Offensive Security Team Lead
About The Position
We are a cutting-edge cybersecurity company that combines powerful scanning technologies with expert services. At OP Innovate, security research isn’t a support function - it’s at the core of how we build, think, and deliver value to help businesses stay secure through modern, practical, and innovative solutions. This role sits right at that intersection of advanced hands-on research, combined with ownership over how our work shows up in the real world.
We’re looking for a hands-on Offensive Security Team Lead who wants to stay close to the technical edge while shaping how a team operates and grows. Someone who enjoys getting their hands dirty with the details of complex vulnerabilities and threats, but also cares about raising the bar across projects, people, and outcomes.
You’ll lead meaningful, end-to-end work across penetration testing, application security and vulnerability research, while guiding a team of talented security researchers. This is a role with real influence on the quality of our research, the way we work, and the impact we deliver to our clients.
Requirements
- Lead and drive end-to-end security research projects across web applications, API, mobile (iOS/Android), and cloud environments (AWS, Azure, GCP) - from initial scoping through research, exploitation and final delivery
- Stay hands-on in the research itself, digging into complex vulnerabilities, validating findings, and setting the technical direction across engagements
- Translate technical findings into clear, actionable insights, helping clients understand risk, impact, and next steps without losing the technical depth
- Own multiple concurrent projects, maintaining clear visibility over progress, coverage, and research depth while ensuring consistently high-quality outcomes
- Define and drive the strategic implementation of Application Security within the SDLC, orchestrating a seamless blend of manual research, deep-dive code reviews, and automated SAST/SCA guardrails to ensure security at scale
- Set the standard for research quality by reviewing the work, challenging assumptions, and ensuring every deliverable reflects both clarity and impact
- Lead and mentor a team of experienced researchers, providing hands-on guidance, reviews, and support while helping them grow in both technical and professional dimensions
- Contribute to how we work as a group - refining methodologies, improving testing playbooks, and building scalable research workflows and tooling
- Stay ahead of the curve by keeping close to emerging vulnerabilities, exploitation techniques, and trends across the offensive security landscape
Skills and Experience
- 5+ years of hands-on experience in security research from either a product or services cybersecurity company
- 2+ years of experience leading a small team, with a clear focus on technical leadership and day-to-day mentorship
- Proven experience driving projects from scoping to final delivery with a strong sense of ownership
- Experience in Application Security (Web and Mobile), Pentesting, and Vulnerability Research, including strong familiarity with common attack vectors and exploitation techniques
- Experience working within secure SDLC practices, including "shift left" approaches and SAST and SCA tools (Semgrep, SonarQube, etc.)
- Confidence working directly with clients - presenting findings, leading discussions, and representing the team’s work clearly
- Strong communication skills in both Hebrew and English, written and verbal
- A proactive, accountable approach with strong organization and a collaborative mindset
- Strong source code analysis skills across common backend and scripting languages (e.g., Python, Go, Java, Node.js) with the ability to identify security vulnerabilities and logic flaws
- Experience in cloud-native pentesting and automated auditing within AWS, Azure, or GCP, with a focus on identifying misconfigurations and lateral movement risks.
- B.Sc. in Computer Science or equivalent hands-on experience (military background or advanced certifications such as OSCP, OSWE, etc. are a strong advantage)
Advantages
- Broader experience across additional research domains such as cloud security, red teaming, infrastructure testing, or incident response
- Hands-on experience with industry-standard tools such as Prowler and Scout Suite
- Experience building internal tools, scripts, or automation to support research workflows
- Track record of vulnerability discovery and disclosure (e.g., CVEs, bug bounty)
- Contributions to the security community - conference talks or blog posts
- Familiarity with DFIR practices


