Get the latest on global AI regulations, legal risk, and safety-by-design strategies. Read the Report
Protect your AI applications and agents from attacks, fakes, unauthorized access, and malicious data inputs.
Control your GenAI applications and agents and assure their alignment with their business purpose.
Proactively test GenAI models, agents, and applications before attackers or users do
The only real-time multi-language multimodality technology to ensure your brand safety and alignment with your GenAI applications.
Ensure your app is compliant with changing regulations around the world across industries.
Proactively identify vulnerabilities through red teaming to produce safe, secure, and reliable models.
Detect and prevent malicious prompts, misuse, and data leaks to ensure your conversational AI remains safe, compliant, and trustworthy.
Protect critical AI-powered applications from adversarial attacks, unauthorized access, and model exploitation across environments.
Provide enterprise-wide AI security and governance, enabling teams to innovate safely while meeting internal risk standards.
Safeguard user-facing AI products by blocking harmful content, preserving brand reputation, and maintaining policy compliance.
Secure autonomous agents against malicious instructions, data exfiltration, and regulatory violations across industries.
Ensure hosted AI services are protected from emerging threats, maintaining secure, reliable, and trusted deployments.
Ramat Gan, IL, Tel Aviv District / Full-time / Hybrid
ActiveFence is seeking to hire a Senior Mobile Threat Analyst to join the Mobile Threat group. In this role, you will be responsible for researching, detecting, and analyzing mobile threats alongside fraud detection mechanisms and vulnerabilities across various platforms, tools and solutions.
You will generate strategic insights from diverse intelligence sources, conduct OSINT investigations to identify mobile risks, and monitor online platforms to detect malicious activities. You will also focus on uncovering fraud tactics, behavioral vulnerabilities, and process bypasses while delivering actionable mitigation recommendations to clients in relation to mobile cyber threats.
Key Responsibilities:
Advantage: