|
Microsoft 365 Security Engineer Tue, 17 Feb 2026 08:46:00 GMT
מיקום המשרה:
פתח תקווה
תחומי המשרה:
אבטחת מידע וסייבר, מחשבים ורשתות, תמיכה טכנית - מחשבים ורשתות, מנהל IT, מהנדס סייבר
סוג/היקף המשרה:
משרה מלאה
We offer hope to patients suffering from rare and severe diseases by forming partnerships with emerging biotech companies to accelerate access to highly innovative therapies in international markets. As the creator and leader of the global partnership category in the pharma industry, we strive to be Always Ahead and work relentlessly to bring therapy to patients in need, no matter where they live. Our values are at the core of every action we take, and we are committed to going above and beyond to benefit the patients we serve. We are a dynamic, fast-paced company operating in over 34 countries on 5 continents. We are looking for out-of-the-box thinkers, people who are passionate, caring, agile, and adaptive, to join us on our mission. If you are looking to make a difference in people's lives, we invite you to join us! We are looking for Microsoft 365 Security Engineer to lead the implementation and continuous improvement of Microsoft security and compliance capabilities across the Microsoft 365 environment. The role focuses especially on Microsoft Purview and Microsoft Defender for Cloud Apps, and also covers Microsoft Defender for Office 365, Security for identity, Entra ID security controls, and security features across Exchange Online and collaboration services. You will translate requirements into technical design and configuration, implement and tune policies, rollout changes safely, troubleshoot complex issues, and document solutions and operational procedures. You will work closely with IT and system teams to ensure stable integrations, minimal business disruption, and measurable risk reduction.
Responsibilities: Lead end to end implementation and ongoing improvement of Microsoft 365 security and compliance controls. Implement and operate Microsoft Purview, including sensitivity labels and DLP, and support additional compliance capabilities as needed. Implement and operate Microsoft Defender for Cloud Apps CASB, including cloud discovery, governance controls, and policy enforcement. Implement and tune Microsoft Defender for Office 365 protections for phishing, malware, and impersonation threats. Support identity driven security controls with Entra ID, including Conditional Access concepts and tenant security posture improvements. Improve Exchange Online security posture, mail flow protections, and related configurations. Create technical documentation, runbooks, and change plans, and provide operational support and troubleshooting. Partner with internal teams and stakeholders to plan rollouts, reduce false positives, and maintain business continuity. Experience in securing Microsoft SharePoint Online, including configuration of access controls, data protection policies, and compliance settings. City: Petah Tikva Requirements: 5-8 years of experience in cloud, IT systems, and security roles within global environments - including approximately 3 years as a system Administrator and 2-3 years implementing security projects (must). Experience from Integration companies- Advantage. Strong hands-on experience implementing Microsoft 365 security solutions end to end. Strong understanding of Microsoft 365 E5 security and compliance capabilities and licensing scope. Proven implementation experience of Microsoft Purview. Proven implementation experience with MS Defender for Cloud Apps (CASB, Defender for Office 365, Defender for identity etc.). Strong understanding of Entra ID security, Intune and Conditional Access concepts. Strong understanding of IT and system domains, including Active Directory, and core enterprise infrastructure tools. Strong understanding of Exchange Online security and mail flow basics. Strong troubleshooting skills across tenant, endpoint, and network dependencies. Experience writing clear technical documentation and runbooks. Advantage: Relevant certifications such as SC 400, SC 200, AZ 500, MS 102. This position is open to all candidates. |
|
Senior Embedded Vulnerability Researcher Mon, 16 Feb 2026 19:32:00 GMT
מיקום המשרה:
רעננה
תחומי המשרה:
אבטחת מידע וסייבר, חוקר סייבר
סוג/היקף המשרה:
משרה מלאה, עבודה היברידית
Required Senior Embedded Vulnerability Researcher
Our mission is to deend and mitigate the danger from rogue drones. We are looking to expand our drone take-over research team, which is responsible for the core technology of our product. This is a great opportunity for you to expand your capabilities working on versatile and innovative cyber research projects as part of a young and extremely talented team. Requirements: 4+ years of relevant industry experience as embedded vulnerability researcher or equivalent. Experience with a dis-assembler for vulnerability research (IDA Pro or GHIDRA). Deep understanding of OS internals (Linux, RTOS, Android etc.). Experience with complicated exploitation methods on embedded systems. Experience with writing code in assembly or c and Python. Advantage - Graduate of an elite technological unit in IDF. This position is open to all candidates. |
|
אנליסט/ית סייבר Mon, 16 Feb 2026 18:54:00 GMT
מיקום המשרה:
תחומי המשרה:
אבטחת מידע וסייבר, אנליסט סייבר
סוג/היקף המשרה:
משרה מלאה
לתפקיד משמעותי ומאתגר בארגון גדול ומורכב דרוש/ה אנליסט/ית סייבר עם יכולות חקירה וניתוח מתקדמות.
