
Idan Tager
Cybersecurity R&D Leader, Expert in API Security and Applied Mathematics
Israel
Joined January 2026
Network
2.3K connectionsAAEMOW
IGRYNM
GBTFGV
CENMTI
RLAZTR
ORABSY
NGRL
Summary
Idan Tager is a distinguished leader in cybersecurity R&D, with extensive experience spanning both military and private sectors. His career demonstrates a strong focus on developing advanced security solutions, particularly in API security, leveraging his deep expertise in applied mathematics. theorg+2
His foundational experience includes nearly a decade in various leadership roles within the Israel Defense Forces' Cyber Operations, where he was instrumental in overseeing teams of security researchers and engineers and leading R&D efforts in network security, Android OS cyber R&D, and low-level systems development. theorg
Following his military service, Idan transitioned to Noname Security, where he progressed from Algorithms R&D Team Leader to Senior Director of Engineering. During his tenure, he played a key role in developing algorithms and strategies for API security, eventually leading to his team's acquisition by Akamai. theorg+2
Idan is recognized as an inventor on patents related to securing computing interfaces, demonstrating his innovative contributions to the field of cybersecurity, particularly in detection and mitigation techniques for API behavior. justia
His educational background includes a Master of Science in Applied Mathematics from Tel Aviv University and a Bachelor of Applied Science in Mathematics from The Hebrew University of Jerusalem, providing a strong theoretical foundation for his practical R&D and cybersecurity work. theorg
Looking ahead, Idan is slated to become the VP R&D at Wonderful, an AI platform company established in 2025, where he will continue to drive innovation in R&D, likely applying his extensive expertise in AI and security to customer interaction solutions. ivc-online
Work
Education
Writing
Techniques for securing computing interfaces using clustering
Patent application focused on methods for securing computing interfaces through clustering techniques.
SYSTEM AND METHOD FOR EXCESSIVE COMPUTING INTERFACE BEHAVIOR DETECTION AND MITIGATION
Patent application for a system and method to detect and mitigate excessive behavior in computing interfaces.