141 companies in Computer and Network Security are hiring Splunk talent, with 413 open roles.
Splunk is the backbone of enterprise security operations — it ingests, indexes, and correlates machine data to power SIEM, threat detection, and incident response workflows. When a company in the Computer and Network Security sector posts Splunk roles at scale, it signals active investment in SOC infrastructure, often alongside SIEM migrations, XSIAM deployments, or managed detection buildouts. These companies are simultaneously in the market for adjacent tooling: threat intelligence platforms, SOAR solutions, and professional services tied to security operations maturity.
Buying Signal
A company hiring multiple Splunk specialists — especially roles like SOC Transformation Consultants or Threat Hunting Analysts — is likely mid-deployment or scaling an existing SIEM environment, which means active or imminent budget for complementary security tools. Vendors selling SOAR platforms, endpoint detection, or cloud security tooling should prioritize these accounts immediately. A concrete example: an SDR at a threat intelligence vendor should be sequencing outreach to any of the 141 companies with open Splunk roles before the deployment window closes.
| Company | Industry | HQ Location | Size | Jobs | Last Seen | Links |
|---|---|---|---|---|---|---|
CrowdStrike crowdstrike.com |
Computer and Network Security | United States | 5,001+ | 27 | 7w ago | |
Zscaler zscaler.com |
Computer and Network Security | San Jose, United States | 5,001+ | 6 | 7w ago | |
Abnormal AI abnormal.ai |
Computer and Network Security | Las Vegas, United States | 1,001–5,000 | 15 | 1mo ago | |
Tenable tenable.com |
Computer and Network Security | Columbia, United States | 1,001–5,000 | 11 | 1mo ago | |
Optiv optiv.com |
Computer and Network Security | Denver, United States | 1,001–5,000 | 8 | 7w ago | |
SentinelOne sentinelone.com |
Computer and Network Security | Mountain View, United States | 1,001–5,000 | 8 | 7w ago | |
C
Censys |
Computer and Network Security | Ann Arbor, United States | 1,001–5,000 | 5 | 2mo ago | |
Arctic Wolf arcticwolf.com |
Computer and Network Security | Eden Prairie, United States | 1,001–5,000 | 5 | 1mo ago | |
Cyderes cyderes.com |
Computer and Network Security | Kansas City, United States | 1,001–5,000 | 5 | 7w ago | |
DigiCert digicert.com |
Computer and Network Security | Lehi, United States | 1,001–5,000 | 5 | 1mo ago | |
KnowBe4 knowbe4.com |
Computer and Network Security | Clearwater, United States | 1,001–5,000 | 5 | 1mo ago | |
1Password 1password.com |
Computer and Network Security | Toronto, Canada | 1,001–5,000 | 2 | 2mo ago | |
Armis armis.com |
Computer and Network Security | San Francisco, United States | 501–1,000 | 6 | 2mo ago | |
UltraViolet Cyber uvcyber.com |
Computer and Network Security | McLean, United States | 501–1,000 | 6 | 2mo ago | |
Wiz wiz.io |
Computer and Network Security | New York, United States | 501–1,000 | 6 | 1mo ago | |
Huntress huntress.com |
Computer and Network Security | United States | 501–1,000 | 5 | 2mo ago | |
Ensign InfoSecurity ensigninfosecurity.com |
Computer and Network Security | Singapore | 501–1,000 | 4 | 1mo ago | |
Recorded Future recordedfuture.com |
Computer and Network Security | Somerville, United States | 501–1,000 | 4 | 7w ago | |
Telos Corporation telos.com |
Computer and Network Security | Ashburn, United States | 501–1,000 | 4 | 2mo ago | |
BlueVoyant bluevoyant.com |
Computer and Network Security | New York, United States | 501–1,000 | 2 | 2mo ago | |
CPX cpx.net |
Computer and Network Security | Abu Dhabi, United Arab Emirates | 501–1,000 | 2 | 2mo ago | |
Corelight corelight.com |
Computer and Network Security | San Francisco, United States | 201–500 | 5 | 2mo ago | |
Deepwatch deepwatch.com |
Computer and Network Security | Palo Alto, United States | 201–500 | 5 | 2mo ago | |
NVISO Security nviso.eu |
Computer and Network Security | Brussels, Belgium | 201–500 | 5 | 1mo ago | |
Devo devo.com |
Computer and Network Security | Boston, United States | 201–500 | 3 | 3mo ago | |
Sygnia sygnia.co |
Computer and Network Security | Tel-Aviv, Israel | 201–500 | 3 | 1mo ago | |
Anomali anomali.com |
Computer and Network Security | Redwood City, United States | 201–500 | 2 | 3mo ago | |
Adapt Forward adaptforward.com |
Computer and Network Security | North Charleston, United States | 51–200 | 7 | 2mo ago | |