מה בתפקיד? בחינה ושיפור אפקטיביות מערכות ניטור והגנה עבודה מעמיקה עם Splunk - בניית דשבורדים וחקירות כתיבת שאילתות מורכבות בSPL / SQL- ניתוח לוגים, זיהוי חריגות וביצוע Root Cause Analysis מיפוי פערים בהתאם ל-MITRE ATT&CK, NIST ומסגרות מתודולוגיות מובילות ביצוע סימולציות תקיפה באמצעות כלי BAS והובלת תהליכי שיפור משרה מלאה | סביבת עבודה מקצועית ודינמית. דרישות: ניסיון מעשי בחקירות סייבר וניתוח לוגים שליטה מלאה ב- Splunk יכולת מוכחת בכתיבת שאילתות מורכבות (SPL / KQL) חשיבה אנליטית גבוהה ויכולת כתיבת דוחות טכניים. המשרה מיועדת לנשים ולגברים כאחד. |
|
מומחה/ית תקשורת ואבטחת מידע Mon, 16 Feb 2026 18:50:00 GMT
מיקום המשרה:
תחומי המשרה:
אבטחת מידע וסייבר, מחשבים ורשתות, מומחה תקשורת, מומחה אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
דרוש/ה מומחה/ית תקשורת ואבטחת מידע
ארגון גדול ומוביל מגייס מומחה/ית תקשורת ואבטחת מידע לתפקיד משמעותי בצוות מקצועי האחראי על תשתיות קריטיות בארגון. תפקיד מאתגר הכולל עבודה Hands-on לצד הובלת תהליכים ופרויקטים. תחומי אחריות: תכנון, תפעול ותחזוקה של תשתיות תקשורת ומערכות אבטחת מידע מתן פתרונות מתקדמים בתחום התקשורת והסייבר אפיון וטיפול בתקלות, התקנות ציוד וניהול שוטף זיהוי וניהול סיכונים יישום מדיניות אבטחה והובלת פרויקטים. דרישות: ניסיון של לפחות 5 שנים בתחום תקשורת ואבטחת מידע ניסיון מארגונים גדולים / ספקיות תקשורת או ניסיון בתמיכה טכנית Tier 2-3 בסביבה ארגונית שליטה בפרוטוקולי תקשורת וניסיון מעשי עם ציוד Arista / Aruba / Juniper ניסיון מוכח בניהול Firewalls בדגש על Palo Alto ניסיון בתפעול מערכות NAC מבוססות IEEE 802.1X - חובה יתרון: ניסיון עם מוצרי F5 (ASM/LTM/APM) עבודה עם מוצרי Forcepoint (Proxy/DLP/Mail) היכרות עם פתרונות Opswat. המשרה מיועדת לנשים ולגברים כאחד. |
|
Incident Response Lead Mon, 16 Feb 2026 15:14:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, ראש צוות פיתוח אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
we are seeking an Incident Response Lead to own and mature the companys global cyber incident response capability. This role sits within the CISO Office and is accountable for response execution, post-incident learning, and executive-level coordination across our companys cloud, infrastructure, and platform environments.
