Mossad Needs Cyber Experts

Mossad's operational cyber arm is currently recruiting cyber experts for service in many fields. In particular, the spy agency is calling on cyber experts to present their candidacy for integration into the organisation's operational cyber arm. According to local press reports, Mossad's demand for cyber experts has neen set at a record number with at least five high-level jobs to be filled

In the job description says "We need a cyber expert who has excellent control over Internet technologies, operating systems and information security, who likes to think outside the box and is interested in working in a young and dynamic environment from these fields: software development, computer security, computer networks and Internet technologies."

Mossad is also looking for a cyber developer, a cyber researcher, a developer of large-scale cyber-technology systems, a Data developer for the operational cyber arm, and more.In addition, the Mossad is also looking for experts in data security in the field of Penetration Testing, infrastructure testing and more.

Mossad has also published a campaign to fill 10 positions in various hi-tech fields, such as cellular, antennas, software developers, and the like. In all positions there is an advantage for graduates of military courses in this field.

Israel National News:

You Might Also Read:

Revealed: Top Secret Israeli Hackers For Hire:

 

 

« Engaging With Cybersecurity
Using Identity Access Management »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Evolve Secure Solutions

Evolve Secure Solutions

Evolve Secure Solutions is a security focused managed services provider serving private and public customers across the UK.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

SoSafe

SoSafe

Modern awareness training that works. With memorable content on all areas of IT security, with measurable learning success and full data protection compliance.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

guardDog.ai

guardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.