434 companies in Computer and Network Security are hiring Linux talent, with 2,304 open roles.
Linux is the dominant open-source operating system powering enterprise servers, cloud infrastructure, and security tooling. When a security company posts Linux roles, it signals active investment in building or scaling detection, response, or infrastructure capabilities — not just maintaining existing systems. These companies are likely buying cloud security tooling, endpoint protection platforms, and DevSecOps solutions to support what they're building.
Buying Signal
A company hiring Linux talent in the security sector is typically standing up new infrastructure, migrating workloads, or expanding their SOC capabilities — all of which create immediate procurement needs. Vendors selling SIEM platforms, vulnerability management tools, cloud workload protection, or container security should be actively prospecting these accounts. A Threat Analyst hiring surge, like the 34 open roles tracked here, is a direct indicator that detection and response tooling decisions are either underway or imminent.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 225 | 2mo ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 71 | 2mo ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 46 | 2mo ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 119 | 2mo ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 79 | 2mo ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 53 | 2mo ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 48 | 2mo ago | |
secunet Security Networks AG secunet.com |
Computer and Network Security | Essen, Germany | 1,001–5,000 | 32 | 2mo ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 25 | 2mo ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 21 | 2mo ago | ||
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 21 | 2mo ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 18 | 2mo ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 18 | 2mo ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 13 | 2mo ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 11 | 2mo ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 9 | 2mo ago | |
N-able n-able.com |
Computer and Network Security | Morrisville, United States | 1,001–5,000 | 9 | 2mo ago | |
SonicWall sonicwall.com |
Computer and Network Security | Milpitas, United States | 1,001–5,000 | 9 | 2mo ago | |
Optiv optiv.com |
Computer and Network Security | Denver, United States | 1,001–5,000 | 8 | 2mo ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 35 | 2mo ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 31 | 2mo ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 22 | 2mo ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 20 | 2mo ago | |
Telos Corporation telos.com |
Computer and Network Security | Ashburn, United States | 501–1,000 | 19 | 2mo ago | |
Group-IB group-ib.com |
Computer and Network Security | Singapore, Singapore | 501–1,000 | 15 | 2mo ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 14 | 2mo ago | |
NetSPI netspi.com |
Computer and Network Security | Minneapolis, United States | 501–1,000 | 11 | 2mo ago | |
Ensign InfoSecurity ensigninfosecurity.com |
Computer and Network Security | Singapore | 501–1,000 | 10 | 2mo ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 10 | 2mo ago | |
BigID bigid.com |
Computer and Network Security | New York, United States | 501–1,000 | 9 | 2mo ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 8 | 2mo ago | |
UltraViolet Cyber uvcyber.com |
Computer and Network Security | McLean, United States | 501–1,000 | 8 | 2mo ago | |
Claroty claroty.com |
Computer and Network Security | New York, United States | 501–1,000 | 7 | 2mo ago | |
Pentera pentera.io |
Computer and Network Security | Burlington, United States | 201–500 | 14 | 2mo ago | |
Koal Software koal.com |
Computer and Network Security | 201–500 | 13 | 12mo ago | ||
Chainguard chainguard.dev |
Computer and Network Security | Kirkland, United States | 201–500 | 12 | 2mo ago | |
OffSec offsec.com |
Computer and Network Security | New York, United States | 201–500 | 10 | 2mo ago | |
genua gmbh genua.de |
Computer and Network Security | Kirchheim bei München, Germany | 201–500 | 9 | 2mo ago | |
Owl Cyber Defense owlcyberdefense.com |
Computer and Network Security | Columbia, United States | 201–500 | 9 | 2mo ago | |
Open Systems open-systems.com |
Computer and Network Security | Zurich, Switzerland | 201–500 | 8 | 2mo ago | |
Futurex futurex.com |
Computer and Network Security | Bulverde, United States | 51–200 | 15 | 5mo ago | |
Rublon rublon.com |
Computer and Network Security | Zielona Góra, Poland | 51–200 | 10 | 2mo ago | |
Stellar Cyber stellarcyber.ai |
Computer and Network Security | San Jose, United States | 51–200 | 8 | 2mo ago | |
Axiado Corporation axiado.com |
Computer and Network Security | San Jose, United States | 51–200 | 7 | 2mo ago | |
IOActive, Inc. ioactive.com |
Computer and Network Security | Seattle, United States | 51–200 | 7 | 6mo ago | |
Remedio (formerly GYTPOL) remedio.io |
Computer and Network Security | Ness Ziona, Israel | 11–50 | 12 | 2mo ago | |
Phoenix Cyber phoenixcyber.com |
Computer and Network Security | Scottsdale, United States | 11–50 | 7 | 3mo ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 173 | 2mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 88 | 2mo ago |
434 companies use Linux. Want the full list?
Export to CSV▲Market Signal
434 security companies actively hiring Linux talent across 2,304 open roles points to a sector in serious infrastructure build-out mode. This isn't routine backfill — it reflects an industry scaling its technical foundations fast.
⦿Stack Intelligence
Companies pairing Linux with Docker, Kubernetes, Ansible, Terraform, and NGINX are running modern, containerized infrastructure with automated deployment pipelines — a stack that signals DevSecOps maturity and active tooling evaluation cycles. For sales teams, this combination identifies accounts that are past the proof-of-concept stage and making real purchasing decisions around security, observability, and infrastructure management. These are high-intent buyers, not explorers.
Where and how companies hire Linux talent
Don't just know who uses Linux.
Know who's actively building with it right now.
Search hiring signals →Linux is the operating system foundation for most enterprise and cloud-native security infrastructure. It underpins everything from threat detection platforms to network security appliances. When a company is hiring for it, they're building serious technical depth — and buying the tools to go with it.
Linux hiring in security signals active infrastructure investment, which correlates with open budgets for adjacent tooling. An SDR tracking these signals can time outreach to coincide with active vendor evaluation — before the decision is made.
Vendors in cloud security, SIEM, endpoint detection and response, container security, and IT automation should prioritize companies hiring Linux talent in this sector.