The Incident Response Lead will act as the single accountable owner for high-severity security incidents, ensuring rapid containment, accurate impact assessment, regulatory-compliant communications, and continuous improvement of detection and response capabilities. This role requires deep technical expertise, strong crisis leadership, and the ability to operate under pressure in highly regulated, high-availability environments. Key Responsibilities Incident Response Leadership Lead and coordinate of security incidents across our companys cloud, infrastructure, and corporate environments. Act as Incident Commander during major incidents, driving containment, eradication, and recovery efforts. Support and maintain clear incident classification, escalation, and decision-making frameworks. Ensure 24/7 readiness through on-call structures, runbooks, and playbooks. Detection, Triage, and Investigation Oversee advanced incident triage and forensic investigations across: Cloud platforms Network and perimeter security Identity and access systems Supply chain and third-party risks Partner with SOC, Threat Intelligence, and Threat Hunting teams to improve detection fidelity and reduce MTTR. Ensure evidence handling meets legal, regulatory, and forensic standards. Lead regulatory-ready incident documentation, timelines, and root cause analysis (RCA). Support audits, regulatory inquiries, and executive reporting related to security incidents. Executive & Cross-Functional Coordination Serve as the primary incident response interface to: CISO and executive leadership Legal, Privacy, Compliance, and Communications teams Infrastructure, Network, IT, Platform, and Engineering leadership Deliver clear, factual, and risk-based incident briefings to senior leadership. Support customer and partner communications when security incidents impact trust or service availability. Program Development & Continuous Improvement Support our companys incident response program, including: Playbooks and runbooks Tabletop exercises and simulations Red/blue/purple team coordination Drive lessons-learned processes and ensure findings result in measurable control improvements. Define and track incident response KPIs (MTTD, MTTR, containment effectiveness). Requirements: Experience 8+ years in cybersecurity, with significant hands-on incident response leadership experience. Proven experience leading large-scale, high-impact security incidents in cloud or infrastructure-heavy environments. Experience operating in regulated or compliance-driven environments (SOC, ISO, financial services, cloud providers, etc.). Technical Expertise Strong understanding of: Cloud security architectures Network security, IAM, endpoint security, and logging pipelines Threat actor tactics, techniques, and procedures (MITRE ATT&CK) Practical experience with SIEM, SOAR, EDR, NDR, and forensic tooling. Ability to validate technical findings independently and challenge assumptions. Leadership & Communication Demonstrated ability to lead under pressure and make high-quality decisions with incomplete data. Clear, concise communicator capable of briefing executives and non-technical stakeholders. Strong cross-functional leadership skills without relying on direct authority. This position is open to all candidates. |
|
Junior Security Compliance Analyst Mon, 16 Feb 2026 15:10:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, אנליסט סייבר
סוג/היקף המשרה:
משרה מלאה
The Junior Security Compliance Analyst (Access Controls) supports security compliance and audit activities related to user access management, privileged access, and segregation of duties (SoD) across enterprise systems
.This role focuses primarily on SOX access control reviews, evidence collection, and documentation, working under guidance from senior team members. It is an excellent entry-level opportunity for candidates with foundational IT or security knowledge who are interested in building a career in security, audit, or governance Key Responsibilities Support periodic user access reviews across systems, including Entra ID, business applications, privileged accounts, and external users Prepare and maintain access review files, ensuring completeness, accuracy, and timely tracking of system owner approvals Assist with Segregation of Duties (SoD) reporting, including identification of conflicts, tracking remediation actions, and maintaining documentation Collect, organize, and validate audit evidence, such a s:User and admin access listin gsPrivileged account inventori esAdministrative activity and access lo gsExternal user access records Support SOX audit activities by:Preparing required documentation and evidence packa gesMaintaining audit trackers and control documentat ionResponding to basic auditor questions under supervis ionFollow documented procedures and control requirements to ensure consistency and audit readin essCollaborate with IT, application owners, and security teams to resolve access-related questions and findings. Requirements: Preferred qualifica tionsBasic familiarity with:Windows / Active Directory or cloud identity platforms (e.g., Entr a ID)Ticketing systems such as Jira, ServiceNow, or si milarAcademic background or coursework in IT, Computer Science, Cybersecurity, or Information Sy stemsExperience in compliance, audit, SOX controls, or information sec urityExposure to or understanding of access control concepts suc h as:Least priv ilegeUser types and role-based a ccessAccess approval work flowsPrivileged and external user access. This position is open to all candidates. |
|
IT Security Engineer Mon, 16 Feb 2026 15:06:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מהנדס סייבר
סוג/היקף המשרה:
משרה מלאה
The IT Security Engineer will be responsible for implementing, managing, integrating and maintaining security systems across the organizations IT landscape. The role includestranslating policies and standards into procedures and controls, collaborating with internal stakeholders such as IT, Product Security, and Data Centers, and performing preventive actions and rapid response to security incidents.
