Explore Top Tech Companies
All Filters
Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Seattle, WA Security Companies (65)

Don't see your company?

Create a company profile
Aerospace • Artificial Intelligence • Hardware • Robotics • Security • Software • Defense
Seattle, Washington, USA
1,400 Employees

Anduril is a defense products company. Unlike most defense companies, we don’t wait for our customers to tell us what they need. We identify problems, privately fund our R&D and sell finished products off the shelf. Ideas are turned into deployed capabilities in months, not years.


Cloud • Professional Services • Security • Analytics • Consulting • Utilities • Renewable Energy
Seattle, Washington, USA
2,000 Employees

West Monroe is a digital services firm that was born in technology but built for business—partnering with companies in transformative industries to deliver quantifiable financial value. We believe that digital is a mindset—not a project, a team, or a destination—and it’s something companies become, not something they do. That’s why we work in diverse, multidisciplinary teams that blend management consulting, digital design, and product engineering to move companies from traditional ways of working to digital operating models—and create experiences that transcend the digital and physical worlds. Connected by the 13 founding values that drive our culture, our 2,000 employees work collaboratively across the firm with the belief that your success is our success.


Artificial Intelligence • Cloud • Mobile • Security • Software
Seattle, Washington, USA
145 Employees

Our mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, connecting businesses with their customers, and helping carriers secure their networks for all.


Information Technology • Security • Cybersecurity
Fully Remote
250 Employees

If your career aspiration when you were a child was to fight the “bad guys” while helping the good ones, keep reading. We’re Huntress. Through education, expertise and curiosity, our team protects our partners from today’s increasingly dangerous threat actors. Founded by former NSA Cyber Operators—and backed by a team of human ThreatOps researchers—we’re working to bring cybersecurity to the 99%: those businesses and mom-and-pop shops that lack the resources to defend themselves. Come join the hunt and make your childhood self proud (in a 21st century kind of way).


Information Technology • Security • Cybersecurity
Seattle, Washington, USA
3,300 Employees

Cloudflare, Inc. is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company's Most Innovative Companies in 2021, and ranked among Newsweek's Top 100 Most Loved Workplaces in 2022.


Cloud • Information Technology • Sales • Security • Cybersecurity
Kirkland, Washington, USA
10,000 Employees

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks. The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team. We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?


Cloud • Internet of Things • Security • Software
Seattle, Washington, USA
470 Employees

Verkada protects people, assets, and privacy in physical spaces with its hybrid cloud security solution that makes it simple to manage devices at scale. Our vision is to power the modern, integrated building of the future.


Security
Seattle, Washington, USA

SpecterOps provides adversary-focused cybersecurity solutions to help organizations understand how threat actors maneuver against them, so they can successfully defend against advanced attacks.


Artificial Intelligence • Cloud • Security • Software • Cybersecurity
Seattle, Washington, USA
514 Employees

ExtraHop secures the hybrid enterprise through network detection and response. ExtraHop provides cloud-native network detection and response for the hybrid enterprise. Our breakthrough approach analyzes all network interactions and applies cloud-scale machine learning for complete visibility, real-time detection, and intelligent response.


Security
Seattle
341 Employees

Hybrid conflict. Non-state actors. Digital hacktivists. Tribal politics. Advanced technology. Ancient beliefs. Rapid adaptation. Strategic uncertainty. Declining resources. Rising extremism. Today’s national security challenges are complex and multidimensional, requiring adaptive, interagency responses. For more than a decade, IDS International has delivered innovative training, research and operational civil-military services to help address these 21st century challenges. We are seasoned soldiers, aid workers, diplomats, intelligence professionals, cyber warriors, technical experts, political advisors, and more with a common understanding of how to train for and operate in conflict zones and transitional areas. Our team of interagency experts and field practitioners operate and train together daily, building on our global multidisciplinary understanding of challenges, best practices and new approaches. This wide range of perspectives permits us to serve as a liaison between civil society, military, government and technology to enhance coordination and effectively solve complex security and political problems.


Artificial Intelligence • Big Data • Cloud • Security

Stabilitas is the first cloud and Artificial Intelligence based critical event management technology that helps companies protect their employees and resources in an unstable world. The Stabilitas platform detects potential threats from news, government feeds, social media, correlating the data via ML to identify at-risk scenarios to create alerts.


