Cybersecurity Companies Hiring on LinkedIn (Live Feed)

Real-time cybersecurity hiring posts from LinkedIn. See which companies are building security teams, what certifications they value, and what security challenges they're solving.

10,000 posts
Updated 42m ago
20 new today

Get new posts in your inbox

Showing 120 of 10,000 posts

Yarden Cohen
Yarden Cohen

Identify Security for the AI Era

42m ·
Entry Level
Would you like a deep dive into AI security challenges from a practitioner’s perspective? In this episode, we explore some of the most pressing issues in securing AI systems today: • Emerging attack surfaces – how AI is introducing new, often overlooked risks • Gaps in current approaches – where
Matched:appsec
NW
Not The Hidden Wiki

3,876 followers

51m ·
Entry Level
HackTheKnowledge - Episode 0x03 🚀 Title: "From $HOME to root shell - Exploiting environment variables in privileged binaries" Speaker: Iwo Tylus Bio: Iwo is an application security engineer at Veeam and a proud member of the #NTHW community. He joined Hack The Box two years ago and has been pwning
Matched:security engineercybersecurityapplication securityinfosecappsecsecurity engineering
QL
Quantic Business Media Pvt. Ltd

12,128 followers

51m ·
Entry Level
Speed or security? With 𝗖𝗵𝗲𝗰𝗸𝗺𝗮𝗿𝘅, you get both. We’re thrilled to welcome Checkmarx as the official 𝗣𝗿𝗲𝘀𝗲𝗻𝘁𝗶𝗻𝗴 𝗣𝗮𝗿𝘁𝗻𝗲𝗿 for the 𝟴𝘁𝗵 𝗘𝗱𝗶𝘁𝗶𝗼𝗻 𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝘆 𝗘𝘅𝗰𝗲𝗹𝗹𝗲𝗻𝗰𝗲 𝗔𝘄𝗮𝗿𝗱𝘀 𝟮𝟬𝟮𝟲 - 𝗚𝗖𝗖 𝗘𝗱𝗶𝘁𝗶𝗼𝗻 📅 15th May 2026 | 📍 Aloft ORR Ho
Matched:security engineerapplication securityappsecsecurity engineeringcloud security
AI
Alastor InfoSec

75 followers

1h ·
Entry Level
Most teams secure their APIs like glass doors 🪟 Crystal clear, well-designed and easy to see through. Your docs look clean. Flows make sense. Everything feels secure. Here’s where things quietly break 👇 Mistake #1: BOLA 🔓 One small parameter change = access to someone else’s data. Not a glitc
Matched:cybersecurityinfosecappseccloud security
Kwong Hong Kenny Wong
Kwong Hong Kenny Wong

Aspiring GRC Analyst | ISC2 CC Certified | CompTIA Security+ Certified | Ex-IT Support with IAM & Incident Response Experience

1h ·
Entry Level
Sharing one of the best resources for Web Application Security. PortSwigger remains the gold standard for anyone serious about AppSec and vulnerability research. I’m currently exploring new roles in the cybersecurity field. If your team is hiring, I would love to chat! #InfoSec #TechSharing #WebSecu
Matched:cybersecurityapplication securityinfosecappsec
Mahmoud Laban
Mahmoud Laban

Enterprise Engineering & R&D Leader | Hyperscale Data Centres | Digital Infrastructure Strategy | IT/OT Integration & Cybersecurity | CEng, CISSP, IEC 62443

1h ·
Director
𝗠𝗼𝗱𝗲𝗿𝗻 𝗮𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲𝘀 𝗮𝗻𝗱 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝘀𝘁𝗮𝗻𝗱𝗮𝗿𝗱𝘀 𝗮𝗿𝗲 𝗲𝘃𝗼𝗹𝘃𝗶𝗻𝗴 𝗳𝗮𝘀𝘁𝗲𝗿 𝘁𝗵𝗮𝗻 𝗺𝗼𝘀𝘁 𝗼𝗿𝗴𝗮𝗻𝗶𝘀𝗮𝘁𝗶𝗼𝗻𝘀 𝗰𝗮𝗻 𝗮𝗱𝗮𝗽𝘁. 𝗢𝗪𝗔𝗦𝗣 𝗔𝗦𝗩𝗦 𝘃𝟱 𝗿𝗲𝗽𝗹𝗮𝗰𝗲𝘀 𝗮𝗯𝗼𝘂𝘁 𝟰𝟬% 𝗼𝗳 𝘁𝗵𝗲 𝗽𝗿𝗲𝘃𝗶𝗼𝘂𝘀 𝘀𝘁𝗮𝗻𝗱𝗮𝗿𝗱. But the m
Matched:security engineercybersecurityappsecsecurity engineering
D
DoveRunner

2,560 followers

1h ·
Entry Level
Black Hat Asia is where cybersecurity leaders come to stay ahead of what’s next. At Black Hat Asia 2026 in Singapore, DoveRunner will be showcasing how organizations can protect mobile apps against real-world attacks. As threats grow more sophisticated — from reverse engineering and runtime tamper
1
Matched:security engineercybersecurityapplication securityappsecsecurity engineering
Chakradhar Bathula
Chakradhar Bathula

Malware Analyst at industech solutions/pentesting /RedTeaming/Cybersecurity analyst

1h ·
Entry Level
🚨 What does it really take to bring a security community to life? Every meetup comes with its own pressure—Will people show up? Will the sessions deliver value? Will the audience actually engage? While organizing the March edition of the NULL Hyderabad Monthly Meet, I realized something important:
6
Matched:cybersecurityinfosecappsec
Gautam Makwana
Gautam Makwana