Key Responsibilities: Security Systems:Implement security architectures and controls.Maintain and manage security systems such as:XDR (Extended Detection & Response), SWG (Secure Web Gateway), DLP (Data Leakage Prevention), Email Security, Network security (Firewalls, NAC), IAM (Identity & Access Management), CASB (Cloud Access Security Broker), PAM (Privileged Access Management), EPM (Endpoint Privilege Management), BAS (Breach & Attack Simulation), Vulnerability Scanners, Training & Awareness, SIEM (Security Information & Event Management), SOAR (Security Orchestration, Automation & Response), Password Manager, Threat Intelligence, Patch Management, TPRM (Third-Party Risk Management), EASM (External Attack Surface Management). Collaborate with teams: Develop and implement security for IT systems, applications, and networks.Integrate security into the design and development of new and existing systems.Provide guidance on secure configurations and designs.Identify and remediate vulnerabilities and misconfigurations.Monitor and optimize system and processes to enhance security and comply with policies and standards.Lead and execute cross-organizational security projects and initiatives. Technological Documentation: Write technical documents such as:HLD (High Level Design), LLD (Low Level Design), system documentation, procedures, guidelines, IMF (Incident Management Flow), network diagrams.Incident Response and Recovery:Collaborate with the Security Operations Center (SOC) and MSSP to ensure robust incident detection and response capabilities.Contribute to the development of incident response plans and recovery strategies.Participate in post-incident reviews to identify lessons learned and implement improvements. Security Technology Evaluation: Research and recommend new security technologies to enhance the organization's security posture.Oversee the implementation and integration of security tools and solutions.Evaluate the impact and effectiveness of security technologies in mitigating risks.Compliance and Audit Support:Ensure IT systems and processes comply with relevant regulatory standards (e.g., ISO 27001, NIST, GDPR).Support internal and external audits by providing documentation and evidence of compliance.Maintain detailed records of security controls and activities for audit purposes. Requirements: Education and Certifications:Bachelors degree in Computer Science, Information Security, or a related field.Relevant certifications such as CISSP, CISM, CCSP, or similar are highly desirable. Experience:Minimum of 5 years of experience in IT security (System, Network, Information, Cyber), with at least 3 years in a security engineering role. Familiarity with securing cloud-based environments and SaaS platforms. Skills and Knowledge: Fluent in English. Expertise in security engineering principles, relevant frameworks, and best practices.Strong understanding and hands-on experience with Security & IT technologies.Excellent interpersonal and communication skills for cross-functional collaboration. This position is open to all candidates. |
|
Detection & Response Manager Mon, 16 Feb 2026 15:04:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מנהל אבטחת מידע / סייבר / CISO, מומחה אבטחת מידע / סייבר, SOC/SIEM
סוג/היקף המשרה:
משרה מלאה
we are seeking a Detection & Response Manager to lead and mature our security operations and adversary defense capabilities.
This role owns SOC operations, incident response, red teaming, and security automation (SIEM & SOAR) across cloud, data center, and enterprise environments. The ideal candidate combines operational excellence, threat-adversary thinking, and automation-first execution. Key Responsibilities Security Operations Center (SOC) Leadership Own day-to-day SOC operations across cloud, data center, and corporate environments Define detection strategy aligned to our company threat models and crown jewels Ensure high-quality alerting, triage, escalation, and reporting Continuously reduce false positives and alert fatigue Incident Response & Crisis Management Lead end-to-end incident response for high-severity security incidents Own incident command during crises (technical, executive, and regulatory coordination) Ensure post-incident reviews lead to real control improvements Maintain and regularly test incident response playbooks Red Team & Adversarial Testing Manage red team and purple team activities (internal and external) Translate real-world adversary TTPs into detection and response improvements Ensure findings from red team exercises are remediated and verified Partner with product, cloud, and physical security teams on attack simulations SOC Automation (SIEM & SOAR) Own SIEM and SOAR strategy, architecture, and roadmap Drive automation of detection, enrichment, response, and reporting Integrate identity, cloud, CI/CD, and physical security telemetry Measure SOC effectiveness using MTTD, MTTR, and coverage metrics Threat Intelligence & Continuous Improvement Operationalize threat intelligence into detections and playbooks Track emerging threats relevant to cloud, AI, and infrastructure providers Continuously improve detection coverage against prioritized attack paths What Success Looks Like (12 Months) Measurable reduction in MTTD and MTTR for high-severity incidents Majority of high-risk incidents detected internally, not externally Red team findings consistently detected and contained SOC automation meaningfully reduces manual effort Clear, trusted security reporting to CISO and leadership. Requirements: 7+ years in security operations, incident response, or threat detection Proven experience leading a SOC or incident response function Strong experience with SIEM and SOAR platforms Deep understanding of: Cloud security Identity-based attacks and detection Endpoint, network, and application telemetry Experience running or managing red team / purple team activities Calm, decisive leadership under pressure Preferred Qualifications Experience in cloud service providers, hyperscale, or infrastructure companies Familiarity with GPU / HPC environments or large-scale data centers Experience with DORA, SOC 2, ISO 27001 incident requirements Background in threat hunting or offensive security Key Skills & Attributes Adversary-minded: thinks like an attacker, not a tool operator Automation-first mindset Strong communicator during crises Data-driven decision making High ownership, low ego. This position is open to all candidates. |
|
Intelligence Analyst Mon, 16 Feb 2026 14:51:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, אנליסט סייבר
סוג/היקף המשרה:
משרה מלאה
We are seeking a highly motivated and skilled intelligence analyst with hands-on Python programming experience to join our Operation Security (OpSec) team. This role focuses on monitoring, analyzing, and automating the processing of intelligence-related data from multiple sources to ensure the stability, performance, and security of operations.
