Security Analyst II
Posted on 3/25/2024

201-500 employees

WebOps platform for efficient website management
Company Overview
Pantheon Platform is a WebOps platform that empowers developers, IT, and marketing teams to develop, test, and release website changes swiftly and reliably. With a cloud-native software, it provides a secure environment to manage a single website or thousands of websites across multiple teams, backed by 24/7 support. The company's competitive advantage lies in its ability to offer up to 99.99% uptime, seamless integrations with popular e-commerce platforms, and robust security measures, making it a trusted choice for large brands and organizations across various industries.

Company Stage

Series E

Total Funding





San Francisco, California

Growth & Insights

6 month growth


1 year growth


2 year growth

Vancouver, BC, Canada
Experience Level
Desired Skills
IT & Security
  • 3 to 5 years of experience of Information Technology experience in networking, operations, security, or other technical discipline
  • 1 to 3 years of experience working in a regulated or audited organization
  • 3 to 5 years of experience as a SOC or security operations analyst
  • Experience with security tooling and techniques
  • Experience with security processes and procedures
  • Critical thinking and ability to think through problems
  • Ability to work on-site, remotely or at other locations as needed
  • Excellent written and oral communication skills
  • Ability to deal with fast pace and high stress
  • Ability to support shift work
  • Ability to be on-call
  • Provide security event monitoring through analysis and response to alerts
  • Prioritize alerts based on severity, impact and risk to operations
  • Perform Incident Response tasks based on framework and process steps
  • Document and manage incident cases
  • Escalation point for on-duty SOC analysts
  • Contribute to forensic analysis
  • Follow SOPs
  • Trending and analysis of security and operational tooling log data
  • Review and optimization of log search queries
  • Conduct gap analysis of detection methods, placement, and depth of coverage
  • Deep familiarity with SIEM architecture, SIEM operations and ecosystem
  • Review of raw logs to develop trending and analysis related to operational searches
  • Contribute to development of baseline and deviation KPIs
  • Contribute to security tooling detection rule optimization
  • Validate that security tooling is operational and detection rules, policies, etc. are functioning as intended
  • Promote a culture of security across the organization
  • Be able to wear many hats, performing critical required duties as necessary, especially as the team is being developed
  • Occasional travel