{"id":8604,"date":"2018-12-24T10:46:37","date_gmt":"2018-12-24T08:46:37","guid":{"rendered":"http:\/\/www.ambition.org.il\/?p=8604"},"modified":"2018-12-24T11:00:07","modified_gmt":"2018-12-24T09:00:07","slug":"cyber-security-researcher-%d7%9c%d7%97%d7%91%d7%a8%d7%94-%d7%91%d7%94%d7%a8%d7%a6%d7%9c%d7%99%d7%94","status":"publish","type":"post","link":"https:\/\/www.ambition.org.il\/?p=8604","title":{"rendered":"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8604\" class=\"elementor elementor-8604 elementor-bc-flex-widget\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-289b90e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"289b90e3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38ecb62d\" data-id=\"38ecb62d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-556ca15a elementor-widget elementor-widget-heading\" data-id=\"556ca15a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u05de\u05e9\u05e8\u05d4 \u05de\u05e1\u05e4\u05e8  2719<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d7359dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d7359dc\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27b2a4cc\" data-id=\"27b2a4cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76b63c0e elementor-widget elementor-widget-text-editor\" data-id=\"76b63c0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<h4 class=\"ng-binding\" style=\"padding-right: 60px;\">\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05ea\u05e4\u05e7\u05d9\u05d3<\/h4><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Previous proven experience in application and\/or network security research, preferably in a product company- at least 2 years.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Strong programming skills (scripting and\/or OO languages) &#8211; Must.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Deep understanding of contemporary threats landscape and attack vectors.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Knowledge and deep understanding of networking and internet protocols.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Knowledge and deep understanding of malware techniques and methods.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Excellent English written and verbal communication skills.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Willing to travel abroad occasionally.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Experience with Incident Response and Digital Forensics domains \u2013 strong advantage.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Experience with various attack and penetration testing tools \u2013 an advantage.<\/h6><h6 class=\"ng-binding\" dir=\"ltr\" style=\"padding-right: 60px; padding-left: 30px;\">Bachelor&#8217;s degree (Computer Science or scientific discipline) \u2013 an advantage.<\/h6>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9628f54 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9628f54\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-shrink\" href=\"https:\/\/www.ambition.org.il\/?page_id=6054\">\n\t\t\t\t\t\t\t<i class=\"fa fa-arrow-circle-left\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-590bb7a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"590bb7a0\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1bd3b55c\" data-id=\"1bd3b55c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c1a0dc elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"4c1a0dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<center><img loading=\"lazy\" class=\"\" src=\"https:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg\" width=\"158\" height=\"158\" \/><\/center><center><a style=\"font-size: 24px;\" href=\"mailto:jobs@ambition.org.il?subject= \u05de\u05e9\u05e8\u05d4 \u05de\u05e1\u05e4\u05e8 2719 \u05dc\u05ea\u05e4\u05e7\u05d9\u05d3 Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4! - \u05e0\u05e9\u05dc\u05d7 \u05de\u05d0\u05ea\u05e8 AMBITION\">\u05dc\u05e9\u05dc\u05d9\u05d7\u05ea \u05e7\u05d5&#8221;\u05d7 \u05dc\u05de\u05e9\u05e8\u05d4<\/a><\/center>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-588655ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"588655ee\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3285083e\" data-id=\"3285083e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a7281a0 