434 companies in Computer and Network Security are hiring Linux talent, with 2,304 open roles.
Linux is the dominant open-source operating system powering enterprise servers, cloud infrastructure, and security tooling. When a security company posts Linux roles, it signals active investment in building or scaling detection, response, or infrastructure capabilities — not just maintaining existing systems. These companies are likely buying cloud security tooling, endpoint protection platforms, and DevSecOps solutions to support what they're building.
Buying Signal
A company hiring Linux talent in the security sector is typically standing up new infrastructure, migrating workloads, or expanding their SOC capabilities — all of which create immediate procurement needs. Vendors selling SIEM platforms, vulnerability management tools, cloud workload protection, or container security should be actively prospecting these accounts. A Threat Analyst hiring surge, like the 34 open roles tracked here, is a direct indicator that detection and response tooling decisions are either underway or imminent.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 225 | 6w ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 71 | 6w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 46 | 6w ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 119 | 6w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 79 | 6w ago | |
R
Radware |
Computer and Network Security | Tel-Aviv, Israel | 10,001–5,000 | 63 | 6w ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 53 | 6w ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 48 | 6w ago | |
secunet Security Networks AG secunet.com |
Computer and Network Security | Essen, Germany | 1,001–5,000 | 32 | 6w ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 25 | 6w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 21 | 7w ago | ||
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 21 | 6w ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 18 | 6w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 18 | 6w ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 13 | 6w ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 11 | 6w ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 9 | 6w ago | |
N-able n-able.com |
Computer and Network Security | Morrisville, United States | 1,001–5,000 | 9 | 6w ago | |
SonicWall sonicwall.com |
Computer and Network Security | Milpitas, United States | 1,001–5,000 | 9 | 6w ago | |
Optiv optiv.com |
Computer and Network Security | Denver, United States | 1,001–5,000 | 8 | 6w ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 35 | 6w ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 31 | 6w ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 22 | 7w ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 20 | 7w ago | |
Telos Corporation telos.com |
Computer and Network Security | Ashburn, United States | 501–1,000 | 19 | 2mo ago | |
Group-IB group-ib.com |
Computer and Network Security | Singapore, Singapore | 501–1,000 | 15 | 6w ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 14 | 6w ago | |
NetSPI netspi.com |
Computer and Network Security | Minneapolis, United States | 501–1,000 | 11 | 6w ago | |
Ensign InfoSecurity ensigninfosecurity.com |
Computer and Network Security | Singapore | 501–1,000 | 10 | 6w ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 10 | 1mo ago | |
BigID bigid.com |
Computer and Network Security | New York, United States | 501–1,000 | 9 | 6w ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 8 | 6w ago | |
UltraViolet Cyber uvcyber.com |
Computer and Network Security | McLean, United States | 501–1,000 | 8 | 7w ago | |
Claroty claroty.com |
Computer and Network Security | New York, United States | 501–1,000 | 7 | 6w ago | |
Pentera pentera.io |
Computer and Network Security | Burlington, United States | 201–500 | 14 | 6w ago | |
Koal Software koal.com |
Computer and Network Security | 201–500 | 13 | 11mo ago | ||
Chainguard chainguard.dev |
Computer and Network Security | Kirkland, United States | 201–500 | 12 | 6w ago | |
OffSec offsec.com |
Computer and Network Security | New York, United States | 201–500 | 10 | 7w ago | |
genua gmbh genua.de |
Computer and Network Security | Kirchheim bei München, Germany | 201–500 | 9 | 6w ago | |
Owl Cyber Defense owlcyberdefense.com |
Computer and Network Security | Columbia, United States | 201–500 | 9 | 6w ago | |
Open Systems open-systems.com |
Computer and Network Security | Zurich, Switzerland | 201–500 | 8 | 6w ago | |
Futurex futurex.com |
Computer and Network Security | Bulverde, United States | 51–200 | 15 | 4mo ago | |
Rublon rublon.com |
Computer and Network Security | Zielona Góra, Poland | 51–200 | 10 | 2mo ago | |
Stellar Cyber stellarcyber.ai |
Computer and Network Security | San Jose, United States | 51–200 | 8 | 1mo ago | |
Axiado Corporation axiado.com |
Computer and Network Security | San Jose, United States | 51–200 | 7 | 6w ago | |
IOActive, Inc. ioactive.com |
Computer and Network Security | Seattle, United States | 51–200 | 7 | 6mo ago | |
Remedio (formerly GYTPOL) remedio.io |
Computer and Network Security | Ness Ziona, Israel | 11–50 | 12 | 6w ago | |
Phoenix Cyber phoenixcyber.com |
Computer and Network Security | Scottsdale, United States | 11–50 | 7 | 2mo ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 173 | 6w ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 88 | 6w ago |
434 companies use Linux. Want the full list?
Export to CSV▲Market Signal
434 security companies actively hiring Linux talent across 2,304 open roles points to a sector in serious infrastructure build-out mode. This isn't routine backfill — it reflects an industry scaling its technical foundations fast.
⦿Stack Intelligence
Companies pairing Linux with Docker, Kubernetes, Ansible, Terraform, and NGINX are running modern, containerized infrastructure with automated deployment pipelines — a stack that signals DevSecOps maturity and active tooling evaluation cycles. For sales teams, this combination identifies accounts that are past the proof-of-concept stage and making real purchasing decisions around security, observability, and infrastructure management. These are high-intent buyers, not explorers.
Where and how companies hire Linux talent
Don't just know who uses Linux.
Know who's actively building with it right now.
Search hiring signals →Linux is the operating system foundation for most enterprise and cloud-native security infrastructure. It underpins everything from threat detection platforms to network security appliances. When a company is hiring for it, they're building serious technical depth — and buying the tools to go with it.
Linux hiring in security signals active infrastructure investment, which correlates with open budgets for adjacent tooling. An SDR tracking these signals can time outreach to coincide with active vendor evaluation — before the decision is made.
Vendors in cloud security, SIEM, endpoint detection and response, container security, and IT automation should prioritize companies hiring Linux talent in this sector.