Top Cybersecurity Jobs Hiring in March 2026

▼ Summary
– The article lists multiple cybersecurity job openings across various companies, countries, and work arrangements (onsite, hybrid, remote).
– The roles span diverse specializations including application security, cloud security, compliance, incident response, governance, and offensive security.
– Common responsibilities across many positions involve developing security strategies, managing risk and compliance, leading incident response, and reporting to leadership.
– Many jobs emphasize integrating security into business processes, aligning with organizational goals, and using specific frameworks or tools like MITRE ATT&CK.
– The listings highlight a demand for both technical skills (like penetration testing and SIEM management) and strategic skills (like policy development and executive advisement).
The cybersecurity job market continues to evolve rapidly, with organizations across the globe seeking specialized talent to protect their digital assets. The demand for skilled professionals remains exceptionally high, offering diverse career paths from technical engineering roles to strategic leadership positions. This overview highlights key opportunities available, showcasing the breadth of expertise companies are looking to hire.
An Associate Director of Application Security at BioNTech in Germany carries significant responsibility. This leadership role involves crafting the overarching application security strategy and standardizing protective processes. The individual will manage vulnerability across development environments, champion secure-by-design principles through technical solutions, and oversee the safe integration of open-source software. A core function is defining key performance indicators to measure and report on security effectiveness.
The role of Chief Information Security Officer (CISO) with AIG in Israel is a strategic enterprise position. This executive is tasked with developing and executing company-wide cybersecurity strategy, ensuring all policies and operations support broader business objectives. Key duties include maintaining regulatory compliance, adapting global standards to local needs, and managing risk through comprehensive assessments. The CISO also evaluates new technologies, leads incident response and disaster recovery planning, and communicates security posture directly to the board and senior leadership.
For those focused on cloud infrastructure, a Cloud Security Professional position at ServiceNow in Italy offers a hybrid work model. This professional strengthens cloud security by aiding in incident response and investigations, resolving security issues collaboratively, and conducting post-incident reviews to drive architectural improvements. The role also involves engaging with customers on security matters, providing strategic guidance, and leading cross-functional initiatives that may include contract support and team coordination.
A Cyber Compliance Analyst role at Inchcape Shipping Services in India centers on governance. This analyst monitors adherence to cybersecurity regulations and standards, develops security policies and controls, and conducts risk assessments to identify gaps with actionable recommendations. They lead responses to external audits, work with global teams to implement compliance enhancements, and support certification processes to uphold the organization’s security posture.
The position of Cyber Security Engineer at Ocean Infinity in the UK involves acting as a primary point of contact for auditors, regulators, and defense stakeholders. This engineer ensures compliance with security frameworks, coordinates audits and remediation efforts, and translates regulatory requirements into technical specifications. The role oversees cyber risk across enterprise, cloud, and operational technology environments through assessments and policy management, while also supporting secure procurement and third-party security evaluations.
Leading a Security Operations Center (SOC) and Governance, Risk, and Compliance (GRC) team at VaporVM in the UAE is a multifaceted challenge. This Team Lead oversees 24/7 SOC operations, manages SIEM platforms and threat detection, and drives incident response with root cause analysis. The position also involves guiding enterprise security programs, shaping cloud security strategy, and managing GRC activities through policy development, risk assessments, and audit coordination.
A Cybersecurity Analyst at the Canadian Cancer Society in Canada operates in a hybrid capacity. This analyst monitors security solutions, responds to alerts and incidents, and researches emerging threats. They support vulnerability management, maintain security policies, and enhance awareness programs with measurable outcomes. Additional responsibilities include providing advanced investigative support, assessing new technologies for compliance, and collaborating with IT teams to remediate issues.
For those beginning their career, a Cybersecurity Intern opportunity at Bitstack in France provides hands-on experience. Interns support identity and access management, help secure company devices, and assist with integrating security tools into development pipelines. They also contribute to compliance documentation, support awareness initiatives, and aid in investigating suspicious activity.
A Cybersecurity Senior Manager at Eraneos in Germany focuses on high-level advisory and program delivery. This manager builds trusted relationships with executives, advising on cyber risk, resilience, and digital transformation. They shape and deliver comprehensive programs covering strategy, zero trust architecture, cloud security, threat detection, data privacy, and operational technology protection.
The Data Governance Lead role at Abu Dhabi Airports in the UAE is crucial for data integrity. This lead develops and implements data governance frameworks to ensure accuracy and security, defining standards and policies with cross-functional teams. They enforce policies to manage data risks, lead data quality initiatives like profiling and cleansing, and guide business units on best practices and privacy requirements.
