a 365 environment - an advantage * Ongoing work with clients and with senior executives * High level English - required * Experience in characterizing and planning a project, including construction, implementation, maintenance and support - a significant advantage Willingness to learn and develop at the professional level - required. This position is open to all candidates. |
|
Communication and information security Mon, 05 Jan 2026 19:53:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, איש אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
Job description:
our company in the center of the country has a long-term full-time communications and information security person The role includes: working on the organizations information security systems, working and experience with FIRE WALL of various information security manufacturers. Leading large projects and driving many processes and technologies in the organization. Full-time long-term with promotion options. Requirements: At least 2-3 years of experience in the field of communication and information security Knowledge of systems / Palo- Alto / Checkpoint / Fortinet - required Familiarity with information security solutions such as WAF, IPS Knowledge of installation and maintenance in the f5 system - a significant advantage Experience with Radware, Forescout - Advantage Knowledge of SSL-VPN, VPN technologies Communication experience: routing & switching Familiarity with load-balancing products Experience in network design - an advantage Large head, ability to withstand multiple tasks and times of stress Excellent interpersonal skills and ability to work in teams and clients self-learning ability. This position is open to all candidates. |
|
SOC Analyst Mon, 05 Jan 2026 19:52:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, אנליסט סייבר, SOC/SIEM
סוג/היקף המשרה:
משרה מלאה
Job description:
our company in the center of the country needs an SOC analyst. The job includes: monitoring faults on the organizations systems, staffing the organizations systems against cyber incidents 24/7. Requirements: Graduates of a course / professional training in the field of information security - compulsory Background in the field of system / communication / information security - an advantage Training will be given on site Willingness to work 24/7 including Saturdays and holidays Integration in a large organization, promotion options. This position is open to all candidates. |
|
Incident Response Team Leader Mon, 05 Jan 2026 19:07:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מנהל אבטחת מידע / סייבר / CISO, מומחה אבטחת מידע / סייבר, איש אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
looking for an Incident Response Team Leader to lead investigations and response activities in support of organizations worldwide.
Cyber threats are constantly growing in volume, velocity and sophistication. When an organization is confronted with an advanced attack, it needs the strongest capabilities on its side. In many cases, an incident response engagement is in fact a battle within a network. The operational art, experience, focus, and speed of response teams can mean the difference between a minor blow, and a devastating impact on an organizations performance and reputation. The Incident Response Team Leader will be key to the success of Incident Response projects worldwide, and should possess strong leadership skills, be highly technical and thrive in a fast-paced and dynamic environment. Main Responsibilities Lead a team of top-tier cyber security researchers and forensic experts conducting assessments and in-depth analysis in complex investigations, as well as security assessments. Guide and empower team members, enhancing their technical and research skills. Lead client-facing projects including incident response and hunting efforts for large-scale sophisticated attacks, to contain and defeat real-world cyber threats. Collaborate and work with clients IT and Security teams during investigations. Design and improve internal incident response technologies, methodologies, and processes. Requirements: At least 3 years experience in team management (from military service and/or industry). Excellent English - spoken and written. In-depth understanding of the lifecycle of advanced security threats, attack vectors and methods of exploitation. Strong technical understanding of network fundamentals, common internet protocols and system and security controls. Experience with the tools and techniques used in security event analysis, incident response, computer forensics, malware analysis, or other areas of security operations. Multidisciplinary knowledge and competencies, such as: o Hands-on experience in data analysis (preferably network traffic or log analysis) in relevant data analysis and data science platforms (Jupyter, Splunk, pandas, SQL). o Familiarity with cloud infrastructure, web application and servers, Android and iOS mobile platforms. o Experience with malware analysis and reverse engineering. o Familiarity with enterprise SIEM platforms (e.g. Splunk, QRadar, ArcSight). This position is open to all candidates. |
|
SOC Analyst Mon, 05 Jan 2026 18:59:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, אנליסט סייבר, SOC/SIEM
סוג/היקף המשרה:
משרה מלאה
looking for a MXDR Analyst to join the team of cybersecurity analysts monitoring services 24/7. The role includes development of detection analyses, triage of alerts, investigation of security incidents, proactive threat hunting and enhancement of sensors and overall visibility status. The suitable candidate should be a team player with previous experience in SOC, SecOps or security monitoring, independent, and with a can-do attitude.
