102 companies in Computer and Network Security are hiring MySQL talent, with 312 open roles.
MySQL is the world's most widely deployed open-source relational database, and companies hiring for it in the Computer and Network Security industry are actively scaling data-heavy infrastructure — think threat intelligence pipelines, audit logging systems, and customer-facing security dashboards. With 102 companies posting 312 open roles, this isn't maintenance hiring; it's growth hiring. These companies are likely in the market for database monitoring tools, cloud infrastructure, and security-adjacent data services.
Buying Signal
When a security company posts MySQL roles, they're typically building or expanding backend systems that store sensitive event data, user records, or compliance logs — all of which require supporting tooling around encryption, access control, and performance optimization. A rep selling database security, cloud migration services, or observability platforms should be prospecting these companies immediately. The hiring volume suggests active build cycles, not just backfill.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 10 | 2mo ago | |
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 10 | 1mo ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 6 | 1mo ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 29 | 1mo ago | ||
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 22 | 1mo ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 14 | 1mo ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 8 | 7w ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 7 | 1mo ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 6 | 1mo ago | |
1Password 1password.com |
Computer and Network Security | Toronto, Canada | 1,001–5,000 | 4 | 1mo ago | |
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 4 | 2mo ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 4 | 2mo ago | |
Tanium tanium.com |
Computer and Network Security | Kirkland, United States | 1,001–5,000 | 4 | 2mo ago | |
Cyderes cyderes.com |
Computer and Network Security | Kansas City, United States | 1,001–5,000 | 3 | 2mo ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 3 | 2mo ago | |
Beijing VRV Software Corporation Limited vrv.com.cn |
Computer and Network Security | 1,001–5,000 | 3 | 12mo ago | ||
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 2 | 2mo ago | |
Optiv optiv.com |
Computer and Network Security | Denver, United States | 1,001–5,000 | 2 | 1mo ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 8 | 7w ago | |
北明软件 bmsoft.com.cn |
Computer and Network Security | Beijing, China | 501–1,000 | 4 | 12mo ago | |
Malwarebytes malwarebytes.com |
Computer and Network Security | Santa Clara, United States | 501–1,000 | 4 | 4mo ago | |
Simeio simeio.com |
Computer and Network Security | Alpharetta, United States | 501–1,000 | 2 | 1mo ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 2 | 2mo ago | |
Aqua Security aquasec.com |
Computer and Network Security | Burlington, United States | 501–1,000 | 1 | 1mo ago | |
CHEQ cheq.ai |
Computer and Network Security | New York, United States | 201–500 | 6 | 2mo ago | |
Upwind Security upwind.io |
Computer and Network Security | San Francisco, United States | 201–500 | 5 | 7w ago | |
Aryaka aryaka.com |
Computer and Network Security | Santa Clara, United States | 201–500 | 2 | 1mo ago | |
Clearwater clearwatersecurity.com |
Computer and Network Security | Nashville, United States | 201–500 | 2 | 2mo ago | |
Cyble cyble.com |
Computer and Network Security | Cupertino, United States | 201–500 | 2 | 9mo ago | |
Dashlane dashlane.com |
Computer and Network Security | New York, United States | 201–500 | 2 | 1mo ago | |
Hack The Box hackthebox.com |
Computer and Network Security | Folkestone and Hythe District, United Kingdom | 201–500 | 2 | 2mo ago | |
Lookout lookout.com |
Computer and Network Security | Boston, United States | 201–500 | 2 | 4mo ago | |
Menlo Security Inc. menlosecurity.com |
Computer and Network Security | Mountain View, United States | 201–500 | 2 | 7w ago | |
Protegrity protegrity.com |
Computer and Network Security | Stamford, United States | 201–500 | 2 | 2mo ago | |
Securepoint GmbH securepoint.de |
Computer and Network Security | Lüneburg, Germany | 201–500 | 2 | 2mo ago | |
AppViewX appviewx.com |
Computer and Network Security | New York, United States | 201–500 | 1 | 2mo ago | |
C
Creatuscorp |
Computer and Network Security | Beijing, China | 10,001–200 | 12 | 12mo ago | |
Guardio guard.io |
Computer and Network Security | Bat Yam, Israel | 51–200 | 6 | 3mo ago | |
Safe Security safe.security |
Computer and Network Security | Palo Alto, United States | 51–200 | 4 | 1mo ago | |
BC Technologies bctechnologies.co.za |
Computer and Network Security | Durban, South Africa | 51–200 | 3 | 4mo ago | |
Action1 action1.com |
Computer and Network Security | Houston, United States | 51–200 | 2 | 2mo ago | |
CYMOTIVE Technologies cymotive.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 2 | 3mo ago | |
DomainTools domaintools.com |
Computer and Network Security | Seattle, United States | 51–200 | 2 | 2mo ago | |
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 2 | 7w ago | |
Infosec Ventures infosecventures.com |
Computer and Network Security | Greater London, United Kingdom | 51–200 | 2 | 1mo ago | |
WarCollar Industries, LLC warcollar.com |
Computer and Network Security | Reston, United States | 51–200 | 2 | 3mo ago | |
Zermount, Inc. zermount.com |
Computer and Network Security | United States | 51–200 | 2 | 2mo ago | |
LpsChain lpschain.com |
Computer and Network Security | Kâğıthane, Turkey | 11–50 | 2 | 1mo ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 15 | 2mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 12 | 7w ago |
102 companies use MySQL. Want the full list?
Export to CSV▲Market Signal
Over 300 open roles across 102 security companies signals that MySQL remains a core production database in this sector, not a legacy holdover. The ratio of roughly 3 roles per company suggests sustained team expansion rather than isolated hires.
⦿Stack Intelligence
Companies pairing MySQL with Redis and PHP are typically running high-throughput web applications that need caching layers alongside persistent storage — a stack common in SaaS security products. The presence of PostgreSQL and MariaDB alongside MySQL often indicates multi-database environments or active migration projects, which opens doors for database management and ETL vendors. Java in the mix points to enterprise-grade backend services with real procurement budgets.
Where and how companies hire MySQL talent
Don't just know who uses MySQL.
Know who's actively building with it right now.
Search hiring signals →MySQL is a relational database management system used to store and query structured data at scale. In the security industry, it underpins everything from user authentication systems to threat log storage. Companies hiring MySQL engineers are actively building or scaling these systems.
MySQL hiring signals that a company is in an active infrastructure build phase — exactly when they're evaluating adjacent tools. A sales team selling database security, cloud hosting, or backend monitoring has a narrow window to get in front of the right buyers.
Vendors best positioned here include database security and compliance platforms, cloud infrastructure and managed database providers, backend observability and performance monitoring tools, and data integration or ETL solution vendors.