Cybersecurity Companies Hiring on LinkedIn (Live Feed)

Real-time cybersecurity hiring posts from LinkedIn. See which companies are building security teams, what certifications they value, and what security challenges they're solving.

10,000 posts
Updated N/A
20 new today

Get new posts in your inbox

Showing 1โ€“20 of 10,000 posts

Shadrach Addo
Shadrach Addo

Cyber Security Student at University of Ghana

1h ยท
Entry Level
My First (technically third) CTF Done I just solved my third CTF and my first one I worked through entirely on my own. The challenge: Old Sessions on picoCTF which is Web Exploitation vulnerability. The vulnerability? A developer who never logs out. Their session cookie stays alive, and if the app
1
Vikash Choudhary
Vikash Choudhary

Aspiring Penetration Tester | Web Application Security | TryHackMe Top 1% | Burp Suite โ€ข SQL Injection โ€ข IDOR โ€ข Recon | VAPT | SOC Fundamentals

1h ยท
Entry Level
๐Ÿš€ Milestone Achieved! Iโ€™ve successfully completed all labs in the Information Disclosure section of PortSwigger Web Security Academy. ๐ŸŽฏ Labs Writeups: https://lnkd.in/g4baY8Es Through this hands-on experience, I explored: โ€ข Identifying unintended data exposure in web applications โ€ข Analyzing er
1
B
Bhionix.Group

11,395 followers

1h ยท
๐„๐ฆ๐ฉ๐จ๐ฐ๐ž๐ซ๐ข๐ง๐  ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ๐ž๐ฌ ๐ฐ๐ข๐ญ๐ก ๐ข๐ง๐ญ๐ž๐ฅ๐ฅ๐ข๐ ๐ž๐ง๐ญ, ๐ฌ๐œ๐š๐ฅ๐š๐›๐ฅ๐ž, ๐š๐ง๐ ๐Ÿ๐ฎ๐ญ๐ฎ๐ซ๐ž-๐ซ๐ž๐š๐๐ฒ ๐ฌ๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ.โฃ ๐๐ก๐ข๐จ๐ง๐ข๐ฑ ๐๐ž๐ฅ๐ข๐ฏ๐ž๐ซ๐ฌ ๐œ๐ฎ๐ญ๐ญ๐ข๐ง๐ -๐ž๐๐ ๐ž ๐€๐ˆ ๐ญ๐ž๐œ๐ก๐ง๐จ๐ฅ๐จ๐ ๐ข๐ž๐ฌ ๐ญ๐ก๐š๐ญ ๐ญ๐ซ๐š๐ง๐ฌ๐Ÿ๐จ๐ซ๐ฆ ๐จ๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ง๐ ๐š๐œ๐œ๐ž๐ฅ๐ž๏ฟฝ
Jean Berrios-Marquez
Jean Berrios-Marquez

Aspiring Cybersecurity Professional | Sec + & Google Cybersecurity Candidate | SOC Lab: Wazuh & SIEM Implementation

1h ยท
Entry Level
Connecting with the local infosec community at the OWASP Boston Application Security Conference (BASC) this weekend was a rewarding experience. A major highlight was a deep-dive workshop on the industrialization of software supply chain attacks. We examined the complexities of dependency pinning,
2
Sparsh Chaudhary
Sparsh Chaudhary

Advocate, LL.M (Intellectual Property Law), Contract Drafting, RERA, Arbitration, Criminal litigation.

1h ยท
In the year 2017, I graduated and enrolled as an advocate and in the following months I landed up getting an independent trial case to contest. It was my first case. This case is close to my heart not because it was my first case but because I exposed the police brutality to the court of law. Th
1
Charlotte S.
Charlotte S.

SOC Analyst | Log Analysis | Threat Detection | SIEM Monitoring | Incident Response | CompTIA CySA+ | ISC2 CC

2h ยท
Entry Level
Set up my first local MySQL server for my home lab projects. I plan to strengthen my understanding of databases, SQL, and secure data handling at the systems level. Knowing how these tools work is essential for both development and application security; in addition, SQL remains a highly valuable ski
3
Vasanth Ravichandiran
Vasanth Ravichandiran

Software Engineer โ†’ Application Security Enthusiast | Secure Coding | Web Security Learning | OWASP Top 10 | TryHackMe | Agile Coach (PSM II, PMI-ACP, SAFe 6)

2h ยท
Entry Level
๐Ÿ” **๐—œ๐—บ๐—ฝ๐—ฎ๐—ฐ๐˜ ๐—ผ๐—ณ ๐—”๐—ฃ๐—œ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ โ€“ ๐—ช๐—ต๐˜† ๐—”๐—ฃ๐—œ๐˜€ ๐—”๐—ฟ๐—ฒ ๐—›๐—ถ๐—ด๐—ต-๐—ฉ๐—ฎ๐—น๐˜‚๐—ฒ ๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜๐˜€** Continuing my exploration in Application Security, I looked into the **๐—ถ๐—บ๐—ฝ๐—ฎ๐—ฐ๐˜ ๐—ผ๐—ณ ๐—”๐—ฃ๐—œ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€**. Since APIs directly expose b
1
Venkata Pranay Anga
Venkata Pranay Anga

Aspiring Cloud Engineer| Available on Upwork

2h ยท
Entry Level
๐Ÿš€ Project: Architecting a Secure 3-Tier VPC on AWS I am excited to showcase a strong project involving the design and deployment of a secure 3-Tier VPC Architecture on AWS. This build focuses on infrastructure isolation, data protection, and scalable networking. ๐Ÿ› ๏ธ AWS Services Utilized: Network
3
1 comments
Muhammed Nihal TS
Muhammed Nihal TS

