R&D
Full-time
;
Senior

Security Researcher

Tel Aviv, Israel
28 28 HaArba'a Street, Tel Aviv-Yafo, Tel Aviv District 6473925, IL

About us

Oligo is a rapidly growing startup, leading the way in reshaping Application Security. With a strong investment from top-tier VCs including Greenfield Partners, Red Dot Capital Partners, Lightspeed, Ballistic Ventures, and TLV Partners, we are developing a unique solution to address application security challenges, mainly focusing on open-source components in the application.

Our innovative technology leverages runtime application context while maintaining exceptional performance and stability. The Oligo Application Defense Platform gives security teams powerful capabilities to observe application components, detect intrusions, and mitigate threats, all while keeping developers focused on features - not fixes.

We are seeking a highly motivated and experienced Financial Controller to join our team. If you are a CPA with 4–6 years of relevant experience, a mix of public accounting (Big 4 preferred) and startup experience, we are looking for you!

Description

About us

Oligo is a fast-growing cybersecurity startup transforming how organizations protect their applications, cloud environments, and AI systems at runtime. Backed by top-tier investors including Greenfield Partners, Red Dot Capital Partners, Lightspeed, Ballistic Ventures, and TLV Partners, we’re on a mission to make real-time security a reality.

Oligo’s industry’s leading runtime security platform built to stop attacks in real time without stopping the business. We transform security from passive visibility to active protection across applications, cloud services, workloads, and AI systems. By uncovering the deepest layers of what actually runs in production, Oligo helps organizations prioritize exploitable vulnerabilities, detect malicious behavior as it happens, and stop modern attacks in their tracks.

What You’ll Be Doing

As a Security Researcher in our CADR (Cloud Application Detection & Research) multidisciplinary team, you will play a key role in advancing our runtime protection capabilities. Our team includes both researchers and developers, enabling rapid implementation of research insights into our product. Your work will focus on identifying and analyzing runtime attack patterns, as well as developing innovative detection techniques to strengthen the protection of our clients’ cloud-native applications.

Specifically, you will:

  • Conduct cutting-edge security research on runtime threats in cloud-native applications.
  • Design, develop, and validate detection algorithms based on large-scale telemetry, threat research and experiments to identify runtime threats.
  • Characterize and refine the security data collected from costumers’ runtime environments to enhance detection efficacy and improve research-driven insights.
  • Own the end-to-end impact of your research, from identifying emerging cloud threats to developing and deploying detection rules that protect real-world environments.
  • Work cross-functionally with researchers, engineers and product managers to ensure research translates into effective, real-world security protections.

Requirements


Qualifications

  • 5+ years of experience in security research, focusing on advanced threat detection and deep attack analysis.
  • Ability to design and execute structured experiments and tests to validate detection algorithms.
  • Proven experience conducting hands-on investigations into real-world security threats and reverse engineering of attack patterns.
  • Strong communication and collaboration skills to translate complex security findings into actionable insights.
  • Strong expertise in the Linux ecosystem.
  • Familiarity with common application weaknesses, (e.g. RCE, SQLi, memory corruptions, insecure deserialization, etc.).
  • Strong data analysis skills and hands-on experience with databases.
  • Basic programming skills (experience with at least 1 high-level language like Python).

We’ll be lucky if you have

  • Experience writing and deploying security detection rules in production environments.
  • Understanding of cloud-native attack surfaces (containers, Kubernetes, cloud networking).
  • Knowledge of programming languages internals (e.g. Low level languages, JVM, etc.).
  • Experience with data science and statistical analysis in security research.
Submit
Submit
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.