315 companies in Computer and Network Security are hiring Docker talent, with 1,347 open roles.
Docker is a containerization platform that packages applications and their dependencies into portable, isolated units. When a security company hires for Docker expertise, it signals they are building or scaling internal tooling, cloud-native detection infrastructure, or SaaS security products that require consistent deployment across environments. These companies are active buyers of container security tools, CI/CD platforms, and cloud infrastructure services.
Buying Signal
A security company hiring Docker talent is likely mid-build on a cloud-native product or shifting legacy infrastructure to containers — both moments that trigger new vendor evaluations. They need container scanning tools, secrets management solutions, and runtime security platforms they may not yet have in place. DevSecOps vendors, cloud security posture management (CSPM) providers, and CI/CD tooling companies should be actively prospecting these accounts.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 59 | 6w ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 41 | 6w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 35 | 6w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 55 | 6w ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 48 | 6w ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 40 | 6w ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 38 | 6w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 31 | 7w ago | ||
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 28 | 6w ago | |
R
Radware |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 22 | 6w ago | |
Tenable tenable.com |
Computer and Network Security | Columbia, United States | 1,001–5,000 | 18 | 6w ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 17 | 6w ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 16 | 6w ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 14 | 6w ago | |
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 11 | 6w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 10 | 6w ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 6 | 6w ago | |
SonicWall sonicwall.com |
Computer and Network Security | Milpitas, United States | 1,001–5,000 | 6 | 6w ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 16 | 6w ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 11 | 6w ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 11 | 1mo ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 10 | 7w ago | |
BigID bigid.com |
Computer and Network Security | New York, United States | 501–1,000 | 10 | 6w ago | |
LastPass lastpass.com |
Computer and Network Security | Boston, United States | 501–1,000 | 8 | 7w ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 6 | 6w ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 6 | 6w ago | |
Checkmarx checkmarx.com |
Computer and Network Security | Paramus, United States | 501–1,000 | 5 | 6w ago | |
Cyera cyera.io |
Computer and Network Security | New York, United States | 501–1,000 | 5 | 2mo ago | |
F-Secure Corporation f-secure.com |
Computer and Network Security | Helsinki, Finland | 501–1,000 | 5 | 6w ago | |
Chainguard chainguard.dev |
Computer and Network Security | Kirkland, United States | 201–500 | 20 | 6w ago | |
Pentera pentera.io |
Computer and Network Security | Burlington, United States | 201–500 | 12 | 6w ago | |
Upwind Security upwind.io |
Computer and Network Security | San Francisco, United States | 201–500 | 12 | 6w ago | |
XM Cyber xmcyber.com |
Computer and Network Security | Tel-Aviv, Israel | 201–500 | 9 | 6w ago | |
ReversingLabs reversinglabs.com |
Computer and Network Security | Cambridge, United States | 201–500 | 7 | 6w ago | |
Corelight corelight.com |
Computer and Network Security | San Francisco, United States | 201–500 | 6 | 7w ago | |
Cyberhaven cyberhaven.com |
Computer and Network Security | Palo Alto, United States | 201–500 | 6 | 6w ago | |
Fortanix fortanix.com |
Computer and Network Security | Santa Clara, United States | 201–500 | 6 | 6w ago | |
Horizon3.ai horizon3.ai |
Computer and Network Security | San Francisco, United States | 201–500 | 6 | 6w ago | |
Bugcrowd bugcrowd.com |
Computer and Network Security | San Francisco, United States | 201–500 | 5 | 2mo ago | |
Clearwater clearwatersecurity.com |
Computer and Network Security | Nashville, United States | 201–500 | 5 | 7w ago | |
Oneleet oneleet.com |
Computer and Network Security | Wilmington, United States | 51–200 | 25 | 2mo ago | |
Rublon rublon.com |
Computer and Network Security | Zielona Góra, Poland | 51–200 | 8 | 2mo ago | |
COGNNA cognna.com |
Computer and Network Security | 51–200 | 5 | 2mo ago | ||
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 5 | 6w ago | |
Futurex futurex.com |
Computer and Network Security | Bulverde, United States | 51–200 | 5 | 4mo ago | |
Phoenix Cyber phoenixcyber.com |
Computer and Network Security | Scottsdale, United States | 11–50 | 7 | 2mo ago | |
ai.esra ai-esra.com |
Computer and Network Security | Turin, Italy | 11–50 | 6 | 6w ago | |
Cogent Security cogent.security |
Computer and Network Security | San Francisco, United States | 11–50 | 6 | 3mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 71 | 6w ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 61 | 6w ago |
315 companies use Docker. Want the full list?
Export to CSV▲Market Signal
315 companies across Computer and Network Security posting over 1,300 Docker roles indicates this is no longer an early-adopter signal — it reflects broad production adoption. The volume suggests a mature buying cycle, meaning vendors should focus on displacement and expansion plays, not just net-new deals.
⦿Stack Intelligence
Companies pairing Docker with Kubernetes, Terraform, Jenkins, GitHub Actions, and AWS are building fully automated, cloud-native delivery pipelines — a sign of high technical maturity and significant infrastructure spend. This stack combination means procurement decisions involve platform engineering, security, and DevOps leadership simultaneously. Sales reps can use this signal to multi-thread into three distinct buying centers within a single account.
Where and how companies hire Docker talent
Don't just know who uses Docker.
Know who's actively building with it right now.
Search hiring signals →Docker enables development teams to build, ship, and run applications in standardized containers, eliminating environment inconsistencies across dev, staging, and production. For security companies, it is foundational to shipping reliable, scalable software products. Hiring for Docker signals active infrastructure investment, not just exploration.
Docker hiring predicts near-term spend on adjacent tools including container security, cloud infrastructure, and CI/CD automation. A security company opening 10+ Docker roles is likely 60 to 90 days from a tooling evaluation. Tracking this hiring pattern lets sales teams enter deals before RFPs are written.
Vendors best positioned here include container and runtime security platforms, cloud infrastructure providers, CI/CD tooling companies, and secrets management or identity solutions.