148 companies in Computer and Network Security are hiring Ansible talent, with 464 open roles.
Ansible is an open-source automation platform used to configure systems, deploy applications, and orchestrate infrastructure at scale. When a security company posts Ansible roles, it signals active investment in automating compliance workflows, hardening configurations, and reducing manual remediation time — priorities that correlate directly with spending on SIEM platforms, vulnerability management tools, and cloud security posture management. These aren't exploratory hires; they're building repeatable, auditable infrastructure.
Buying Signal
A Computer and Network Security company hiring Ansible engineers is likely mid-deployment on a security automation or DevSecOps initiative — which means they're evaluating or already buying orchestration tooling, secrets management solutions, and policy-as-code platforms. The top roles being DevOps and SRE titles confirms this is infrastructure-led, not just ops maintenance. Vendors selling privileged access management, endpoint configuration, or cloud workload protection should be prospecting these accounts now.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 28 | 7w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 19 | 7w ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 8 | 1mo ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 35 | 7w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 20 | 7w ago | |
A
Axians magellan GmbH |
Computer and Network Security | Cologne, Germany | 10,001–5,000 | 12 | 6w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 12 | 7w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 12 | 2mo ago | ||
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 9 | 7w ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 5 | 1mo ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 4 | 1mo ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 4 | 1mo ago | |
N-able n-able.com |
Computer and Network Security | Morrisville, United States | 1,001–5,000 | 4 | 7w ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 4 | 7w ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 3 | 7w ago | |
Forescout Technologies Inc. forescout.com |
Computer and Network Security | San Jose, United States | 1,001–5,000 | 3 | 2mo ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 2 | 4mo ago | |
Cyderes cyderes.com |
Computer and Network Security | Kansas City, United States | 1,001–5,000 | 2 | 2mo ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 15 | 7w ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 6 | 1mo ago | |
Telos Corporation telos.com |
Computer and Network Security | Ashburn, United States | 501–1,000 | 5 | 2mo ago | |
ExtraHop extrahop.com |
Computer and Network Security | Seattle, United States | 501–1,000 | 4 | 2mo ago | |
Securonix securonix.com |
Computer and Network Security | Plano, United States | 501–1,000 | 4 | 1mo ago | |
Cyera cyera.io |
Computer and Network Security | New York, United States | 501–1,000 | 3 | 3mo ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 2 | 7w ago | |
PentenAmio pentenamio.com |
Computer and Network Security | Canberra, Australia | 201–500 | 3 | 2mo ago | |
Pentera pentera.io |
Computer and Network Security | Burlington, United States | 201–500 | 3 | 1mo ago | |
SimSpace simspace.com |
Computer and Network Security | Boston, United States | 201–500 | 3 | 7w ago | |
Bridewell bridewell.com |
Computer and Network Security | United Kingdom | 201–500 | 2 | 2mo ago | |
Cyberbit cyberbit.com |
Computer and Network Security | Boston, United States | 201–500 | 2 | 1mo ago | |
Filigran filigran.io |
Computer and Network Security | New York, United States | 201–500 | 2 | 2mo ago | |
COGNNA cognna.com |
Computer and Network Security | 51–200 | 5 | 2mo ago | ||
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 4 | 7w ago | |
Applied Network Solutions, Inc. go-ans.com |
Computer and Network Security | Columbia, United States | 51–200 | 4 | 2mo ago | |
Cequence Security cequence.ai |
Computer and Network Security | Santa Clara, United States | 51–200 | 3 | 2mo ago | |
ITrust itrust.fr |
Computer and Network Security | France | 51–200 | 3 | 1mo ago | |
Lutessa lutessa.com |
Computer and Network Security | Paris, France | 51–200 | 3 | 1mo ago | |
Mondoo mondoo.com |
Computer and Network Security | San Francisco, United States | 51–200 | 3 | 4mo ago | |
Zetier zetier.com |
Computer and Network Security | United States | 51–200 | 3 | 2mo ago | |
Balbix balbix.com |
Computer and Network Security | San Jose, United States | 51–200 | 2 | 7w ago | |
Rapid Strategy rapidstrategy.io |
Computer and Network Security | 11–50 | 7 | 6mo ago | ||
Bénin Digital benin-digital.com |
Computer and Network Security | Cotonou, Benin | 11–50 | 3 | 1mo ago | |
nscon network, security & consulting gmbh nscon.de |
Computer and Network Security | Germany | 11–50 | 3 | 2mo ago | |
Phoenix Cyber phoenixcyber.com |
Computer and Network Security | Scottsdale, United States | 11–50 | 3 | 2mo ago | |
SecureStrux® securestrux.com |
Computer and Network Security | Lancaster, United States | 11–50 | 3 | 1mo ago | |
StopAHack.com® stopahack.com |
Computer and Network Security | Marlborough, United States | 11–50 | 3 | 2mo ago | |
ARGO Cyber Systems argocyber.com |
Computer and Network Security | Pensacola, United States | 11–50 | 2 | 6mo ago | |
Computer Network Defence Ltd (CND) cndltd.com |
Computer and Network Security | United Kingdom | 11–50 | 2 | 1mo ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 38 | 7w ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 14 | 1mo ago |
148 companies use Ansible. Want the full list?
Export to CSV▲Market Signal
464 open roles across 148 companies points to Ansible being a core, not experimental, part of security infrastructure hiring. That ratio — over three roles per company on average — suggests these are scaling deployments, not pilot programs.
⦿Stack Intelligence
The co-occurrence of Terraform, Puppet, Chef, Linux, and Python alongside Ansible indicates companies building multi-tool automation stacks with serious infrastructure maturity. This combination signals they're past the 'choose one tool' phase and are integrating policy enforcement across hybrid environments. For vendors, this stack profile is a strong indicator of budget authority sitting with platform or infrastructure security teams, not just IT ops.
Where and how companies hire Ansible talent
Don't just know who uses Ansible.
Know who's actively building with it right now.
Search hiring signals →Ansible automates repetitive IT tasks — provisioning servers, pushing configuration changes, enforcing security baselines — without requiring agents on every machine. In security contexts, it's central to compliance automation and incident response workflows. Hiring for it signals a company is operationalizing security at scale.
Ansible hiring in security firms indicates active infrastructure modernization projects with real budget attached. A rep selling cloud security or compliance automation tools should treat these job postings as a trigger to reach out before the stack is locked in.
Vendors best positioned here include cloud security posture management (CSPM) platforms, secrets and credentials management tools, IT compliance and audit automation software, and infrastructure monitoring solutions.