Threat Research Team Lead

Tel Aviv-Yafo, Tel Aviv District, IL

SafeBreach

SafeBreach provides the leading exposure validation platform, combining breach and attack simulation with attack path validation.

View all jobs at SafeBreach

Apply now Apply later

Description

🔹 Title: Threat Research Team Lead

📍 Locations (Hybrid): Tel Aviv (Sky Tower)

👥 Reporting To: VP of Security Research

🌟 Opportunity Highlights

We are seeking a Threat Research Team Lead to join our security research team in Tel Aviv.

As the leader of the SafeBreach Threat Research team, you will play a pivotal role in analyzing and simulating the most advanced cyber threats. Your team will be responsible for researching and developing attacks for the exposure validation platform, uncovering complex in-the-wild exploits across diverse technologies and environments.

👋 Who We Are

SafeBreach is the leader in enterprise-grade exposure validation, providing the world’s largest brands with safe and scalable capabilities to understand, measure and remediate threat exposure and associated cyber risk.

SafeBreach has had a landmark year so far, launching its new SafeBreach Exposure Validation Platform in February 2025, which combines breach and attack simulation (BAS) capabilities with attack path validation to provide enterprises with deeper insight into threat exposure and cyber risk.

The award-winning SafeBreach exposure validation platform combines pioneering breach and attack simulation and innovative attack path validation capabilities to help enterprise security teams measure and address security gaps at the perimeter and beyond. SafeBreach helps enterprises transform their security strategy from reactive to proactive safely and at scale.

SafeBreach is a state-of-the-art thought leadership research team, with proven critical discoveries which include forty 0-day vulnerabilities in significant security solutions.

We are regular speakers at the most important global cyber security conferences, with more than twenty main-stage talks at Black Hat and DEFCON conferences.

The best thing about SafeBreach? Definitely the people! SafeBreachers are friendly, collaborative, and hard working. Together, we've built an amazing culture, and we are looking to add more awesome people to our growing team!


💰 What We Offer

  • Competitive salary and equity grants
  • Hybrid flexibility
  • Quarterly recharge weekends
  • Learning & development stipend
  • Generous paid leave policies including flexible PTO and parental leave


🚀 The Impact You Will Have

  • You will manage the SafeBreach Threat Research team, responsible for analyzing the most advanced threat groups techniques and exploits. The team is responsible for the research and building of the exposure validation platform’s attacks. You will lead the research of complex in-the-wild attacks on a wide variety of technologies and operating systems such as Windows, Linux, Mac, and environments such as Dockers and Cloud. 
  • You will lead the implementation and work closely with the R&D teams on a huge variety of cyber attacks simulation such as: process injections, lateral movement, OS persistence, Active Directory attacks, and vulnerabilities exploits.
  • You will work closely with the thought leadership team on exclusive 0-Day attacks simulations.
  • You will directly manage our talented threat researchers, guiding and helping them on complex hands-on challenges and directing their priorities and focus.


Interview Process

Average Duration: ~2-4 weeks

Key steps:

  1. Send your application
  2. Receive a response from us within 5–7 days


If selected:

  1. Speak with the Recruiter (15 min)
  2. Meet the Hiring Manager (45 min)
  3. Complete an assignment
  4. On-Site Meetings: Technical Interview (90 minutes) and HR conversation (60 minutes)
  5. Offer & Onboarding!

Requirements

🫵 Who YOU Are

  • At least 3 years of experience in OS internals
  • Proven work experience as a research team lead
  • Knowledge in offensive or red-team approach
  • 3 years experience in Python development.
  • At least 3 years of experience in vulnerability or APT’s research or research of Endpoint’s and OS security control detection techniques.
  • Self-driven, autonomous learning abilities and thinking outside the box mentality
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Active Directory APT Cloud Exploits Linux Python R&D Security strategy Strategy Threat Research Vulnerabilities Windows Zero-day

Perks/benefits: Competitive pay Conferences Equity / stock options Flex hours Flex vacation Parental leave

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.