elementor-hidden-phone elementor-widget elementor-widget-text-editor\" data-id=\"3a7281a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<center><img loading=\"lazy\" class=\"\" src=\"https:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg\" width=\"158\" height=\"158\" \/><\/center>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6566deaf elementor-button-success elementor-align-center popmake-pop-communication6 elementor-hidden-phone elementor-widget elementor-widget-button\" data-id=\"6566deaf\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-md\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">\u05dc\u05e9\u05dc\u05d9\u05d7\u05ea \u05e7\u05d5\"\u05d7 \u05dc\u05de\u05e9\u05e8\u05d4<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-67cbbc36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"67cbbc36\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4640860d\" data-id=\"4640860d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a53f4c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a53f4c0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60cff387\" data-id=\"60cff387\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5832d907 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5832d907\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4cb69d21\" data-id=\"4cb69d21\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24fb7833 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24fb7833\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63cc2761\" data-id=\"63cc2761\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u05de\u05e9\u05e8\u05d4 \u05de\u05e1\u05e4\u05e8 2719 \u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05ea\u05e4\u05e7\u05d9\u05d3 Previous proven experience in application and\/or network security research, preferably in a product company- at least 2 years. Strong programming skills (scripting and\/or OO languages) &#8211; Must. Deep understanding of contemporary threats landscape and attack vectors. Knowledge and deep understanding of networking and internet protocols. Knowledge and deep understanding of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[114],"tags":[87],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4 - Ambition<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ambition.org.il\/?p=8604\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4 - Ambition\" \/>\n<meta property=\"og:description\" content=\"\u05de\u05e9\u05e8\u05d4 \u05de\u05e1\u05e4\u05e8 2719 \u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05ea\u05e4\u05e7\u05d9\u05d3 Previous proven experience in application and\/or network security research, preferably in a product company- at least 2 years. Strong programming skills (scripting and\/or OO languages) &#8211; Must. Deep understanding of contemporary threats landscape and attack vectors. Knowledge and deep understanding of networking and internet protocols. Knowledge and deep understanding of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ambition.org.il\/?p=8604\" \/>\n<meta property=\"og:site_name\" content=\"Ambition\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/he-il.facebook.com\/A-M-B-I-T-I-O-N-663883997063831\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-24T08:46:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-24T09:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"\u05e0\u05db\u05ea\u05d1 \u05e2\u05dc \u05d9\u05d3\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpf7D\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ambition.org.il\/#organization\",\"name\":\"Ambition\",\"url\":\"https:\/\/www.ambition.org.il\/\",\"sameAs\":[\"https:\/\/he-il.facebook.com\/A-M-B-I-T-I-O-N-663883997063831\/\",\"https:\/\/il.linkedin.com\/in\/sharon-eldar-33166b8\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ambition.org.il\/#logo\",\"inLanguage\":\"he-IL\",\"url\":\"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/07\/logo4.jpg\",\"contentUrl\":\"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/07\/logo4.jpg\",\"width\":2000,\"height\":210,\"caption\":\"Ambition\"},\"image\":{\"@id\":\"https:\/\/www.ambition.org.il\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ambition.org.il\/#website\",\"url\":\"https:\/\/www.ambition.org.il\/\",\"name\":\"Ambition\",\"description\":\"Ambition \u05d7\u05d1\u05e8\u05ea \u05d4\u05e9\u05de\u05d4 \u05dc\u05de\u05e7\u05e6\u05d5\u05e2\u05d5\u05ea \u05d4\u05d9\u05d9\u05d8\u05e7. \u05d7\u05d9\u05e4\u05d5\u05e9 \u05e2\u05d1\u05d5\u05d3\u05d4 \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05d4\u05d9\u05d9\u05d8\u05e7. \u05de\u05e9\u05e8\u05d5\u05ea \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05d4\u05d9\u05d8\u05e7. \u05dc\u05d5\u05d7 \u05de\u05e9\u05e8\u05d5\u05ea. \u05d3\u05e8\u05d5\u05e9\u05d9\u05dd \u05d1\u05d4\u05d9\u05d9\u05d8\u05e7. \u05d7\u05d9\u05e4\u05d5\u05e9 \u05de\u05e9\u05e8\u05d5\u05ea. \u05dc\u05d5\u05d7 \u05d3\u05e8\u05d5\u05e9\u05d9\u05dd\",\"publisher\":{\"@id\":\"https:\/\/www.ambition.org.il\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ambition.org.il\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"he-IL\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#primaryimage\",\"inLanguage\":\"he-IL\",\"url\":\"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg\",\"contentUrl\":\"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#webpage\",\"url\":\"https:\/\/www.ambition.org.il\/?p=8604\",\"name\":\"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4 - Ambition\",\"isPartOf\":{\"@id\":\"https:\/\/www.ambition.org.il\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#primaryimage\"},\"datePublished\":\"2018-12-24T08:46:37+00:00\",\"dateModified\":\"2018-12-24T09:00:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ambition.org.il\/?p=8604\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ambition.org.il\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#webpage\"},\"author\":{\"@id\":\"https:\/\/www.ambition.org.il\/#\/schema\/person\/bcccd5d5d1c4d8d65566cc1e9bf680ab\"},\"headline\":\"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4\",\"datePublished\":\"2018-12-24T08:46:37+00:00\",\"dateModified\":\"2018-12-24T09:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#webpage\"},\"wordCount\":99,\"publisher\":{\"@id\":\"https:\/\/www.ambition.org.il\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ambition.org.il\/?p=8604#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg\",\"keywords\":[\"\u05e9\u05e8\u05d5\u05df\"],\"articleSection\":[\"\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\"],\"inLanguage\":\"he-IL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ambition.org.il\/#\/schema\/person\/bcccd5d5d1c4d8d65566cc1e9bf680ab\",\"name\":\"wpf7D\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ambition.org.il\/#personlogo\",\"inLanguage\":\"he-IL\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dcf7be4139109e960ed4c62b9a86adc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dcf7be4139109e960ed4c62b9a86adc6?s=96&d=mm&r=g\",\"caption\":\"wpf7D\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4 - Ambition","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ambition.org.il\/?p=8604","og_locale":"he_IL","og_type":"article","og_title":"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4 - Ambition","og_description":"\u05de\u05e9\u05e8\u05d4 \u05de\u05e1\u05e4\u05e8 2719 \u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05ea\u05e4\u05e7\u05d9\u05d3 Previous proven experience in application and\/or network security research, preferably in a product company- at least 2 years. Strong programming skills (scripting and\/or OO languages) &#8211; Must. Deep understanding of contemporary threats landscape and attack vectors. Knowledge and deep understanding of networking and internet protocols. Knowledge and deep understanding of [&hellip;]","og_url":"https:\/\/www.ambition.org.il\/?p=8604","og_site_name":"Ambition","article_publisher":"https:\/\/he-il.facebook.com\/A-M-B-I-T-I-O-N-663883997063831\/","article_published_time":"2018-12-24T08:46:37+00:00","article_modified_time":"2018-12-24T09:00:07+00:00","og_image":[{"url":"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg"}],"twitter_card":"summary","twitter_misc":{"\u05e0\u05db\u05ea\u05d1 \u05e2\u05dc \u05d9\u05d3":"wpf7D"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ambition.org.il\/#organization","name":"Ambition","url":"https:\/\/www.ambition.org.il\/","sameAs":["https:\/\/he-il.facebook.com\/A-M-B-I-T-I-O-N-663883997063831\/","https:\/\/il.linkedin.com\/in\/sharon-eldar-33166b8"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.ambition.org.il\/#logo","inLanguage":"he-IL","url":"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/07\/logo4.jpg","contentUrl":"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/07\/logo4.jpg","width":2000,"height":210,"caption":"Ambition"},"image":{"@id":"https:\/\/www.ambition.org.il\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.ambition.org.il\/#website","url":"https:\/\/www.ambition.org.il\/","name":"Ambition","description":"Ambition \u05d7\u05d1\u05e8\u05ea \u05d4\u05e9\u05de\u05d4 \u05dc\u05de\u05e7\u05e6\u05d5\u05e2\u05d5\u05ea \u05d4\u05d9\u05d9\u05d8\u05e7. \u05d7\u05d9\u05e4\u05d5\u05e9 \u05e2\u05d1\u05d5\u05d3\u05d4 \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05d4\u05d9\u05d9\u05d8\u05e7. \u05de\u05e9\u05e8\u05d5\u05ea \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05d4\u05d9\u05d8\u05e7. \u05dc\u05d5\u05d7 \u05de\u05e9\u05e8\u05d5\u05ea. \u05d3\u05e8\u05d5\u05e9\u05d9\u05dd \u05d1\u05d4\u05d9\u05d9\u05d8\u05e7. \u05d7\u05d9\u05e4\u05d5\u05e9 \u05de\u05e9\u05e8\u05d5\u05ea. \u05dc\u05d5\u05d7 \u05d3\u05e8\u05d5\u05e9\u05d9\u05dd","publisher":{"@id":"https:\/\/www.ambition.org.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ambition.org.il\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"he-IL"},{"@type":"ImageObject","@id":"https:\/\/www.ambition.org.il\/?p=8604#primaryimage","inLanguage":"he-IL","url":"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg","contentUrl":"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg"},{"@type":"WebPage","@id":"https:\/\/www.ambition.org.il\/?p=8604#webpage","url":"https:\/\/www.ambition.org.il\/?p=8604","name":"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4 - Ambition","isPartOf":{"@id":"https:\/\/www.ambition.org.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ambition.org.il\/?p=8604#primaryimage"},"datePublished":"2018-12-24T08:46:37+00:00","dateModified":"2018-12-24T09:00:07+00:00","breadcrumb":{"@id":"https:\/\/www.ambition.org.il\/?p=8604#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ambition.org.il\/?p=8604"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ambition.org.il\/?p=8604#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ambition.org.il\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4"}]},{"@type":"Article","@id":"https:\/\/www.ambition.org.il\/?p=8604#article","isPartOf":{"@id":"https:\/\/www.ambition.org.il\/?p=8604#webpage"},"author":{"@id":"https:\/\/www.ambition.org.il\/#\/schema\/person\/bcccd5d5d1c4d8d65566cc1e9bf680ab"},"headline":"Cyber Security Researcher \u05dc\u05d7\u05d1\u05e8\u05d4 \u05d1\u05d4\u05e8\u05e6\u05dc\u05d9\u05d4","datePublished":"2018-12-24T08:46:37+00:00","dateModified":"2018-12-24T09:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ambition.org.il\/?p=8604#webpage"},"wordCount":99,"publisher":{"@id":"https:\/\/www.ambition.org.il\/#organization"},"image":{"@id":"https:\/\/www.ambition.org.il\/?p=8604#primaryimage"},"thumbnailUrl":"http:\/\/www.ambition.org.il\/wp-content\/uploads\/2017\/05\/at-1020116_1920_a-300x300.jpg","keywords":["\u05e9\u05e8\u05d5\u05df"],"articleSection":["\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea"],"inLanguage":"he-IL"},{"@type":"Person","@id":"https:\/\/www.ambition.org.il\/#\/schema\/person\/bcccd5d5d1c4d8d65566cc1e9bf680ab","name":"wpf7D","image":{"@type":"ImageObject","@id":"https:\/\/www.ambition.org.il\/#personlogo","inLanguage":"he-IL","url":"https:\/\/secure.gravatar.com\/avatar\/dcf7be4139109e960ed4c62b9a86adc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dcf7be4139109e960ed4c62b9a86adc6?s=96&d=mm&r=g","caption":"wpf7D"}}]}},"_links":{"self":[{"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=\/wp\/v2\/posts\/8604"}],"collection":[{"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8604"}],"version-history":[{"count":3,"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=\/wp\/v2\/posts\/8604\/revisions"}],"predecessor-version":[{"id":10217,"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=\/wp\/v2\/posts\/8604\/revisions\/10217"}],"wp:attachment":[{"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ambition.org.il\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}