Security
23 Employees

Defiant is the industry leader in website security. We provide software and services to millions of website owners to protect their reputations, customer data and their businesses.


Security
6 Employees

Trustless Authentication | Trusted Identity


Security
Kirkland, Washington, USA

Tanium offers endpoint management and security that is built for the world’s most demanding IT environments. Many of the world’s largest and most sophisticated organizations, including nearly half of the Fortune 100, top retailers and financial institutions, and multiple branches of the US Armed Forces rely on Tanium to make confident decisions, operate efficiently and effectively, and remain resilient against disruption. Tanium has been named to the Forbes Cloud 100 list of “Top 100 Private Companies in Cloud Computing” for five consecutive years and ranks 4th on FORTUNE’s list of the “Best Workplaces in Technology 2020.”


Information Technology • Professional Services • Security • Software • Consulting
Seattle, Washington, USA
130 Employees

Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our assessment and training solutions to secure software wherever it runs. Our services clients are among the largest brands in the world - Microsoft, AWS, Symantec, Disney, State Farm, Verizon, just to name a few. They trust us to provide best-in-class software penetration testing, application security consulting and infrastructure security consulting. Our clients rely on our experts so much, that they asked us to train their internal teams to help scale their software security programs. So, we created CMD+CTRL Training combines role-based courses with hands-on cyber ranges to build skills that stick, a computer-based security training that has been recognized 6 times on the Gartner Magic Quadrant. With over 3.5 million users, CMD+CTRL helps all software security stakeholders address the risk of today’s tech stacks – flawed design, defenseless code, expanded attack surface, and misconfigured deployments.


Cloud • Enterprise Web • Information Technology • Security • Software
18 Employees

At Aserto we want to help every SaaS application authorize like a great Enterprise application. Meeting the enterprise bar requires fine-grained permissions, role- and attribute-based access control, flexible and custom roles, integration with numerous enterprise identity providers and directories, and complete authorization logs to meet a growing list of data and privacy compliance standards. Today, engineering teams have to invest considerable effort in building, maintaining, and evolving a “table stakes” set of capabilities that are tricky to get right, yet aren’t visible to the end-user and don’t offer meaningful differentiation. From the enterprise customer’s perspective, the IT teams that operate these SaaS applications have to live in dozens (or hundreds) of different permissions consoles - a fractured, error-prone, frustrating experience resulting in misconfigurations, data leaks, and manual, soul-crushing compliance audits. No wonder everyone we talk to feels like authorization is broken! At Aserto, we want to address these pain points at the source: by creating a simple, opinionated framework that engineers can use to easily incorporate authorization into their applications. Engineers win by integrating a modern, cloud-native service instead of having to reinvent the wheel. SaaS vendors win by shortening sales cycles with an enterprise-ready set of authorization capabilities, satisfying the infamous “enterprise requirements spreadsheet”. IT teams win by leveraging consistent, reusable authorization policies across their applications. Compliance teams win by having comprehensive authorization logs that help them easily meet audit requirements.


Artificial Intelligence • Machine Learning • Security • Software
448 Employees

We are the global leader in Managed Detection and Response (MDR), keeps organizations safe from cyber attacks that technology alone cannot prevent. Our 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events.


Security

Red Queen Technologies is a trusted information security consulting and security operations provider to midsize finance, transportation, healthcare, and supply/logistics companies, and we’re here to help you secure your product and world from today’s threats.


Cloud • Information Technology • Security
8 Employees

Shujinko, the better way to build in the cloud. Take the easy path to secure, compliant cloud environments. Don't waste time and money building cloud environments that won't pass compliance. Stop collecting evidence manually for audits. Shujinko is ensuring compliance from the start and automatically collecting evidence to pass your audit!


Big Data • Enterprise Web • Security • Software
Seattle, Washington, USA
180 Employees

Ekata provides global identity verification via APIs and a SaaS solution. Our product suite is powered by the Ekata Identity Engine that uses complex machine learning to derive unique data links from our customer network and graph to provide the standard in global identity verification to companies.