BCA Final Year Student | Aspiring Cybersecurity Analyst | Networking & Security Fundamentals

2h ยท
Entry Level
I recently completed my Cybersecurity Internship, where I gained hands-on experience in identifying and understanding common web application vulnerabilities. During this internship, I worked on a vulnerable environment (DVWA) and explored concepts such as: โ€ข SQL Injection (SQLi) โ€ข Cross-Site Script
1
Aditya Khandelwal
Aditya Khandelwal

Science Maths Computer Teacher and Computer repair/Microsoft Excel or government related computer work

2h ยท
This is a Batch earned by completing all 14 courses (such as team formation, drafting, formatting, artificial intelligence in government, artificial intelligence uses/application//learning/security,/Ethics, public participation in AI, CCA behaviour rules, Yuva AI etc.) designed by various institutio
1
Do Tuan
Do Tuan

Pentester

2h ยท
Entry Level
Iโ€™m excited to start my journey as a Security Specialist at Vikki Digital Bank (Ngรขn hร ng Sแป‘ Vikki). Looking forward to contributing to building secure systems, enhancing application security.
3
Hrutul Khamar
Hrutul Khamar

MS Cybersecurity || Northeastern University, Boston || December 2026 || Open to Summer and Fall 2026 Co-op ||

2h ยท
Entry Level
Had a great experience attending the Boston Application Security Conference 2026, organized by OWASP, learned a lot, met amazing people from different companies, and had some really valuable interactions around real-world application security challenges. During the conference, I attended two insigh
8
1 comments

Want this feed with custom filters?

Sign up and clone this watchlist. Add your own keywords, labels, and alerts.

Clone Feed
. Jauert
. Jauert

Founder, AXIOM TIDE LLC | Building Privacy Infrastructure for the Future Internet

2h ยท
CXO/Founder
How to Use x402 for Autonomous Payments: A Complete Beginnerโ€™s Guide Learn how to set up and use x402 autonomous payments for seamless digital transactions. This beginner-friendly guide covers wallet setup, real-world applications, and security best practices for automated crypto payments....
Kashif Memon
Kashif Memon

Vulnerability Management, Cloud Security Engineering | OSCP, DevSecOps

2h ยท
Entry Level
Another one in the books โ€” GWAPT โœ”๏ธ With OSCP already under my belt, this was a good refresher and deeper look into web application security. Iโ€™m happy to share that Iโ€™ve obtained a new certification: GIAC Web Application Penetration Tester (GWAPT) from GIAC Certifications!
1
1 comments
T
TrustLayerLabs

168 followers

2h ยท
Entry Level
As a founder, Iโ€™ve seen many startups focus heavily on product features, speed and growth. But security is often considered only after a problem occurs. Early-stage applications commonly contain vulnerabilities such as: โ€ข SQL Injection โ€ข Cross-Site Scripting (XSS) โ€ข Broken authentication โ€ข
2
2 comments
Akindoyin Yemisi
Akindoyin Yemisi

Emerging Cybersecurity Talent | Passionate About Ethical Hacking & Pen testing | B.Sc. CSC | Founder, Leaders Are Rulers | Seeking Internships | IT Support | Empowering the Next Generation | Growth & Leadership Driven

3h ยท
Entry Level
Day 86: Python for Cybersecurity โ€“ Why Itโ€™s Essential Today, I dived into Python in Cybersecurity and understood why it is considered the #1 programming language for security professionals. Python is not just popular itโ€™s an industry standard used across penetration testing, SOC operations, malwar
3
2 comments
fahmi ghannam
fahmi ghannam

โ€Aspiring SOC Analyst | Cybersecurity Student | SIEM โ€ข Threat Detection โ€ข Incident Response

3h ยท
Entry Level
Iโ€™m pleased to share that I have successfully completed my cybersecurity certification after a 3-hour exam that tested a wide range of core security concepts and practical scenarios. During this journey, I strengthened my understanding of: Network security fundamentals and attack detection Identity
6
4 comments
Linda Ann Eknoian
Linda Ann Eknoian

Cybersecurity | Project Management | Actress at SAG-AFTRA

3h ยท
Entry Level
Volunteered at the Boston Application Security Conference (BACS) earlier today and I met a lot of passionate, authentic and interesting cybersecurity professionals! I attended AI Generated Code vs Human Code seminar and a workshop on mobile apps, SDKs, privacy settings. There were many other interes
2
Jon. Prabhu D
Jon. Prabhu D

Security Engineer | Network Security & Incident Response | Enterprise Networking (Aruba, HPE) | Incident Management, Monitoring & Escalation | Masterโ€™s | STEM

3h ยท
Entry Level
The digital threat landscape is constantly shifting. Are your web applications truly ready for what's coming in 2026? ๐Ÿค” Ignoring the future of web security isn't an option. We've dived deep into the anticipated OWASP Top 10:2025, providing a vital roadmap for understanding and mitigating the most
3
SB
Sreelakshmi B

Client Acquisition Manager

3h ยท
Managerjob posts
๐Ÿš€ Exciting Opportunities in IT Support & Cybersecurity! Ready to grow your career with impactful roles? Weโ€™re hiring skilled professionals across application support and security domains. ๐Ÿ“ Location: Churchgate, Mumbai ๐Ÿ”น Role 1: IT Applications Support Specialist (4โ€“6 Years) What youโ€™ll do: โ€ข
1

Never miss a post about cybersecurity jobs

Clone this feed into your own dashboard. Add custom filters, get real-time alerts, and track exactly what matters to you.

Frequently Asked Questions