Responsibilities Working across all areas of SOC, including continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, and forensics. Solving security incidents in accordance with defined service level agreements and objectives. Prioritizing and differentiating between potential incidents and false alarms. Addressing clients enquiries via phone, email, and live chat. Working side-by-side with customers, providing insightful incident reports. Working closely with peers and higher-tier analysts to ensure that your analysis work meets quality standards. Identifying opportunities for improvement and automation within the MXDR Operation Lead, and leading efforts to operationalize ideas. Identifying and offering solutions to gaps in current capabilities, visibility, and security posture. Correlating information from disparate sources to develop novel detection methods. Requirements: At least one year of experience in a SOC/MDR or Managed EDR service, including night and weekend shifts. Strong analytical thinker, problem-solving mindset, and ability to succeed in a dynamic environment. Independent, bright and positive analyst who strives for excellence. Proficiency and experience with scripting (Python). Strong capabilities in drafting cyber security reports for clients. Basic understanding of the lifecycle of advanced security threats, attack vectors, and methods of exploitation. Hands-on experience working with SIEM technologies. (e.g. Splunk, QRadar, ArcSight, Exabeam, etc.) Familiarity with common data and log sources for monitoring, detection and analysis (e.g., Event Logs, firewall, EDR). Strong technical understanding of network fundamentals, common internet protocols, and system and security controls. Basic knowledge of host-based forensics and OS artifacts. Familiarity with cloud infrastructure, web application and servers - an advantage. This position is open to all candidates. |
|
Senior Staff PM, AI SIEM Data Platform, Agent Log File Collection Mon, 05 Jan 2026 16:04:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, SOC/SIEM
סוג/היקף המשרה:
משרה מלאה
We are looking for a Senior Staff Product Manager to join AI SIEM Data Platform product team to lead the vision, strategy, and execution for unified log collection from our unified agent. This role focuses on driving product direction and cross-functional delivery of agent-based collection for both Windows, MacOS, and Linux flat file logs and Windows Event Logs. The Product Manager ensures that customers benefit from a seamless, single-agent solution that streamlines log onboarding, normalization, and centralized security analytics for threat hunting, detection, response, and reporting.
What will you do? Product Strategy and Ownership Define product vision, priorities, and multi-phase roadmap for unified agent log collection capabilities Lead requirement gathering and translate business needs into clear, actionable product requirements Own the lifecycle of agent log collection features from ideation through development, launch, and ongoing iteration Collaborate with engineering, UX, and architect teams to design configurable, user-friendly log collection workflows. Collaborate with cross-functional product areas to specify requirements for agent-side features Establish technical and UX specifications for integration with the Singularity Operations Center Champion the consolidation of flat file log, event log, and telemetry collection into a unified, enterprise-grade agent deployment Minimize operational overhead and complexity for customer environments Ensure secure, performant, and reliable ingestion of collected logs into the AI SIEM/Singularity Data Lake Drive initiatives on data normalization, parsing, and searchability to maximize downstream analytics and compliance value Develop enablement material, size and performance guidance, and support playbooks for internal and external stakeholders Serve as an escalation point for validation, troubleshooting, and feedback cycles with field, support, and customer teams Requirements: Bachelors degree in Computer Science, Engineering, Information Security, or a related technical discipline 8-12 years of product management at enterprise-level organizations Demonstrated track record driving agent-based product initiatives in SIEM, XDR, or related data platforms Expertise in Windows logging subsystems (Event Logs and flat files) and endpoint agent architectures Fluency in SIEM and/or XDR concepts, log normalization, and relevant protocols Experience delivering scalable agent deployment, upgrade, and remote configuration solutions for large enterprises Proficiency managing backlogs, epics, and user stories using agile tools such as JIRA Customer Focus - Ability to create a shared vision with customers and deliver on it This position is open to all candidates. |
|
Cloud Security Researcher Sun, 04 Jan 2026 19:25:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר
סוג/היקף המשרה:
משרה מלאה
we are looking for a Cloud Security Researcher.
As a Cloud Security Researcher, you will explore and exploit cloud-native attack surfaces, uncovering new vulnerabilities and researching misconfigurations across AWS, Azure, GCP, and container ecosystems. Youll work on offensive cloud security projects that blend creativity, technical depth, and innovation, contributing to cutting-edge tools and methodologies. Roles and Responsibilities: Research and develop novel attack techniques targeting cloud environments and infrastructure. Analyze and exploit vulnerabilities across multi-cloud platforms (AWS, Azure, GCP). Identify and document security flaws in cloud configurations, networking, and identity systems. Perform hands-on testing in containerized and Kubernetes-based systems. Collaborate with engineering and product teams to translate research into security features and best practices. Develop PoCs, tools, and scripts to automate vulnerability discovery. Contribute to the wider security research community through responsible disclosure and technical publications. Stay ahead of emerging cloud threats, security trends, and adversarial TTPs (MITRE ATT&CK, OWASP Cloud-Native Top 10). Requirements: In-depth understanding of cloud services (AWS, Azure, GCP) and their security models. Practical experience in attacking or defending cloud environments. Experience with Kubernetes, containerized workloads, and CI/CD environments. Strong scripting/programming skills (Python, Go, or similar). Analytical mindset and hands-on experience identifying and exploiting real-world vulnerabilities. Preferred Skills: Research background in cloud or infrastructure security. Knowledge of IaC (Terraform, CloudFormation) and its security implications. Familiarity with cloud-native security tooling and monitoring systems. Contributions to open-source security projects or research publications. This position is open to all candidates. |
|
Cyber Field Engineer Sun, 04 Jan 2026 19:21:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מחשבים ורשתות, איש לינוקס Linux, מומחה אבטחת מידע / סייבר, מהנדס סייבר
סוג/היקף המשרה:
משרה מלאה
We are looking for a hands-on cybersecurity expert to serve as a trusted technical advisor for our customers.
In this role, you will leverage your in-depth knowledge of the cybersecurity landscape, Pentera platform, and security validation principles to lead technical deep-dives, guide remediation strategies, and ensure successful deployment. Acting as the bridge between the field and R&D, you will combine technical and problem-solving skills with strong communication abilities to drive platform adoption and enhance customer security maturity. Roles & Responsibilities: Demonstrate deep technical mastery of the Pentera platform and its integration across customer networks, endpoints, authentication, and security controls. Lead technical deep-dives with security teams (SOC, IR, Red/Blue) to review findings, explain and analyze attack vectors, and guide remediation based on real-world offensive techniques. Provide end-to-end support for deployment, configuration, and complex troubleshooting, while advising on security risks, misconfigurations, and validation procedures. Drive customer success, retention, and platform adoption by providing consistent technical guidance on cybersecurity trends and identifying opportunities for expanded use. Act as the technical voice of the customer, channeling operational feedback and needs internally to Product, R&D, and Support teams. Requirements: 3+ years of hands-on cybersecurity experience (SOC, IR, PT, or Security Engineering) 2+ years of Linux administration (Ubuntu preferred). Strong understanding of network security fundamentals (TCP/IP, routing, VPNs) and IT infrastructure, including OS internals, VMware, Ansible, and Docker. Familiarity with offensive security principles, including attack techniques, and standard attack frameworks. Proven ability to troubleshoot and analyze complex network and system issues within enterprise environments. Strong customer-facing experience with the ability to explain complex technical concepts to varied audiences, guide conversations, and manage expectations. Excellent communication, presentation, and documentation skills. Valid drivers license with a willingness to travel periodically. Ability to obtain (or currently hold) a high-level security clearance. Preferred Skills: Experience in Cloud Security (AWS, Azure, GCP) and scripting proficiency (Python, Bash). Background in Sales Engineering or technical customer-facing roles; relevant certifications (OSCP, CRTO, GXPN) are an advantage. This position is open to all candidates. |
|
Cyber Researcher Sun, 04 Jan 2026 19:18:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, חוקר סייבר
סוג/היקף המשרה:
משרה מלאה
We are looking for a versatile and innovative Attack-oriented Cyber Researcher to join our R&D team and become part of the revolution.
