עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!
במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.
מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.
Responsibilities:
Lead research into modern security threats, with emphasis on lateral movement, privilege escalation, and post‑compromise techniques across on‑prem, hybrid, and cloud environments.
Analyze and model enterprise infrastructure, networking, and identity systems to identify attack surfaces and opportunities for segmentation.
Work closely with product and engineering teams to design and validate new security controls, detection logic, and segmentation strategies.
Research and exploit misconfigurations or weaknesses in identity systems, networking, authentication protocols, and platform services.
Build proof‑of‑concept attacks and detection techniques that inform both our commercial product and our open‑source projects.
Contribute to the development and maintenance of open‑source security tools, threat simulations, and internal research frameworks.
Produce high‑quality technical blog posts, research papers, talks, and online content to share findings and strengthen our presence in the security community.
Proven experience in security research, penetration testing, red teaming, or advanced defensive security engineering.
Strong understanding of networking, identity, authentication, and authorization concepts in enterprise and hybrid environments.
Familiarity with lateral movement, privilege escalation, and post‑exploitation techniques on modern platforms (Windows, Linux, Active Directory, cloud, or hybrids thereof).
Experience with programming and scripting language (e.g., C/C++, Python, Go) for building tools and research prototypes.
Experience contributing to or maintaining open‑source security tools or public research projects.
Data analysis skills (e.g., Elasticsearch, pandas, log pipelines) for processing and analyzing large security datasets.
Knowledge of detection engineering, telemetry analysis, and log‑based threat hunting.
Prior experience publishing research, speaking at conferences, webinars, or producing technical content.
Bonus: Experience with cloud platforms (AWS, Azure, GCP), endpoint or identity security, kernel or OS‑level internals, or security product development.
במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.
מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.
משרות נוספות מומלצות עבורך
-
Senior Security Researcher Identity & SaaS (Cortex Cloud)
-
תל אביב - יפו
Palo Alto Networks
-
-
Security Researcher
-
תל אביב - יפו
Medulla
-
-
vulnerability researcher - 2600
-
תל אביב - יפו
Shabak - Israeli Security Agency - Career
-
-
Security Researcher - Relocation to USA
-
תל אביב - יפו
Snatch UP
-
-
Security Researcher
-
תל אביב - יפו
Recolabs
-
-
Security Researcher
-
תל אביב - יפו
Hunters
-