Valimail valimail.com |
Computer and Network Security | Denver, United States | 51–200 | 7 | 7w ago | |
NuHarbor Security nuharborsecurity.com |
Computer and Network Security | United States | 51–200 | 6 | 1mo ago | |
SERMA Safety and Security serma-safety-security.com |
Computer and Network Security | Pessac, France | 51–200 | 6 | 2mo ago | |
JFL CONSULTING, LLC jflconsulting.com |
Computer and Network Security | Springfield, United States | 51–200 | 4 | 2mo ago | |
Zermount, Inc. zermount.com |
Computer and Network Security | United States | 51–200 | 4 | 2mo ago | |
Anvilogic anvilogic.com |
Computer and Network Security | Palo Alto, United States | 51–200 | 3 | 2mo ago | |
COGNNA cognna.com |
Computer and Network Security | 51–200 | 3 | 2mo ago | ||
CyberGate Defense cybergate.tech |
Computer and Network Security | Abu Dhabi, United Arab Emirates | 51–200 | 3 | 2mo ago | |
Lutessa lutessa.com |
Computer and Network Security | Paris, France | 51–200 | 3 | 7w ago | |
WarCollar Industries, LLC warcollar.com |
Computer and Network Security | Reston, United States | 51–200 | 3 | 2mo ago | |
NexThreat nexthreat.com |
Computer and Network Security | Alexandria, United States | 11–50 | 12 | 8mo ago | |
ARGO Cyber Systems argocyber.com |
Computer and Network Security | Pensacola, United States | 11–50 | 8 | 3mo ago | |
Phoenix Cyber phoenixcyber.com |
Computer and Network Security | Scottsdale, United States | 11–50 | 7 | 2mo ago | |
phia, LLC phiatech.com |
Computer and Network Security | Fairfax, United States | 11–50 | 4 | 2mo ago | |
Blackpanda blackpanda.com |
Computer and Network Security | Singapore, Singapore | 11–50 | 3 | 4mo ago | |
iVerify iverify.io |
Computer and Network Security | New York, United States | 11–50 | 3 | 3mo ago | |
Rapid Strategy rapidstrategy.io |
Computer and Network Security | 11–50 | 3 | 7mo ago | ||
Bénin Digital benin-digital.com |
Computer and Network Security | Cotonou, Benin | 11–50 | 2 | 2mo ago | |
Cyberdian Groupe cyberdian.com |
Computer and Network Security | Paris, France | 11–50 | 2 | 6mo ago | |
Colossus Technologies Group colossustg.com |
Computer and Network Security | Boston, United States | 2–10 | 3 | 1mo ago | |
Palo Alto Networks paloaltonetworks.com |
Computer and Network Security | Santa Clara, United States | 10,001+ | 37 | 1mo ago | |
Fortinet fortinet.com |
Computer and Network Security | Sunnyvale, United States | 10,001+ | 6 | 1mo ago |
141 companies use Splunk. Want the full list?
Export to CSV▲Market Signal
413 open roles across 141 companies in a single vertical points to a market that is actively building, not just maintaining — this isn't backfill hiring. The concentration suggests sustained budget cycles in security operations, not a one-time spike.
⦿Stack Intelligence
Companies pairing Splunk with Elastic and Datadog are often running multi-stack observability environments, which signals they have not standardized on a single vendor — a significant opportunity for platform consolidation plays. Python and AWS appearing alongside Splunk indicate teams building custom detection pipelines and cloud-native integrations, meaning they likely need professional services or DevSecOps tooling. Sales teams targeting this cluster should lead with integration capability and cloud deployment support.
Where and how companies hire Splunk talent
Don't just know who uses Splunk.
Know who's actively building with it right now.
Search hiring signals →Splunk is an enterprise platform used by security and IT operations teams to search, monitor, and analyze machine-generated data in real time. It sits at the center of most mature SOC environments, powering alerting, compliance reporting, and threat detection. Hiring for Splunk signals a company is actively running or building out a security operations function.
Splunk hiring is one of the clearest indicators that a security team is expanding its detection and response capabilities — which creates direct budget adjacency for dozens of complementary products. If you sell SIEM content packs, threat feeds, or incident response retainers, a new Splunk hire is your buying trigger.
Vendors best positioned to sell into Splunk-hiring companies include SOAR and automation platforms, managed SOC and MDR providers, threat intelligence feed vendors, and cloud security posture management tools.