You will conduct state-of-the-art research across multiple environments, ranging from Windows internals and kernel-level security to cloud platforms like AWS, Azure, Web technologies, etc' to stay one step ahead of real threat actors. Your findings, your code and attack tools will feed directly into our automated attack platform, enhancing its capabilities with new offensive techniques and AI-powered decision-making algorithms. Roles and Responsibilities: Perform in-depth research in multiple areas such from AV/EDR evasion, binary exploitation, vulnerability discovery, and subversion of communication channels across both OS-level, domains, cloud-native domains, external surfaces. Integrate research outputs into production-grade attack functionalities within our automation ecosystem. Architect and develop AI-driven decision-making modules that enable the platform to mimic experienced attackers, making real-time choices during automated operations. Develop production-ready attack capabilities using whatever technologies are necessary, Python, C/C++, C#, Java, Office Macros, Bash, PowerShell, Go, Ruby, Assembly, etc. Mentor and collaborate with fellow R&D team members, fostering a culture of innovation and continuous learning. Requirements: 5+ years of experience in Windows internals, low and high-level attack-oriented development, penetration testing, and offensive security. 3+ years of experience in Python development. Demonstrated skill in writing cyber-related code optimized for performance, memory, and stealth. Experience with attack frameworks and tools such as Metasploit, Nmap, Cobalt Strike, Impacket, Burp, Pacu, and similar. Proficiency in reverse engineering and debugging (e.g., IDA, Radare2, WinDBG) for low-level research. Familiarity with cloud ecosystems and hybrid environments, specifically AWS, Azure. Ability to apply AI or machine learning concepts and models to decision-making processes within the automated attack platform. Excellent teamwork, adaptability, and a quick learning mindset. Preferred skills: IDF cyber team veteran. Passion for cyber research and hands-on experience with red/blue team operations. Experience in Agile methodology and security product development. Bachelors degree in Computer Science or related field. This position is open to all candidates. |
|
Cybersecurity Project Manager Sun, 04 Jan 2026 19:12:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מנהל פרויקטים אבטחת מידע/סייבר, איש אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה, לדוברי אנגלית
Were looking for an experienced and highly organized Project Manager - Cybersecurity Operations to join our growing team. In this role, youll manage end-to-end delivery of cybersecurity programs for our clients, ensuring every engagement runs efficiently, aligns with business objectives, and delivers measurable value.
Youll collaborate closely with cross-functional teams including engineering, research, product, and customer excellence to ensure projects meet deadlines, maintain quality, and exceed expectations. This is an opportunity to lead high-impact cybersecurity initiatives in a global, fast-paced environment. Roles and Responsibilities: Manage multiple cybersecurity projects simultaneously, from planning through execution and delivery. Coordinate and communicate across technical and non-technical teams to ensure project alignment and success. Translate client needs into actionable project plans, defining clear scope, milestones, and deliverables. Monitor and report project performance using KPIs, dashboards, and structured communication frameworks. Proactively identify risks, dependencies, and bottlenecks, and implement mitigation strategies. Maintain strong client relationships through transparency, responsiveness, and strategic alignment. Standardize delivery processes, templates, and reporting to ensure consistency and scalability. Coordinate internal project allocation and workload balancing across teams to ensure resources are distributed efficiently, prevent overload, and maintain smooth operations. Requirements: 5+ years of experience as a Project Manager in cybersecurity, technology, or professional services. Proven success managing large-scale, cross-functional projects with enterprise clients. Strong understanding of project management methodologies (Agile, Waterfall, or hybrid). Experience working with CRM and project management tools (e.g., Jira, Monday.com, Asana, Salesforce). Excellent communication, organization, and stakeholder management skills. Analytical mindset with strong problem-solving and decision-making abilities. Fluency in English. Preferred Skills: Experience in cybersecurity domains such as red teaming, application security, or infrastructure projects. Background in intelligence, operations, or research-oriented environments. Experience improving delivery workflows and implementing KPIs in global organizations. This position is open to all candidates. |
|
GRC Manager Sun, 04 Jan 2026 18:59:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, איש אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
Were looking for an experienced GRC Manager to join our team in Israel. Were seeking someone with solid, hands-on experience who can take ownership and lead both technically and operationally.
