105 companies in Computer and Network Security are hiring Redis talent, with 386 open roles.
Redis is an in-memory data store used for caching, session management, and real-time data processing — and in the Computer and Network Security industry, hiring for it signals that a company is scaling systems that require sub-millisecond response times, likely for threat detection pipelines or authentication infrastructure. With 105 security firms actively hiring Redis talent and 386 open roles, this is a sector building high-throughput backends that need adjacent tooling for data streaming, search, and persistence. These companies are probable buyers of cloud infrastructure, observability platforms, and managed database services.
Buying Signal
When a security company posts Redis roles, they're typically mid-build on a real-time data architecture — think event ingestion, IP reputation lookups, or session token management at scale. That's a buying signal for vendors selling managed Redis hosting, distributed caching solutions, or security data platforms. SDRs at cloud providers, database vendors, and DevSecOps tooling companies should be prospecting these accounts now, before the architecture decisions are finalized.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 25 | 1mo ago | |
Check Point Software checkpoint.com |
Computer and Network Security | Redwood City, United States | 5,001+ | 12 | 2mo ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 11 | 1mo ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 46 | 7w ago | |
Nord Security nordsecurity.com |
Computer and Network Security | 1,001–5,000 | 30 | 1mo ago | ||
Cloudflare cloudflare.com |
Computer and Network Security | San Francisco, United States | 1,001–5,000 | 20 | 7w ago | |
Qualys qualys.com |
Computer and Network Security | Foster City, United States | 1,001–5,000 | 16 | 7w ago | |
Netskope netskope.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 15 | 7w ago | |
R
Radware |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 10 | 7w ago | |
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 8 | 1mo ago | |
Cato Networks catonetworks.com |
Computer and Network Security | Tel-Aviv, Israel | 1,001–5,000 | 7 | 1mo ago | |
SonicWall sonicwall.com |
Computer and Network Security | Milpitas, United States | 1,001–5,000 | 6 | 7w ago | |
RSA Security rsa.com |
Computer and Network Security | Burlington, United States | 1,001–5,000 | 4 | 3mo ago | |
Cybereason cybereason.com |
Computer and Network Security | San Diego, United States | 1,001–5,000 | 3 | 6w ago | |
TECEZE teceze.com |
Computer and Network Security | Chicago, United States | 1,001–5,000 | 3 | 2mo ago | |
Infoblox infoblox.com |
Computer and Network Security | Santa Clara, United States | 1,001–5,000 | 2 | 2mo ago | |
Beijing VRV Software Corporation Limited vrv.com.cn |
Computer and Network Security | 1,001–5,000 | 2 | 12mo ago | ||
Sysdig sysdig.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 6 | 2mo ago | |
Axonius axonius.com |
Computer and Network Security | New York, United States | 501–1,000 | 2 | 7w ago | |
北明软件 bmsoft.com.cn |
Computer and Network Security | Beijing, China | 501–1,000 | 2 | 12mo ago | |
Group-IB group-ib.com |
Computer and Network Security | Singapore, Singapore | 501–1,000 | 2 | 1mo ago | |
NetSPI netspi.com |
Computer and Network Security | Minneapolis, United States | 501–1,000 | 2 | 7w ago | |
Aqua Security aquasec.com |
Computer and Network Security | Burlington, United States | 501–1,000 | 1 | 1mo ago | |
Orca Security orca.security |
Computer and Network Security | Portland, United States | 201–500 | 7 | 1mo ago | |
CHEQ cheq.ai |
Computer and Network Security | New York, United States | 201–500 | 6 | 2mo ago | |
Upwind Security upwind.io |
Computer and Network Security | San Francisco, United States | 201–500 | 6 | 7w ago | |
Cyberhaven cyberhaven.com |
Computer and Network Security | Palo Alto, United States | 201–500 | 5 | 1mo ago | |
Arkose Labs arkoselabs.com |
Computer and Network Security | San Mateo, United States | 201–500 | 3 | 7w ago | |
Menlo Security Inc. menlosecurity.com |
