Senior Researcher
Content + Source + Freshness • 12 Dec 2025 • 95% confidence
Offer value
Value derived from leadership responsibilities and the importance of cybersecurity in current contexts.
- Emphasis on leadership in cybersecurity R&D
- Potentially influential role within the organization
- Mentorship and development-oriented position
- Expectations require significant experience and commitment
Pros
- Leadership role overseeing multiple teams in cybersecurity.
- Opportunity to shape technology strategy in a dynamic environment.
- Focus on mentorship and development of engineering talents.
Cons
- Leadership roles require extensive experience which could be limiting.
- High expectations with the need for cybersecurity expertise.
- Potential for long hours given the nature of responsibilities.
Who it's for
Senior Leadership • On-site collaboration with teams
Good fit
- Experienced R&D leaders in cybersecurity
- Candidates with an eagerness to mentor and grow teams
- Strategists with a vision for cybersecurity development
Not recommended for
- Inexperienced leaders without technical background
- New graduates or juniors looking for entry-level roles
- Individuals not interested in fast-paced R&D settings
Motivation fit
Key skills
About the job
Senior Researcher
- R&D
- Tel Aviv
- Full-time
Description
We are looking for a highly motivated, fast learning researcher to focus on vulnerability research & exploitation in embedded environments.
In this roll you will acquire a deep understanding of proprietary and unique technologies.
A special opportunity to deep dive into embedded devices internals and the full understanding of functionality and design of IOT. You will also develop and utilize the knowledge acquired into the product and the production environment and provide end-to-end solutions in your domain.
Requirements
- 3+ years of relevant industry experience as a vulnerability researcher or equivalent.
- Extensive experience with a disassembler (IDA Pro or GHIDRA) and source-less debugging and OS internals.
- Experience with complicated exploitation methods.
- Experience in writing code in assembly, C, and Python.
- Good understanding of common security mitigations.
- Good understanding of network protocols and concepts.
- Understanding of cryptography concepts.
- Highly motivated and creative individual.
Advantages
- Experience with RF communication schemes such as WiFi, Bluetooth, GPS…
- Experience with developing/researching in Android / iOS environments.
- Understanding of OS internals

