BusinessCybersecurityNewswireTechnology

Top Cybersecurity Jobs Hiring Now | February 2026

Originally published on: February 4, 2026
▼ Summary

– The article lists multiple cybersecurity job openings across various companies, locations, and work arrangements (hybrid, on-site, remote).
– Common roles include Application Security Engineers, who implement testing and secure coding, and Security Architects, who design secure systems and standards.
– Several positions focus on offensive security, such as Red Team Operators and Penetration Testers, who simulate attacks to improve defenses.
– Many roles involve incident response and threat analysis, including Cyber Incident Responders and SOC Analysts, who handle security events and investigations.
– Specialized positions are highlighted for securing operational technology (OT), AI systems, and cloud infrastructure, reflecting diverse industry needs.

The cybersecurity job market continues to offer a wealth of opportunities for professionals with specialized skills, from application security to operational technology. Organizations across every sector are actively seeking talent to defend against increasingly sophisticated threats, creating a dynamic and high-demand career landscape. This list highlights a selection of prominent roles currently available, showcasing the diverse paths within the field.

Application Security Engineer positions, such as the one at Liebherr Group in Germany, focus on integrating security directly into the software development lifecycle. Responsibilities typically include automating security testing, conducting vulnerability assessments, and collaborating with development teams to enforce secure coding standards. These roles are crucial for building resilient software from the ground up.

For those with a strategic mindset, an Application Security Expert – Information Systems role at a firm like HCLTech in France involves performing cyber risk analyses and approving security architectures. Professionals in these positions provide secure-by-design guidance for IT projects, manage security services like DevSecOps pipelines, and ensure compliance with internal and external standards.

Incident response remains a critical function. A Cyber Incident Responder at a global institution like UBS in Singapore handles security events from identification through recovery. This involves forensic analysis of systems and malware, acting as a key point of engagement during major incidents, and developing response strategies for critical attack scenarios.

Consultancy roles, such as the Cyber Security Principal Engineer at Hoare Lea in the UK, require deep expertise in both ICT and OT networks within specific environments like commercial buildings. These engineers advise clients on securing building management systems through network segmentation and secure protocols, delivering detailed reports and designs.

Leadership in digital forensics is another key avenue. An Associate Director DFIR at Control Risks in the UK would lead forensic incident response engagements, providing expert scoping, data collection, and analysis. This role also involves fostering innovation, supporting adjacent teams, and helping to develop new business proposals.

At an architectural level, an Executive Director, Application Security Architect at Sony Pictures Entertainment in the USA leads security design reviews across application, data, and cloud domains. This senior position involves assessing risks, defining security standards, and recommending secure design patterns to ensure systems comply with organizational requirements.

Engineering leadership is also in high demand. A Lead, Cyber Security Engineer at TAQA Group in the UAE focuses on designing and optimizing SIEM and SOAR platforms to enhance threat detection and response. This includes managing configurations, ensuring compliance, and providing technical account management for security operations.

Offensive security roles, like the Lead Offensive Engineer position at McKesson in the USA, involve leading complex red team engagements to simulate real-world attacks. These professionals develop offensive strategies, execute vulnerability discovery methodologies, and lead purple team exercises to improve defensive measures.

Product security is a growing specialty. A Lead Product Security Engineer at Dematic in the USA works on integrating cloud security tooling to build a cohesive platform. They advance automated security capabilities, respond to alerts, and support application teams in embedding security throughout the software development lifecycle.

Threat intelligence analysis is vital for proactive defense. A Lead/Senior Cyber Threat Analyst at Peoplebank in Australia produces intelligence reporting, researches threat actors, and fuses event data to identify emerging risks. They recommend mitigations and build strong relationships with internal and external stakeholders.

The intersection of cybersecurity and artificial intelligence is creating new roles. A Lead Cybersecurity Engineer-AI at Chevron in India embeds secure-by-design principles into digital capabilities while serving as a subject matter expert in AI security. This includes defining security architectures for AI solutions and leading research into securing emerging technologies.

