148 companies in Computer and Network Security are hiring Jenkins talent, with 549 open roles.
Jenkins is an open-source automation server used to build, test, and deploy software through continuous integration and delivery pipelines. When a security company hires for Jenkins, it signals they are scaling their internal engineering infrastructure — typically ahead of product launches, compliance initiatives, or a shift toward DevSecOps practices. These companies are actively buying tools that plug into CI/CD pipelines: secrets management, SAST/DAST scanners, container security, and artifact repositories.
Buying Signal
A security company hiring Jenkins engineers is building or expanding a pipeline that needs to meet strict compliance and vulnerability management requirements — think SOC 2, FedRAMP, or ISO 27001 automation. This is a strong entry point for vendors selling shift-left security tools, pipeline-native compliance platforms, or cloud infrastructure services. SDRs at companies like Snyk, Aqua Security, or HashiCorp should be prospecting these accounts immediately.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 40 | 2mo ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 12 | 2mo ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 8 | 2mo ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 29 | 2mo ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 28 | 2mo ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 26 | 2mo ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 23 | 2mo ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 16 | 2mo ago | |
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 14 | 2mo ago | |
Snyk snyk.io |
Computer and Network Security | Boston, United States | 1,001–5,000 | 9 | 2mo ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 9 | 2mo ago | |
Tanium tanium.com |
Computer and Network Security | Kirkland, United States | 1,001–5,000 | 8 | 2mo ago | |
Tenable tenable.com |
Computer and Network Security | Columbia, United States | 1,001–5,000 | 8 | 2mo ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 5 | 2mo ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 5 | 2mo ago | |
N-able n-able.com |
Computer and Network Security | Morrisville, United States | 1,001–5,000 | 5 | 2mo ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 4 | 2mo ago | |
Mimecast aliancegroup.com.au |
Computer and Network Security | City of London, United Kingdom | 1,001–5,000 | 2 | 2mo ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 2 | 2mo ago | |
Cybereason cybereason.com |
Computer and Network Security | San Diego, United States | 1,001–5,000 | 2 | 7w ago | |
Cyderes cyderes.com |
Computer and Network Security | Kansas City, United States | 1,001–5,000 | 2 | 2mo ago | |
Darktrace darktrace.com |
Computer and Network Security | Cambridge, United Kingdom | 1,001–5,000 | 2 | 2mo ago | |
Checkmarx checkmarx.com |
Computer and Network Security | Paramus, United States | 501–1,000 | 7 | 2mo ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 7 | 2mo ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 4 | 2mo ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 4 | 2mo ago | |
UltraViolet Cyber uvcyber.com |
Computer and Network Security | McLean, United States | 501–1,000 | 4 | 2mo ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 4 | 2mo ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 3 | 2mo ago | |
Mitek Systems miteksystems.com |
Computer and Network Security | San Diego, United States | 501–1,000 | 3 | 2mo ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 3 | 2mo ago | |
Securonix securonix.com |
Computer and Network Security | Plano, United States | 501–1,000 | 3 | 2mo ago | |
Protegrity protegrity.com |
Computer and Network Security | Stamford, United States | 201–500 | 14 | 2mo ago | |
Chainguard chainguard.dev |
Computer and Network Security | Kirkland, United States | 201–500 | 7 | 2mo ago | |
Appdome appdome.com |
Computer and Network Security | Redwood City, United States | 201–500 | 2 | 4mo ago | |
BioCatch biocatch.com |
Computer and Network Security | New York, United States | 201–500 | 2 | 2mo ago | |
Clavis Segurança da Informação clavis.com.br |
Computer and Network Security | Brazil | 201–500 | 2 | 2mo ago | |
Cyberbit cyberbit.com |
Computer and Network Security | Boston, United States | 201–500 | 2 | 2mo ago | |
Axiado Corporation axiado.com |
Computer and Network Security | San Jose, United States | 51–200 | 4 | 2mo ago | |
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 4 | 2mo ago | |
Futurex futurex.com |
Computer and Network Security | Bulverde, United States | 51–200 | 3 | 6mo ago | |
OX Security ox.security |
Computer and Network Security | Boston, United States | 51–200 | 3 | 2mo ago | |
Rublon rublon.com |
Computer and Network Security | Zielona Góra, Poland | 51–200 | 3 | 2mo ago | |
Rapid Strategy rapidstrategy.io |
Computer and Network Security | 11–50 | 10 | 6mo ago | ||
Bénin Digital benin-digital.com |
Computer and Network Security | Cotonou, Benin | 11–50 | 6 | 2mo ago | |
Arpya arpya.xyz |
Computer and Network Security | Tirana, Albania | 11–50 | 2 | 2mo ago | |
DeepInspect deepinspect.it |
Computer and Network Security | Rome, Italy | 11–50 | 2 | 2mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 36 | 2mo ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 20 | 4mo ago |
148 companies use Jenkins. Want the full list?
Export to CSV▲Market Signal
148 companies posting 549 Jenkins roles in computer and network security represents an average of nearly 4 open positions per company — a depth of hiring that suggests active pipeline buildouts, not backfills. This volume points to sustained, structural investment in DevSecOps infrastructure across the sector.
⦿Stack Intelligence
Companies hiring for Jenkins alongside GitHub Actions, GitLab CI, Docker, Kubernetes, and Terraform are running hybrid or multi-cloud environments with mature-but-evolving CI/CD strategies. The combination signals a pipeline modernization effort — often migrating away from legacy Jenkins setups toward cloud-native orchestration. For vendors, this stack fingerprint identifies companies in active procurement cycles for infrastructure tooling, security scanning, and policy-as-code solutions.
Where and how companies hire Jenkins talent
Don't just know who uses Jenkins.
Know who's actively building with it right now.
Search hiring signals →Jenkins automates the process of building, testing, and releasing software — functioning as the backbone of a development team's delivery pipeline. For security companies, it's often the control plane through which code quality and vulnerability checks are enforced. Hiring for it signals engineering teams are growing fast enough to need dedicated pipeline ownership.
Jenkins hiring in security indicates a company is investing in internal engineering velocity, which correlates with increased spend on tooling that integrates with CI/CD pipelines. A rep selling container security or secrets management has a timed, relevant reason to reach out — the infrastructure is being built right now.
Vendors best positioned to sell into Jenkins-hiring security companies include cloud security platforms, DevSecOps tooling providers, infrastructure-as-code vendors, and artifact management or binary repository solutions.