You will lead the certification and accreditation processes , managing all current compliance frameworks and certifications. This includes both preparation activities and direct engagement with external auditors, from readiness and gap analysis through to achieving final reports or certificates. Roles and Responsibilities: Lead internal and external audit and certification cycles, ensuring readiness and successful completion of assessments. Maintain and continuously improve internal control framework, ensuring that security and compliance controls are effective, documented, and aligned across ISO 27001, SOC 2, and privacy requirements. Develop, maintain, and enhance security and compliance documentation, including policies, procedures, and evidence repositories. Manage the ongoing risk management process by maintaining a centralized risk register and ensuring alignment between business objectives, regulatory obligations, and security controls. Conduct internal audits and risk assessments to evaluate the effectiveness of technical and organizational controls. Manage the cybersecurity onboarding and ongoing risk assessments of third-party vendors, while cooperating with Legal to ensure alignment with privacy compliance requirements. Manage relationships with external auditors and consultants, ensuring timely completion of certification milestones. Partner with cross-functional teams to strengthen the companys overall GRC posture and support continuous improvement initiatives. Requirements: 3-5 Years of proven experience in GRC, information security compliance, or audit management roles. Experience with audit and certification processes of information security frameworks (e.g., ISO 27001, SOC 2). Ability to manage cross-functional projects and collaborate effectively with internal stakeholders and external auditors, and consultants. Excellent communication skills and attention to detail. Fluent in English (written and spoken). Preferred Skills: Experience with risk assessments and managing a risk register end-to-end. Experience with third-party vendor risk management. Experience in compliance frameworks of cloud infrastructure. Knowledge of privacy regulations such as GDPR and CCPA. Background in cybersecurity or IT risk management. This position is open to all candidates. |
|
Application Security Engineer Sun, 04 Jan 2026 15:39:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, ארכיטקט סייבר, מהנדס סייבר
סוג/היקף המשרה:
משרה מלאה
We are looking for an Application Security Engineer to join our Security Engineering team.
What you will be doing: As an Application Security Engineer , you will play a critical role in ensuring our software applications are secure by design and resilient against evolving threats. You will collaborate closely with development, DevOps, and product teams to embed security throughout the SSDLC and drive secure coding practices. Conduct security assessments, penetration tests, and code reviews across web, mobile, and cloud applications. Integrate security tools (SAST, DAST, SCA) into CI/CD pipelines using platforms like Azure DevOps, GitHub Actions. Design and enforce secure coding standards and SSDLC policies. Collaborate with developers to remediate vulnerabilities and provide inline guidance during PR reviews. Lead threat modeling and architecture reviews for new features and services. Manage secrets, access controls, and data confidentiality assurance across applications. Monitor public exposure of cloud resources and enforce Azure policies to prevent misconfigurations. Participate in incident response and forensic analysis for application-related security events. Deliver security awareness training and documentation for engineering teams. Maintain up-to-date knowledge of OWASP Top 10, secure coding techniques, and emerging threats. Requirements: 3+ years of experience in application security or related fields. Strong understanding of secure development practices, cryptography, and vulnerability management. Familiarity with tools like CodeQL, GitHub Advanced Security, and container image scanning platforms. Experience with cloud platforms (Azure preferred), microservices, and containerized environments. Knowledge of authentication protocols (OAuth 2.0, OIDC), RBAC, and VPN architecture. Familiarity with SBOM generation and supply chain security practices. Certifications such as OSCP, CSSLP, or GWAPT are a plus. Excellent communication skills and ability to work cross-functionally. Internally motivated, well organized, able to work proficiently both independently and in a team environment. Strong communication skills with both internal team members and external business stakeholders. All-around team player who is self-motivated with a high work ethic. This position is open to all candidates. |