The ideal candidate has a strong background in cybersecurity monitoring combined with the ability to develop Python-based automations and analytical workflows to detect, investigate, and prevent security threats. Key Responsibilities Provide timely response to Operational Security (OpSec) incidents, triage alerts, and categorize issues for escalation to appropriate technical teams. Monitor and analyze security data from multiple sources, including network logs, system logs, performance metrics, and customer reports. Develop and maintain Python-based scripts and automations to: Parse, normalize, and analyze large volumes of log and security data Automate alert triage, reporting, and repetitive SOC workflows Improve detection efficiency and response times Communicate effectively with internal teams and customers to provide incident status updates and resolution details. Requirements: Experience working with network and system logs, security events, and performance metrics. Ability to combine and analyze multiple datasets to identify security patterns and trends. Experience with network monitoring and troubleshooting tools. Hands-on experience with network sniffing tools. Proficiency in Excel for data analysis and reporting. Background in intelligence operations or intelligence analysis. Strong Python programming skills, with experience in: Data analysis (e.g., parsing logs, statistical analysis, trend detection) Automation of monitoring, alerting, and reporting workflows Education Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field or equivalent hands-on experience in intelligence operations, automation, or security analysis. This position is open to all candidates. |
|
Network Security Researcher Mon, 16 Feb 2026 14:33:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, איש אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
The Cyber Research team secures the invisible layers of the modern enterprise. We specialize in the "unmanageable"- identifying and safeguarding OT, IoT, and Medical devices by decoding complex network communications and proprietary protocols.
As a Network Security Researcher, you will drive the full research lifecycle: from deep-dive protocol analysis and device fingerprinting to vulnerability discovery and the development of automated security solutions. Responsibilities Conduct deep-dive security research and blackbox network analysis on proprietary and obscure OT, IoT, and medical protocols. Identify and fingerprint devices based on network traffic patterns and develop logic to detect relevant CVEs and security risks. Develop Python-based tools and SQL queries to automate research workflows and enhance product detection capabilities. Collaborate with R&D and Product teams to transform research findings into scalable security features and customer-facing solutions. Requirements: At least 2 years of professional experience in cyber security research specifically focused on network traffic analysis. Proven expertise using network analysis tools such as Wireshark and tcpdump to dissect complex communication flows. Demonstrated experience performing research on network protocols (TCP/IP, well-known, or proprietary). Hands-on proficiency with SQL for data analysis and basic Python for scripting or automation. This position is open to all candidates. |
|
Senior Cyber Security Engineer Mon, 16 Feb 2026 14:04:00 GMT
מיקום המשרה:
הרצליה
תחומי המשרה:
אבטחת מידע וסייבר, מומחה אבטחת מידע / סייבר, מהנדס סייבר
סוג/היקף המשרה:
משרה מלאה
We are looking for a talented, tech-savvy individual to join our Cyber Security team and help us tackle the toughest security challenges in cutting-edge ecosystem.
