Top Cybersecurity Jobs Hiring Now | November 2025

▼ Summary
– Cybersecurity roles span various levels and specialties, including leadership positions like CISO and technical roles like SOC analysts and penetration testers.
– Common responsibilities across positions include developing security strategies, managing risk, overseeing incident response, and ensuring compliance with frameworks like ISO 27001 and NIST.
– Many roles involve hands-on technical tasks such as monitoring threats, conducting vulnerability assessments, and managing security tools like SIEM, EDR, and IAM.
– Security professionals often work with cloud environments (e.g., AWS, Azure) and hybrid or on-site setups, focusing on protecting infrastructure and applications.
– Continuous improvement is emphasized through activities like threat hunting, policy development, and mentoring teams to enhance organizational security maturity.
For professionals seeking a dynamic career path, the cybersecurity job market continues to offer a wealth of diverse and high-impact roles across the globe. From strategic leadership positions to deeply technical engineering specializations, organizations are actively recruiting talent to protect their critical digital assets. The following opportunities represent a snapshot of current openings, showcasing the breadth of roles available for experts at every level.
An Associate Director, Cybersecurity Specialist role at HSBC in India focuses on leading the Cyber Professional Testing Practice. This position involves setting strategic direction, mentoring teams, and planning resources to foster organization-wide adoption of security testing. The specialist defines and delivers the testing strategy, which includes frameworks, processes, methodologies, and automated testing practices. They also provide guidance on performance and stress testing while overseeing testing process management, documentation, and continuous improvement efforts.
A CISO position with Solitics in Israel requires defining and maintaining the company-wide security roadmap and Information Security Management System (ISMS). This leader acts as the central contact for all security, compliance, and privacy matters. Key duties involve securing the SaaS platform and cloud environments by driving secure software development lifecycles, vulnerability management, remediation, and penetration testing. The role also encompasses overseeing governance, risk management, and incident response, including maintaining policies, the risk register, and leading detection, investigation, and post-incident reviews.
For a Cyber Security Engineer at Intrum in the UK, the work centers on operating and optimizing a broad suite of security platforms. These include SIEM, XDR, EDR, IAM, DLP, PAM, ZTNA, and vulnerability management tools. The engineer takes ownership of the entire detection and response lifecycle, from triaging alerts and investigating incidents to identifying root causes and coordinating response actions. A significant part of the job involves implementing and managing security controls across AWS, Azure, and on-premises environments, ensuring alignment with frameworks like ISO 27001 and PCI-DSS.
Another Cyber Security Engineer role at Protergo in Indonesia involves troubleshooting deployment issues across both software and hardware. The engineer provides technical support to clients and assists in designing deployment plans tailored to their specific needs. Additional responsibilities include monitoring and maintaining the health of servers and network devices, deploying or updating systems as required, and designing and implementing robust backup solutions to prevent data loss.
A Cyber Security Expert position with Golden Goose in Italy focuses on monitoring and analyzing SOC alerts for potential threats. The expert investigates and triages security incidents, escalating them when necessary to mitigate risk. They perform root cause analysis, document their findings, and assist in configuring, tuning, and maintaining security tools such as SIEM platforms. The role also includes coordinating threat assessments, penetration tests, and vulnerability scans while overseeing subsequent remediation efforts.
At NDT Global in Germany, a Cyber Security Specialist will establish cybersecurity governance aligned with CIS Controls, NIST CSF, and ISO 27001. They define supporting policies and procedures and drive maturity improvements across the security program. This specialist leads the enterprise risk management program, maintains risk registers, and collaborates with IT and business teams to remediate vulnerabilities and prioritize controls. They also support security operations by guiding incident response, contributing to root-cause analysis, and participating in threat hunting, penetration testing, and vulnerability management activities.
A Cyber Threat Intelligence Manager at ESET in Germany is responsible for translating technical threat intelligence into clear business insights, including risk assessments and strategic recommendations. They profile client needs, set and maintain Priority Intelligence Requirements, and coordinate with technology teams to integrate threat intelligence platforms and automated sharing mechanisms. The manager also benchmarks the organization’s security posture against industry standards and ensures all threat intelligence initiatives align with relevant frameworks.
An L2 Cybersecurity Defense SOC Analyst role at Ascot Group in the USA involves developing and implementing advanced security protocols, incident response procedures, and improved threat intelligence processes. The analyst creates and refines standard operating procedures, including runbooks and playbooks for threat detection and incident response. They conduct detailed security investigations, analyze logs, network traffic, email traffic, and other data sources to identify root causes, determine impact, and support effective response and mitigation.
A Cybersecurity Manager at The Bank of East Asia in Hong Kong leads cybersecurity governance by establishing standards and performing technical evaluations. They are tasked with mitigating cybersecurity and cloud-security risks, responding to security incidents, and deploying, migrating, and maintaining security solutions in accordance with company policies and industry best practices.
For a Cybersecurity OT Engineer at Unisys in the UAE, the job entails conducting real-time risk and opportunity assessments during commissioning to ensure safe implementation. The engineer identifies potential variation requests to support contract claims and reports any contract, quality, schedule, or cost issues early, along with recommended solutions. They create and apply standard processes and tools, ensure all commissioning activities meet safety and contractual requirements, and manage small commissioning teams.
A Director, Information Security at accessiBe in Israel owns and evolves the company’s security strategy to align with business goals. This director leads security operations, including incident response, vulnerability management, IAM, and vendor risk, while ensuring compliance with SOC 2, ISO 27001, and other requirements. They partner with Product and Engineering teams to embed security by design, manage key vendor and auditor relationships, and report on security risks, metrics, and overall posture to executives and the board.
