121 companies in Computer and Network Security are hiring Prometheus talent, with 444 open roles.
Prometheus is an open-source monitoring and alerting system built for dynamic, containerized environments. When security companies hire for Prometheus expertise, they're signaling an active build-out of observability infrastructure — typically alongside Kubernetes clusters and real-time threat detection pipelines. These companies are likely in-market for log aggregation tools, cloud-native security platforms, and managed monitoring services.
Buying Signal
A security company hiring 15 DevOps Engineers and 15 Senior DevOps Engineers with Prometheus skills is actively scaling its detection and response infrastructure, not maintaining legacy systems. This is a strong indicator they're evaluating or purchasing complementary tools like SIEM integrations, cloud security posture management, or incident response platforms. Sales reps at vendors selling observability tooling, cloud infrastructure, or security automation should prioritize these accounts immediately.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 32 | 1mo ago | |
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 25 | 7w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 10 | 7w ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 66 | 7w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 18 | 7w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 15 | 2mo ago | ||
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 15 | 7w ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 13 | 7w ago | |
R
Radware |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 12 | 1mo ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 12 | 7w ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 9 | 7w ago | |
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 6 | 2mo ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 6 | 2mo ago | |
Tenable tenable.com |
Computer and Network Security | Columbia, United States | 1,001–5,000 | 6 | 1mo ago | |
secunet Security Networks AG secunet.com |
Computer and Network Security | Essen, Germany | 1,001–5,000 | 3 | 1mo ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 2 | 2mo ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 2 | 2mo ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 2 | 1mo ago | |
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 2 | 3mo ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 10 | 2mo ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 6 | 2mo ago | |
Checkmarx checkmarx.com |
Computer and Network Security | Paramus, United States | 501–1,000 | 4 | 7w ago | |
Securonix securonix.com |
Computer and Network Security | Plano, United States | 501–1,000 | 4 | 1mo ago | |
Semperis semperis.com |
Computer and Network Security | Hoboken, United States | 501–1,000 | 4 | 2mo ago | |
ExtraHop extrahop.com |
Computer and Network Security | Seattle, United States | 501–1,000 | 3 | 2mo ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 2 | 7w ago | |
Group-IB group-ib.com |
Computer and Network Security | Singapore, Singapore | 501–1,000 | 2 | 1mo ago | |
Ledger ledger.com |
Computer and Network Security | Paris, France | 501–1,000 | 2 | 1mo ago | |
CHEQ cheq.ai |
Computer and Network Security | New York, United States | 201–500 | 6 | 2mo ago | |
Corelight corelight.com |
Computer and Network Security | San Francisco, United States | 201–500 | 3 | 1mo ago | |
Cyble cyble.com |
Computer and Network Security | Cupertino, United States | 201–500 | 3 | 3mo ago | |
BioCatch biocatch.com |
Computer and Network Security | New York, United States | 201–500 | 2 | 2mo ago | |
Cyberbit cyberbit.com |
Computer and Network Security | Boston, United States | 201–500 | 2 | 1mo ago | |
Horizon3.ai horizon3.ai |
Computer and Network Security | San Francisco, United States | 201–500 | 2 | 2mo ago | |
Open Systems open-systems.com |
Computer and Network Security | Zurich, Switzerland | 201–500 | 2 | 1mo ago | |
PentenAmio pentenamio.com |
Computer and Network Security | Canberra, Australia | 201–500 | 2 | 2mo ago | |
Synack synack.com |
Computer and Network Security | Redwood City, United States | 201–500 | 2 | 1mo ago | |
Balbix balbix.com |
Computer and Network Security | San Jose, United States | 51–200 | 4 | 7w ago | |
OX Security ox.security |
Computer and Network Security | Boston, United States | 51–200 | 3 | 2mo ago | |
Stellar Cyber stellarcyber.ai |
Computer and Network Security | San Jose, United States | 51–200 | 3 | 5mo ago | |
BC Technologies bctechnologies.co.za |
Computer and Network Security | Durban, South Africa | 51–200 | 2 | 2mo ago | |
Astra Security getastra.com |
Computer and Network Security | United States | 51–200 | 2 | 2mo ago | |
ITrust itrust.fr |
Computer and Network Security | France | 51–200 | 2 | 1mo ago | |
Todyl todyl.com |
Computer and Network Security | Denver, United States | 51–200 | 2 | 4mo ago | |
Bénin Digital benin-digital.com |
Computer and Network Security | Cotonou, Benin | 11–50 | 3 | 1mo ago | |
Remedio (formerly GYTPOL) remedio.io |
Computer and Network Security | Ness Ziona, Israel | 11–50 | 3 | 1mo ago | |
Arpya arpya.xyz |
Computer and Network Security | Tirana, Albania | 11–50 | 2 | 1mo ago | |
Prelude preludesecurity.com |
Computer and Network Security | 11–50 | 2 | 3mo ago | ||
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 20 | 1mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 5 | 2mo ago |
121 companies use Prometheus. Want the full list?
Export to CSV▲Market Signal
444 open roles across 121 companies in a single vertical signals that Prometheus adoption in Computer and Network Security has moved past early adopter stage — this is now standard infrastructure. The role volume suggests most of these companies are in active build or scale phases, not maintenance mode.
⦿Stack Intelligence
Companies pairing Prometheus with Grafana, Loki, and Kubernetes are building fully integrated observability stacks, which typically means they've already committed to cloud-native architecture. The presence of Datadog alongside these tools suggests some organizations are running hybrid monitoring setups — a sign they're still evaluating vendors or consolidating tooling. For sales targeting, this combination points to buyers with active budgets and unresolved vendor decisions.
Where and how companies hire Prometheus talent
Don't just know who uses Prometheus.
Know who's actively building with it right now.
Search hiring signals →Prometheus is a metrics collection and alerting tool used to monitor the health and performance of infrastructure in real time. Security companies use it to detect anomalies, track system behavior, and feed data into broader incident response workflows. Hiring for it signals an organization is building or expanding production-grade monitoring capabilities.
Prometheus hiring in the security sector correlates directly with infrastructure investment cycles — companies adding these roles are spending on tooling, not just headcount. A sales rep at a cloud security or DevSecOps vendor can use this signal to time outreach to when budgets are actively allocated.
Vendors best positioned to sell to these companies include cloud security platforms, observability and APM providers, managed detection and response (MDR) services, and Kubernetes security tooling vendors.