Staff Security Engineer
Quick Summary
Security by Design: Implement “Security by Design” within agile software development and cloud-native environments, with a primary focus on GCP-native security architecture , IAM design,
Comfort operating as an engineer first , you measure impact by what you ship and what teams adopt, not by tickets closed or alerts triaged.
Pantheon WebOps Platform powers the open web, running more than 300,000 sites in the cloud for customers including Google, Princeton, Salesloft and Doctors Without Borders. Every day, thousands of developers and marketers create, iterate, and scale WordPress and Drupal sites to reach billions of people globally. Pantheon’s multitenant, container-based platform enables organizations to manage all of their websites from a single dashboard. Organizations including Clorox and the United Nations drive results through accelerated development and real-time publishing using Pantheon’s collaborative workflows.
Pantheon’s Security Engineering team is responsible for safeguarding, auditing, and testing the security of Pantheon's entire platform. Our Security Engineering team aims to create a comprehensive and multi-dimensional approach to application security, with a focus on Security by Design in agile software development and cloud native environments, with deep expertise in securing Google Cloud Platform (GCP) workloads at scale.
We are seeking a passionate, driven, and experienced application security engineer to join our growing team. The Staff Security Engineer is a key strategic and technical role within the Application Security team. This is an engineering-first role: we measure impact by what you build and what teams adopt, not by tickets closed or alerts triaged.
Our mission is to safeguard, audit, and test the security of the entire cloud hosting platform in these core areas:
- Security by Design: Implement “Security by Design” within agile software development and cloud-native environments, with a primary focus on GCP-native security architecture, IAM design, and workload protection.
- Support and Mentorship: Act as a Subject Matter Experts (SMEs), mentoring, coaching, and supporting all security engineering efforts across the organization.
- Standard Setting: Define, organize, and implement application security policy, process, standards, and guidelines.
- Application Security Performance: Helping engineering teams design and build high-performing, secure applications by mitigating security issues in a risk-based manner.
Responsibilities
~2 min read- →GCP Security Architecture: Design and implement security primitives across GCP including org policy hierarchies, VPC Service Controls perimeter design, Workload Identity Federation, CMEK key management strategy, and Secret Manager governance ensuring secure-by-default infrastructure across all engineering teams.
- →Policy Definition: Define, document, and champion processes and practices for a secure Software Development Life Cycle (SDLC).
- →Security Culture: Be a driving force in establishing a strong security culture within platform engineering teams.
- →Proactive Security: Lead Threat Modeling as a core principle for the Secure by Design strategy with particular focus on GCP-hosted, container-based, multi-tenant architectures. Design and enforce trust boundaries across GCP service and host project structures.
- →Secure Design Reviews: Conduct Secure Code and Architecture Design Reviews, including threat modeling and technology/risk-based assessments.
- →Automation: Automate application security testing and controls, integrating them directly into the CI/CD pipelines.
- →Tooling: Own the deployment, operation, and tuning of security tools (SAST, DAST, IAST, and CSPM), with a focus on platforms like CodeQL and Wiz.io including deep integration with GCP Security Command Center (SCC) and Binary Authorization for container workload protection.
- →Vulnerability Management: Partner with engineering to effectively prioritize and remediate identified vulnerabilities.
- →Supply Chain & Testing: Own the software supply chain security program, including SCA tooling, Artifact Registry vulnerability scanning, and Binary Authorization policy enforcement across GCP. Coordinate with the Security Operations team on penetration testing scope and findings remediation.
Requirements
~1 min read- Builder Orientation: Comfort operating as an engineer first , you measure impact by what you ship and what teams adopt, not by tickets closed or alerts triaged.
- Problem-Solving: Ability to bring standardization to inconsistent internal practices and transition to industry best practices.
- Communication: Strong communication skills essential for partnering with engineering teams.
- Commitment: Demonstrated commitment to teamwork, professionalism, and authenticity, fostering trust and accountability.
- Grit: Understanding that establishing security best practices is a marathon requiring persistence across many stakeholders.
- Overall Experience: Minimum of 10+ years of overall experience, with at least 5+ years dedicated to Application Security.
- GCP Security Depth: Proven, hands-on experience designing and operating security controls in Google Cloud Platform at scale including IAM and Workload Identity Federation, VPC Service Controls, CMEK and Secret Manager, Binary Authorization, GKE hardening, and Security Command Center. Experience with AWS or Azure is a plus; GCP is the primary platform for this role.
- Development Practices: Deep, hands-on experience in Secure by Design development practices, including guiding Secure Architecture and System Design.
- Security Engineering Mindset: A builder first demonstrated experience designing and shipping reusable security primitives (Terraform modules, policy libraries, pipeline integrations) that engineering teams adopt, not just policies that exist on paper.
- Cloud Infrastructure as Code: Hands-on experience writing production-grade, secure-by-default Terraform for GCP deployments including org policies, IAM bindings, VPC configurations, and GKE cluster hardening. Experience with GKE workload identity, node pool security, and admission controller configuration.
- Coding Proficiency: Ability to build maintainable components in Go or Python.
- CI/CD Fundamentals: Hands-on experience with Jenkins, Cloud Build, or CircleCI (bonus points for experience with reusable workflows).
- Tooling: Proven ability to build, select, and implement application security tools, and integrate them into CI/CD pipelines.
- Certifications: Google Professional Cloud Security Engineer certification strongly preferred. CISSP, CCSP, or CKS (Certified Kubernetes Security Specialist) are a plus.
- Education: Bachelor's degree in Computer Science or equivalent practical experience.
What We Offer
~2 min readListing Details
- First seen
- April 3, 2026
- Last seen
- April 26, 2026
Posting Health
- Days active
- 23
- Repost count
- 0
- Trust Level
- 39%
- Scored at
- April 26, 2026
Signal breakdown
We're building the world's best WebOps platform. Pantheon empowers marketing and development teams to take control of their websites, while giving them the agility to win in the dynamic world of digital marketing. We power over 700,000 sites and are trusted by thousands of marketing and development teams around the world - and we're just getting started.
View company profilePlease let Pantheon Systems, Inc know you found this job on Jobera.
3 other jobs at Pantheon Systems, Inc
View all →Explore open roles at Pantheon Systems, Inc.
Similar Security Engineer jobs
View all →Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.