A GRC Cybersecurity Specialist at Pernod Ricard in France defines, implements, and governs cybersecurity policies, standards, and guidelines. They perform security and privacy risk evaluations, coordinate responses to suspected incidents, and report cybersecurity risks to TECH and Business executive committees. The specialist oversees risk-reduction activities and supports the implementation and maintenance of the overarching cybersecurity framework.
The Head of Cyber Security at Tattarang in Australia leads and evolves the organization’s cybersecurity strategy and roadmap while guiding technology and business teams to maintain a secure environment. They design and enhance security controls aligned with enterprise and regulatory requirements, mature the GRC function across frameworks like ISO 27001, SOC 2, NIST CSF, and the Essential Eight, and serve as the primary escalation point for cyber incidents, coordinating response and recovery efforts.
As Head of IT & Digital Security at Pieta in Ireland, the professional develops and delivers the organization’s IT and digital strategy in line with its mission and strategic plan. They lead operational resilience efforts, including disaster recovery, data protection, and business continuity planning. This head manages the ICT budget, ensures effective investment, oversees cybersecurity and data protection compliance (including GDPR), and maintains strong security policies, frameworks, and incident response protocols.
An Incident Response Analyst II at Astreya in Ireland monitors alarms and alerts across data center infrastructure. This includes watching over network and server devices, hardware health indicators, WAN circuits, local connectivity, and facility environmental systems such as temperature, humidity, power, racks, and PDUs. The analyst tracks system health and service availability through OCI, cloud dashboards, and related monitoring tools.
An Information Security and Compliance Lead at HCRG Care Group in the UK supports the delivery and monitoring of secure infrastructure services across cloud, on-premises, and hybrid environments. They ensure security and compliance controls are consistently applied across networks, servers, endpoints, and backup systems. This lead also helps maintain the ISMS, including its policies, procedures, and risk registers.
A Penetration Tester at ReadyTech in New Zealand conducts security assessments across applications, cloud environments, and infrastructure, operating independently of development and delivery teams. They identify, validate, and prioritize vulnerabilities, providing clear risk insights that are aligned with business impact.
A Principal Cybersecurity Architect at JPMorganChase in the USA develops multi-year roadmaps aligned with business and architectural priorities. They create complex, scalable coding frameworks on public cloud platforms to support new system design patterns and process templates. The architect also builds secure, high-quality production code and reviews or debugs code developed by other team members.
A Security Engineer at Bending Spoons in Italy runs security audits to identify weaknesses and improve security strategies. They perform internal vulnerability testing, uncover system gaps, and implement countermeasures to protect sensitive data. The engineer also identifies organization-wide security challenges and designs solutions that strengthen protection while streamlining practices across IT and infrastructure.
A Senior Cybersecurity Analyst at CB&I in the USA assesses information risk and supports the remediation of vulnerabilities across the company’s network, systems, and applications. They conduct assigned vulnerability assessments using security tools and established methodologies. The analyst also evaluates the security and risk posture of IT networks, systems, software, and vendors within the Vendor Management Program.
A Senior Manager, SAP Application Security at NVIDIA in the USA leads the SAP security strategy by defining and enforcing standards for S/4HANA, Fiori, ECC, BW, and integrated applications. They manage SAP GRC Access Control modules to support risk analysis, segregation of duties conflict resolution, and elevated access monitoring. The manager also ensures SOX compliance and maintains a state of audit readiness with zero critical findings.
A Senior Network Security Engineer at NETS-International Group in the UAE manages large-scale Cisco ISE deployments for Network Access Control (NAC) and TACACS, including guest access, device profiling, posture assessment, and third-party integrations. They administer Cisco Secure Email solutions, oversee enterprise mail flow, manage Secure Email Gateway clusters, and operate Security Management Appliances for centralized threat containment. The engineer also handles Cisco Secure Firewall platforms, including FTD and ASA migrations, FMC operations in high-availability environments, IPS deployment, and advanced incident troubleshooting.
A Senior Red Team – Cybersecurity Engineer at The Nuclear Company in the USA conducts sophisticated red team exercises that simulate real-world attack scenarios against critical nuclear infrastructure systems. They execute multi-vector penetration tests, including network, application, wireless, and physical security assessments. The role also involves performing on-site physical penetration tests to evaluate facility security measures and access controls.
A Senior Security Engineer at Doctolib in France drives security by design across product lifecycles, balancing business goals, risk, and regulatory needs. They threat model and assess features, define practical long-term security requirements, and serve as a key security advisor to strengthen the organization’s security culture. The engineer partners with GRC and Product teams on risk analysis and policies, and owns continuous application security by managing vulnerability SLAs, Blue Team playbooks, and the Bug Bounty program.
A Senior Security Engineer, Application Security at GitLab in Canada performs security-focused design and architecture reviews, threat modeling, code reviews, and security testing. They explore potential attack paths and demonstrate exploitation in controlled environments. The engineer defines secure development practices, creates paved roads and standards, and supports Product and Engineering teams in delivering secure features quickly and efficiently.
A Senior Security Engineer – Cloud Specialist at CARFAX in Canada oversees continuous monitoring of network traffic, systems, and applications to detect, analyze, and respond to cybersecurity threats using advanced security tools and proactive defense methodologies. They also monitor public, private, and hybrid cloud environments, applications, and services to identify and address security threats and findings with modern cloud management and security tools.
A SOC Analyst at Databricks in India is responsible for monitoring, detecting, and responding to security threats across the organization. They triage alerts by analyzing logs and correlating data from multiple sources, while also building or enhancing automation to improve detection and response capabilities. The analyst follows established standard operating procedures and drives continuous improvements to enhance the overall operational maturity of the security operations center.
(Source: HelpNet Security)