As the Head of Cyber Security for Bestway Group in the UK, the professional develops and owns the security strategy and roadmap. They represent security at the board level, define robust policies and operating models, and ensure compliance with regulations. This head leads operational security and incident response to ensure effective containment, while managing enterprise risk through assessments and regular reporting.
An Information Security Engineer at Fireblocks in Israel, with a hybrid schedule, implements and manages security controls across endpoints and networks. They monitor and respond to incidents, translate security requirements into technical configurations, and manage security tools. The engineer investigates threats, hardens systems, builds detection mechanisms, and collaborates with technical teams to improve security with clear documentation.
The Information Security Lead at McNab in Australia establishes and evolves the security operating model. They develop and maintain security policies, governance, and risk frameworks, embedding cybersecurity into major technology projects. This lead manages and reports on organizational cyber risks, coordinates internal and external security capabilities, and leads incident response planning and executive communication during crises.
Specializing in internal risks, an Insider Threat Security Analyst at Old National Bank in the USA enhances the Insider Threat Program. They strengthen prevention, detection, and response efforts, develop policies and workflows, and track program effectiveness through metrics. The analyst stays current on regulations and emerging risks, working with business units to protect sensitive data using data loss prevention controls and user behavior analytics.
An Intern – Information Security at Navigant Credit Union in the USA assists in maintaining risk management tools and documentation. The intern gains exposure to risk assessment concepts, supports reporting activities that analyze trends and control effectiveness, and helps review security policies to ensure alignment with regulatory and industry standards.
The IT Incident Manager at MSC Cruises in Italy leads end-to-end incident response to restore services and minimize business impact. They coordinate technical teams and service providers, manage communications, and analyze trends to identify systemic issues. This manager collaborates with operations teams to improve stability and drives continuous improvement of incident management processes.
A Lead Cyber Security Engineer at Davies in India provides leadership and support to security engineers and analysts. They act as an escalation point for incidents and oversee operational IT security, including monitoring tools like SIEM and endpoint protection platforms. This lead assists with team planning, reviews technical policies, assesses new vulnerabilities, supports risk-based improvements, and contributes to security gap assessments against recognized frameworks.
As a Network Security Engineer at Specsavers in Australia, the professional serves as a subject matter expert and escalation point for network security incidents. They maintain secure configurations across firewalls, routers, and VPNs, review and optimize firewall rules, and drive automation. The engineer collaborates with Security Operations to analyze traffic, detect threats, and manage vulnerabilities and patching to ensure a secure network environment.
An Offensive Security Consultant specializing in penetration testing at RSM Canada assesses client IT environments using security testing tools. They conduct various penetration tests and specialized assessments, such as wireless or social engineering tests, and help develop remediation recommendations for identified vulnerabilities.
A Product Security Engineer at KKR in Ireland performs application security assessments and penetration tests. They work closely with development teams to embed secure coding practices, design security controls, and provide guidance on best practices. This engineer supports incident response for application security events, delivers developer training, and maintains application security standards and policies.
The Region Cybersecurity Manager at Ferrero in France defines and executes the regional cybersecurity roadmap aligned with Group strategy. They lead security improvement initiatives, assess regional maturity and risk exposure, and align local processes with Group standards. This manager secures industrial sites and supply chains, driving the deployment of cybersecurity practices and technologies across the region.
A Secure AI Architect at Rezolve Ai, working remotely in the EU, assesses organizational readiness for artificial intelligence. They identify security and governance gaps, advising technical and executive stakeholders on the safe and responsible adoption of AI at scale. This architect bridges security architecture, compliance, data governance, and responsible AI principles to enable trusted deployments.
A Senior Analyst, Information Security at Analog Devices in Ireland manages and automates identity governance processes. They improve efficiency through automation, enforce least-privilege access, maintain documentation, and investigate identity-related incidents. The analyst continuously monitors data access to detect risks and maintain thorough audit trails.
The Senior Application Security Engineer role at AbbVie in the USA is a remote position managing application security testing tools to detect vulnerabilities across the software development lifecycle. This engineer oversees platforms that centralize findings and embed security into workflows, supports users by resolving false positives and guiding remediation, and integrates security tools into continuous integration and delivery pipelines.
As a Senior SOC Analyst and Threat Hunter at The Lubrizol Corporation in the USA, the professional investigates incidents using response playbooks and documents findings. They automate SOC tasks, enhance detection with analytics aligned to threat frameworks, and conduct structured, hypothesis-driven threat hunts to proactively identify risks.
Finally, a SIEM Architect at NetworkPedia in the USA designs, implements, and manages highly available Security Information and Event Management platforms. They maintain security log pipelines for data ingestion and normalization, build architectures using technologies like Splunk and AWS, and manage scalable security data lakes. The architect develops detection logic and correlation rules aligned with established cybersecurity frameworks.
(Source: HelpNet Security)





