Security Researcher

Israel

Apply now Apply later

Make Your Mark

Cymulate’s Continuous Security Validation enables companies to challenge, assess and optimize their cyber-security posture against the evolving cyberthreat landscape, simply and continuously.

With world-class clients we strive to bring the highest level of service to everything we do. Our team is made up of the very best people for the job and as we grow, we’re always on the lookout for people with the skills, experience, and personality that will let us both shine. With high scores on Gartner, G2 and Glassdoor, our clients and employees have let us know what they love about us.

Cyber Security Researcher 
Cymulate is looking for a hands-on Penetration Tester / Red Teamer with strong infrastructure experience to join our team as a Cyber Security Researcher. You’ll be part of the offensive team that researches cutting-edge attacks and translates them into realistic breach simulations across complex environments—Windows domains, cloud infrastructure, Linux systems, and more.
Your work directly powers our Exposure Validation platform, helping organizations understand and defend against modern adversaries.

What You Will Do?

Research & Simulate Real-World Attacks
  • Track and analyze the latest attacker TTPs
  • Build internal tools, scripts, and POCs to emulate real threat behavior
  • Design offensive simulations mapped to the MITRE ATT&CK framework
  • Focus areas include:
    • Active Directory attacks (on-prem & Azure)
    • Cloud infrastructure misconfigurations (AWS, Azure, GCP)
    • Linux and network-level attack vectors
    • Kubernetes threats and container-based environments
  • Write clean, reusable, and documented code in PythonPowerShell, and Bash

What Will You Have?

Offensive Infrastructure Security Experience
  • Proven background in infrastructure penetration testing or red teaming (not web-only)
  • Hands-on with Windows AD exploitationnetwork pivotinglateral movement
  • Comfortable working across the entire attack chain—from recon to post-exploitation
Tool Proficiency
  • Experience with tools like BloodHoundMimikatzMetasploitCobalt Strike
  • Familiarity with attacker tradecraft and simulation tools
Scripting & Automation
  • Proficient in:
    • Python – for automation and tooling
    • PowerShell – for Windows attack scenarios
    • Bash – for Linux environments and scripting
Cloud & Linux Experience
  • Worked in Linux-based systems during offensive operations
  • Familiarity with cloud environments: AWS, Azure, GCP (attacks or research)
Bonus Points
  • Used LLMs (like ChatGPT) for research or tooling enhancement
  • Created internal labs, written attack POCs, or contributed to open-source offensive tooling
Who You Are
  • An attacker mindset: creative, curious, and always digging deeper
  • Experienced enough to operate independently—but still a team player
  • Able to research, prototype, and write production-grade offensive content

 

Apply now Apply later

* Salary range is an estimate based on our AI, ML, Data Science Salary Index 💰

Job stats:  2  0  0
Category: Research Jobs

Tags: AWS Azure ChatGPT GCP GPT Kubernetes Linux LLMs Open Source Python Research Security Testing

Region: Middle East
Country: Israel

More jobs like this