554 companies in Computer and Network Security are hiring Python talent, with 3,479 open roles.
Python is the dominant language for data pipelines, machine learning infrastructure, and security automation — making it a core signal in cybersecurity hiring. When a Computer and Network Security company posts Python roles, they're typically building detection systems, threat intelligence pipelines, or ML-driven analytics. Adjacent purchases often follow: cloud data platforms, MLOps tooling, API security layers, and observability stacks.
Buying Signal
A security company hiring Python engineers is actively building or scaling internal tooling — which means budget is moving. They're likely evaluating data infrastructure vendors, threat intelligence feeds, or model deployment platforms. Sales reps at SIEM vendors, data pipeline tools, and AI/ML platforms should be prospecting these accounts immediately.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 221 | 6w ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 98 | 6w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 65 | 6w ago | |
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 207 | 6w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 134 | 6w ago | |
F
Fraunhofer Institute for Secure Information Technology SIT |
Computer and Network Security | Darmstadt, Germany | 10,001–5,000 | 92 | 5w ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 61 | 6w ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 59 | 6w ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 58 | 6w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 42 | 7w ago | ||
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 34 | 6w ago | |
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 30 | 6w ago | |
Rapid7 r-7.co |
Computer and Network Security | Boston, United States | 1,001–5,000 | 29 | 6w ago | |
Snyk snyk.io |
Computer and Network Security | Boston, United States | 1,001–5,000 | 28 | 6w ago | |
1Password 1password.com |
Computer and Network Security | Toronto, Canada | 1,001–5,000 | 24 | 6w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 21 | 6w ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 16 | 6w ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 14 | 6w ago | |
SonicWall sonicwall.com |
Computer and Network Security | Milpitas, United States | 1,001–5,000 | 14 | 6w ago | |
Tanium tanium.com |
Computer and Network Security | Kirkland, United States | 1,001–5,000 | 13 | 6w ago | |
Tenable tenable.com |
Computer and Network Security | Columbia, United States | 1,001–5,000 | 13 | 6w ago | |
Barracuda barracuda.com |
Computer and Network Security | Campbell, United States | 1,001–5,000 | 12 | 6w ago | |
ReliaQuest reliaquest.com |
Computer and Network Security | Tampa, United States | 1,001–5,000 | 12 | 7w ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 34 | 7w ago | |
Group-IB group-ib.com |
Computer and Network Security | Singapore, Singapore | 501–1,000 | 34 | 6w ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 30 | 6w ago | |
OPSWAT opswat.com |
Computer and Network Security | Tampa, United States | 501–1,000 | 28 | 6w ago | |
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 22 | 1mo ago | |
Illumio illumio.com |
Computer and Network Security | Sunnyvale, United States | 501–1,000 | 18 | 6w ago | |
Vectra AI vectra.ai |
Computer and Network Security | San Jose, United States | 501–1,000 | 17 | 1mo ago | |
NetSPI netspi.com |
Computer and Network Security | Minneapolis, United States | 501–1,000 | 16 | 6w ago | |
Recorded Future recordedfuture.com |
Computer and Network Security | Somerville, United States | 501–1,000 | 15 | 6w ago | |
Dragos, Inc. dragos.com |
Computer and Network Security | United States | 501–1,000 | 14 | 6w ago | |
ExtraHop extrahop.com |
Computer and Network Security | Seattle, United States | 501–1,000 | 11 | 7w ago | |
UltraViolet Cyber uvcyber.com |
Computer and Network Security | McLean, United States | 501–1,000 | 11 | 7w ago | |
Pentera pentera.io |
Computer and Network Security | Burlington, United States | 201–500 | 22 | 6w ago | |
Protegrity protegrity.com |
Computer and Network Security | Stamford, United States | 201–500 | 19 | 6w ago | |
Torq torq.io |
Computer and Network Security | New York, United States | 201–500 | 15 | 6w ago | |
Quantinuum quantinuum.com |
Computer and Network Security | Broomfield, United States | 201–500 | 11 | 6w ago | |
Corelight corelight.com |
Computer and Network Security | San Francisco, United States | 201–500 | 10 | 7w ago | |
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 20 | 6w ago | |
Zetier zetier.com |
Computer and Network Security | United States | 51–200 | 17 | 7w ago | |
Kudu Dynamics LLC kududyn.com |
Computer and Network Security | Chantilly, United States | 51–200 | 14 | 6w ago | |
Futurex futurex.com |
Computer and Network Security | Bulverde, United States | 51–200 | 13 | 3mo ago | |
Guardio guard.io |
Computer and Network Security | Bat Yam, Israel | 51–200 | 12 | 2mo ago | |
Remedio (formerly GYTPOL) remedio.io |
Computer and Network Security | Ness Ziona, Israel | 11–50 | 12 | 6w ago | |
InsiderSecurity insidersecurity.co |
Computer and Network Security | Singapore | 11–50 | 11 | 2mo ago | |
Rapid Strategy rapidstrategy.io |
Computer and Network Security | 11–50 | 11 | 5mo ago | ||
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 214 | 6w ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 177 | 6w ago |
554 companies use Python. Want the full list?
Export to CSV▲Market Signal
554 security companies running 3,479 open Python roles signals that automated, ML-driven defense is no longer a differentiator — it's table stakes. This volume indicates an industry-wide shift toward software-defined security operations, not just point-in-time hires.
⦿Stack Intelligence
Python roles in this sector consistently co-occur with FastAPI, Flask, Django, PyTorch, and Airflow — a stack that points to productionized ML services and automated data workflows, not just scrimentation. Companies hiring across this combination are building internal platforms, which signals procurement interest in managed infrastructure, vector databases, and workflow orchestration tools. That's a high-value account profile for both horizontal SaaS vendors and security-specific tooling providers.
Where and how companies hire Python talent
Don't just know who uses Python.
Know who's actively building with it right now.
Search hiring signals →Python is the primary programming language behind data engineering, machine learning, and security automation workflows. For security firms, it powers everything from threat detection models to API-based integrations. When a company hires Python talent in this sector, they're building production-grade systems — not prototypes.
Python hiring in cybersecurity indicates active investment in internal engineering capacity, which typically precedes or accompanies vendor spend. A sales team selling threat intelligence APIs or cloud data warehouses should treat these job posts as early-stage pipeline signals.
Vendors best positioned here include cloud infrastructure providers, MLOps and model deployment platforms, API security tools, and security data pipeline or SIEM vendors.