110 companies in Computer and Network Security are hiring GitHub Actions talent, with 247 open roles.
GitHub Actions is a CI/CD automation platform built directly into GitHub, letting engineering teams build, test, and deploy code without leaving their repository. When a Computer and Network Security company is actively hiring for GitHub Actions expertise, it signals they are maturing or rebuilding their software delivery pipeline — often replacing legacy tools like Jenkins. These companies are likely in the market for secrets management solutions, cloud infrastructure tooling, and container security platforms that integrate with automated pipelines.
Buying Signal
A company posting GitHub Actions roles is investing in pipeline automation, which typically precedes or accompanies purchases of SAST/DAST tools, artifact registries, and cloud-native security products. In the security industry specifically, this often means they are building compliance-as-code workflows and need vendors who can plug into a GitHub-native workflow. Security software vendors, DevSecOps platform reps, and cloud security AEs should be prioritizing these accounts.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 17 | 7w ago | |
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 7 | 7w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 3 | 7w ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 20 | 7w ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 10 | 7w ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 9 | 7w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 9 | 7w ago | |
R
Radware |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 6 | 7w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 6 | 2mo ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 3 | 1mo ago | |
Cyderes cyderes.com |
Computer and Network Security | Kansas City, United States | 1,001–5,000 | 3 | 1mo ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 3 | 2mo ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 3 | 2mo ago | |
Darktrace darktrace.com |
Computer and Network Security | Cambridge, United Kingdom | 1,001–5,000 | 2 | 2mo ago | |
Forescout Technologies Inc. forescout.com |
Computer and Network Security | San Jose, United States | 1,001–5,000 | 2 | 1mo ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 2 | 2mo ago | |
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 2 | 2mo ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 8 | 1mo ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 4 | 7w ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 4 | 2mo ago | |
Malwarebytes malwarebytes.com |
Computer and Network Security | Santa Clara, United States | 501–1,000 | 3 | 3mo ago | |
ExpressVPN expressvpn.com |
Computer and Network Security | Parham Town, British Virgin Islands | 501–1,000 | 2 | 7w ago | |
NetSPI netspi.com |
Computer and Network Security | Minneapolis, United States | 501–1,000 | 2 | 7w ago | |
Securonix securonix.com |
Computer and Network Security | Plano, United States | 501–1,000 | 2 | 1mo ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 2 | 4mo ago | |
Bugcrowd bugcrowd.com |
Computer and Network Security | San Francisco, United States | 201–500 | 3 | 2mo ago | |
Cyberhaven cyberhaven.com |
Computer and Network Security | Palo Alto, United States | 201–500 | 3 | 1mo ago | |
Filigran filigran.io |
Computer and Network Security | New York, United States | 201–500 | 2 | 2mo ago | |
Horizon3.ai horizon3.ai |
Computer and Network Security | San Francisco, United States | 201–500 | 2 | 2mo ago | |
Quantinuum quantinuum.com |
Computer and Network Security | Broomfield, United States | 201–500 | 2 | 2mo ago | |
Upwind Security upwind.io |
Computer and Network Security | San Francisco, United States | 201–500 | 2 | 7w ago | |
XM Cyber xmcyber.com |
Computer and Network Security | Tel-Aviv, Israel | 201–500 | 2 | 1mo ago | |
Arkose Labs arkoselabs.com |
Computer and Network Security | San Mateo, United States | 201–500 | 1 | 1mo ago | |
Astra Security getastra.com |
Computer and Network Security | United States | 51–200 | 6 | 1mo ago | |
Stellar Cyber stellarcyber.ai |
Computer and Network Security | San Jose, United States | 51–200 | 3 | 5mo ago | |
Inkit inkit.com |
Computer and Network Security | United States | 51–200 | 2 | 3mo ago | |
Insight Assurance insightassurance.com |
Computer and Network Security | Tampa, United States | 51–200 | 2 | 3mo ago | |
LayerX Security layerxsecurity.com |
Computer and Network Security | New York, United States | 51–200 | 2 | 2mo ago | |
MIND mind.io |
Computer and Network Security | Seattle, United States | 51–200 | 2 | 1mo ago | |
Upstream Security upstream.auto |
Computer and Network Security | Herzliya, Israel | 51–200 | 2 | 3mo ago | |
Zenity zenity.io |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 2 | 2mo ago | |
1Kosmos 1kosmos.com |
Computer and Network Security | Woodbridge Township, United States | 51–200 | 1 | 4mo ago | |
7AI 7ai.com |
Computer and Network Security | Boston, United States | 51–200 | 1 | 2mo ago | |
Adapt Forward adaptforward.com |
Computer and Network Security | North Charleston, United States | 51–200 | 1 | 6mo ago | |
Appknox appknox.com |
Computer and Network Security | Singapore | 51–200 | 1 | 2mo ago | |
Arpya arpya.xyz |
Computer and Network Security | Tirana, Albania | 11–50 | 2 | 1mo ago | |
Prelude preludesecurity.com |
Computer and Network Security | 11–50 | 2 | 3mo ago | ||
Aryon Security aryon.security |
Computer and Network Security | 11–50 | 1 | 2mo ago | ||
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 3 | 3mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 3 | 1mo ago |
110 companies use GitHub Actions. Want the full list?
Export to CSV▲Market Signal
110 security companies running 247 open roles for GitHub Actions talent represents meaningful pipeline investment concentrated in a single industry vertical. The role volume per company suggests these are not exploratory hires — teams are scaling dedicated DevOps functions.
⦿Stack Intelligence
The co-occurrence of Jenkins and GitLab CI alongside GitHub Actions indicates companies in transition — either consolidating multiple CI systems or running parallel pipelines across acquisition-linked teams. Terraform and Kubernetes in the same hiring cluster signals infrastructure-as-code maturity, meaning these buyers are ready for policy enforcement tools, cloud cost management, and runtime security platforms.
Where and how companies hire GitHub Actions talent
Don't just know who uses GitHub Actions.
Know who's actively building with it right now.
Search hiring signals →GitHub Actions automates software build, test, and deployment workflows directly within GitHub repositories. For security companies, it functions as the operational backbone connecting code commits to production environments. Heavy hiring for this skill signals active pipeline modernization.
GitHub Actions hiring in the security industry flags companies rebuilding or scaling their DevSecOps infrastructure — a reliable predictor of near-term tool purchases. A rep selling secrets management or container scanning should treat these job posts as inbound buying signals.
Vendors best positioned here include DevSecOps platforms, cloud security posture management providers, secrets management tools, and CI/CD observability or compliance solutions.