In this role, you will be a subject matter expert and play a major part in our efforts to build and maintain security infrastructure, design secure architectures, enforce security best practices, and automate security processes. The Cyber Security team is composed of strong and experienced security engineers, responsible for defining the security strategy and managing all of infrastructure. Responsibilities: Define, implement, and maintain security policies, standards, and methodologies; ensure they evolve with new threats and technologies. Design, deploy, and operate detection, prevention, and response technologies across a scaled, diverse, and complex environment (hybrid infrastructure: public cloud + on-premises). Build and operate secure infrastructure: hands-on ownership of security configurations and system hardening. Conduct security assessments, secure-design reviews and architecture assurance reviews to identify and mitigate possible security risks. Automate security processes: configuration deployments, infrastructure management, detection, response, compliance checks, patching, configuration drift, etc. Design, develop, and implement secure software development and deployment pipelines, incorporating best practices, automation, and CI/CD methodologies. Stay ahead of emerging cyber threats and technologies: research, evaluate, pilot, and integrate where relevant. Participate in creating incident response playbooks, coordinate incidents investigations, root cause analysis, and lessons learned. Requirements: 4+ years of experience in security engineering, or equivalent. Strong hands-on experience with security tools, services, deployment automation, and configuration management. Demonstrated expertise in cloud security, including low-level design of secure cloud architectures (e.g., VPCs, network segmentation, endpoints, encryption). Solid understanding of operating systems (Linux, Windows, macOS) and networking fundamentals (TCP/IP, DNS, VLANs, routing, etc.). Well-versed in identity & access management: Conditional Access, Zero Trust, RBAC, identity lifecycle, access reviews, compliance, and governance. Hands-on experience with infrastructure as code. Experience securing microservices, containerized environments and serverless. Strong knowledge of modern Secure Software Development Lifecycle (SSDLC) practices: threat modeling, secure design, code reviews, API security, SAST/DAST/SCA. Programming/scripting skills to build automation, tools, and playbooks. Self-motivated and autodidactic, with the ability to deliver solutions end-to-end as part of a do it yourself approach. Advantage: Relevant courses and qualifications. Experience in securing AWS services. This position is open to all candidates. |
|
Vulnerability Research team leader Sun, 15 Feb 2026 00:02:00 GMT
מיקום המשרה:
תל אביב יפו
תחומי המשרה:
אבטחת מידע וסייבר, ראש צוות פיתוח אבטחת מידע / סייבר
סוג/היקף המשרה:
משרה מלאה
Company Overview:
Our mission is to enable its global customers to protect and save lives by enhancing digital investigations and intelligence gathering to accelerate justice in communities around the world. Our AI-powered Digital Investigation Platform enables customers to lawfully access, collect, analyze and share digital evidence in legally sanctioned investigations while preserving data privacy. Thousands of public safety organizations, intelligence agencies and businesses rely on our digital forensic and investigative solutions-available via cloud, on-premises and hybrid deployments-to close cases faster and safeguard communities.?To learn more, visit us in our website. Position Overview: We are looking for a talented team leader to join the industrys leading digital intelligence Labs group. In this role, you will lead and participate in innovative projects to implement and productize groundbreaking, world-unique capabilities for extracting evidence from Android or IOS devices. Modern Android and IOS platforms present increasing challenges from a forensics perspective, incorporating robust protection mechanisms such as File-Based Encryption, Secure Element, and mitigations like Pointer Authentication Codes. Cellebrite Labs is a team of passionate researchers and developers dedicated to solving cutting-edge digital intelligence challenges, staying years ahead of others in the industry. Our world-class R&D efforts assist law enforcement agencies by enabling lawful evidence extraction, helping to bring criminals to justice every day. Key Responsibilities: Oversee Vulnerability Research Projects: Lead and manage projects focused on discovering and exploiting vulnerabilities in mobile platforms. Mentor and Guide Team Members: Provide mentorship and guidance to researchers, helping them navigate complex technological challenges. Deliver Comprehensive Solutions: Develop complete solutions, moving beyond proof-of-concept demonstrations to fully implementable exploits. Recruit and Develop Talent: Identify and recruit new researchers as needed, building a skilled and dynamic team to enhance the department's capabilities. Office Location: Tel Aviv Requirements: * Over 3 years of experience leading security research projects and managing teams. * At least 6 years of experience in vulnerability research. * Full proficiency in English. * Excellent interpersonal skills. * Experience in mobile vulnerability research and exploitation is an advantage. NOTE: The position is located in our offices in Tel-Aviv, Alon Tower. This position is open to all candidates. |