Senior DevSecOps Engineer | Containers | CI/CD | DevSecOps | OWASP

1h ·
Senior
A team set up Gitleaks. Scanned clean. Pushed to GitHub. GitHub Push Protection blocked the push. Stripe key. Slack webhook. Still sitting in commit history from 3 weeks ago. The pre-commit hook never saw it — it only checks staged files. GitHub saw everything. --- I just published Article 3 of
1
Matched:security engineercybersecurityappsecsecurity engineering
A
Appdirs

492 followers

2h ·
Entry Level
“Bachcha hai tu mera…” 😌    Frontend secure.  Backend protected.  Aur APIs?    Most teams stop at surface-level security.  But real risk starts where visibility ends.    APIs don’t break loudly.  They get misused silently. ⚠️  • Broken authorization  • Business logic abuse  • API chaining    👉 Ind
1
Matched:cybersecurityinfosecappseccloud security
Avinashilingam Gopalsamy
Avinashilingam Gopalsamy

Driving Enterprise Revenue via Direct & GSI Sell-To Motions | Global Alliances & Sales Leader

2h ·
VP
Most app security strategies assume a level playing field. It’s not. Attackers often have more visibility into your application in production than your own teams. That’s the core issue: information asymmetry. And this is where traditional AppSec approaches struggle - because they largely stop at
2
Matched:cybersecurityapplication securityinfosecappsecinformation security
Tommy Shepherd
Tommy Shepherd

Associate Director (Technology) - Helping build high-performing Technology, IT, AI, Data & Cyber Security teams across EMEA & USA

2h ·
Directorjob posts
It’s been a strange month and not something anyone was expecting. Over the past few weeks, the team and I have been speaking regularly with clients and candidates about how best to manage things in the short term. Candidates both locally and internationally are still open to considering opportunitie
16
Matched:security engineercybersecuritysecurity analystappsecsecurity engineering

Want this feed with custom filters?

Sign up and clone this watchlist. Add your own keywords, labels, and alerts.

Clone Feed
Emin Hovanesian
Emin Hovanesian

Senior Network & Security Engineer | FortiGate & MikroTik Specialist | Enterprise Network Architecture | HA Firewalls | IPsec VPN | OSPF | Remote Consulting

2h ·
Senior
The recent Axios supply-chain incident is a serious wake-up call for every security and engineering team. What makes this case dangerous is not just the compromised maintainer account, but the technique: a phantom dependency added only to trigger a malicious postinstall script. That means compromise
Matched:security engineercybersecurityapplication securityappsecsecurity engineering
Akash Lingayat
Akash Lingayat

Associate Security Consultant at SecureLayer7

2h ·
Entry Level
Honored to receive “The L33T Award 2025” from SecureLayer7. This recognition reflects my efforts in identifying and effectively handling high-severity vulnerabilities during penetration testing, while ensuring smooth client communication and zero escalations throughout engagements. Over the past m
8
Matched:cybersecurityinfosecappseccloud security
C
Cybotronics

6,752 followers

2h ·
Entry Level
Why Security Can’t Be an Afterthought in Modern Development In today’s fast-paced development world, shipping features quickly is important but shipping secure code is critical. Too often, security is treated as a final checklist item. But by then, vulnerabilities are already embedded deep into the
3
Matched:cybersecurityinfosecappseccloud security
Alish Karki
Alish Karki

--

3h ·
Entry Level
Day 7 of my Cybersecurity Internship at Eminence Ways brought us to two often underestimated but highly consequential OWASP Top 10 2025 risks: A09:2025 Security Logging & Alerting Failures and A10:2025 Mishandling of Exceptional Conditions. We began with A09, which occurs when applications fail to p
2
Matched:cybersecurityapplication securityinfosecappsecinformation security
Alev Çetin
Alev Çetin

HR Executive @ Cyberwise TR & MENA

3h ·
Entry Leveljob posts
🚀 We’re hiring: Application Security Engineer If you’re passionate about AppSec, Vulnerability Management and building secure systems end-to-end… this role is for you. Let’s build the future of cybersecurity together. 🔐 #FollowTheWise
7
Matched:security engineercybersecurityapplication securityappsecsecurity engineering
Patrick Hühne
Patrick Hühne

Security Owner & Senior Android Developer | SSDLC & DevSecOps for Complex Systems | Automotive Infotainment | Secure Development from Architecture to Pipeline

3h ·
Senior
"What does your security gate look like before a PR goes in?" I ask that in almost every first call. The answer is usually some version of: CodeQL in CI, maybe. Nothing at pre-commit. Staging tests if there's time. Here's what I actually recommend for teams shipping with AI-generated code — four l
1
Matched:appsec
Karen New
Karen New

AI & Web3 Speaker| Council member of Singapore A.I Association (SAIA)

3h ·
Entry Level
AI is reshaping cybersecurity — and the latest insight from The Hacker News puts it perfectly: "AI Will Change Cybersecurity. Humans Will Define Its Success." This hits close to home for us at GladiosWAF. We built an AI-powered, zero-rule Web Application Firewall — no manual rule tuning, no signat
5
Matched:cybersecurityapplication securityappsec
Sarang Gupta
Sarang Gupta

UI Engineer @Endor Labs

3h ·
Entry Level
How certain are you around what's running in your GitHub Actions today? Things have been pretty wild lately, so we're offering a free software supply chain security assessment to help teams assess and harden their CI/CD workflows. Here's what's included: 🔍 A scan of your open source dependencies
2
Matched:appsec

Never miss a post about cybersecurity hiring posts

Clone this feed into your own dashboard. Add custom filters, get real-time alerts, and track exactly what matters to you.

Frequently Asked Questions