Protecting industrial environments is a specialized field. A Network Security Architect at Siemens Energy in Israel designs secure OT and ICS network architectures for systems like SCADA and DCS. They lead segmentation strategies, define security policies, and conduct risk assessments to protect critical infrastructure.

Similarly, an OT Security Architect at dormakaba in Germany designs advanced security solutions for OT and IoT environments. They advise leadership on security strategy, conduct risk assessments, define requirements for new systems, and respond to incidents to maintain operational resilience.

On the implementation side, an OT Cyber Security Engineer at Schneider Electric in India interprets process control network architectures to manage cybersecurity devices. They execute commissioning and upgrades for firewalls and switches, analyze security logs, and ensure compliance with industry standards by identifying and remediating gaps.

Leading a technical team requires both skill and management acumen. A Penetration Testing Team Lead at Check Point Software in Israel leads a global team of testers, fostering a high-performance culture. They own delivery quality, support pre-sales activities, manage resources, and drive operational excellence through process improvements.

Architectural engineering roles, such as the Principal Engineer – Security Architecture at RBC in Canada, focus on engineering automated security governance integrated into CI/CD pipelines. They design reusable security patterns for cloud and on-premises environments and lead the evaluation of new security technologies.

In product security, a Principal Product Security Engineer at Red Hat in Italy defines the long-term technical strategy for secure software development. They act as an escalation point for complex risks, establish secure development standards, and design CI/CD pipelines that ensure software integrity.

Operational roles like a Red Team Operator at AXA Group Operations in France involve planning and executing advanced red team operations to test organizational defenses. This includes conducting penetration tests, performing vulnerability research, and developing custom tools to demonstrate attack paths and drive improvements.

Hardware and firmware security is a niche but critical area. A Senior Security Firmware Engineer at Qualcomm in Ireland designs security software for AI accelerator cards, enabling features like trusted device assignment and secure lifecycle management. They implement isolated execution and integrate PCIe security protocols within a trusted execution environment.

Consulting within a major tech firm, a Security Consultant, Red Team at Google’s Mandiant in the USA identifies security issues and implements controls to improve client security. They support offensive engagements, work directly with clients on remediation, and collaborate with internal teams to enhance service offerings.

Defensive analysis roles are equally important. A Senior Cyber Defense Analyst at Abnormal AI in the USA monitors and triages security alerts, investigates incidents, and performs root cause analysis. They proactively hunt for threats using frameworks like MITRE ATT&CK and work to improve automation and detection logic.

A Senior Security Engineer at LemFi in Ireland focuses on securing AWS infrastructure, implementing detection capabilities, and embedding security into CI/CD pipelines. They maintain compliance, operate a SIEM for threat detection, and lead incident response and continuous improvement efforts.

In application and platform security, a Senior Security Engineer at Sentry in Canada leads initiatives to address critical security challenges. They influence company-wide security objectives, evaluate scalable technologies to strengthen posture, and enable teams to deliver solutions aligned with Secure-by-Design principles.

Architectural roles in emerging tech, like the Senior Security Architect at Open Innovation AI in the UAE, involve designing end-to-end security for applications and hybrid cloud platforms. They lead DevSecOps initiatives, define security patterns for zero trust architectures, and ensure regulatory compliance.

Technical testing expertise is always needed. A Senior IT Security Penetration Tester at the Reserve Bank of Australia identifies vulnerabilities across web applications, infrastructure, and mobile systems. They produce clear reports with remediation advice and conduct targeted research on high-value systems.

Finally, within security operations centers, a Senior SOC Analyst at BESTSECRET in Italy monitors and analyzes security events in cloud environments. They optimize playbooks, improve detections, drive automation of response workflows, and identify opportunities to harden systems, helping to shape the future of the SOC.

(Source: HelpNet Security)

Topics

application security 95% security architecture 90% incident response 85% security engineering 85% penetration testing 80% secure development 80% cloud security 75% security operations 75% red teaming 70% ot security 70%