Senior Security Researcher

Location: Tel Aviv, Israel

Description

In cybersecurity, technology too often overshadows the business element. At Nagomi, we’re restoring the balance. As the first execution layer for Continuous Threat Exposure Management, we help security teams eliminate all types of exposures with the security tools they already have, without adding more complexity or noise.

By unifying data across assets, threats, and defenses, we make it easy to reduce exposure, eliminate inefficiencies, and clearly communicate risk.

This is an amazing opportunity to join our team at an early stage and have a huge impact on our success. We are on a mission to revolutionize the industry, and we are looking for brilliant, curious, creative, and fun-loving individuals to join our dynamic team.

What You’ll Do

  • Lead research initiatives to model and quantify security risk through data.
  • Analyze large-scale datasets (telemetry, vulnerability, and threat intel) to identify trends and actionable insights.
  • Investigate vulnerabilities and adversarial behaviors to strengthen detection and remediation logic.
  • Collaborate closely with engineering, product, and data teams to enhance the exposure posture of organizations.
  • Engage with customers to translate findings into meaningful improvements to their security posture.
  • Drive innovation in how we measure, visualize, and prioritize risk within organizations.

Requirements:

  • 5+ years of experience in cybersecurity research, vulnerability analysis, or threat intelligence.
  • Strong understanding of cybersecurity fundamentals and tools such as EDR, SIEM, or Vulnerability Management platforms.
  • Expertise in Python (data manipulation, automation, and pipeline integration).
  • Hands-on experience with SQL and working across cloud data warehouses (BigQuery, Athena, Snowflake, etc.).
  • Solid foundation and understanding of leading attack frameworks and vulnerability prioritization standards, such as MITRE ATT&CK, CISA KEV, NVD, CVSS, and EPSS, with the ability to apply them to real-world exposure and threat modeling.
  • Proficiency in data analysis libraries (pandas, polars, or equivalent).