Digital forensics · Mobile data extraction · Investigative analytics· Petah Tikva (HQ) · global offices·~1,000 globally · ~700 in Israel
Cellebrite is the digital-forensics company most associated with mobile-device extraction for law enforcement and government — founded 1999, HQ Petah Tikva, ~1,000 employees globally. The 2026 industry-trends report (published by the company) documents that smartphones are now 97% of digital evidence in investigations. Junior intake at Cellebrite is heavy on iOS / Android internals expertise, which is rare in the Israeli junior pool — a real asymmetric specialty.
Entry-level engineering inside Cellebrite's mobile-internals R&D — work spans iOS bypass research, Android extraction tooling, exploit development for forensics use, and the cloud-side analytics platform. Roles split between research-engineering tracks (heavier on RE / kernel internals) and product-engineering tracks (heavier on the analyst-facing SaaS).
Eligibility
BSc / MSc CS or EE students with one of: hands-on RE experience, mobile-internals coursework, CTF participation, or military signal-corps / cyber-unit background. The bar is supply-constrained — Cellebrite hires more easily than it finds qualified mobile-internals candidates.
Schedule
Mostly full-time entry-level · part-time student tracks for IL universities · Petah Tikva site.
Cellebrite's intake leans heavily toward CS / EE students with security or systems-internals depth. The Technion (CS-with-security minor), Tel Aviv University (CS), Ben-Gurion (CS + 8200/9900 alumni who returned to civilian education) dominate. CTF participation is a published-positive signal — Cellebrite's senior engineering ranks include long-time CTF veterans, and the hiring loop is calibrated to recognize this experience. Israeli signal-corps + cyber-unit backgrounds (8200, Mamram, Matzov, 81) translate directly because the unit work is exactly the same shape as commercial mobile-extraction R&D. Hebrew helps for daily team rituals; English is the working language for cross-region collaboration.
The process
Pipeline runs through Greenhouse. After CV screen — typically 7–14 days for student / junior tracks — successful candidates hit a domain-specific technical screen. RE-track candidates: 60-minute walkthrough of one CTF you've solved or one binary you've reversed, plus follow-up questions on iOS / Android internals (file systems, kernel, sandbox). Product-track candidates: standard Leetcode-style coding screen (60 minutes, two problems). Tech panel: 90 minutes with two senior engineers, mixing live coding and architecture discussion. A take-home assignment can replace one round at some teams. Manager fit closes the loop. Total time from CV to offer is 4–7 weeks. The Petah Tikva commute is similar to CyberArk / Check Point / Elta — manageable from north Tel Aviv, harder from south.
Cellebrite CV — what to include
Link to one CTF write-up or one reversed sample on your blog / GitHub. Cellebrite explicitly hires from this signal — saying you 'like reverse engineering' without artifacts is a non-starter.
List specific RE / forensics tooling (IDA Pro, Ghidra, Frida, Volatility, Wireshark) with a project that used each. Tooling-named CVs are read as concrete.
iOS / Android internals familiarity is supply-constrained — even academic-level kernel-debugging or syscall-tracing exposure is positive. Surface it explicitly.
Mention any signal-corps / cyber-unit background (8200, Mamram, Matzov, 81). The unit work translates directly to commercial mobile-extraction R&D.
Cite participation in CTF events — even local university CTFs. The senior team has CTF veterans; this is a recognized currency.
Address the government-client angle in the manager-fit conversation. Cellebrite's customers include law-enforcement agencies; candidates who acknowledge the ethical-framework conversation thoughtfully read as informed.
Common mistakes that get you filtered
Generic CS CV without a security or systems-internals depth signal. Cellebrite's panels press hard on internals; pure web-dev CVs route slowly.
Saying you 'like reverse engineering' without linked artifacts. Provide a write-up, a GitHub repo, a CTF account — even one.
Underselling military-unit experience to 'sound civilian'. Signal-corps and cyber-unit backgrounds map directly to Cellebrite's product surface.
Hebrew-only CV when applying to a global product team. The reading audience is bilingual; English-first or bilingual is the norm.
Avoiding the customer-base discussion. The work involves government and law-enforcement clients; candidates who haven't thought about the ethical framing struggle in the manager-fit round.
Insights that aren't on the company's careers page
Cellebrite's 2026 industry-trends report documents that smartphones are 97% of digital evidence in investigations — a number that grew from ~85% three years earlier. The shift toward mobile-only digital evidence is what makes the company's R&D investment in iOS / Android internals load-bearing for the entire forensics market, not just Cellebrite.
Spring 2026 release added iPhone 17 access to the lawful-access matrix — concrete evidence that the company's research engineering is keeping pace with Apple's annual hardware cycle. Junior candidates joining now will see this cadence continue.
iOS / Android internals expertise is structurally under-supplied in the Israeli junior pool because most CS programs default to web / cloud / SaaS tracks. Candidates with even academic-level kernel or sandbox-bypass exposure have an asymmetric advantage at Cellebrite vs at SaaS-first companies.
Government-client gravity is part of the working context — Cellebrite's customers include law-enforcement agencies, and the company's 2024–2025 public-disclosure pattern (proactive trends reports, transparency frameworks) signals that ethical-framing conversations are part of the hiring loop, not avoided.
The senior engineering ranks include long-time CTF veterans, and CTF participation is a recognized hiring currency. Most companies treat CTF as a 'nice extra'; Cellebrite treats it as direct evidence of exactly the work the company does.
Greenhouse ATS — same family as Check Point, NICE, CyberArk, SentinelOne, SolarEdge. CV-keyword tactics that work at the other Israeli Greenhouse-backed companies transfer here unchanged.
Does your CV match Cellebrite?
Korotchaim scores your CV against an actual Cellebrite job description. Free preview — no signup.