Computer and Network Security | Mountain View, United States | 201–500 | 3 | 7w ago | |
Dashlane dashlane.com |
Computer and Network Security | New York, United States | 201–500 | 2 | 1mo ago | |
Hack The Box hackthebox.com |
Computer and Network Security | Folkestone and Hythe District, United Kingdom | 201–500 | 2 | 3mo ago | |
Knox Systems, Inc. knoxsystems.com |
Computer and Network Security | 201–500 | 2 | 2mo ago | ||
Koal Software koal.com |
Computer and Network Security | 201–500 | 2 | 12mo ago | ||
Synack synack.com |
Computer and Network Security | Redwood City, United States | 201–500 | 2 | 1mo ago | |
XM Cyber xmcyber.com |
Computer and Network Security | Tel-Aviv, Israel | 201–500 | 2 | 2mo ago | |
Guardio guard.io |
Computer and Network Security | Bat Yam, Israel | 51–200 | 6 | 3mo ago | |
Dream dreamgroup.com |
Computer and Network Security | Tel-Aviv, Israel | 51–200 | 5 | 7w ago | |
Safe Security safe.security |
Computer and Network Security | Palo Alto, United States | 51–200 | 4 | 1mo ago | |
Stellar Cyber stellarcyber.ai |
Computer and Network Security | San Jose, United States | 51–200 | 3 | 5mo ago | |
Balbix balbix.com |
Computer and Network Security | San Jose, United States | 51–200 | 2 | 2mo ago | |
GitGuardian gitguardian.com |
Computer and Network Security | Paris, France | 51–200 | 2 | 2mo ago | |
IRONSCALES ironscales.com |
Computer and Network Security | Atlanta, United States | 51–200 | 2 | 2mo ago | |
LayerX Security layerxsecurity.com |
Computer and Network Security | New York, United States | 51–200 | 2 | 2mo ago | |
Whalebone whalebone.io |
Computer and Network Security | Brno, Czechia | 51–200 | 2 | 1mo ago | |
Axiad axiad.com |
Computer and Network Security | San Jose, United States | 51–200 | 1 | 6mo ago | |
LpsChain lpschain.com |
Computer and Network Security | Kâğıthane, Turkey | 11–50 | 2 | 1mo ago | |
Backline.ai backline.ai |
Computer and Network Security | Englewood, United States | 11–50 | 1 | 5mo ago | |
Cloud Security Services cloudsecuritysvcs.com |
Computer and Network Security | Princeton, United States | 2–10 | 2 | 15mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 13 | 7w ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 7 | 2mo ago |
105 companies use Redis. Want the full list?
Export to CSV▲Market Signal
386 open roles across 105 companies is a high roles-per-company ratio, suggesting these aren't exploratory hires — security firms are staffing entire Redis-dependent teams, which points to committed, multi-year infrastructure investments rather than one-off projects.
⦿Stack Intelligence
Companies pairing Redis with Kafka, Elasticsearch, Postgres, Node.js, and Python are building event-driven architectures that ingest, cache, and query security telemetry at speed. This stack combination indicates mature engineering orgs running microservices with real-time alerting requirements — a strong fit for vendors offering observability, data pipeline tooling, or cloud-native databases. If a prospect uses three or more of these technologies together, they're likely evaluating or already buying enterprise-grade infrastructure contracts.
Where and how companies hire Redis talent
Don't just know who uses Redis.
Know who's actively building with it right now.
Search hiring signals →Redis is an open-source, in-memory key-value store used to accelerate application performance through caching and fast data retrieval. In security contexts, it underpins systems that need to process and respond to events in real time. Hiring for Redis signals that a company is actively building or scaling that kind of performance-sensitive infrastructure.
Redis hiring indicates a company is investing in real-time data processing — a strong proxy for infrastructure spend. A rep selling cloud databases or streaming platforms can use this signal to time outreach before vendor selection happens.
Vendors best positioned to sell into Redis-hiring security companies include managed cloud database providers, observability and monitoring platforms, DevSecOps tooling vendors, and data streaming infrastructure companies.