321 companies in Computer and Network Security are hiring Kubernetes talent, with 1,821 open roles.
Kubernetes is the infrastructure backbone for running containerized applications at scale — and when a security company hires for it, they're signaling a shift toward cloud-native product architecture. In Computer and Network Security, Kubernetes adoption typically precedes or accompanies purchases of container security platforms, secrets management tools, and service mesh solutions. With 321 companies actively hiring and over 1,800 open roles, this is a category in active build-out, not maintenance mode.
Buying Signal
A security company hiring Kubernetes engineers is almost certainly evaluating or expanding spend on runtime security, policy enforcement, and CI/CD pipeline tooling. They're building multi-tenant or SaaS-delivered security products — which means they need vendors in container scanning, network policy, and cloud cost management. Sales reps at companies like Prisma Cloud, Snyk, or HashiCorp should be prioritizing these accounts now, before infrastructure decisions get locked in.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 104 | 6w ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 64 | 6w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 55 | 6w ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 83 | 6w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 76 | 6w ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 68 | 6w ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 49 | 6w ago | |
R
Radware |
Computer and Network Security | Tel-Aviv, Israel | 10,001–5,000 | 43 | 6w ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 32 | 6w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 30 | 7w ago | ||
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 28 | 6w ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 21 | 6w ago | |
Tenable tenable.com |
Computer and Network Security | Columbia, United States | 1,001–5,000 | 20 | 6w ago | |
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 13 | 6w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 13 | 6w ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 10 | 6w ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 10 | 6w ago | |
secunet Security Networks AG secunet.com |
Computer and Network Security | Essen, Germany | 1,001–5,000 | 9 | 6w ago | |
Snyk snyk.io |
Computer and Network Security | Boston, United States | 1,001–5,000 | 8 | 6w ago | |
SonicWall sonicwall.com |
Computer and Network Security | Milpitas, United States | 1,001–5,000 | 8 | 6w ago | |
N-able n-able.com |
Computer and Network Security | Morrisville, United States | 1,001–5,000 | 6 | 6w ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 53 | 7w ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 47 | 6w ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 39 | 6w ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 10 | 7w ago | |
BigID bigid.com |
Computer and Network Security | New York, United States | 501–1,000 | 10 | 6w ago | |
Checkmarx checkmarx.com |
Computer and Network Security | Paramus, United States | 501–1,000 | 7 | 6w ago | |
Ledger ledger.com |
Computer and Network Security | Paris, France | 501–1,000 | 7 | 6w ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 7 | 6w ago | |
Semperis semperis.com |
Computer and Network Security | Hoboken, United States | 501–1,000 | 7 | 7w ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 7 | 1mo ago | |
Chainguard chainguard.dev |
Computer and Network Security | Kirkland, United States | 201–500 | 25 | 6w ago | |
Upwind Security upwind.io |
Computer and Network Security | San Francisco, United States | 201–500 | 17 | 6w ago | |
Cyberhaven cyberhaven.com |
Computer and Network Security | Palo Alto, United States | 201–500 | 10 | 6w ago | |
Orca Security orca.security |
Computer and Network Security | Portland, United States | 201–500 | 10 | 7w ago | |
XM Cyber xmcyber.com |
Computer and Network Security | Tel-Aviv, Israel | 201–500 | 9 | 6w ago | |
Corelight corelight.com |
Computer and Network Security | San Francisco, United States | 201–500 | 7 | 7w ago | |
Horizon3.ai horizon3.ai |
Computer and Network Security | San Francisco, United States | 201–500 | 7 | 6w ago | |
Arkose Labs arkoselabs.com |
Computer and Network Security | San Mateo, United States | 201–500 | 6 | 6w ago | |
CHEQ cheq.ai |
Computer and Network Security | New York, United States | 201–500 | 6 | 1mo ago | |
Fortanix fortanix.com |
Computer and Network Security | Santa Clara, United States | 201–500 | 6 | 6w ago | |
Oneleet oneleet.com |
Computer and Network Security | Wilmington, United States | 51–200 | 25 | 2mo ago | |
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 11 | 6w ago | |
Wallarm: API Security Leader wallarm.com |
Computer and Network Security | San Francisco, United States | 51–200 | 11 | 7w ago | |
COGNNA cognna.com |
Computer and Network Security | 51–200 | 8 | 2mo ago | ||
Phoenix Cyber phoenixcyber.com |
Computer and Network Security | Scottsdale, United States | 11–50 | 7 | 2mo ago | |
Rapid Strategy rapidstrategy.io |
Computer and Network Security | 11–50 | 7 | 5mo ago | ||
Cogent Security cogent.security |
Computer and Network Security | San Francisco, United States | 11–50 | 6 | 3mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 94 | 6w ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 69 | 6w ago |
321 companies use Kubernetes. Want the full list?
Export to CSV▲Market Signal
1,821 open roles across 321 companies is not a niche signal — it reflects an industry-wide migration from legacy on-prem security architectures to cloud-native delivery models. The volume suggests budget has already been approved; these companies are in execution mode.
⦿Stack Intelligence
Companies hiring for Kubernetes alongside Docker, Terraform, Helm, ArgoCD, and AWS are running mature GitOps-oriented stacks — the kind that require dedicated tooling for secrets injection, drift detection, and multi-cluster management. This combination is a strong indicator of a platform engineering function, which is a distinct buying center from traditional IT or DevOps. Vendors selling to this cluster should map contacts beyond the CISO — look for VP of Platform or Head of Infrastructure.
Where and how companies hire Kubernetes talent
Don't just know who uses Kubernetes.
Know who's actively building with it right now.
Search hiring signals →Kubernetes is an orchestration system that manages how containerized software is deployed and scaled across cloud infrastructure. For security companies, it enables them to ship product updates faster and run multi-tenant workloads reliably. When you see hiring for it, a company is actively building or scaling cloud-native capabilities.
Kubernetes hiring precedes procurement decisions for a predictable set of adjacent tools — security scanning, observability, and cloud infrastructure management. A company posting 10+ Kubernetes roles is likely 60 to 90 days away from vendor evaluations in those categories.
Container security vendors (e.g., Aqua, Sysdig), cloud infrastructure providers, CI/CD and GitOps platforms, and observability tools like Datadog or Grafana are the strongest fits for this buyer profile.